TWM508733U - Authentication system of electronic insurance policy - Google Patents
Authentication system of electronic insurance policy Download PDFInfo
- Publication number
- TWM508733U TWM508733U TW104205685U TW104205685U TWM508733U TW M508733 U TWM508733 U TW M508733U TW 104205685 U TW104205685 U TW 104205685U TW 104205685 U TW104205685 U TW 104205685U TW M508733 U TWM508733 U TW M508733U
- Authority
- TW
- Taiwan
- Prior art keywords
- file
- policy
- electronic
- verification
- authenticated
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
Description
一種電子保單之驗證系統,特別係指一種使用電子憑證驗證電子保單之系統。An electronic policy verification system, in particular, a system for verifying an electronic policy using an electronic voucher.
由於保存紙本文件需要合適的環境,否則紙本文件容易遭到損壞,而除了環境的因素之外,紙本文件也需要空間來保存,因此,紙本文件的保存需要一定的成本。Since the paper file requires a suitable environment, the paper document is easily damaged, and in addition to the environmental factors, the paper document requires space to be stored, and therefore, the storage of the paper document requires a certain cost.
而隨著資訊處理技術與通信技術的快速發展,由於電子文件不容易因為環境因素而遭到破壞,且幾乎不需要保存空間,這造成紙本文件逐漸轉變為電子文件的趨勢。不過,相對的,電子文件比紙本文件容易被竊取、篡改、或偽造,也就是電子文件的安全性也較紙本文件來得低,所以,不論個人或是企業都相當關注電子文件之安全性的問題。With the rapid development of information processing technology and communication technology, electronic files are not easily destroyed by environmental factors, and there is almost no need to save space, which causes the trend of paper documents to be gradually converted into electronic files. However, in contrast, electronic documents are easier to steal, falsify, or falsify than paper documents, that is, the security of electronic documents is lower than that of paper documents. Therefore, both individuals and companies are concerned about the security of electronic documents. The problem.
也因此,目前對於竊取電子文件的防範,可藉由將電子文件進行加密而確保電子文件的安全性,而對於偽造或篡改電子文件的防範,則可利用數位簽章而確保正確性。Therefore, at present, for the prevention of stealing electronic files, the security of electronic files can be ensured by encrypting electronic files, and for counterfeiting or tampering with electronic files, digital signatures can be used to ensure correctness.
不過,對於部分的文件而言,例如需要擁有人確認內容的文件,比如合約、保單等,使用紙本的形式仍然遠多於使用電子的形式。這是通常因為隨著時間的遞移,電子文件的擁有人無法直接確認文件是否遭到篡改或偽造,因此,仍然使用傳統容易發現被修改之處的紙本文件來記錄內容。However, for some documents, such as documents that require the owner to confirm the content, such as contracts, policies, etc., the use of paper is still much more than the use of electronic forms. This is usually because the owner of an electronic file cannot directly confirm whether the file has been tampered with or falsified over time, and therefore, the paper is still recorded using a conventional paper file that is easily found to be modified.
綜上所述,可知先前技術中長期以來一直存在電子文件的擁有人無法直接確認電子文件是否遭到篡改或偽造的問題,因此有必要提出改進的技術手段,來解決此一問題。In summary, it can be seen that the owner of electronic documents in the prior art has not been able to directly confirm whether the electronic file has been tampered with or forged. Therefore, it is necessary to propose an improved technical means to solve this problem.
