The method of forming a valuable document (options)

 

The invention relates to valuable documents, in particular to the formation and securities documents, and can be used for transactions with securities or instruments, in particular for the acquisition of valuable documents by means of telecommunication connections. The technical result is reliable verification and protection against fraud in respect of the document. The invention consists in a new method of forming a valuable document, allowing for the completion of the formation of a valuable document, the form of which is at hand, other than the Issuer. To do this, in the form of valuable document include primary test data and the protection elements, and additional validation data associated with primary verification data using cryptographic means, get through the telecommunication connection with the Issuer. Received additional validation data are accepted as valuable details of the document confirming its value. In ensuring the security of the Issuer's securities document, as well as the purchaser. 4 C. and 83 C.p. f-crystals, 5 tab., 5 Il.

The invention relates to the field of securities to securities documents, in particular for the acquisition of valuable documents by means of telecommunication connections.

Under the valuable document refers to any document that represents the identity of an arbitrary subjective rights [1]. In particular, the valuable document can verify the right, conditional or unconditional, to claim certain obligations of the Issuer of the document, i.e. the entity that issued this valuable document. This obligation is called the obligation of the Issuer's securities document. Valuable documents include, for example, securities, valuable cards, all kinds of checks and certificates.

Valuable document can be made on the basis of an arbitrary material carrier. In particular, the valuable document can be produced on paper, on a plastic base, based on electronic or magnetic storage devices and in many other ways. In addition, mean that valuable document may consist of several parts connected, the connection may be physical devices, logical means or by a combination of physical devices and logical means.

The formation of the securities is hydrated all its details. Under the us securities document refers to data, which is necessary to verify valuable document, i.e. the recognition procedure prove a valuable document of title. In this part of the us securities document can be applied on arbitrary physical media, and some details might be intended, like a password, to remember the owner of a valuable document. Under the data refers to performance in a predictable way arbitrary information, handle computational methods ([2], page 720). When applied to physical media or data can be presented in various forms. In particular, the data can be represented digitally, the letters of some alphabet, barcodes, signals, images, holographic images, records on electronic or magnetic media, a combination of the above methods and in other ways. In addition, data can be presented in a form accessible to detection by organoleptic methods, in the form available for recognition by means of devices or combined methods. In other words, Enosti, the particular form of representation of some data may have some redundancy.

At least part of the us securities document can be contained on the form of the valuable document. When this form of the valuable document, and the value document can be made on the basis of an arbitrary material carrier. In particular, form a valuable document may consist of several parts connected, the connection may be physical devices, logical means or by a combination of physical devices and logical means. Details can be applied to form a valuable document in an arbitrary manner, including by application to the surface of the blank or by embedding in the structure of the material bearer form securities document. Although the form of the valuable document itself may or may not be of some value and, in particular, distributed for a fee, he himself is not yet the valuable document, the formation of which is in question.

Form a valuable document can be equipped with security elements, that is, means preventing fraud Blanca valuable document and promote the recognition truly is spozywania of authenticity contained on the form details valuable document. The level of protection form a valuable document provided by the security features must correspond to the purpose of the valuable document and consumer awareness about the necessity and adequacy of the protection elements form a valuable document from tampering. In addition, the protection elements form a valuable document must be available for recognition organoleptic methods or to succumb to the recognition with the help of special instruments. Famous for numerous varieties of protection elements ([3], pages 25-31).

Some of the details of the valuable document can be conditionally called for more details. The term "additional" is due to the fact that supply valuable document, more details are usually, though not always, occurs after the production of the form a valuable document. Additional details can be located at arbitrary material medium. While the media additional details are not necessarily equipped with security features and may or may not coincide with the form of the valuable document. Moreover, some additional details can be located on the letterhead of the valuable document, and some other carrier. In particular, more is mainly intended to test a valuable document. Besides checking valuable document for more test data, and other details of the valuable document, can be used to Refine prove a valuable document of title.

Below is a description of analogs and prototypes.

A well-known method of forming a valuable document, representing the winning lottery ticket. The winning lottery ticket in the lottery ticket includes, as additional test data, published paytable. In the known method as a valuable form of document using the actual lottery ticket with number and security elements. In this case the formation of the valuable document is as follows. The organizer of the lottery, acting as the Issuer of the document, produces a lottery ticket that is purchased by the participant, acting as a purchaser of securities of the document. Then conduct a raffle and complete the formation of a winning lottery ticket, providing a lottery ticket published in mass media by the paytable. In this example, the completion of the formation of a valuable document comes at a time when BL the th from the Issuer of the purchaser. In the known method form a valuable document presents a lottery ticket that gives the right to participate in the drawing, and thereby form a valuable document itself is some of the valuable document. However, we are talking about the formation of this valuable document, and valuable document, which is the winning lottery ticket. We are talking about the formation of a valuable document giving the right to receive a specific prize. Thus, a valuable document "lottery ticket" after supply additional testing data is converted into other valuable document, namely in a winning lottery ticket. Note that the supply of stationery valuable document additional testing data refers to the formation of the valuable document, and not to its appeal since it does not change the ownership of a valuable document. A disadvantage of such a formation method that checks a valuable document depends on faith in the source of the publication of the winnings table.

The known method of forming a valuable document [4], in which the valuable document is a credit card number with PIN code that is not contained on the form valuable document in this example, the CT is correctly from the card itself. The disadvantage of this method of formation is that there is no reliable procedure verification card by a third party, as the PIN associated with the card only by the corresponding entry from the card Issuer, and the Issuer may not recognize the validity of the PIN code, hid their pocket, malicious or not, the binding entry.

The known method of forming a valuable document ([3]), which is the closest analogue of the present invention and selected by the applicant as a prototype. In a known way to form a valuable document, which is the bill. At the same time as form a valuable document release form of promissory notes, has some details and elements of protection. As contained on the form of the details of the bill can be data about the Issuer, data on the form of promissory notes and other data. As an additional test data using a signature of the Issuer, which the Issuer of the document. In this case, additional validation data are applied directly on the form valuable document. The main disadvantage of this method of formation of the valuable document is that during the formation of the valuable document by the remote consumer and thereby prevents the transmission of values through the telecommunication connection. In addition, reliable verification of handwritten signatures requires considerable effort.

The main problem solved by variants of the claimed invention is to provide such a method of forming a valuable document, which allows the transfer of values through telecommunications connections and provides security as the Issuer of the document, as well as the purchaser.

Common to all the variants of the claimed invention technical result is that formed a valuable document allows reliable verification and fully protects the interests of the purchaser valuable document and its Issuer. Furthermore, the method of forming a valuable document, for each of these options provides the opportunity to conduct through the telecommunication connection transaction is safe for both the Issuer of the document, and for the purchaser.

Specified single technical result is achieved in all variants of one and the same way, namely by issuing form valuable document comprising part of us formed a valuable documenti details, associated with a form of valuable document using cryptographic means. Thus, additional details can be transferred to the purchaser Blanca valuable document through the telecommunication connection, which allows the buyer to form a valuable document to complete the formation of the securities remote document of the Issuer.

Additional technical result achieved during the implementation of the first variant of the claimed invention, is that the test generated valuable document may be produced without the participation of the Issuer. In addition, the brevity of additional test data allows you to easily save their handwritten image, and it is easy to enter them into the computer when checking a valuable document or other securities document. In addition, the method of forming a valuable document allows multistage formation of the valuable document, each of the intermediate steps which increase the value generated valuable document, i.e. increasing volume prove a valuable document of the subject law.

The above technical result of the invention in the first embodiment is achieved by Thu the military document include, at least part of the us securities document and elements of protection, and supply valuable document for more details, including additional testing data. With the release form valuable document his cause as one of the requisites of a commercial document, the primary test data, and the additional validation data forming as the type of the primary test data regarding public one-way function F, the parameters of which include part of the additional details valuable document.

Under the primary test data means any information designed to test a valuable document. The term "primary" is explained by the fact that these data are applied to form a valuable document when issuing form a valuable document. The term "primary" is also used to distinguish these data from additional testing data. In addition to checking a valuable document of the primary test data, and other details of the valuable document, can be used to Refine prove a valuable document of title.

The concept of one-way functions and numerous examples of such functions are used in practice, well issah elements of the field values of this function. However, one-way functions are the so-called one-way function with a loophole (tapdoor one-way function), with the property that knowledge of the "loopholes" that is certain classified information, allows you to find the prototypes with respect to a given one-way function to at least part of the elements of the field values. The party that owns the "loophole", to be determined. In the description of the claimed invention is meant that the winner of the "loopholes" can only be the Issuer of the document.

Under the public function refers to an arbitrary xed function, rules of calculation which made potentially available to an indefinite circle of persons, and under the primary test data refers to arbitrary digital data, which are applied to form a valuable document when issuing such a form. The security features included in the form of valuable document that should prevent, in particular, the fabrication of the primary test data.

The above technical result, in some cases, a particular implementation can be achieved, in addition to the fact that the supply of a valuable document for more details carried out after the issue of the form t the th form valuable document may be transferred to any purchaser.

In addition, to supply valuable document additional testing data acquirer Blanca valuable document with security features authenticates form a valuable document.

