CN102073977A - Methods and equipment for generating and authenticating digital signatures and digital signature system - Google Patents

Methods and equipment for generating and authenticating digital signatures and digital signature system Download PDF

Info

Publication number
CN102073977A
CN102073977A CN 201010586845 CN201010586845A CN102073977A CN 102073977 A CN102073977 A CN 102073977A CN 201010586845 CN201010586845 CN 201010586845 CN 201010586845 A CN201010586845 A CN 201010586845A CN 102073977 A CN102073977 A CN 102073977A
Authority
CN
China
Prior art keywords
text
characteristic information
dimension code
character string
digital signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201010586845
Other languages
Chinese (zh)
Inventor
贾宝军
郭强
郝芸霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN 201010586845 priority Critical patent/CN102073977A/en
Publication of CN102073977A publication Critical patent/CN102073977A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides methods and equipment for generating and authenticating digital signatures and a digital signature system. The method for generating digital signatures comprises the following steps: encrypting and/or coding text characteristic information and environmental data to generate character strings; coding the character strings with two-dimension codes to generate two-dimension code pictures; and using the two-dimension code pictures as digital signatures and sending the two-dimension code pictures together with the text to be sent. The method for authenticating digital signatures comprises the following steps: reducing the received two-dimension code pictures into the character strings through scanning; decrypting the character strings to obtain the environmental data and the text characteristic information; and checking the received text according to the text characteristic information. Compared with the prior art using the character strings as the digital signatures, the invention can realize more effective signature effect by using the two-dimension codes as the digital signatures.

