CN108038388B - Method for realizing Web page seal, client and server - Google Patents

Method for realizing Web page seal, client and server Download PDF

Info

Publication number
CN108038388B
CN108038388B CN201810051857.4A CN201810051857A CN108038388B CN 108038388 B CN108038388 B CN 108038388B CN 201810051857 A CN201810051857 A CN 201810051857A CN 108038388 B CN108038388 B CN 108038388B
Authority
CN
China
Prior art keywords
web page
seal
electronic seal
data
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810051857.4A
Other languages
Chinese (zh)
Other versions
CN108038388A (en
Inventor
郝立臣
胡昊
刘莺莺
武文高
刘伟东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sursen Electronic Technology Co ltd
Original Assignee
Beijing Sursen Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sursen Electronic Technology Co ltd filed Critical Beijing Sursen Electronic Technology Co ltd
Priority to CN201810051857.4A priority Critical patent/CN108038388B/en
Publication of CN108038388A publication Critical patent/CN108038388A/en
Application granted granted Critical
Publication of CN108038388B publication Critical patent/CN108038388B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The invention provides a method for realizing a Web page seal, a client, a server and a storage medium, belonging to the technical field of information security. The implementation method comprises the following steps: the method comprises the steps of drawing an electronic seal on an embedded window of a Web page according to data of the electronic seal, signing the Web page, generating a digital signature, and submitting the data of the electronic seal and the digital signature to a server, wherein the server is used for providing the Web page, so that the electronic seal is drawn on the embedded window of the Web page by using the data of the electronic seal, the drawn electronic seal is only a display result of the electronic seal and does not contain the data of the electronic seal or a link of the data of the electronic seal, and therefore a user cannot obtain the data of the electronic seal from the embedded window, and the seal of the Web page is effectively prevented from being illegally obtained and used.