有鑒於先前技術存在電子文件的擁有人無法直接確認電子文件是否遭到篡改或偽造的問題,本創作遂揭露一種電子保單之驗證系統,其中:In view of the fact that the owner of an electronic document in the prior art cannot directly confirm whether the electronic document has been tampered with or forged, the present invention discloses an electronic policy verification system in which:
本創作所揭露之電子保單之驗證系統,至少包含:文件提供主機,用以產生送簽文件,送簽文件包含待認證文件及提供驗證待認證文件之第二數位簽章;驗證伺服器,用以接收文件提供主機所傳送之送簽文件,並於成功驗證送簽文件後,產生電子保單,電子保單包含送簽文件及提供驗證送簽文件之第三數位簽章,及用以傳送電子保單至文件提供主機儲存;客戶端,用以接收文件提供主機所傳送之電子保單,及用以驗證送簽文件與待認證文件,並顯示待認證文件與送簽文件之驗證結果。The verification system of the electronic policy disclosed in the present invention includes at least: a file providing host for generating a delivery document, the delivery document includes a document to be authenticated and a second digital signature for verifying the document to be authenticated; the verification server uses The receiving document provides the delivery document transmitted by the host, and after successfully verifying the delivery document, an electronic policy is generated, the electronic policy includes the delivery document and the third digital signature of the verification delivery document, and the electronic insurance policy is transmitted. The file provides host storage; the client receives the file to provide the electronic policy transmitted by the host, and is used to verify the delivery file and the file to be authenticated, and displays the verification result of the file to be authenticated and the file to be sent.
本創作所揭露之驗證系統如上,與先前技術之間的差異在於本創作透過文件提供主機對待認證文件進行數位簽章後,驗證伺服器也會對數位簽章後的待認證文件再次進行數位簽章,客戶端可以驗證驗證伺服器與文件提供主機的數位簽章,並顯示驗證結果,藉以解決先前技術所存在的問題,並可以達成提高電子保單之使用方便性的技術功效。The verification system disclosed in the present application is as above, and the difference between the prior art and the prior art is that after the creation of the document to provide the host with the digital signature of the authentication file, the verification server will perform the digital signature again on the digitally signed document to be authenticated. In chapter, the client can verify the digital signature of the authentication server and the file providing host, and display the verification result, thereby solving the problems of the prior art and achieving the technical effect of improving the convenience of using the electronic policy.
以下將配合圖式及實施例來詳細說明本創作之特徵與實施方式,內容足以使任何熟習相關技藝者能夠輕易地充分理解本創作解決技術問題所應用的技術手段並據以實施,藉此實現本創作可達成的功效。The features and implementations of the present invention will be described in detail below in conjunction with the drawings and embodiments, which are sufficient to enable any skilled person to fully understand the technical means to which the present invention solves the technical problems and implement them accordingly. The achievable effect of this creation.
本創作可以在文件提供主機以及驗證伺服器依序對待認證文件進行數位簽章產生電子保單後,由文件提供主機將包含數位簽章的電子保單傳送給客戶端,客戶端可以依據電子保單中的數位簽章驗證產生待認證文件中之原始保單的內容是否正確無誤,並顯示驗證結果。The author can send the electronic policy containing the digital signature to the client by the file providing host after the file providing host and the verification server sequentially process the authentication file to generate the electronic certificate. The client can refer to the electronic policy in the electronic policy. The digital signature verification verifies that the content of the original policy in the document to be certified is correct and displays the verification result.
以下先以「第1圖」本創作所提之使用電子憑證驗證電子保單之系統架構圖來說明本創作的系統運作。如「第1圖」所示,本創作之驗證系統含有文件提供主機110、驗證伺服器120、以及客戶端130。其中,文件提供主機110通常被設置在提供原始保單及/或電子保單的保險機構,例如保險公司等,驗證伺服器120則通常被設置在憑證機構,例如憑證發行單位等,或可以被設置在提供原始保單及/或電子保單的保險機構,但本創作對於文件提供主機110與驗證伺服器120所設置的位置並沒有特別的限制。The system operation of the creation of the electronic voucher using the electronic certificate verification system diagram proposed in the "Picture 1" is described below. As shown in "FIG. 1", the authentication system of the present creation includes a file providing host 110, a verification server 120, and a client 130. Wherein, the document providing host 110 is usually set up in an insurance institution that provides an original policy and/or an electronic policy, such as an insurance company, etc., and the verification server 120 is usually set in a voucher institution, such as a voucher issuing unit, or the like, or may be set in An insurance institution that provides an original policy and/or an electronic policy, but the present creation is not particularly limited to the location where the file providing host 110 and the authentication server 120 are set.