Moreover, the formation of additional test data acquirer Blanca valuable document checks that generated additional validation data are a type of primary test data regarding public one-way function F, depending on the part of the additional details valuable document.

In particular, details of the valuable document can be included data indicating the value generated valuable document. Moreover, data indicating the value generated valuable document may be included at least partially in the additional details of the valuable document.

In particular, before the release form valuable document choose the secret key of the Issuer Z, and the primary test data form using the selected secret key of Z. moreover, as the primary test data using data F(Z).

In particular, as the primary test data using the secret way is ary one-way functions F1F2,..., FM. Moreover, in the us generated a valuable document include arbitrary natural number And clarifying the value generated valuable document and does not exceed M, and as a public one-way function F using the composition F1oF2o...oFA. In addition, as an additional test data take data FM-Ao. . .oFM(Z). In particular, as each of the public one-way function F1F2,..., FMuse the cryptographic hash function.

The concept of hash functions and numerous examples of such functions are well known ([5] , page 29, [6], page 8, 337). Under the hash function we mean an arbitrary function, designed for compression of the data, possibly with the loss of data. More specifically, under the hash function we mean an arbitrary function, the application of which to an arbitrary element of the definition area allows you to receive data, the size of which is limited in advance and, in particular, fixed in advance. In addition, it is desirable that the probability of coincidence of the fixed element of the field values with the value of the hash function computed on a random element of the field of od is the Notion of a cryptographic hash function, differently-called one-way hash functions, and numerous examples of such functions are used in practice, is also well known ([5], pages 30-31, [6] p. 321-383, [7]). The essence of the one-way hash function is clear from the title and is that such a function is a hash function and a one-way function.

Moreover, as each of the public one-way function F1F2, ..., FMuse the same cryptographic hash function.

In addition, as a public one-way function F using a cryptographic hash function.

In addition, the secret key Z is chosen via random number generator.

In particular, the valuable document form in several steps, each of which increase the value generated valuable document.

In addition, when the form of the valuable document security features use the security features that prevent falsification of the primary test data.

In particular, as the primary test data use the ID of the form a valuable document.

In addition, valuable document provide additional test data through telecommunication with the second carrier. Moreover, additional details of the valuable document keep in a material medium in the form available for automatic reading. Furthermore, additional details of the valuable document keep on a tangible medium by a computer-controlled device. In addition, additional details of the valuable document keep on a tangible medium handwritten way. In particular, as a material carrier of additional details of the valuable document, use the form valuable document. In addition, as a carrier for more details valuable document use storage device. In particular, additional details of the valuable document to the material carrier causes the acquirer Blanca valuable document.

Link for more details form valuable document using encryption in the method of forming a valuable document in the first embodiment is that the additional validation data forming as the type of the primary test data regarding public one-way function F, the parameters of which include part of the additional details valuable document. In particular, is NCLI F, may be empty. While checking this, and thus check the validity of the document can be carried out reliably and quickly without the participation of the Issuer at any time and in any place, for example, using a computer programmed accordingly. Moreover, the nature of this is that the actual additional test data is almost impossible to create without the participation of the Issuer.

To confirm achieve the above technical result, namely the possibility of a reliable test and the full protection of the interests of the purchaser of the securities document, the following is a description of the validation of the valuable document, formed in the first embodiment of the claimed method.

Let X is the primary test data located on the letterhead of the valuable document, and Y is additional validation data. Valuable document is valid, if, among other conditions, F(Y)=X. This procedure does not depend on the arbitrariness of the Issuer and fully protects the interests of the purchaser of a valuable document, because the purchaser at the time of purchase can verify the validity of the valuable document. This bezopasnoe protection and the fact that additional test data are not available beyond the control of the Issuer, since F is a one - way function.

In private cases, the implementation of the data used to generate valuable document that can be presented in a form accessible to automatic recognition. In particular, additional test data can be printed out by the printer or caused handwritten image by allocating fixed elements like on the mail envelope sender handwritten image specifies the index of the recipient, with the specified index is available for automatic recognition. This data representation can simplify and accelerate the procedure of verification of the valuable document.

The following are also some additional features that may be useful in special cases the implementation of the invention in the first embodiment.

In the case when as a public one-way function F is used, the composition of F1oF2o...oFMsequence M public one-way function F1F2,...,FMwhere the number M is large enough, and as the primary test data using the image of sacri type Fjo. ..oFM(Z), while processing a client request to use these interim secret values to speed up the processing of the request.

In addition, the number of characters used to write the primary test data, can be reduced enough to prevent the possibility of recruiting additional test data without the participation of the Issuer. The number of characters used to write additional test data, can be reduced as well as by selecting the one-way function F and the choice of a suitable form of representation of digital data.

Additional technical result achieved in the implementation of the second variant of the claimed invention is that the test generated valuable document may be produced without the participation of the Issuer. In addition, there is the possibility of forming additional test data to ensure nesvetaevsky generated valuable data document available to the Issuer in the formation of this valuable document. Thus can be protected not only the monetary interests of the purchaser of the securities document, but also to protect his privacy. In addition, the method of forming a valuable document € capacity values generated valuable document, that is, the increasing volume prove a valuable document of the subject law.

The above technical result of the invention according to the second variant is achieved by a method of forming a valuable document includes the issuance by the Issuer of the form of the valuable document, and form a valuable document include, at least, part of the us securities document and elements of protection, and supply valuable document for more details, including additional testing data. With the release form valuable document his cause as one of the requisites of a commercial document, the primary test data, and the additional validation data forming as a digital signature of the Issuer for the message, connecting the primary test data from a part of the additional details valuable document.

The concept of digital signatures and numerous digital signatures are well known ([5], page 29, [6], page 8, 327). A digital signature is widely used in practice and plays a role similar to the role of customary handwritten signature. The advantages of digital signatures is that its accuracy is easily verifiable, her faking is very difficult, and, in addition, d / is the number of the signature, traditionally called message). The term "message" is used regardless of whether it is a message to send or not intended. Under the digital signature for some message M refers to the digital data S that satisfy a certain value, recognized in advance of the signing party. In other words, the signing party must be fixed function signature verification VER(M, S) that accepts a Boolean value of "false" or "true". The data's are recognized by the digital signature of the signer of a message M, if VER(M, S)=true. For producing a digital signature is used signing function representing a one-way function with a loophole, and the loophole is the secret of the signer and is called a secret key. Data specifying the function signature verification, called the public key of the signer.

Under the binding of the same data with others through message refers to the inclusion in the message of arbitrary information that identifies the associated data. For example, such information may be used concantenate associated data.

The above technical the document for more details carried out after the issue of the form of the valuable document. In addition, to supply valuable document additional testing data released in the form of valuable document transmit arbitrary purchaser.

Moreover, the digital signature of the Issuer, the purchaser Blanca valuable document gets through the process of making a blind digital signature.

Blind digital signature (blind digital signature) are varieties of digital signature and is especially important to protect the privacy of consumers. There are several known procedures for making a blind digital signature ([5] , pp. 112-115; [6], page 475, 487; [8], pp. 1036-1038, [9]). The essence of blind digital signatures is to interrupt communication between the data available signing party in the manufacture of the signature, and the digital signature. In General the procedure for obtaining a blind digital signature of the user, that is, the party interested in obtaining signatures, provides the signer side blinded the form M' of the original message M, where blinding is implemented by user-selected randomized blinding key R Contracting party provides the user data to delaplane S', and the user receives a digital signature S of the original message posredstvennye testing data acquirer Blanca valuable document with security features authenticates form a valuable document. In addition, the formation of additional test data acquirer Blanca valuable document verifies the digital signature of the Issuer.

In particular, details of the valuable document includes data that indicates the value generated valuable document. Moreover, data indicating the value generated valuable document, include at least partially in the additional details of the valuable document. In particular, the valuable document form in several steps, each of which increase the value generated valuable document.

In addition, when the form of the valuable document security features use the security features that prevent falsification of the primary test data.

In particular, as the primary test data use the ID of the form a valuable document.

In addition, valuable document can be provided for testing data through the telecommunication connection.

In particular, additional details of the valuable document keep on arbitrary material medium. Moreover, additional details of the valuable document keep in a material medium in the form postoperation media through a computer-controlled device. Moreover, as a material carrier of additional details of the valuable document, use the form valuable document. In particular, as a carrier for more details valuable document use storage device. In addition, additional details of the valuable document to the material carrier causes the acquirer Blanca valuable document.

Link for more details form valuable document using encryption in the method of forming a valuable document according to the second variant differs from the similar due to the method of forming a valuable document according to the first variant consists in that the additional validation data forming as a digital signature of the Issuer for the message, connecting the primary test data from a part of the additional details valuable document. The security features included in the form of valuable document that should prevent, in particular, the fabrication of the primary test data. While checking this, and thus check the validity of the document can be carried out reliably and quickly without the participation of the Issuer at any time and in preacher this is that is valid for more test data is almost impossible to create without the participation of the Issuer.