Description

The generation of digital signature and verification method, equipment and system
Technical field
The present invention relates to the communication technology, relate in particular to a kind of generation and verification method, equipment and system of digital signature.
Background technology
Digital signature be by an one-way function to the message that will transmit handle obtain in order to message identifying source and examine the number of characters word string whether message changes.
Problems such as digital signature can solve and deny, forges, distorts and pretend to be, specific requirement: message signature, the recipient that the sender can not deny sending afterwards can examine that message signature that the sender sends, message signature, recipient that the recipient can not forge the sender can not carry out that part is distorted to sender's message, a certain user in the network can not pretend to be another user as sender or recipient.
In realizing process of the present invention, the inventor finds that there are the following problems at least in the prior art: adopt character string as digital signature in the prior art usually, effect is outstanding inadequately.
Summary of the invention
The embodiment of the invention provides a kind of generation and verification method, equipment and system of digital signature, in order to solve the problem that causes as digital signature with character string in the prior art, realizes that the digital signature effect is more outstanding.
On the one hand, the embodiment of the invention provides a kind of generation method of digital signature, comprising:
Text characteristic information and environmental data are encrypted and/or encoded, generate character string;
Adopt two-dimension code to encode to described character string, generate two-dimension code image;
Described two-dimension code image as digital signature, is sent with text to be sent.
On the other hand, the embodiment of the invention provides a kind of verification method of digital signature, comprising:
The two-dimension code image that receives scanned be reduced into character string;
Described character string is decrypted, obtains environmental data and text characteristic information;
Check the text that receives according to described text characteristic information.
On the one hand, the embodiment of the invention provides a kind of generation equipment of digital signature, comprising:
The information encryption module is used for text characteristic information and environmental data being encrypted and/or being encoded, and generates character string;
Two-dimensional code generation module is used for adopting two-dimension code to encode to described character string, generates two-dimension code image;
Sending module is used for described two-dimension code image sending with text to be sent as digital signature.
On the other hand, the embodiment of the invention provides a kind of Authentication devices of digital signature, comprising:
Two-dimension code scan module, the two-dimension code image that is used for receiving scan and are reduced into character string;
The decrypts information module is used for described character string is decrypted, and obtains environmental data and text characteristic information;
The text authentication module is used for checking the text that receives according to described text characteristic information.
The embodiment of the invention provides the system of digital signature, comprising: the generation equipment of above-mentioned digital signature and the Authentication devices of digital signature.
As shown from the above technical solution, the generation of the digital signature of the embodiment of the invention and verification method, equipment and system, by with two-dimension code as digital signature, because picture has the visual sense feeling more formal than character string, so the effect that adopts two-dimension code more can push oneself to the front and sign as digital signature.
Description of drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the invention, the accompanying drawing of required use is done an introduction simply in will describing embodiment below, apparently, accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the generation method flow synoptic diagram of first embodiment of the invention;
Fig. 2 is the verification method schematic flow sheet of second embodiment of the invention;
Fig. 3 is the generation device structure synoptic diagram of third embodiment of the invention;
Fig. 4 is the Authentication devices structural representation of fourth embodiment of the invention;
Fig. 5 is the system architecture synoptic diagram of fifth embodiment of the invention;
Fig. 6 is the method flow synoptic diagram of sixth embodiment of the invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer, below in conjunction with the accompanying drawing in the embodiment of the invention, technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
Fig. 1 is the generation method flow synoptic diagram of first embodiment of the invention, comprising:
Step 11: text characteristic information and environmental data are encrypted and/or encoded, generate character string;
Wherein, the text characteristic information can obtain in the following way:
Text to be sent is encoded, generate described text characteristic information, the algorithm of described coding comprises hashing algorithm.
Environmental data comprises at least: the apparatus characteristic information of user name, transmitting time and the information of transmission;
Described apparatus characteristic information comprises at least one in following: the network interface card identification number of machine, IP address, machine name.
Particularly, text characteristic and environmental data are encrypted and/or the algorithm of encoding can adopt rivest, shamir, adelman, also can be adopted the high symmetric encipherment algorithm of Cipher Strength.
Step 12: adopt two-dimension code to encode to described character string, generate two-dimension code image;
Wherein, the algorithm of two-dimension code coding can be PDF417, QRCode, Code49, code16K or CodeOne.
Step 13: described two-dimension code image as digital signature, is sent with text to be sent;
For example, can be with the annex of described two-dimension code image as mail, the perhaps signature of delivering as forum's speech sends after being attached to described text together.
This forum includes but not limited to: internet forum, news analysis, Web Community etc.
Further, present embodiment can also send user name with above-mentioned two-dimension code, text to be sent.Since expressly carry user name, can be so that the effect of digital signature be more outstanding.
Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Fig. 2 is the verification method schematic flow sheet of second embodiment of the invention, comprising:
Step 21: the two-dimension code image that receives scanned be reduced into character string;
For example, be reduced into character string after can adopting existing two-dimensional code reading equipment with the scanning of the two-dimension code image that receives.
Step 22: described character string is decrypted, obtains environmental data and text characteristic information;
Particularly, can decipher character string, obtain environmental data and text characteristic information by the key and the decipherment algorithm of making an appointment.
Described environmental data comprises at least: the apparatus characteristic information of user name, transmitting time, transmission information; Described apparatus characteristic information comprises at least one in following: the network interface card identification number of machine, IP address, machine name.