文件提供主機110負責產生送簽文件。文件提供主機110所產生的送簽文件包含待認證文件以及被提供來驗證待認證文件的第二數位簽章,也就是說,文件提供主機110會先使用文件提供主機110的私密金鑰(private key)對待認證文件進行演算,並取得演算產生的第二數位簽章,以及將待認證文件與第二數位簽章、或將待認證文件、第二數位簽章與其他資料合併為送簽文件。The file providing host 110 is responsible for generating the delivery file. The file providing file generated by the host 110 includes a file to be authenticated and a second digital signature provided to verify the file to be authenticated, that is, the file providing host 110 first uses the file to provide the private key of the host 110 (private Key) Calculate the document to be certified, and obtain the second digit signature generated by the calculation, and combine the document to be certified with the second digit, or merge the document to be certified, the second digit signature and other materials into the delivery document. .
送簽文件所包含的待認證文件可以是記錄使用者之保單內容的原始保單與第一數位簽章的電子文件,也可以是包含一個原始保單的加密文件與第一數位簽章的電子文件。文件提供主機110可以將原始保單加密以取得加密文件,並使用文件提供主機110的私密金鑰對原始保單進行演算,藉以在演算後取得被提供來驗證原始保單的第一數位簽章,以及將加密文件與第一數位簽章、或將加密文件、第一數位簽章與其他資料合併為待認證文件。The document to be authenticated included in the delivery document may be an electronic document that records the original policy of the user's policy and the first digital signature, or an electronic file that includes an encrypted document of the original policy and the first digital signature. The file providing host 110 may encrypt the original policy to obtain the encrypted file, and use the file providing host 110's private key to calculate the original policy, thereby obtaining the first digital signature provided to verify the original policy after the calculation, and The encrypted file is signed with the first digit, or the encrypted file, the first digit signature, and other materials are merged into the file to be authenticated.
文件提供主機110也負責將所產生的送簽文件傳送到驗證伺服器120,並接收驗證伺服器120對送簽文件進行數位簽章後所傳回的電子保單,以及將所接收到的電子保單傳送到客戶端130。在部分的實施例中,文件提供主機110是透過電子郵件將電子保單傳送給客戶端130,但本創作並不以此為限。The file providing host 110 is also responsible for transmitting the generated delivery file to the verification server 120, and receiving the electronic policy returned by the verification server 120 after digitally signing the delivery document, and the received electronic policy. Transfer to client 130. In some embodiments, the file providing host 110 transmits the electronic policy to the client 130 via email, but the present invention is not limited thereto.
驗證伺服器120負責接收文件提供主機110所傳送的送簽文件,並依據送簽文件中的第二數位簽章驗證送簽文件中的待認證文件。The verification server 120 is responsible for receiving the delivery file transmitted by the file providing host 110, and verifying the to-be-certified file in the delivery file according to the second digital signature in the delivery file.
驗證伺服器120也負責在成功驗證待認證文件後產生電子保單,並將所產生的電子保單傳回文件提供主機110儲存。驗證伺服器120所產生的電子保單包含所接收到的送簽文件以及被提供來驗證送簽文件的第三數位簽章。也就是說,驗證伺服器120會在接收到送簽文件後,使用驗證伺服器120的私密金鑰對送簽文件進行演算以取得演算產生的第三數位簽章,以及將送簽文件與第三數位簽章、或將送簽文件、第三數位簽章與其他資料合併為電子保單。其中,一起被合併到電子保單中的其他資料包含但不限於版本資訊。The verification server 120 is also responsible for generating an electronic policy after successfully verifying the file to be authenticated, and transmitting the generated electronic policy back to the file providing host 110 for storage. The electronic policy generated by the verification server 120 includes the received delivery document and a third digital signature provided to verify the delivery document. That is to say, after receiving the delivery file, the verification server 120 uses the private key of the verification server 120 to calculate the delivery document to obtain the third digital signature generated by the calculation, and the delivery document and the first A three-digit signature, or a combination of a delivery document, a third-digit signature, and other materials into an electronic policy. Among other things, the other materials that are merged into the electronic policy include, but are not limited to, version information.