Form a valuable document in itself is not so valuable document, the formation of which is in question. In order to complete the formation of the valuable document, valuable document provide additional details, including additional testing data. Additional test data form as a digital signature of the Issuer for the message, connecting the primary test data from a part of the additional details valuable document. Thus, additional details can be transferred to the purchaser Blanca valuable document through the telecommunication connection, which allows the buyer to form a valuable document to complete the formation of the securities remote document of the Issuer.

Additional validation data can be stored, in particular, to the storage device, such as a floppy disk.

To ensure nesvetaevsky generated valuable data document available to the Issuer in the formation of this valuable document, and thereby to protect the privacy of the buyer chenopodii of the Issuer.

To confirm achieve the above technical result, namely the possibility of a reliable test and the full protection of the interests of the purchaser of the securities document, the following is a description of the validation of the valuable document generated according to the second variant of the claimed method.

Let X is the primary test data located on the letterhead of the valuable document, and Y is additional validation data. Valuable document is valid, if, among other conditions, the correct digital signature of the Issuer. This procedure does not depend on the arbitrariness of the Issuer and fully protects the interests of the purchaser of a valuable document, because the purchaser at the time of purchase can verify the validity of the valuable document. While security of the Issuer of the document provided that the form of the valuable document is protected from fraud security features, and the fact that the digital signature of the Issuer, it is impossible to obtain without the consent of the Issuer.

In addition, in certain cases, the implementation of the invention according to the second variant the number of characters used for recording the primary data for testing can be reduced enough to prevent the possibility of selection for more about the third variant of the claimed invention, is that as additional test data, you can use a very short data, allowing you to easily save their handwriting, or even to remember and easy to type them into the computer when checking a valuable document or other securities document.

The above technical result of the invention is achieved by a method of forming a valuable document includes the issuance by the Issuer of the form of the valuable document, and form a valuable document include, at least, part of the us securities document and elements of protection, and supply valuable document for more details, including additional testing data. With the release form valuable document his cause as one of the requisites of a commercial document, the primary test data, additional test data form by transforming the primary test data, which form an intermediate test data, which take the type of the primary test data on public and resistant to the presence of the second type of one-way function F, the parameters of which include castaneum public function G to the generated intermediate test data.

Under the intermediate data means any information involved in the formation of a valuable document, but not a requisite. Thus, such data after they will be used in the formation of the valuable document may be lost.

The term "resistant to the presence of the second type of function is used by the applicant to be used instead of the English literature of the term "weak collision resistance function" ([6], page 324). This term entered by the applicant due to the lack of established or at least found in the literature Russian adequate term. Under steady-finding the second type of function we mean a function satisfying the property that is in the English language is called "2-nd preimage resistance" ([6], page 323). This property is that for an arbitrary element X of the domain of the function F is almost impossible to find another element X' such that F(X)=F(X'). As resistant to the presence of the second type of one-way functions can be used, for example, the hash function SHA-1 hash function described in [7].

The above technical result, in some cases, a particular implementation can be achieved, in addition, Terraza on a random element with a fixed value is less than the pre-specified probability. In particular, as a public function G can be used arbitrary cryptographic hash function.

In addition, the supply of the valuable document, more details can be carried out after the issue of the form of the valuable document. Moreover, to supply valuable document additional testing data released in the form of valuable document may be transferred to any purchaser. In addition, to supply valuable document, intermediate test data acquirer Blanca valuable document with security features authenticates form a valuable document. In addition, the formation of additional test data form a valuable document to validate that the intermediate test data are a type of primary test data regarding public one-way function F, depending on the part of the additional details valuable document.

In particular, details of the valuable document includes data that indicates the value generated valuable document. Moreover, data indicating the value generated valuable document, include at least partially in the additional details C is Z, and the primary test data form using the selected secret key of Z. moreover, as the primary test data using data F(Z).

In particular, as the primary test data using the image of the secret key Z relative composition1oF2o...oFMsequence of M public one-way function F1F2,..., FM. Moreover, in the us generated a valuable document include arbitrary natural number And clarifying the value generated valuable document and does not exceed M, and as a public one-way function F using the composition F1oF2o...oFA. In addition, as an additional test data take data FM-Ao. . .oFM(Z). Moreover, as each of the public one-way function F1F2,..., FMuse the cryptographic hash function.

In addition, as each of the public one-way function F1F2,. .., FMuse the same cryptographic hash function. In particular, as a public one-way function F using cryptographically, valuable document form in several steps, each of which increase the value generated valuable document.

In addition, when the form of the valuable document security features use the security features that prevent falsification of the primary test data.

In particular, as the primary test data use the ID of the form a valuable document.

In addition, a valuable document for supply of intermediate testing data through the telecommunication connection.

In particular, additional details of the valuable document keep on arbitrary material medium. Moreover, additional details of the valuable document keep in a material medium in the form available for automatic reading. Furthermore, additional details of the valuable document keep on a tangible medium by a computer-controlled device. In particular, additional details of the valuable document keep on a tangible medium handwritten way. Moreover, as a material carrier of additional details of the valuable document, use the form valuable document. In addition, as the carrier of the E. details of the valuable document to the material carrier causes the acquirer Blanca valuable document.

Link for more details form valuable document using encryption in the method of forming a valuable document according to a third variant consists in that the additional validation data forming application public function G to the interim test data, which use the type of the primary test data on public and resistant to the presence of the second type of one-way function F, the parameters of which include part of the additional details valuable document. In particular, some additional details of the valuable document, which include the parameters of the public one-way function F, can be empty. While checking this, and thus check the validity of the document can be carried out in such a way that although it requires the participation of the Issuer, but the result does not depend on the discretion of the Issuer. Moreover, the nature of this is such that the probability of formation of a valid additional test data without the participation of the Issuer can be made arbitrarily small.

The security features included in the form of valuable document which should be prevented in cascabraga result namely, the possibility of a reliable test and the full protection of the interests of the purchaser of the securities document, the following is a description of a special case of the verification of the valuable document generated by the third variant of the claimed method.

Described verification procedure involves the presence of some RP, the competence of which is recognized in advance by the Issuer and the purchaser of the securities document. When the check procedure such party is conventionally called the court.

In the case where the Issuer and acquirer valuable document act in good faith, verification valuable document can be made without court intervention. The company recognizes the valuable document is valid, if, among other conditions, F(I)=X a G(I)=Y, where I is the intermediate test data, X is the primary test data located on the letterhead of the valuable document, and Y is additional validation data. In this interim test data reproduced by the Issuer in the course of the audit, and the property of resistance to the presence of the second prototype of the function F almost guarantees the coincidence of the reconstructed intermediate test data with the intermediate testing data, kotorye the validity of the valuable document, the acquirer valuable document goes to court. The court withdraws the form of valuable ticket purchaser may, on receipt, provide the Issuer with the securities document primary test data X and prompts the Issuer intermediate test data I. If the Issuer has not provided such data or provided by the Issuer data is not valid, i.e. does not satisfy the equality F(I)=X, then the valuable document to be valid. If the data is valid I, the court finds valuable document is valid, if the equality G(I)=Y. Otherwise valuable document is rendered invalid by the court. This procedure checks the valuable document is not dependent on the arbitrariness of the Issuer and the security of the purchaser valuable document because of the almost complete failure to present during the inspection any intermediate data I', which is different from the data I and for which F(I')=x

Security of the Issuer of the document provided, in particular, the dependence of the additional test data from the intermediate data for testing. Of course, this mean a real, not formal dependence. The consequence of this dependence is positively and security of the Issuer's securities document provided in particular, the following procedure call associated with a valuable document of title. First, the valuable document is assessed a certain amount of A. secondly, the bearer securities of the document passes to the Issuer together with a valuable document of the Deposit, With greater than A/W. After that, the Issuer imposes intermediate test data, and bearer securities document confirms the correctness of the presented interim test data I and data sets Y, pretending to be additional testing data. If you find that G(I)=Y, where the data Y pretend to be additional testing data, the Issuer returns to the bearer of the valuable document of pledge and recognize this valuable document. Otherwise, the Deposit is non-refundable.

The above procedure is provided only to confirm the possibility to ensure the protection of the Issuer in such exotic cases, when additional test data is very small in size, for example have a size of one bit. Of course, in practice it is preferable to use as a G or a cryptographic hash function or a hash function, which although is not cryptographic, but values which eno is the probability of random guessing with a relatively small number of trials was negligible.

The following are also some additional features that may be useful in special cases the implementation of the invention according to the third variant.

In the case when the function F is used, the composition of F1oF2o. . .oFMsequence M public one-way function F1F2,..., FMwhere the number M is large enough, and as the primary test data using the image of the secret key Z relative to the function F, the Bank may pre-calculate some intermediate the secret values of the form Fjo...oFM(Z), while processing a client request to use these interim secret values to speed up the processing of the request.

In addition, the number of characters used to write the primary test data, can be reduced so that there is no possibility that the selection of intermediate test data without the participation of the Issuer.

The number of characters used for the submission of additional test data, you can also reduce to almost any natural number. In particular, the number of symbols used to represent the additional test data, t can be simply memorized the purchaser of the securities document like the password.

Additional technical result achieved during the implementation of the fourth variant of the claimed invention, is that you can achieve nesvetaevsky generated valuable data document available to the Issuer in the formation of this valuable document, with brief additional test data. Thereby simultaneously achieved as the ability to easily save additional testing data of the manuscript image and the protection of the privacy of the purchaser valuable document.