Description

Method for realizing Web page seal, client and server
Technical Field
The invention relates to the technical field of information security, in particular to a method for realizing a Web page seal, a client, a server and a storage medium.
Background
With the development of e-government affairs and e-commerce, more and more information is interacted through Web pages, such as online contracts, online approvals and the like, and the Web pages embody authenticity and validity by means of electronic seal stamping. At present, a way of embedding a stamp image into a Web page is usually adopted for displaying a Web page stamp, when a user opens the Web page by using a browser, the stamp image is already embedded into the Web page, and when the stamp image is clicked, the stamp image can be saved, but the saved stamp image has the problem of being illegally used.
Therefore, how to avoid the illegal acquisition and use of the seal of the Web page becomes a problem to be solved urgently.
Disclosure of Invention
The embodiment of the invention provides a method for realizing a Web page seal, a client, a server and a storage medium, which can effectively prevent the seal of a Web page from being illegally obtained and used.
One aspect of the present invention provides a method for implementing a seal on a Web page, the method comprising: drawing an electronic seal on an embedded window of a Web page according to the data of the electronic seal; signing the Web page to generate a digital signature; and submitting the data and the digital signature of the electronic seal to a server, wherein the server is used for providing a Web page.
In an embodiment of the present invention, the implementation method further includes: acquiring seal position information, wherein the seal position information is used for indicating the position of the embedded window relative to the Web page, and submitting data and a digital signature of an electronic seal to a server, and the seal position information comprises the following steps: and submitting the data, the digital signature and the seal position information of the electronic seal to a server.
In one embodiment of the present invention, drawing an electronic seal in an embedded window of a Web page according to data of the electronic seal includes: acquiring and analyzing data of the electronic seal to obtain a stamp image; and drawing the electronic seal on the embedded window according to the stamp picture.
In an embodiment of the present invention, before signing the Web page, the implementation method further includes: using a signature public key of a seal maker to verify whether the data of the electronic seal is legal or not, wherein the signature of the Web page comprises the following steps: and when the data of the electronic seal is verified to be legal, signing the Web page.
Another aspect of the present invention provides a method for implementing a Web page seal, including: receiving a Web page, data of an electronic seal and a digital signature of the Web page sent by a server; drawing an electronic seal on an embedded window of a Web page according to the data of the electronic seal; the Web page is verified based on the digital signature.
In one embodiment of the present invention, receiving a Web page, data of an electronic seal, and a digital signature of the Web page sent by a server includes: receiving a Web page, data of an electronic seal, a digital signature of the Web page and seal position information sent by a server, wherein the seal position information is used for indicating the position of an embedded window relative to the Web page; before drawing the electronic seal on the embedded window of the Web page according to the data of the electronic seal, the implementation method further comprises the following steps: and moving the embedded window to the position indicated by the seal position information according to the seal position information.
In one embodiment of the present invention, drawing an electronic seal in an embedded window of a Web page according to data of the electronic seal includes: analyzing the data of the electronic seal to obtain a stamp image; and drawing the electronic seal on the embedded window according to the stamp picture.
In an embodiment of the present invention, the implementation method further includes: and verifying whether the data of the electronic seal is legal or not by using the signature public key of the seal maker.
In another aspect, the present invention provides a method for implementing a seal on a Web page, including: receiving data of an electronic seal and a digital signature of a Web page submitted by a client of a first user; and sending the Web page, the data of the electronic seal and the digital signature of the Web page to a client of a second user.
Yet another aspect of the present invention provides a client, comprising: the drawing module is used for drawing the electronic seal on the embedded window of the Web page according to the data of the electronic seal; the signature module is used for signing the Web page to generate a digital signature; and the submitting module is used for submitting the data and the digital signature of the electronic seal to a server, wherein the server is used for providing a Web page.
In one embodiment of the present invention, the client further includes: the acquisition module is used for acquiring stamp position information, wherein the stamp position information is used for indicating the position of the embedding window relative to the Web page, and the submission module submits the data, the digital signature and the stamp position information of the electronic stamp to the server.
In an embodiment of the invention, the drawing module acquires and analyzes data of the electronic seal to obtain the stamp image, and draws the electronic seal in the embedded window according to the stamp image.
In an embodiment of the invention, before signing the Web page, the signature module also uses a signature public key of a signer to verify whether the data of the electronic seal is legal, wherein the signature module signs the Web page when verifying that the data of the electronic seal is legal.
Yet another aspect of the present invention provides a client, comprising: the receiving module is used for receiving the Web page, the data of the electronic seal and the digital signature of the Web page sent by the server; the drawing module is used for drawing the electronic seal on the embedded window of the Web page according to the data of the electronic seal; and the verification module is used for verifying the Web page according to the digital signature.
In one embodiment of the invention, a receiving module receives a Web page, data of an electronic seal, a digital signature of the Web page and seal position information sent by a server, wherein the seal position information is used for indicating the position of an embedded window relative to the Web page; and the drawing module moves the embedded window to the position indicated by the seal position information according to the seal position information before drawing the electronic seal on the embedded window of the Web page according to the data of the electronic seal.
In one embodiment of the invention, the drawing module analyzes data of the electronic seal to obtain a stamp image, and draws the electronic seal in the embedded window according to the stamp image.
In one embodiment of the invention, the verification module also uses the signature public key of the seal maker to verify whether the data of the electronic seal is legal.
Yet another aspect of the present invention provides a server, including: the receiving module is used for receiving the data of the electronic seal submitted by the client of the first user and the digital signature of the Web page; and the sending module is used for sending the Web page, the data of the electronic seal and the digital signature of the Web page to the client of the second user.
Yet another aspect of the present invention provides a storage medium having computer-executable instructions stored thereon, wherein the executable instructions, when executed by a processor, implement the method for implementing a Web page stamp according to the above aspects.
According to the technical scheme provided by the embodiment of the invention, the electronic seal is drawn on the embedded window of the Web page according to the data of the electronic seal, the Web page is signed, the digital signature is generated, and the data and the digital signature of the electronic seal are submitted to the server, wherein the server is used for providing the Web page, the electronic seal is drawn on the embedded window of the Web page by using the data of the electronic seal, the drawn electronic seal is only the display result of the electronic seal and does not contain the data of the electronic seal or the link of the data of the electronic seal, so that a user cannot obtain the data of the electronic seal from the embedded window, and the seal of the Web page is effectively prevented from being illegally obtained and used.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
FIG. 1 is a schematic block diagram of a Web page stamping system according to one embodiment of the present invention.