另外,驗證伺服器120可以接收客戶端130所傳送的解密文件以及電子保單。由於電子保單中包含送簽文件以及第三數位簽章,送簽文件中包含待認證文件,且待認證文件中包含第一數位簽章,因此,驗證伺服器120可以依據第一數位簽章驗證解密文件,以及依據第三數位簽章驗證送簽文件,並在驗證後產生驗證結果,以及將所產生的驗證結果傳送到客戶端130。In addition, the authentication server 120 can receive the decrypted file transmitted by the client 130 and the electronic policy. Since the electronic policy includes the delivery document and the third digital signature, the delivery document includes the file to be authenticated, and the first digit signature is included in the to-be-certified file. Therefore, the verification server 120 can verify according to the first digital signature. The file is decrypted, and the delivery document is verified according to the third digit signature, and the verification result is generated after verification, and the generated verification result is transmitted to the client 130.
客戶端130負責接收文件提供主機110所傳送的電子保單。一般而言,客戶端130可以是使用者所使用的裝置或是使用者所使用之裝置中的軟體或硬體,客戶端130可以開啟電子保單,並由電子保單中讀取出送簽文件與第三數位簽章,並依據電子保單中的第三數位簽章驗證電子保單中的送簽文件;也可以開啟送簽文件,由送簽文件中讀取出待認證文件與第二數位簽章,並依據送簽文件中的第二數位簽章驗證送簽文件中的待認證文件。甚至在待認證文件包含加密文件以及第一數位簽章時,客戶端130可以開啟待認證文件,並由待認證文件中讀取出加密文件與第一數位簽章。另外,客戶端130也可以顯示送簽文件與待認證文件的驗證結果。The client 130 is responsible for receiving the electronic policy transmitted by the file providing host 110. Generally, the client 130 can be a device used by the user or a software or hardware in the device used by the user, and the client 130 can open the electronic policy and read the delivery document from the electronic policy. The third digit is signed and the signature file in the electronic policy is verified according to the third digit signature in the electronic policy; the delivery document can also be opened, and the document to be authenticated and the second digit signature are read from the delivery document. And verify the file to be authenticated in the delivery document according to the second digit signature in the delivery document. Even when the file to be authenticated includes the encrypted file and the first digital signature, the client 130 can open the file to be authenticated, and the encrypted file and the first digital signature are read from the file to be authenticated. In addition, the client 130 can also display the verification result of the delivery file and the file to be authenticated.
客戶端130在成功驗證送簽文件與待認證文件後,若待認證文件包含加密文件與第一數位簽章,則客戶端130可以解密待認證文件中的加密文件以取得解密文件(也就是文件提供伺服器110所提供之原始保單)。客戶端130也可以傳送解密所得的解密文件以及電子保單至驗證伺服器120,藉以由驗證伺服器120驗證解密文件與送簽文件的正確性。After the client 130 successfully verifies the file to be authenticated and the file to be authenticated, if the file to be authenticated includes the encrypted file and the first digital signature, the client 130 can decrypt the encrypted file in the file to be authenticated to obtain the decrypted file (that is, the file). The original policy provided by the server 110 is provided). The client 130 can also transmit the decrypted decrypted file and the electronic policy to the verification server 120, whereby the verification server 120 verifies the correctness of the decrypted file and the delivery file.
客戶端130也可以顯示解密產生的解密文件及/或驗證伺服器120所傳回的驗證結果。其中,客戶端130可以將驗證結果以圖示的方式顯示在使用者介面的特定位置,例如,將驗證結果顯示在狀態列等,但本創作並不以此為限,客戶端130也可以將驗證結果以可視化的電子印章顯示在被客戶端130顯示的解密文件中,其中,驗證結果表示為通過驗證時,客戶端130所顯示的電子印章也會表示為通過驗證,而當驗證結果表示為未通過驗證時,電子印章也會表示為未通過驗證,也就是說,客戶端130在驗證結果表示為通過驗證與未通過驗證時所顯示的電子印章並不相同,使得使用者可以在觀看後直接確認解密文件是否通過驗證。The client 130 can also display the decrypted file generated by the decryption and/or the verification result returned by the verification server 120. The client 130 may display the verification result in a specific manner on the user interface, for example, display the verification result in the status column, etc., but the present invention is not limited thereto, and the client 130 may also The verification result is displayed in the decrypted file displayed by the client 130 as a visual electronic stamp. When the verification result is indicated as being verified, the electronic seal displayed by the client 130 is also indicated as passing verification, and when the verification result is indicated as When the verification fails, the electronic seal is also indicated as failing verification. That is to say, the client 130 is not the same as the electronic seal displayed when the verification result is verified by the verification and the failed verification, so that the user can watch after Confirm directly whether the decrypted file has passed the verification.