The above technical result of the invention is achieved by a method of forming a valuable document includes the issuance by the Issuer of the form of the valuable document, and form a valuable document include, at least, part of the us securities document and elements of protection, and supply valuable document for more details, including additional testing data. With the release form valuable document his cause as one of the requisites of a commercial document, the primary test data, additional test data form by transforming the primary test data, which form PGO document for a message, connecting the primary test data from a part of the additional details valuable document, then additional validation data forming application public function G to the generated intermediate test data.

Under deterministic digital signature ([6], page 427) refers to such a digital signature, which is uniquely determined by the signed message and a public key of the signing party.

The above technical result, in some cases, a particular implementation can be achieved, furthermore, by the fact that as a public function G used a random function, for which the probability of coincidence of her image on a random element with a fixed value is less than the pre-specified probability. In particular, as a public function, G you can use any cryptographic hash function.

In addition, the supply of the valuable document, more details is carried out after the issue of the form of the valuable document. Moreover, to supply valuable document additional testing data released in the form of valuable document transmit arbitrary purchaser.

In particular, the digital signature of the Issuer p is

In addition, to supply valuable document, intermediate test data acquirer Blanca valuable document with security features authenticates form a valuable document. In addition, the formation of additional test data acquirer Blanca valuable document verifies the digital signature of the Issuer.

In particular, details of the valuable document includes data that indicates the value generated valuable document. Moreover, data indicating the value generated valuable document, include at least partially in the additional details of the valuable document. In particular, the valuable document form in several steps, each of which increase the value generated valuable document.

In addition, when the form of the valuable document security features use the security features that prevent falsification of the primary test data.

In particular, as the primary test data use the ID of the form a valuable document.

In addition, a valuable document for supply of intermediate testing data through the telecommunication connection.

In particular, the further the details of the valuable document keep in a material medium in the form, available for automatic reading. In particular, additional details of the valuable document keep on a tangible medium by a computer-controlled device. In addition, additional details of the valuable document keep on a tangible medium handwritten way. In particular, as a material carrier of additional details of the valuable document, use the form valuable document. In addition, as a carrier for more details valuable document use storage device. In particular, additional details of the valuable document to the material carrier causes the acquirer Blanca valuable document.

Link for more details form valuable document using encryption in the method of forming a valuable document according to the fourth variant is that the additional validation data forming application public function G to the interim test data, which use a type of deterministic digital signature of the Issuer for the message, connecting the primary test data from a part of the additional details valuable document. When this wire is and thus although it requires the participation of the Issuer, but the result does not depend on the discretion of the Issuer. Moreover, the nature of this is such that the probability of formation of a valid additional test data without the participation of the Issuer can be made arbitrarily small.

The security features included in the form of valuable document that should prevent, in particular, the fabrication of the primary test data.

To ensure nesvetaevsky generated valuable data document available to the Issuer in the formation of this valuable document, and thereby to protect the privacy of the purchaser of the valuable document, additional validation data forming through the process of getting blind digital signature of the Issuer.

Thus the invention according to the fourth variant is possible simultaneously to ensure the protection of the privacy of the purchaser, and the brevity of additional test data.

To confirm achieve the above technical result, namely the possibility of a reliable test and the full protection of the interests of the purchaser of the securities document, the following is a description of a particular case validation valuable document is hearing there is some RP, the competence of which is recognized in advance by the Issuer and the purchaser of the securities document. When the check procedure such party is conventionally called the court.

In the case where the Issuer and acquirer valuable document act in good faith, verification valuable document can be made without court intervention. The company recognizes the valuable document is valid, if, among other conditions intermediate test data are correct digital signature of the Issuer, a G(I)=Y, where I is the intermediate test data, X is the primary test data located on the letterhead of the valuable document, a Y - additional validation data. In this interim test data reproduced by the Issuer in the course of the audit, and the deterministic property of a digital signature guarantees the coincidence of the reconstructed intermediate test data with the intermediate testing data that were used in the formation of the valuable document.

In the case when the Issuer refuses to recognize the validity of the valuable document, the purchaser valuable document goes to court. The court withdraws the form of valuable ticket purchaser may test data I. If the Issuer has not provided such data or provided by the Issuer data is not valid, i.e. are not correct digital signature of the Issuer, the valuable document to be valid. If the data is valid I, the court finds valuable document is valid, if the equality G(I)=Y. Otherwise valuable document is rendered invalid by the court. This procedure checks the valuable document is not dependent on the arbitrariness of the Issuer and the security of the purchaser valuable document because of the almost complete failure to present during the inspection any intermediate data I', which is different from the data I and are the digital signature of the Issuer.

Security of the Issuer of the document provided, in particular, the dependence of the additional test data from the intermediate data for testing. Of course, this mean a real, not formal dependence. The consequence of this dependence is the positivity of the probability W that a randomly selected data will not coincide with the additional validation data. While security of the Issuer of the document provided, in particular, the following procedure vostrebovanija.there valuable document delivers to the Issuer, together with the valuable document of the Deposit, With greater than A/W. After that, the Issuer imposes intermediate test data, and bearer securities document confirms the correctness of the presented interim test data I and data sets Y, pretending to be additional testing data. If you find that G(I)=Y, where the data Y pretend to be additional testing data, the Issuer returns to the bearer of the valuable document of pledge and recognize this valuable document. Otherwise, the Deposit is non-refundable.

The above procedure is provided only to confirm the possibility to ensure the protection of the Issuer in such exotic cases, when additional test data is very small in size, for example have a size of one bit. Of course, in practice it is preferable to use as a G or a cryptographic hash function or a hash function, which although is not cryptographic, but values which are sufficiently short to ensure that they could easily remember like password, and long enough so that the probability of random guessing with a relatively small number of trials was negligible.

In addition, the numbers who would not admit the possibility of recruiting additional test data without the participation of the Issuer. The number of characters used to represent additional test data, can be reduced to almost any natural number. In particular, the number of symbols used to represent the additional test data, may also be made so small, such as 4 or 5 characters that additional test data may simply be stored by the purchaser for valuable document like the password.

Below are specific examples of implementation of each alternative method of forming a valuable document, as well as specific examples of usage generated valuable documents. While examples 1 and 2 relate to a first embodiment example 3 refers to the second option, example 4 refers to the third version, and example 5 relates to the fourth variant of the claimed method.

Example 1 In this example, the Issuer of the document is the Bank a valuable document is a Bank ticket, representing the right of its holder to receive from the Bank a certain sum of money equal to the value of the Bank card. In the formation of the valuable document involved the Bank and the purchaser Blanca Bank ticket, which is a customer of the Bank. The role of Blanca valuable OGA ticket.

Before the release forms with Bank notes, the Bank chooses the maximum value of Bank ticket M, for definiteness 100,000 rubles. In addition, the Bank chooses M public cryptographic functions F1,..., FM. In this example, as each of these functions use a cryptographic hash function H, which coincides with the function SHA-1 ([6], page 348).

Additional details of Bank tickets are a pair A, Y, where a is expressed in rubles the value of Bank ticket, and Y is a string of 40 hexadecimal digits representing the additional validation data. As a public one-way function F using the function HAndthen there is the composition of F1oF2o. ..oFA. Thus, in this example, the portion of the additional details that is included in the parameters of the function F represented by the value And Bank ticket, which is included in the parameters of the function F as the degree of iteration functions N.

In this example, the Bank shall release copies of forms with Bank notes of a thousand forms. With the release forms, the Bank generates a secret circulation table whose rows correspond manufactured forms, that is, in this example, the table contains tysjaci edition contains fields for the number and the secret key.

First, for each row generated secret table of the circulation of the Bank completes the "Secret key" 32 hexadecimal digits, which selects using a cryptographic random numbers generator.

Such a cryptographic random number, also called a cryptographically secure random number, is well known ([6], pp. 185-187). Their role is to assign values to an unpredictable side, not controlling the operation of such a sensor. Assume that the table copies purchased after this, where the ellipsis represents the existing rows in the table, the specific content of which is not specified (see tab. 1A).

The Bank will then fill the field "Number" of each line generated secret tables circulation line X 40 hex digits, which is given by the formula X=HM(Z), where HMdenotes the M-th iteration of the function H, that is, the composition function H with itself M times, a Z - secret key of the corresponding row. The field "Number" will play the role of the primary test data. After this secret table of circulation takes the form shown in table.1B.

In this form of the secret table of circulation ends. Secret table turagsoy forms Bank notes bearing the values of the fields "Number" string secret table of circulation as the primary test data. View Blanca Bank of the ticket corresponding to the secret string table edition with the value of the field "Number" No=14DF1A81 00A6E5F8 SS D5518433 FD169A28, illustrated in Fig.1A.

Forms Bank notes supplied with security features, thus, in order to prevent forgery of the form of a Bank card and, in particular, rigged his rooms. Released forms of banking tickets are distributed without any restrictions. For example, forms with Bank notes can be distributed for a small fee in retail locations.