Step 23: check the text that receives according to described text characteristic information.
Particularly,,, environmental data expressly can be obtained, the evidence that send related data of this environmental data as transmit leg the denial of transmit leg can be avoided afterwards through deciphering to character string for environmental data.Perhaps, if comprise environmental data expressly in the data that send, the environmental data that the environmental data after then can relatively deciphering expressly carries, whether legal to check the source that sends data.For example,, then can compare the user name and this user name of expressly carrying that obtain after the deciphering, if both unanimities show that then the source of data of this reception is effectively legal if the data that transmit leg sends further comprise user name.For the text characteristic information, can be in the following way:
Adopt hashing algorithm to encode to the text that receives, generate the text characteristic information;
If the text characteristic information of described generation is identical with the text characteristic information that receives (i.e. the text characteristic information that obtains by the deciphering character string), then checked result is that text is effective.Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Fig. 3 is the generation device structure synoptic diagram of third embodiment of the invention, comprises information encryption module 31, two-dimensional code generation module 32 and sending module 33; Information encryption module 31 is used for text characteristic information and environmental data being encrypted and/or being encoded, and generates character string; Two-dimensional code generation module 32 is used for adopting two-dimension code to encode to described character string, generates two-dimension code image; Sending module 33 is used for described two-dimension code image sending with text to be sent as digital signature.
Further, present embodiment can also comprise text eigenwert generation module 34, and text eigenwert generation module 34 is used for text to be sent is encoded, and generates described text characteristic information, and the algorithm of described coding comprises hashing algorithm.
Particularly, described information encryption module 31 specifically is used for text characteristic information and environmental data are adopted rivest, shamir, adelman, perhaps adopts the high symmetric encipherment algorithm of Cipher Strength, encrypts and/or encodes, and generates character string; And/or described two-dimensional code generation module 32 specifically is used for described character string is adopted PDF417, QRCode, Code49, code16K or CodeOne algorithm, encodes, and generates two-dimension code image; And/or described sending module 33 specifically is used for the annex of described two-dimension code image as mail, and the perhaps signature of delivering as forum's speech sends after being attached to described text together.
Perhaps, the sending module of present embodiment can also specifically be used for user name with described two-dimension code image and described environmental data as digital signature, sends with text to be sent.
Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Fig. 4 is the Authentication devices structural representation of fourth embodiment of the invention, comprises two-dimension code scan module 41, decrypts information module 42 and text authentication module 43; The two-dimension code image that two-dimension code scan module 41 is used for receiving scans and is reduced into character string; Decrypts information module 42 is used for described character string is decrypted, and obtains environmental data and text characteristic information; Text authentication module 43 is used for checking the text that receives according to described text characteristic information.
Wherein, described decrypts information module 42 specifically is used to adopt key and corresponding decipherment algorithm that described character string is decrypted, and obtains environmental data and text characteristic information.
Obtain environmental data expressly after the described character string deciphering, the environmental data that described text authentication module 43 can be used for specifically that deciphering is obtained sends the evidence of related data as transmit leg, avoid the denial of transmit leg, perhaps, if transmit leg has carried user name simultaneously when sending data, the user name that obtains after the user name that also can expressly carry by comparison and the deciphering then, if both unanimities, then checked result for the source effectively.
Perhaps, present embodiment can also comprise text eigenwert generation module 44, and described text eigenwert generation module 44 is used for adopting hashing algorithm to encode to the text that receives, and generates the text characteristic information; If it is identical with the text characteristic information that receives that described text authentication module 43 specifically is used for the text characteristic information of described generation, then checked result is that text is effective.
Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Fig. 5 is the system architecture synoptic diagram of fifth embodiment of the invention, comprise the generation equipment 51 of digital signature and the Authentication devices 52 of digital signature, wherein, the generation equipment 51 of digital signature can be specifically as shown in Figure 3, and the Authentication devices 52 of digital signature can be specifically as shown in Figure 4.
Correspondingly, corresponding to this system, the method for execution as shown in Figure 6, Fig. 6 is the method flow synoptic diagram of sixth embodiment of the invention, comprising:
Step 61: the generation equipment of digital signature is encrypted text characteristic information and environmental data and/or is encoded, and generates character string;
Step 62: the generation equipment of digital signature adopts two-dimension code to encode to described character string, generates two-dimension code image;
Step 63: the generation equipment of digital signature as digital signature, sends described two-dimension code image with text to be sent;
Step 64: the Authentication devices of digital signature scans the two-dimension code image that receives and is reduced into character string;
Step 65: the Authentication devices of digital signature is decrypted described character string, obtains environmental data and text characteristic information;
Step 66: the Authentication devices of digital signature is checked the text that receives according to described text characteristic information.
The particular content of above steps can be referring to the various embodiments described above.
Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Be understandable that the reference mutually of the correlated characteristic in said method and the equipment.In addition, " first " in the foregoing description, " second " etc. are to be used to distinguish each embodiment, and do not represent the quality of each embodiment.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be finished by the relevant hardware of programmed instruction, aforesaid program can be stored in the computer read/write memory medium, this program is carried out the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
It should be noted that at last: above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (19)