接著以一個實施例來解說本創作之系統的運作,並請參照「第2A圖」。Next, an embodiment will be used to explain the operation of the system of the present creation, and please refer to "2A".
首先,需要提供待認證文件(步驟200)。若原始的電子保單不需要加密,例如,沒有包含個人資料,則待認證文件可以是原始的電子保單。First, a file to be authenticated needs to be provided (step 200). If the original electronic policy does not require encryption, for example, without personal data, the document to be certified may be the original electronic policy.
不過在實務上,由於原始保單是記錄使用者之保單內容的電子檔案,為了讓保險公司可以保護使用者的個人資料不被第三方獲得,例如提供驗證的憑證機構,但又要讓使用者可以透過第三方的驗證伺服器120對電子保單中所記錄的保單內容進行驗證,文件提供主機110可以如「第2B圖」所示,在取得被提供的原始保單(步驟202)後,產生用來驗證原始保單的第一數位簽章(步驟204),並加密原始保單產生加密檔案(步驟206),之後,產生包含加密文件與第一數位簽章的待認證文件(步驟208)。However, in practice, since the original policy is an electronic file that records the contents of the user's policy, in order to allow the insurance company to protect the user's personal information from third parties, such as providing a certificate authority, but also allowing the user to The third party verification server 120 verifies the policy content recorded in the electronic policy, and the file providing host 110 can generate the original policy (step 202) after obtaining the provided original policy as shown in "FIG. 2B". The first digital signature of the original policy is verified (step 204), and the original policy is encrypted to generate an encrypted file (step 206), after which a file to be authenticated containing the encrypted file and the first digital signature is generated (step 208).
繼續回到「第2A圖」,在待認證文件被提供後,文件提供主機110可以產生送簽文件(步驟210)。也就是文件提供主機110會產生用來驗證待認證文件的第二數位簽章,並產生包含待認證文件以及第二數位簽章的送簽文件。Continuing back to "FIG. 2A", after the file to be authenticated is provided, the file providing host 110 can generate a delivery file (step 210). That is, the file providing host 110 generates a second digital signature for verifying the file to be authenticated, and generates a delivery file containing the file to be authenticated and the second digital signature.
在文件提供主機110產生送簽文件(步驟210)後,文件提供主機110可以將所產生的送簽文件傳送到驗證伺服器120(步驟222)。After the file providing host 110 generates the delivery file (step 210), the file providing host 110 can transmit the generated delivery file to the verification server 120 (step 222).
驗證伺服器120在接收到文件提供主機110所傳送的送簽文件後,可以依據送簽文件中的第二數位簽章驗證送簽文件中的待認證文件(步驟226)。也就是使用文件提供主機110的公鑰對待認證文件進行演算,並比對演算所產生的資料與第二數位簽章是否相同。After receiving the mailing file transmitted by the file providing host 110, the verification server 120 may verify the file to be authenticated in the mailing file according to the second digit signature in the mailing file (step 226). That is, the public key of the host 110 is used to calculate the file to be authenticated, and the data generated by the comparison calculation is the same as the second digit signature.
若不同即表示待認證文件沒有通過驗證,也就是待認證文件可能經過竄改,沒有繼續執行本創作的必要;而若相同則表示待認證文件通過驗證,驗證伺服器120可以產生電子保單(步驟230)。也就是驗證伺服器120會產生用來驗證送簽文件的第三數位簽章,並產生至少包含送簽文件、以及第三數位簽章的電子保單。If the difference is different, the file to be authenticated is not verified, that is, the file to be authenticated may have been tampered with, and the original creation is not necessary; if the same, the file to be authenticated is verified, and the verification server 120 can generate an electronic policy (step 230). ). That is, the verification server 120 generates a third digital signature for verifying the delivery document and generates an electronic policy including at least the delivery document and the third digital signature.