Suppose that the Bank has a system of remote customer account management by means of computers. Suppose also that the Bank's client is a purchaser Blanca Bank of the ticket shown in Fig.1A, wishes to receive cash from your Bank account 12000 rubles. For this purpose, the Bank customer enters into your computer room Blanca banking ticket No=14DF1A81 00A6E5F8 SS D5518433 FD169A28 and expressed in rubles required sum A= 12000. The client computer on telecommunication networks sends to the computer of the Bank, the request generated in the framework of the system of remote management of clients ' accounts and codetable him additional test data Y, received the following way. Specified in the client request number No secret circulation table is searched for the corresponding row and is determined by the corresponding private key of Z. In this example, Z= 409020DB B919B1CE F4E50104 VSSS. Additional validation data Y in the computer Bank, programmed appropriately determined according to the formula Y= HM-A(Z). In this example, Y= H88000(409020DB B919B1CE F4E50104 VSSS)= E EEVEE 7FBC87BB EB26DABB E. After this additional test data Y are delivered to the client computer via telecommunications networks.

In the client computer of the Bank for the received data Y is checked, the ratio F(Y)= No, then the client takes the data Y, is displayed on the monitor of his computer, as additional test data and enter in the field "Value" blank Bank ticket amount 12,000, and in the "Check number" data Y. After this form of banking ticket takes the form illustrated in Fig.1B. This completes the formation of the valuable document.

Formed wire card Bank customer may be transferred to the new purchaser, upon receipt of the valuable document can verify its validity, PR is e close to their location.

Moreover, the Bank formed the ticket can be used as the intermediate step in the formation of a new valuable document. In other words, the value generated valuable document can be enlarged with the participation of the Bank. To do this, the owner formed a valuable document, illustrated in Fig.1B, may be submitted to the Bank No data, A, Y, In, where In is the amount of recharge generated valuable ticket. The Bank, making sure No=HA(Y), gives the owner of the valuable document data Y1calculated on a computer that is programmed in accordance with the formula Y= HM-A-B(Z). After the owner of a valuable document, illustrated in Fig.1B, replaces form a valuable document data and Y data (a + b) and Y1respectively. The value formed as a result of the valuable document is equal to (a + b) rubles.

Example 2 In this example, the Issuer of the document is the organizer of the lottery, the role of the valuable document plays a winning lottery ticket, representing the right of its holder to receive from the organizer of the lottery in exchange for a lottery ticket 1000. In the formation of the valuable document involved the organizer of the lottery and the purchaser lo is presented field "Main test room", printed on the lottery ticket.

Prior to the release of lottery tickets, the Issuer chooses a cryptographic hash function H, for definiteness, SHA-1. As a public one-way function F using the function F(X)=H(X), where additional test data X is represented by a sequence of 40 hexadecimal digits.

In this example, the organizer of the lottery provides for the issue of the circulation of lottery tickets of ten thousand tickets. When issuing tickets, the organizer of the lottery creates a secret circulation table whose rows correspond to the issued tickets. This table is stored in the computer in electronic form. The line formed a secret table edition is numbered, and each row contains a field for the secret key. For each row generated secret table of circulation of the organizer of the lottery completes the "Secret key" 40 hex digits, which selects using a cryptographic random numbers generator. Assume that the table copies purchased after this, where the ellipsis represents the existing rows in the table, the specific content of which is not specified (see tab.2).

In this form of the secret table of circulation ends. Secret table t is>/p>After that, the organizer of the lottery shall issue lottery tickets, each of which is the "Room" is filled with the number of the corresponding row, and the "Main testing room filled with a string of 40 hexadecimal digits representing the primary test data. When this string of 40 hexadecimal digits get the formula X=H(Z), where Z is the secret key of the corresponding row.

Kind of a lottery ticket corresponding to the secret string table edition with the number No= 6 543, illustrated in Fig.2A. Lottery tickets are supplied with protective elements in such a way as to prevent, in particular, the fake "Main test room". Issued lottery tickets are distributed to those wishing to participate in the lottery.

This is followed by a raffle and determined non winning lottery tickets. Suppose that a lottery ticket with the number 6 543 won too.

After that, the organizer of the lottery creates the winnings table whose rows correspond to the winning tickets. Each line formed at the payout table contains fields for accommodation and additional testing rooms, playing the role of an additional test daroczy room table winnings a secret key from a string secret table of circulation, corresponding to the winning ticket. In this example, additional details generated valuable document consists only of the additional test data. Thus, in this example, no additional details other than additional test data, and some additional details are included in the parameters of the function F is empty.

Formed paytable is published in the newspaper. The purchaser of a lottery ticket with the number No=6 543, learning from the published table of winnings that his ticket won, cut from a newspaper strip that contains additional test line number with the number 6 543, and attaches it to a lottery ticket at random. For example, a strip of newsprint with additional validation number is simply sealed with a lottery ticket via paperclip. This completes the formation of the valuable document, representing the winning lottery ticket. Formed the winning lottery ticket illustrated in Fig.2B.

After that, the purchaser may transfer it to the new buyer (1000 rubles), which upon receipt of the winning lottery ticket can verify its validity by checking that X=H(Y), where Y is before the first document is a Bank ticket, representing the right of its holder to receive from the Bank a certain sum of money equal to the value of the Bank card. In the formation of the valuable document involved the Bank and the purchaser Blanca Bank ticket, which is a customer of the Bank. The role form plays a valuable document in the form of Bank ticket, and the role of the primary test data plays a slip number of the Bank card.

Additional details of Bank tickets are a pair A, S, where a is a natural number expressing in rubles the value of Bank ticket, and S is a binary sequence representing additional validation data and which is the digital signature of the Bank for the message, linking primary test data with additional valuable details, generated additional test data. In this example, the data S is the digital signature of the Bank) for a message M=(No, A), where No is the number of the form a Bank of ticket, and write (No, A) denotes concantenate binary sequences representing data and No A.

This example uses the digital signature of the Bank related to the following signature scheme based on the well-known RSA scheme ([6], p is a module and is equal to the product of two secret primes P and Q of a suitable size. The secret key of the Bank is a secret integer D1called the secret exponent and satisfying the property 3D11(mod(P-1)(Q-1)). Means for selecting such secret and public keys are well known and can be implemented by a computer programmed accordingly.

In order to be able to sign data using a digital signature, the Bank produces its own secret key D1and the public key is N, then the public key N is published.

Used in this example scheme, the digital signature data S is recognized by the digital signature of the Bank for the data A, No, if NoSE(mod N), where E=3A. This digital signature can be produced by means of a secret key in accordance with the formula SNoD(mod N), where D=D1A. Means for manufacturing such digital signatures are well known and can be implemented by a computer programmed accordingly.

In this example, the Bank shall issue a certain number of forms of Bank notes, one of which is illustrated in Fig.3A. The field "Number" manufactured forms filled peredeniya clients ' accounts by means of computers. Suppose also that the Bank's client is a purchaser Blanca Bank of the ticket shown in Fig.3A, wants to get a Bank ticket with a value of 200 rubles. For this purpose, the Bank customer enters into your computer room Blanca banking ticket No=116F0F0B EA A28D6B13 A3D297E2 and expressed in rubles desired value of Bank ticket And=200.

In this example, the client receives the digital signature of the Bank by known procedures to obtain a blind signature[6], page 475, [8], page 1036). Namely, the client computer within the system of remote management of clients 'accounts on telecommunication networks sends to the computer of the Bank, the request contains No data' and, where No data' are the result of blinding of data No. This blinding No data is performed by the client computer in accordance with the formula No'NoRE(mod N), where E=3A, a R - randomized blinding key.

The computer of the Bank are debited from the account of the client 200 rubles, manufactures by using the secret key D1the digital signature S' messages (No' a) and in response to a client request causes him through the telecommunication connection is made on digital is in accordance with the formula SS'R-1(mod N), where R is randomized blinding key. The generated digital signature S, after checking the correctness of the public key Bank N is stored on a floppy disk and used as additional test data.

The Bank's customer links for more details (A, S) to form a Bank of ticket written on the letterhead of the Bank ticket number 200 and attaching the floppy disk with the digital signature S to form a Bank card. This completes the formation of the Bank card. Formed a valuable document, consisting of two parts, illustrated in Fig.3b. One part formed of the valuable document is a form of banking ticket inscribed with handwritten on it, amount And=200. The other part is formed valuable document is a floppy disk that contains the digital signature S.

Formed a valuable document can be transferred to the new purchaser, for example, in exchange for cash. The new purchaser of the securities document before obtaining valuable document can verify its validity, For the owner of a valuable document passes the new purchaser floppy disk with the digital signature S for Nadia in computer floppy, the number of forms a valuable document and No amount A. After checking the form of the valuable document is transferred to a new purchaser in exchange for cash. The digital signature S remains in the new computer of the purchaser and may be saved on your floppy disk.

Example 4 In this example, the Issuer of the document is a Bank generated valuable document is a Bank card, representing the right of its holder to receive from the Bank an amount of money equal to the value of the Bank card. In the formation of the valuable document involved the Bank and the purchaser Blanca Bank ticket, which is a customer of the Bank. The role form plays a valuable document in the form of Bank ticket, and the role of the primary test data plays a slip number of the Bank card.