1. the generation method of a digital signature is characterized in that, comprising:
Text characteristic information and environmental data are encrypted and/or encoded, generate character string;
Adopt two-dimension code to encode to described character string, generate two-dimension code image;
Described two-dimension code image as digital signature, is sent with text to be sent.
2. method according to claim 1 is characterized in that, also comprises:
Text to be sent is encoded, generate described text characteristic information, the algorithm of described coding comprises hashing algorithm.
3. method according to claim 1 is characterized in that, described environmental data comprises at least:
The apparatus characteristic information of user name, transmitting time and the information of transmission.
4. method according to claim 3 is characterized in that, described apparatus characteristic information comprises at least one in following: the network interface card identification number of machine, IP address, machine name.
5. according to each described method of claim 1 to 4, it is characterized in that, describedly text characteristic information and environmental data are encrypted and/or encoded, generate character string, comprising:
Text characteristic information and environmental data are adopted rivest, shamir, adelman, perhaps adopt the high symmetric encipherment algorithm of Cipher Strength, encrypt and/or encode, generate character string.
6. according to each described method of claim 1 to 4, it is characterized in that, describedly adopt two-dimension code to encode, generate two-dimension code image, comprising described character string:
Described character string is adopted PDF417, QRCode, Code49, code16K or CodeOne algorithm, encode, generate two-dimension code image.
7. according to each described method of claim 1 to 4, it is characterized in that, described with described two-dimension code image as digital signature, send with text to be sent, comprising:
With the annex of described two-dimension code image as mail, the perhaps signature of delivering as forum's speech sends after being attached to described text together.
8. the verification method of a digital signature is characterized in that, comprising:
The two-dimension code image that receives scanned be reduced into character string;
Described character string is decrypted, obtains environmental data and text characteristic information;
Check the text that receives according to described text characteristic information.
9. method according to claim 8 describedly is decrypted described character string, obtains environmental data and text characteristic information, comprising:
Adopt key and corresponding decipherment algorithm that described character string is decrypted, obtain environmental data and text characteristic information.
10. according to Claim 8 or 9 described methods, it is characterized in that described environmental data comprises at least: the apparatus characteristic information of user name, transmitting time and the information of transmission.
11. method according to claim 10 is characterized in that, described apparatus characteristic information comprises at least one in following:
The network interface card identification number of machine, IP address, machine name.
12. according to Claim 8 or 9 described methods, it is characterized in that, also comprise:
Adopt hashing algorithm to encode to the text that receives, generate the text characteristic information;
Describedly check the text that receives, comprising according to described text characteristic information:
If the text characteristic information of described generation is identical with the text characteristic information that receives, then checked result is that text is effective.
13. the generation equipment of a digital signature is characterized in that, comprising:
The information encryption module is used for text characteristic information and environmental data being encrypted and/or being encoded, and generates character string;
Two-dimensional code generation module is used for adopting two-dimension code to encode to described character string, generates two-dimension code image;
Sending module is used for described two-dimension code image sending with text to be sent as digital signature.
14. equipment according to claim 13 is characterized in that, also comprises:
Text eigenwert generation module is used for text to be sent is encoded, and generates described text characteristic information, and the algorithm of described coding comprises hashing algorithm.
15. according to claim 13 or 14 described equipment, it is characterized in that,
Described information encryption module specifically is used for text characteristic information and environmental data are adopted rivest, shamir, adelman, perhaps adopts the high symmetric encipherment algorithm of Cipher Strength, encrypts and/or encodes, and generates character string;
And/or,
Described two-dimensional code generation module specifically is used for described character string is adopted PDF417, QRCode, Code49, code16K or CodeOne algorithm, encodes, and generates two-dimension code image;
And/or,
Described sending module specifically is used for the annex of described two-dimension code image as mail, and the perhaps signature of delivering as forum's speech sends after being attached to described text together.
16. the Authentication devices of a digital signature is characterized in that, comprising:
Two-dimension code scan module, the two-dimension code image that is used for receiving scan and are reduced into character string;
The decrypts information module is used for described character string is decrypted, and obtains environmental data and text characteristic information;
The text authentication module is used for checking the text that receives according to described text characteristic information.
17. equipment according to claim 16 is characterized in that, described decrypts information module specifically is used to adopt key and corresponding decipherment algorithm that described character string is decrypted, and obtains environmental data and text characteristic information.
18. equipment according to claim 16 is characterized in that, also comprises:
Text eigenwert generation module is used for adopting hashing algorithm to encode to the text that receives, and generates the text characteristic information;
If it is identical with the text characteristic information that receives that described text authentication module specifically is used for the text characteristic information of described generation, then checked result is that text is effective.
19. the system of consistent digital signature is characterized in that, comprising:
Generation equipment as each described digital signature of claim 13-15; And,
Authentication devices as each described digital signature of claim 16-18.
CN 201010586845 2010-12-13 2010-12-13 Methods and equipment for generating and authenticating digital signatures and digital signature system Pending CN102073977A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010586845 CN102073977A (en) 2010-12-13 2010-12-13 Methods and equipment for generating and authenticating digital signatures and digital signature system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010586845 CN102073977A (en) 2010-12-13 2010-12-13 Methods and equipment for generating and authenticating digital signatures and digital signature system