在驗證伺服器120產生電子保單(步驟230)後,驗證伺服器可以將所產生的電子保單傳回文件提供主機110(步驟242),文件提供主機110在接收到驗證伺服器120所傳回的電子保單後,可以儲存所接收到的電子保單,並將所儲存的電子保單傳送給客戶端130(步驟246)。在本實施例中,假設文件提供主機110會將電子保單寄送到使用者的電子郵件信箱。After the verification server 120 generates the electronic policy (step 230), the verification server can transmit the generated electronic policy back to the file providing host 110 (step 242), and the file providing host 110 receives the verification from the verification server 120. After the electronic policy, the received electronic policy can be stored and the stored electronic policy transmitted to the client 130 (step 246). In the present embodiment, it is assumed that the file providing host 110 will send the electronic policy to the user's email address.
客戶端130在接收到文件提供主機110所傳送的電子保單後,可以驗證電子保單所包含的送簽文件以及送簽文件所包含的待認證文件(步驟251),並顯示驗證結果(步驟255)。After receiving the electronic policy transmitted by the file providing host 110, the client 130 can verify the mailing file included in the electronic policy and the file to be authenticated included in the mailing file (step 251), and display the verification result (step 255). .
另外,如「第2C圖」所示,客戶端130在成功驗證送簽文件以及待認證文件(步驟253)後,可以將待認證文件所包含的加密文件解密為解密文件(步驟260),並顯示解密文件(步驟271)。In addition, as shown in FIG. 2C, after successfully verifying the delivery file and the file to be authenticated (step 253), the client 130 may decrypt the encrypted file included in the file to be authenticated into a decrypted file (step 260), and The decrypted file is displayed (step 271).
之後,客戶端130可以傳送解密文件以及電子保單至驗證伺服器120(步驟275),驗證伺服器120在接收到客戶端130所傳送的解密文件以及電子保單後,可以驗證所接收到的解密文件以及電子保單(步驟280),並可以將驗證結果傳回客戶端130(步驟291)。在本實施例中,假設驗證伺服器120會由電子保單中取出送簽文件以及第三數位簽章,並由送簽文件中取出待認證文件,以及依據待認證文件中的第一數位簽章驗證解密文件,以及依據第三數位簽章驗證送簽文件,並在完成解密文件與送簽文件的驗證後產生相對應的驗證結果。Thereafter, the client 130 can transmit the decrypted file and the electronic policy to the verification server 120 (step 275). After receiving the decrypted file transmitted by the client 130 and the electronic policy, the verification server 120 can verify the received decrypted file. And an electronic policy (step 280), and the verification result can be passed back to the client 130 (step 291). In this embodiment, it is assumed that the verification server 120 will take out the delivery document and the third digital signature from the electronic policy, and take out the file to be authenticated from the delivery document, and according to the first digital signature in the file to be authenticated. The decrypted file is verified, and the delivery document is verified according to the third digit signature, and the corresponding verification result is generated after the verification of the decrypted file and the delivery document is completed.
如此,客戶端130可以接收到驗證伺服器120所傳送的驗證結果,並可以顯示驗證結果(步驟295)。假設在本實施例中,客戶端130會在顯示解密文件時,顯示與驗證結果對應的電子印章。As such, the client 130 can receive the verification result transmitted by the verification server 120 and can display the verification result (step 295). It is assumed that in the present embodiment, the client 130 displays an electronic seal corresponding to the verification result when the decrypted file is displayed.
綜上所述,可知本創作與先前技術之間的差異在於具有由文件提供主機對待認證文件進行數位簽章後,驗證伺服器也會對簽章後的待認證文件再次進行數位簽章,客戶端可以驗證驗證伺服器與文件提供主機的數位簽章,並顯示驗證結果之技術手段,藉由此一技術手段可以解決先前技術所存在電子保單的擁有人無法直接確認電子保單中所記錄之保單內容是否遭到篡改或偽造的問題,進而達成提高電子保單之使用方便性的技術功效。In summary, it can be seen that the difference between the present creation and the prior art is that after the digital signature of the file to be authenticated by the file providing host, the verification server will digitally sign the document to be authenticated after the signature, the customer The end can verify the digital signature of the verification server and the file providing host, and display the technical means of verifying the result. The technical means can solve the problem that the owner of the electronic policy existing in the prior art cannot directly confirm the policy recorded in the electronic policy. Whether the content has been tampered with or forged, and thus achieves the technical effect of improving the ease of use of the electronic policy.