Before the release forms with Bank notes, the Bank chooses the maximum value of Bank ticket M, equal to 100,000 rubles, and M public cryptographic functions F1,...,FMas each of these functions use a cryptographic hash function H, which coincides with the function SHA-1. In addition, the Bank chooses a public function G defined on the set of binary sequences of 160 bits. For a binary sequence I=(i

Additional details of Bank tickets are a pair A, Y, where a is expressed in rubles the value of Bank ticket, and Y is a string of 8 hexadecimal digits representing the additional validation data. As a public one-way function F using the function HAthen there is the composition of F1oF2o. ..oFA. Thus, in this example, additional details, other than additional test data submitted by the value And Bank ticket, which is included in the parameters of the function F as the degree of iteration functions N.

In this example, the Bank shall release copies of forms of Bank notes is exactly the same as in example 1. Assume that the secret table of circulation is indicated in table 4.

View Blanca Bank of the ticket corresponding to the secret string table edition with the value of the field "Number" No=4AD4FBB1 8FC123AA ASA 4702FBB5 A028044D, illustrated in Fig.4A.

As in example 1, letterheads Bank notes supplied with security features, thus, in order to prevent forgery of the form a Bank of ticket and h is in retail locations.

Suppose that the Bank has a system of remote customer account management by means of computers. Suppose also that the Bank's client is a purchaser Blanca Bank ticket, wishes to receive cash from your Bank account 45300 rubles. For this purpose, the Bank customer enters into your computer room Blanca banking ticket No=4AD4FBB1 8FC123AA ASA 4702FBB5 A028044D and expressed in rubles required sum A=45300. The client computer within the system of remote management of clients ' accounts on telecommunication networks sends to the computer of the Bank query that contains the data and No A.

The computer of the Bank are debited from the client's account 45300 rubles and in response to a client request causes the intermediate test data I generated as follows. Specified in the client request number No secret circulation table is searched for the corresponding row and is determined by the corresponding private key of Z. In this example, Z= FFA25F99 96A2FC1D VS 51564A7D. Intermediate test data I in the Bank's host computer, programmed appropriately determined according to the formula I= HM-A(Z). In this example, I= H54700(FFA25F99 96A2FC1D VS 51564A7D)= E9FC3EFA 61CFF1DE 4855B6F2 AES A. After this intermediate provera the enta Bank for the received data I checked the value F(I)= No, then the client computer of the Bank calculates the data Y as the result of applying the function G to the interim test data I. In this example, Y=G(E9FC3EFA 61CFF1DE 4855B6F2 AES A)=E9FC3EFA.

The client then takes the data Y, is displayed on the monitor of his computer, as additional test data and enter in the field "Value" blank Bank ticket amount 45300, and in the "Check number" data Y. After this form of banking ticket takes the form illustrated in Fig.4B. This completes the formation of the valuable document.

Note that a small amount of additional testing data Y allows you to easily make their in the form of valuable ticket handwritten image and makes a negligible probability of error. In addition, the small size of the primary test data and No additional testing data Y allows you to easily enter them into the computer manually to generate requests to the Bank.

Formed Bank ticket, the client can be put in one of the points of acceptance of Bank notes in exchange for cash. At this point you receive a Bank tickets takes bearer securities document collateral and establishes communication with the Bank to verify the validity prior to the tick test data I exactly as with the formation of the valuable document, and checks the value G(I)=Y. In the case of execution of this ratio, the Bank confirms for receiving Bank notes the validity of the valuable document, after the exchange and return of Deposit. In the case when more details were not valid, the bearer attempts to provide adjusted for more details. If adjusted for additional details were not valid, then the Deposit is non-refundable.

Example 5 In this example, the Issuer of the document is the Bank a valuable document Bank is a ticket that gives the holder the right to receive from the Bank an amount of money equal to the value of the Bank card. In the formation of the valuable document involved the Bank and the purchaser Blanca Bank ticket, which is a customer of the Bank. The role form plays a valuable document in the form of Bank ticket, and the role of the primary test data plays a slip number of the Bank card.

Additional details of Bank tickets are a pair A, Y, where a is a natural number expressing in rubles the value of Bank ticket, and Y is a binary sequence of 160 Bito is carried out by the application of the public function G to the interim test data. In this example, as public functions G use the cryptographic hash function SHA-1.

Intermediate testing data is a digital signature of the Bank for the message, linking primary test data with additional valuable details, generated additional test data. In this example, the intermediate test data are the digital signature of the Bank) for a message M= (No, A), where the No - slip number of the Bank card. This example uses the digital signature of the Bank described in example 3.

As in example 3, the Bank produces its own secret key D1and the public key is N, then the public key N is published.

In this example, the Bank shall issue a certain number of forms of Bank notes, one of which is illustrated in Fig.5A. The field "Number" manufactured forms filled consecutive natural numbers.

In addition, the form of Bank ticket has the "Verifier" that contains the data that are conventionally called verifier form of Bank card and are designed to demand by the banking ticket rights. Thus the verifier Bank ticket is hidden so masteryoda. In Fig.5A masking fixture marked by the shaded strip. As the verifier of the blank with the number of No use data N(T), where H is the hash function SHA-1, T - concantenate No data and R, a R - the secret key of the Bank that are common to all forms of this edition and selected through a cryptographic random numbers generator. In this example, R=E935A2B5 CD1A767A 27AB8EFE 2BF89951 4BD82AF3, and No room is represented by a string of 4 hexadecimal digits.

Suppose that the Bank has a system of remote customer account management by means of computers, and the client of the Bank, which the purchaser Blanca Bank of the ticket shown in Fig.5A, wants to get a Bank ticket value 735 rubles. For this purpose, the Bank customer enters into your computer room Blanca banking ticket No=1234 and expressed in rubles desired value of Bank A ticket=735. In this example, the client receives the digital signature of the Bank's message (No, A) by known procedures to obtain a blind digital signature as in example 3. The generated digital signature S, after checking the correctness of the public key Bank N, is used as an intermediate test data I. the client Computer of the Bank calculates the data Y as the result ol the 65 EA.

The client then takes the data Y, is displayed on the monitor of his computer, as additional test data and enter in the field "Value" blank Bank ticket amount 735, and in the "Check number" data Y. After this form of banking ticket takes the form illustrated in Fig.5B. This completes the formation of the valuable document.

Formed a valuable document can be used as follows. Suppose a Bank customer for some time after the formation of the Bank of the ticket illustrated in Fig.5B, remotely opened in a new Bank account, which is not connected to the account that was debited when the formation of the Bank card. In order to transfer to a new account, the money, the Bank customer enters into your computer data is No, A, Y, is given on the letterhead of the Bank ticket, and room Number of your new account. The client computer delivers the data through the telecommunication connection to the computer Bank. The computer Bank checks the validity of the Bank of the ticket in the following way. First, verify that the number of forms of banking ticket No is not in the list of numbers used Blanco is but the computer Bank delivers to the client computer, a digital signature, confirming the value of the Bank card. The client then opens a masking fixture of his form. Form Bank of ticket purchases after this type, illustrated in Fig. 5V. The verifier V= 017A4D53 99ADB3DD A A182E5F3 WAS delivered to the Bank. The Bank, verifying the verifier by checking the relation V=H(T), where T is concantenate No data and R, is satisfied that the client has spoiled the form of a Bank card. Thereafter, the Bank shall credit to the account number Number sum A=735 rubles and makes No room in the list of numbers used forms.

In other special cases, the applicant notes the possibility of implementing the inventive method of forming a valuable document for each option as many other combinations of the dependent claims, as well as the ability to encrypt, decrypt and convert data when they are transferred from the giver to the Issuer and Vice versa, which do not change the essence of the claimed invention.

The applicant notes the possibility of forming such a valuable document for each of the variants of the claimed method, which allows remote confirmation associated with the generated the secure remote demand Deposit liabilities in the form of valuable document may be equipped with hidden using the masking fixture data the provision of which the Issuer is a sign of the devaluation of the form of the valuable document, and the owner of a valuable document opens the specified masking device only after it has received the signed message Issuer that recognizes the value of the document.

Literature 1. E. A. Krasheninnikov, Securities payable to bearer, Yaroslavl State University, Yaroslavl, 1995.

2. D. Knuth, the Art of computer programming, so 2, Poluchyennyye algorithms, Moscow, Mir, 1977.

3. C. A. Bakhmutov, the Issuance of securities by issuers and their circulation in the Russian Federation: textbook, St. Petersburg, Publishing house of the SPb., 1998.

4. DE 4235349, G 06 K 19/18.

5. Century Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley&Sons, New York, 2nd edition, 1996.

6. A. J. Menezes, P. C. Van Oorshot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.

7. GOST R 34.11 - 94 Information technology. Cryptographic protection of information. The hashing function. Standards publishing house, Moscow, 1994.

8. D. Chaum, Security Without Identification: Transaction Systems to Make Big Brother Obsolete, Communications of the ACM, vol.28, 10, October 1985, pp.1030-1044.

9. D. Pointcheval, J. Stern, Provably Secure Blind Signature, Lectures Notes in Computer Science, 1163, 1996, Springer, pp.252-265.