Publications (1)

Publication Number Publication Date
CN102073977A true CN102073977A (en) 2011-05-25

Family

ID=44032508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010586845 Pending CN102073977A (en) 2010-12-13 2010-12-13 Methods and equipment for generating and authenticating digital signatures and digital signature system

Country Status (1)

Country Link
CN (1) CN102073977A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102270294A (en) * 2011-08-12 2011-12-07 华南农业大学 Bar code and two-dimension code hybrid coding and decoding methods and devices
CN102724668A (en) * 2012-06-15 2012-10-10 惠州Tcl移动通信有限公司 Method and system for sharing WIFI (wireless fidelity) network information on basis of two-dimensional code graphs
CN103226500A (en) * 2012-01-31 2013-07-31 英飞凌科技股份有限公司 System and method of computation by signature analysis
CN103236929A (en) * 2013-04-26 2013-08-07 天地融科技股份有限公司 Information processing method and encryption device
CN103248553A (en) * 2012-02-07 2013-08-14 腾讯科技(深圳)有限公司 Mail encryption method, mail decryption method and clients
CN103532960A (en) * 2013-10-21 2014-01-22 上海合合信息科技发展有限公司 Text encryption interaction method, encryption method and device, decryption method and device
CN104063779A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Email box attachment downloading method and email box attachment downloading system thereof
CN104966116A (en) * 2015-07-14 2015-10-07 苏州奥莱维信息技术有限公司 Encrypted electronic seal based on two-dimension code
CN104993923A (en) * 2015-07-02 2015-10-21 武汉大学 Radar data protection method based on combination of information hiding and encryption techniques
CN105844520A (en) * 2015-01-13 2016-08-10 伍彬 Electronic receipt generating and verifying method
CN106033543A (en) * 2015-03-11 2016-10-19 株式会社理光 Document modification detecting method, original document manuscript providing device, duplicated document detecting device, and document modification detection system
CN108632663B (en) * 2018-06-19 2021-02-02 西安中科深度生态环境科技有限责任公司 Method and system for processing digitized audio/video and subtitles

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004040506A1 (en) * 2002-10-31 2004-05-13 Iconlab, Inc. Two-dimensional code having superior decoding property which is possible to control the level of error correcting codes, and method for encoding and decoding the same
CN101645140A (en) * 2008-08-06 2010-02-10 华为技术有限公司 Two-dimensional code generation method, decoding method and device
CN101834726A (en) * 2010-03-19 2010-09-15 广州广大通电子科技有限公司 Safe encryption method based on bi-dimensional codes

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004040506A1 (en) * 2002-10-31 2004-05-13 Iconlab, Inc. Two-dimensional code having superior decoding property which is possible to control the level of error correcting codes, and method for encoding and decoding the same
CN101645140A (en) * 2008-08-06 2010-02-10 华为技术有限公司 Two-dimensional code generation method, decoding method and device
CN101834726A (en) * 2010-03-19 2010-09-15 广州广大通电子科技有限公司 Safe encryption method based on bi-dimensional codes