雖然本創作所揭露之實施方式如上,惟所述之內容並非用以直接限定本創作之專利保護範圍。任何本創作所屬技術領域中具有通常知識者,在不脫離本創作所揭露之精神和範圍的前提下,對本創作之實施的形式上及細節上作些許之更動潤飾,均屬於本創作之專利保護範圍。本創作之專利保護範圍,仍須以所附之申請專利範圍所界定者為準。Although the embodiments disclosed in the present disclosure are as above, the contents are not intended to directly limit the scope of the patent protection of the present invention. Anyone who has the usual knowledge in the technical field of this creation, without any departure from the spirit and scope disclosed in this creation, makes some modifications to the form and details of the implementation of this creation, which are the patent protection of this creation. range. The scope of patent protection of this creation must be determined by the scope of the attached patent application.
110‧‧‧文件提供主機
120‧‧‧驗證伺服器
130‧‧‧客戶端
步驟200‧‧‧提供待認證文件
步驟202‧‧‧提供原始保單
步驟204‧‧‧文件提供主機產生提供驗證原始保單之第一數位簽章
步驟206‧‧‧文件提供主機加密原始保單產生加密文件
步驟208‧‧‧文件提供主機產生待認證文件,待認證文件包含第一數位簽章及加密文件
步驟210‧‧‧文件提供主機產生送簽文件,送簽文件包含待認證文件及提供驗證待認證文件之第二數位簽章
步驟222‧‧‧文件提供主機傳送送簽文件至驗證伺服器
步驟226‧‧‧驗證伺服器是否成功驗證待認證文件
步驟230‧‧‧驗證伺服器產生電子保單,電子保單包含送簽文件及提供驗證送簽文件之第三數位簽章
步驟242‧‧‧驗證伺服器傳送電子保單至文件提供主機
步驟246‧‧‧文件提供主機傳送電子保單至客戶端
步驟251‧‧‧客戶端驗證送簽文件與待認證文件
步驟253‧‧‧客戶端是否成功驗證送簽文件與待認證文件
步驟255‧‧‧客戶端顯示驗證結果
步驟260‧‧‧客戶端解密加密文件為解密文件
步驟271‧‧‧客戶端顯示解密文件
步驟275‧‧‧客戶端傳送解密文件及電子保單至驗證伺服器
步驟280‧‧‧驗證伺服器驗證解密文件及送簽文件
步驟291‧‧‧驗證伺服器傳送驗證結果至客戶端
步驟295‧‧‧客戶端顯示驗證結果110‧‧‧ Documents provided host
120‧‧‧Verification server
130‧‧‧ Client Steps 200‧‧‧Providing Documents to Be Certified Step 202‧‧‧ Providing Original Policy Steps 204‧‧‧ Document Providing Host Generates First Digital Signature Provides Verification of Original Policy Steps 206‧‧‧ File Host Encrypt the original policy to generate the encrypted file. Step 208‧‧‧ The file provides the host to generate the file to be authenticated. The file to be authenticated contains the first digital signature and the encrypted file. Step 210‧‧‧ The file provides the host to generate the delivery file, and the delivery file contains the certificate to be authenticated. The document and the second digit signature step providing verification of the documents to be certified 222‧‧‧ The document provides the host to send the delivery document to the verification server. Step 226‧‧‧Verify whether the server successfully verifies the document to be authenticated Step 230‧‧‧Verification servo The device generates an electronic policy, the electronic policy contains the document for delivery and the third digit of the signature for the verification of the delivery document. 242‧‧‧Verification server transmits the electronic policy to the document providing the host step 246‧‧‧ The file provides the host to transmit the electronic policy to Client Steps 251‧‧‧ Client Verification Documents and Documents to Be Certified Step 253‧‧ Whether the client successfully verifies the delivery document and the file to be authenticated. Step 255‧‧‧ The client displays the verification result Step 260‧‧‧ The client decrypts the encrypted file as the decrypted file Step 271‧‧‧ The client displays the decrypted file Step 275‧‧ The client transmits the decrypted file and the electronic policy to the verification server. Step 280‧‧ Verify the server to verify the decrypted file and send the file. Step 291‧‧ Verify the server to send the verification result to the client Step 295‧‧‧ Client display verification result
第1圖為本創作所提之使用電子憑證驗證電子保單之系統架構圖。 第2A圖為本創作所提之使用電子憑證驗證電子保單之流程圖。 第2B圖為本創作所提之提供待認證文件之流程圖。 第2C圖為本創作所提之使用電子憑證驗證電子保單之附加流程圖。The first picture is the system architecture diagram of the electronic certificate verification electronic policy proposed by the author. Figure 2A is a flow chart of the use of electronic voucher verification electronic policy for the creation of the author. Figure 2B is a flow chart of the document to be authenticated provided by the author. Figure 2C is an additional flow chart for the use of electronic voucher verification electronic policy as proposed by the author.