Claims

1. The method of forming valuable NTA arbitrary purchaser and subsequent supply of a valuable document, more details, including additional testing data, and in the manufacture of stationery valuable document for the cause of the primary test data, which details a valuable document, and security elements, and supply valuable document for more details carried out by transmission to the purchaser for more test data, which form as a type of the primary test data regarding public one-way function F, the parameters of which include part of the additional details valuable document.

2. The method according to p. 1, characterized in that before the supply of the valuable document additional testing data acquirer Blanca valuable document with security features authenticates form a valuable document.

3. The method according to p. 1, characterized in that during the formation of additional test data acquirer Blanca valuable document checks that generated additional validation data are a type of primary test data, relative to a public one-way function F, depending on the part of the additional details valuable document.

4. The method according to p. 1, characterized in that requi what about p. 4, wherein the data indicating the value generated valuable document, include, at least partially, for more details valuable document.

6. The method according to p. 1, characterized in that before the release form valuable document choose the secret key of the Issuer of the securities document Z, and the primary test data form using the selected secret key z

7. The method according to p. 6, characterized in that as the primary test data using data F(Z).

8. The method according to p. 6, characterized in that as the primary test data using the image of the secret key Z relative to the composition F1oF2o...oFMsequence of M public one-way function F1F2, ..., FM.

9. The method according to p. 8, characterized in that the details generated valuable document include arbitrary natural number And clarifying the value generated valuable document and does not exceed M, and as a public one-way function F using the composition F1oF2o...oFAnd.

10. The method according to p. 9, characterized in that as an additional test data taken with dcadas of public one-way function F1F2, ..., FMuse the cryptographic hash function.

12. The method according to p. 11, characterized in that each of the public one-way function F1F2, ..., FMuse the same cryptographic hash function.

13. The method according to p. 1, characterized in that as a public one-way function F using a cryptographic hash function.

14. The method according to p. 6, characterized in that the secret key Z is chosen via random number generator.

15. The method according to p. 1, or 8, or 9, or 10, or 11, or 12, characterized in that the valuable document form in several steps, each of which increase the value generated valuable document.

16. The method according to p. 1, characterized in that when the form valuable document security features use the security features that prevent falsification of the primary test data.

17. The method according to p. 1, characterized in that as the primary test data use the ID of the form a valuable document.

18. The method according to p. 1, characterized in that formed a valuable document provide additional test data through the telecommunication connection.

19. The method according to p. 1, Ollila.

20. The method according to p. 19, wherein the additional details valuable document keep in a material medium in the form available for automatic reading.

21. The method according to p. 19 or 20, characterized in that the additional details valuable document keep on a tangible medium by a computer-controlled device.

22. The method according to p. 19, wherein the additional details valuable document keep on a tangible medium handwritten way.

23. The method according to p. 19, or 20, or 21, or 22, characterized in that as the material carrier of additional details of the valuable document, use the Bank a valuable document.

24. The method according to p. 19, or 20, or 21, characterized in that the medium for additional details valuable document use storage device.

25. The method according to p. 1 or 21, characterized in that additional details of the valuable document to the material carrier causes the acquirer Blanca valuable document.

26. The method of forming a valuable document, including the production of the form a valuable document, a transfer is made form a valuable document of an arbitrary purchaser and subsequent snagem in the manufacture of stationery valuable document for the cause of the primary test data, which details of the valuable document, and security elements, and supply valuable document for more details carried out by transmission to the purchaser for more test data, which form as a digital signature of the Issuer of the securities document for a message linking the primary test data from a part of the additional details valuable document.

27. The method according to p. 26, characterized in that the digital signature of the Issuer of the document, the purchaser Blanca valuable document gets through the process of making a blind digital signature.

28. The method according to p. 26, characterized in that before the supply of the valuable document additional testing data acquirer valuable form of document using the element of protection authenticates form a valuable document.

29. The method according to p. 26, characterized in that during the formation of additional test data acquirer Blanca valuable document verifies the digital signature of the Issuer of the document.

30. The method according to p. 26, characterized in that the details of the valuable document includes data that indicates the value generated valuable document.

31. The method according to p. 30, characterized in that h is positive us valuable document.

32. The method according to p. 26, characterized in that the valuable document form in several steps, each of which increase the value generated valuable document.

33. The method according to p. 26, characterized in that when the form valuable document security features use the security features that prevent falsification of the primary test data.

34. The method according to p. 26, characterized in that as the primary test data use the ID of the form a valuable document.

35. The method according to p. 26, wherein forming a valuable document provide additional test data through the telecommunication connection.

36. The method according to p. 26, wherein the additional details valuable document keep on arbitrary material medium.

37. The method according to p. 36, wherein the additional details valuable document keep in a material medium in the form available for automatic reading.

38. The method according to p. 36 or 37, characterized in that the additional details valuable document keep on a tangible medium by a computer-controlled device.

39. The method according to p. 36, or 37, or 38, characterized in that cocument.

40. The method according to p. 36, or 37, or 38, characterized in that the medium for additional details valuable document use storage device.

41. The method according to p. 36, wherein the additional details of the valuable document to the material carrier causes the acquirer Blanca valuable document.

42. The method of forming a valuable document, including the production of the form a valuable document, a transfer is made form a valuable document of an arbitrary purchaser and subsequent supply of a valuable document for more details, including additional testing data, and in the manufacture of stationery valuable document for the cause of the primary test data, which details a valuable document, and security elements, and supply valuable document for more details carried out by transmission to the purchaser additional test data generated by transforming the primary test data, and in the course of transformation of the primary test data form an intermediate test data, which take the type of the primary test data on public and resistant visits valuable document, then additional validation data forming application public function G to the generated intermediate test data.

43. The method according to p. 42, characterized in that as a public function G used a random function, for which the probability of coincidence of her image on a random element with a fixed value is less than the pre-specified probability.

44. The method according to p. 42, characterized in that as a public function, G use random cryptographic hash function.

45. The method according to p. 42, characterized in that before the supply of the valuable document, intermediate test data acquirer Blanca valuable document with security features authenticates form a valuable document.

46. The method according to p. 42, characterized in that during the formation of additional test data form a valuable document to validate that the intermediate test data are a type of primary test data, relative to a public one-way function F, depending on the part of the additional details valuable document.

47. The method according to p. 42, characterized in that the details of the valuable document includes data that indicates valuable is generated valuable document, include, at least partially, for more details valuable document.

49. The method according to p. 42, characterized in that before the release form valuable document choose the secret key of the Issuer of the securities document Z, and the primary test data form using the selected secret key z

50. The method according to p. 49, characterized in that as the primary test data using data F(Z).

51. The method according to p. 49, characterized in that as the primary test data using the image of the secret key Z relative to the composition F1oF2o...oFMsequence of M public one-way function F1F2, ..., FM.

52. The method according to p. 51, characterized in that the details generated valuable document include arbitrary natural number And clarifying the value generated valuable document and does not exceed M, and as a public one-way function F using the composition F1oF2o...oFAnd.

53. The method according to p. 52, characterized in that as an additional test data take data FM-Ao...oFM(Z).

54. The method according to p. 51, or 52, or 53, otlit cryptographic hash function.

55. The method according to p. 54, characterized in that each of the public one-way function F1F2, ..., FMuse the same cryptographic hash function.

56. The method according to p. 42, characterized in that as a public one-way function F using a cryptographic hash function.

57. The method according to p. 49, characterized in that the secret key Z is chosen via random number generator.

58. The method according to p. 42, or 43, or 44, or 51 or 52 or 53 or 54 or 55, characterized in that the valuable document form in several steps, each of which increase the value generated valuable document.

59. The method according to p. 42, or 43, or 44, characterized in that when the form valuable document security features use the security features that prevent falsification of the primary test data.

60. The method according to p. 42, or 43, or 44, characterized in that as the primary test data use the ID of the form a valuable document.

61. The method according to p. 42, or 43, or 44, characterized in that formed a valuable document for supply of intermediate testing data through the telecommunication connection.

62. The method according to p. 42, or 43, or 44, characterized . the manual 62, wherein the additional details valuable document keep in a material medium in the form available for automatic reading.

64. The method according to p. 62 or 63, wherein the additional details valuable document keep on a tangible medium by a computer-controlled device.

65. The method according to p. 62, wherein the additional details valuable document keep on a tangible medium handwritten way.

66. The method according to p. 62, or 63, or 64, or 65, wherein as a material carrier of additional details of the valuable document, use the form valuable document.

67. The method according to p. 62, or 63, or 64, wherein the medium for additional details valuable document use storage device.

68. The method according to p. 62, wherein the additional details of the valuable document to the material carrier causes the acquirer Blanca valuable document.

69. The method of forming a valuable document, including the production of the form a valuable document, a transfer is made form a valuable document of an arbitrary purchaser and subsequent supply of securities Dulaney form a valuable document for the cause of the primary test data, which details of the valuable document, and security elements, and supply valuable document for more details carried out by transmission to the purchaser additional test data generated by transforming the primary test data, and in the course of transformation of the primary test data form an intermediate test data, which take deterministic digital signature of the Issuer of the document for a message linking the primary test data from a part of the additional details valuable document, then additional validation data forming application public function G to the generated intermediate test data.