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102270294A (en) * 2011-08-12 2011-12-07 华南农业大学 Bar code and two-dimension code hybrid coding and decoding methods and devices
CN103226500A (en) * 2012-01-31 2013-07-31 英飞凌科技股份有限公司 System and method of computation by signature analysis
CN103226500B (en) * 2012-01-31 2016-08-10 英飞凌科技股份有限公司 The system and method calculated by signature analysis
CN103248553A (en) * 2012-02-07 2013-08-14 腾讯科技(深圳)有限公司 Mail encryption method, mail decryption method and clients
CN102724668A (en) * 2012-06-15 2012-10-10 惠州Tcl移动通信有限公司 Method and system for sharing WIFI (wireless fidelity) network information on basis of two-dimensional code graphs
CN104063779A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Email box attachment downloading method and email box attachment downloading system thereof
CN103236929B (en) * 2013-04-26 2016-09-14 天地融科技股份有限公司 A kind of information processing method and deciphering device
WO2014173233A1 (en) * 2013-04-26 2014-10-30 天地融科技股份有限公司 Information processing method and deciphering apparatus
CN103236929A (en) * 2013-04-26 2013-08-07 天地融科技股份有限公司 Information processing method and encryption device
CN103532960A (en) * 2013-10-21 2014-01-22 上海合合信息科技发展有限公司 Text encryption interaction method, encryption method and device, decryption method and device
CN105844520A (en) * 2015-01-13 2016-08-10 伍彬 Electronic receipt generating and verifying method
CN106033543A (en) * 2015-03-11 2016-10-19 株式会社理光 Document modification detecting method, original document manuscript providing device, duplicated document detecting device, and document modification detection system
CN104993923A (en) * 2015-07-02 2015-10-21 武汉大学 Radar data protection method based on combination of information hiding and encryption techniques
CN104993923B (en) * 2015-07-02 2018-03-27 武汉大学 The radar data guard method that a kind of Information hiding is combined with encryption technology
CN104966116A (en) * 2015-07-14 2015-10-07 苏州奥莱维信息技术有限公司 Encrypted electronic seal based on two-dimension code
CN104966116B (en) * 2015-07-14 2018-08-07 苏州奥莱维信息技术有限公司 The acquisition methods of encrypted electronic seal based on Quick Response Code
CN108632663B (en) * 2018-06-19 2021-02-02 西安中科深度生态环境科技有限责任公司 Method and system for processing digitized audio/video and subtitles

Similar Documents

Publication Publication Date Title
CN102073977A (en) Methods and equipment for generating and authenticating digital signatures and digital signature system
CN105099692B (en) Security verification method and device, server and terminal
CN101295343B (en) Two-dimensional code multi-enciphering anti-fake printing method
US20110145576A1 (en) Secure method of data transmission and encryption and decryption system allowing such transmission
CN105825257A (en) Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof
CN105450395A (en) Information encryption and decryption processing method and system
WO2017016447A1 (en) Two-dimensional code mask encryption and decryption method and system
JP6489464B2 (en) Optical code, information transmission method, and authentication method
CN101388776B (en) Ciphering and deciphering method and device for printed written files
CN104052594A (en) Bandwidth Efficient Method And System For Obscuring The Existence Of Encryption In A Communications Channel
CN1889419A (en) Method and apparatus for realizing encrypting
CN102684877A (en) Method and device for carrying out user information processing
CN104243149A (en) Encrypting and decrypting method, device and server
Karthikeyan et al. Enhanced security in steganography using encryption and quick response code
CN102404337A (en) Data encryption method and device
CN102332978B (en) Lottery ticket off-line verification system
CN110175471B (en) File storage method and system
CN1949196A (en) Method, device and system for storage data in portable device safely
CN109462620A (en) One kind realizing password method for retrieving and system based on a variety of safety verification modes
CN114936012A (en) Method and device for realizing screen projection by encrypting and scanning two-dimensional code
Chaudhary et al. An elucidation on steganography and cryptography
WO2019066640A1 (en) Method for secured offline transfer of documents via dynamic two-dimensional barcode
CN110351227A (en) A kind of method and apparatus of Data Encryption Transmission
EP1691502A1 (en) Information encryption transmission/reception method
KR101269818B1 (en) Data transmission system and method and data decryption system and method for securely delivering of digital information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110525