110‧‧‧文件提供主機110‧‧‧ Documents provided host
120‧‧‧驗證伺服器120‧‧‧Verification server
130‧‧‧客戶端130‧‧‧Client
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW104205685U TWM508733U (en) | 2015-04-16 | 2015-04-16 | Authentication system of electronic insurance policy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW104205685U TWM508733U (en) | 2015-04-16 | 2015-04-16 | Authentication system of electronic insurance policy |
Publications (1)
Publication Number | Publication Date |
---|---|
TWM508733U true TWM508733U (en) | 2015-09-11 |
Family
ID=54607300
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW104205685U TWM508733U (en) | 2015-04-16 | 2015-04-16 | Authentication system of electronic insurance policy |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWM508733U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI596561B (en) * | 2016-04-20 | 2017-08-21 | 臺灣網路認證股份有限公司 | System for checking insurance policy status online based on reading identifications and method thereof |
-
2015
- 2015-04-16 TW TW104205685U patent/TWM508733U/en not_active IP Right Cessation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI596561B (en) * | 2016-04-20 | 2017-08-21 | 臺灣網路認證股份有限公司 | System for checking insurance policy status online based on reading identifications and method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10673632B2 (en) | Method for managing a trusted identity | |
US8924302B2 (en) | System and method for electronic transmission, storage, retrieval and remote signing of authenticated electronic original documents | |
US8583931B2 (en) | Electronic signing apparatus and methods | |
EP2465246B1 (en) | Layered protection and validation of identity data delivered online via multiple intermediate clients | |
US7502934B2 (en) | Electronic signatures | |
WO2017024934A1 (en) | Electronic signing method, device and signing server | |
JP3754565B2 (en) | Electronic seal mark authentication system | |
TWI486808B (en) | System for validating electronic insurance policy with certificate and method thereof | |
CN106599729A (en) | Safety verification method and system for driving program | |
TWI734729B (en) | Method and device for realizing electronic signature and signature server | |
US11335109B2 (en) | Computing device for document authentication and a method to operate the same | |
US20090037340A1 (en) | Digital certification method and apparatus | |
EP1704667B1 (en) | Electronic signing apparatus and methods | |
JP2008035019A (en) | Digital signature device | |
WO2007094043A1 (en) | Electronic bidding/bidding opening program, electronic bidding/bidding opening system, and electronic bidding/bidding opening method | |
JP2013157777A (en) | Information processing system and information processing method | |
JP2003134108A (en) | Electronic signature, apparatus and method for verifying electronic signature, program and recording medium | |
TWM508733U (en) | Authentication system of electronic insurance policy | |
TWI620138B (en) | Remote authentication method for remote account opening | |
US20070192589A1 (en) | System and method for encrypting webpage logs | |
TWM579789U (en) | Electronic contract signing device | |
Hemalatha et al. | Risk Detection and Assessment in Digital Signature | |
JP2004045607A (en) | Electronic certificate, recording medium having electronic certificate recorded thereon, and method, device and program for issuing electronic certificate, and method, device and program for displaying electronic certificate | |
JP2003263647A (en) | Signing method in electronic document | |
CN107111838B (en) | System and method for facilitating financial transactions between payers and payees |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4K | Annulment or lapse of a utility model due to non-payment of fees |