70. The method according to p. 69, characterized in that as a public function G used a random function, for which the probability of coincidence of her image on a random element with a fixed value is less than the pre-specified probability.

71. The method according to p. 69, characterized in that as a public function, G use random cryptographic hash function.

72. The method according to p. 69, characterized in that the digital signature of the Issuer of the document, the purchaser Blanca, characterized in that before the supply of the valuable document, intermediate test data acquirer Blanca valuable document with security features authenticates form a valuable document.

74. The method according to p. 69, characterized in that during the formation of additional test data acquirer Blanca valuable document verifies the digital signature of the Issuer of the document.

75. The method according to p. 69, or 70, or 71, characterized in that the details of the valuable document includes data that indicates the value generated valuable document.

76. The method according to p. 75, wherein the data indicating the value generated valuable document, include, at least partially, for more details valuable document.

77. The method according to p. 69, or 70, or 71, wherein the value document form in several steps, each of which increase the value generated valuable document.

78. The method according to p. 69, or 70, or 71, wherein when the form valuable document security features use the security features that prevent falsification of the primary test data.

79. The method according to p. 69, or 70, or 71, characterized in that as the lip 71, characterized in that formed a valuable document for supply of intermediate testing data through the telecommunication connection.

81. The method according to p. 69, or 70, or 71, wherein the additional details valuable document keep on arbitrary material medium.

82. The method according to p. 81, wherein the additional details valuable document keep in a material medium in the form available for automatic reading.

83. The method according to p. 81 or 82, wherein the additional details valuable document keep on a tangible medium by a computer-controlled device.

84. The method according to p. 81, wherein the additional details valuable document keep on a tangible medium handwritten way.

85. The method according to p. 81, or 82, or 83, or 84, wherein as a material carrier of additional details of the valuable document, use the form valuable document.

86. The method according to p. 81, or 82, or 83, wherein the medium for additional details valuable document use storage device.

87. The method according to p. 81, wherein the additional details C

 

Same patents:

The invention relates to a method of detection of counterfeit products

The invention relates to a method of detecting particles in the base, the electromagnetic properties of which differ from the electromagnetic properties of the particles, as well as to the basics and counterfeit documents containing such particles

The invention relates to a protective element for protection against forgery of various documents

The invention relates to systems of marking and verification of objects and can be used when marking and authentication, notary, financial, documents of title and securities

The invention relates to a method of control of authenticity of documents and the use of this method

The invention relates to methods and apparatus for determining the authenticity of documents, in particular banknotes

The invention relates to means for determining the authenticity of banknotes

FIELD: sorting of bank notes.

SUBSTANCE: the disadvantage of the known devices of the similar type consists in inconvenience of their use, since the possibility of free and easy access to the path of motion of the bank notes is not provided for the user because of a complicated mechanical construction of the transportation system. Owing to it, it is complicatedly enough to extract the bank notes, which because of malfunctions in the process of their transportation may block the transportation system. The invention makes it possible to eliminate the mentioned disadvantage due to the fact that the device for sorting of bank notes consists at least of three component, and at least of two separated from the external components.

EFFECT: a free and easy access to the transportation system is provided.

17 cl, 4 dwg

FIELD: technologies for validating documents, etc.

SUBSTANCE: device has detector with electrodes, detector and signals processing device, during check an alternating electric field is formed, which excites electro-luminescent radiation. One detector detects electro-luminescent signal of validity mark and transforms it to electrical signal, one electrode is made flat or in form of electro-conductive covering of pressing roller, another - in form of electro-conductive film of pressing roller, or one electrode is made plated of transparent electro-conductive material or in form of round electrode in form of one or several wires, and other one - in form of electrode head.

EFFECT: higher efficiency.

3 cl, 12 dwg

FIELD: automated recognition of symbols.

SUBSTANCE: method includes following stages: tuning, forming symbols models, recognition, recording background model together with background of read image, separating model of registered background from elementary image of background, combining for each position of symbol of model of letters and/or digits with elementary displaying of appropriate background, forming of combined models, comparison of unknown symbols to combined models, recognition of each unknown symbol as appropriate symbol, combined model of which is combined with it best in accordance to "template comparison" technology.

EFFECT: higher efficiency.

10 cl, 10 dwg

FIELD: estimation of authenticity of documents, excise brands, bank-notes and securities.

SUBSTANCE: proposed compound is prepared by mixing gadolinium oxysulfide activated by terbium and yttrium oxysulfide activated by ytterbium and erbium. Size of crystal particles of said luminophores does not exceed 1.5 mcm. Compound thus prepared is introduced into printing ink and is applied on surface to be marked by letterpress printing method in form of mark which is invisible at common lighting. Mark is visualized by infra-red light source and/or ultraviolet radiation thus causing its green glow. Document is subjected to identification for estimation of its authenticity of falsification. Marking retains preset properties for extended period of time at high temperatures, bright light and high moisture content.

EFFECT: enhanced efficiency of protection against falsification.

4 cl, 3 ex

FIELD: securities protection.

SUBSTANCE: invention relates to physicochemical protection of securities against falsifications. Coding composition contains one or several code-recognizing compounds, near IR region fluorescent agent, and IR-active compounds containing hydrogen-unbound or weakly bound X-H bonds (X = )-, N-, and ≡C-). Additionally included are IR-active compounds of general formula R1-C≡C-R2 (R1 and R2 are metal or halogen atoms). Method of invention resides in a single or multiple application(s) of one or several coding compositions onto object either avoiding spatial overlapping of compositions or in the form of compositions intersecting in different sequences of streaks, which sequences differ from each other in their code-recognizing components. Recognition of mutually masked code-recognizing and IR-active components is achieved either by way of varying wavelength in excitation spectra or varying intensity and shape of spectra in near IR fluorescence region. Sequence of applied streaks is determined from conformity of code-recognition spectra in higher monomolecular layer (or several monolayers) of composition in a streak intersection point to spectra of individual streaks.

EFFECT: increased information capacity of protection system due to increased diversity of differentiated components.

3 cl, 7 dwg, 6 ex

FIELD: protection coatings.

SUBSTANCE: invention aims at protecting bank notes and security papers against counterfeiting. Optically changing pigment contains interferential multilayer structure including light-transmitting dielectric layer having at least one luminescent material. Dielectric layer is selected from of rare-earth metal, bismuth, and principal group III element trifluorides; of principal group II element difluorides; mixtures thereof; organic or organometallic compounds. Luminescent material should be selected from organic or organometallic compounds containing transition or rare-earth metal ions. Above-defined structure may contain one or more semitransparent, partly reflecting layers, one or more nontransparent, fully reflecting layers, and one or more conducting layers. Pigment is prepared by a method including physical or chemical precipitation of the dielectric layer.

EFFECT: preserved proper properties of color shift, increased reliability of protection, and ensured identification simplicity at relatively low cost.

30 cl, 1 tbl, 9 ex

FIELD: magnetic thread recognition means.

SUBSTANCE: method provides for relative movement between thread and matrix of magnetic heads; each head generates a signal in case of detection of a portion of thread. Approach of thread to one of heads is detected, while this head is marked as main head, and heads on each side of the latter - as secondary heads. Output signals from main and secondary heads are controlled for forming of an image of thread signals amplitudes from main and secondary heads are compared, so that if amplitude of output signal from secondary head exceeds amplitude of signal from main head, then secondary and primary heads are appropriately reassigned.

EFFECT: higher speed of operation, higher efficiency.

6 cl, 17 dwg

FIELD: product authentication.

SUBSTANCE: system has at least one material, providing transformation with frequency increase, as protective marking and one authenticating apparatus, which has one source of electromagnetic radiation with one previously selected wave length and one second electromagnetic radiation source with one second previously selected wave length, which are different from each other and are selected in such a way, that they cause emission by material, providing for transformation with frequency increase, of electromagnetic radiation after combined irradiation by emission with first and second wave lengths, and emitted electromagnetic radiation has radiation with one additional third wave length, specific for return of one electron from activation ion energy level to level, at which electron is excited by combined emission with first and second wave lengths.

EFFECT: higher efficiency.

6 cl, 2 dwg

FIELD: sorting and/or destroying of sheet material, primarily banknotes.

SUBSTANCE: device has processing means, including means for gathering information during processing of separate sheets of sheet material and means for registering data, identifying separate sheets of sheet material, and connected to processing device via galvanically unlocked connection line of control devices with memorizing device for storing information about processing of separate sheets, while memorizing device is made with possible storing of information in it concerning processing of separate sheets of sheet material together with data, identifying separate sheets of sheet material.

EFFECT: higher efficiency, higher reliability.

2 cl, 1 dwg

FIELD: forgery protection and authenticity control of documents.

SUBSTANCE: method includes using an indicator in form of two open spirals in form of an evolvent. Also transformation is performed using sensor of generator electromagnetic emission to electric voltage, in the sensor frequency is altered with following comparison to measurement results standing for authentic funds and/or documents.

EFFECT: higher protection level.

7 cl, 2 dwg

Up!