FIG. 2 is a schematic flow chart of a method for implementing a Web page stamp according to an embodiment of the present invention.
Fig. 3 is a schematic flow chart of a method for implementing a Web page stamp according to another embodiment of the present invention.
Fig. 4 is a schematic flow chart of a method for implementing a Web page stamp according to another embodiment of the present invention.
FIG. 5 is a schematic flow chart diagram of a process for implementing a Web page stamp, according to one embodiment of the present invention.
Fig. 6 is a schematic block diagram of a client according to one embodiment of the present invention.
Fig. 7 is a schematic structural diagram of a client according to another embodiment of the present invention.
Fig. 8 is a schematic structural diagram of a client according to still another embodiment of the present invention.
Fig. 9 is a schematic configuration diagram of a server according to an embodiment of the present invention.
FIG. 10 is a block diagram of a computer device for implementing Web page stamping, according to one embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
FIG. 1 is a schematic block diagram of a Web page stamping system 100 according to one embodiment of the present invention.
The Web page stamping system 100 may include a client 110 of a first user, a client 120 of a second user, and a server 130. The first user's client 110 may communicate with the server 130 over a transport network, and the second user's client 120 may also communicate with the server 130 over a transport network. The server 130 may provide a Web page to be stamped, the client 110 of the first user may stamp an electronic stamp on the Web page and cause the Web page to display the electronic stamp, and the client 120 of the second user may cause the Web page to display the electronic stamp and verify whether the content of the Web page is tampered with.
FIG. 2 is a schematic flow chart of a method for implementing a Web page stamp according to an embodiment of the present invention.
And 210, drawing the electronic seal on the embedded window of the Web page according to the data of the electronic seal.
In the embodiment of the invention, the first user can stamp the electronic seal on the Web page through the stamping control on the client of the first user, wherein the stamping control can be an executable component. Here, the data of the electronic seal may include at least one of a name of the seal, a color of the seal, a size of the seal, a certificate bound to the seal, and signature information of a seal maker, in addition to the stamp image. Specifically, a client of a first user can call a stamping control to enable the stamping control to complete the operation of stamping an electronic seal on a Web page; the client of the first user can also insert a stamping control into the Web page, so that the stamping control can complete the operation of stamping the electronic seal on the Web page. When the stamping control executes the operation of stamping the electronic seal, the embedded window is operated, so that the embedded window is displayed on the Web page, and then the stamping control can acquire the data of the electronic seal and render and display the electronic seal in the embedded window according to the data of the electronic seal. Specifically, in 210, drawing the electronic seal refers to rendering the electronic seal. In addition, when the data of the electronic seal only comprises the stamp image, the stamping control can draw the electronic seal in the embedded window directly according to the stamp image; when the data of the electronic seal comprises the stamp image and other data, the stamping control can analyze the data of the electronic seal to obtain the stamp image, and then draw the electronic seal in the embedded window according to the stamp image. And the stamping control draws the electronic seal in the embedded window according to the data of the electronic seal, the data of the electronic seal is still kept in the stamping control, and a user cannot acquire the data of the electronic seal through the embedded window. In addition, the way for the stamping control to obtain the data of the electronic stamp may be from a cryptographic device, or from a server, which is not limited herein, where the cryptographic device may be at least one of a smart cryptographic Key (USB-Key), an IC Card (Integrated Circuit Card), a fingerprint device, an optical disc, or a floppy disc.
For example, the first user browses the Web page through a browser, and a seal button may exist on an interface of the browser. When a first user clicks a stamping button, a stamping control is inserted into a Web page, and the stamping control starts to execute the operation of stamping an electronic seal on the Web page. Specifically, after the Web page is inserted into the stamping control, the stamping control operates the embedded window to enable the embedded window to be displayed on the Web page, and then the stamping control draws the electronic seal on the embedded window according to the data of the electronic seal to enable the electronic seal to be displayed on the Web page.
And 220, signing the Web page to generate a digital signature.
In the embodiment of the invention, the stamping control on the client of the first user can realize the stamping of the electronic seal on the Web page. Here, the electronic seal is applied to the Web page, and the electronic seal is displayed on the Web page, and the signature is applied to the Web page to ensure the validity of the content of the Web page. Specifically, the stamping control may sign the Web page to generate a digital signature, where the principle of the signature may be based on a Public Key Infrastructure (PKI) system.
For example, the embedded window may be moved, and when the electronic seal is displayed at an inappropriate position on the Web page, the first user may drag the embedded window to display the electronic seal at the appropriate position on the Web page. After the position of the electronic seal displayed on the Web page is determined, the first user can right click on the embedded window to pop up a menu, and the menu can contain a signature option. The first user selects the signature option and the stamping control may begin signing the Web page. Here, the signature option may also be called a stamping option, and is only a difference of nomenclature, and is not limited herein. The specific process of signing the Web page by the seal control may include: the stamping control uses a hash function to operate all or part of the content of the Web page to generate a hash value; and carrying out encryption signature on the hash value by using a signature private key corresponding to the data of the electronic seal to generate a digital signature, wherein the digital signature can be referred to as a second digital signature hereinafter. The signature private key corresponding to the data of the electronic seal may be stored in the password device, and the first user may connect the password device with a client of the first user before performing the signature operation.
And 230, submitting the data and the digital signature of the electronic seal to a server, wherein the server is used for providing the Web page.
For example, after the Web page has been stamped with the electronic seal, the stamping control may directly submit the data of the electronic seal and the digital signature to the server. In addition, a submission button can be arranged on the interface of the Web page, and after the Web page is stamped with the electronic seal, the first user can click the submission button, and the stamping control submits the data and the digital signature of the electronic seal to the server. Or the first user can click a submit button, and the browser submits the data and the digital signature of the electronic seal to the server. The manner of submitting the data of the electronic seal and the digital signature to the server is not limited thereto. The data submitted to the server by the client of the first user can include other data, such as at least one of seal position information, page filling content, stamping control and the like, besides the data of the electronic seal and the digital signature.
According to the technical scheme provided by the embodiment of the invention, the electronic seal is drawn on the embedded window of the Web page according to the data of the electronic seal, the Web page is signed, the digital signature is generated, and the data and the digital signature of the electronic seal are submitted to the server, wherein the server is used for providing the Web page, the electronic seal is drawn on the embedded window of the Web page by using the data of the electronic seal, the drawn electronic seal is only the display result of the electronic seal and does not contain the data of the electronic seal or the link of the data of the electronic seal, so that a user cannot obtain the data of the electronic seal from the embedded window, and the seal of the Web page is effectively prevented from being illegally obtained and used.
In another embodiment of the present invention, the implementation method of fig. 2 may further include: acquiring seal position information, wherein the seal position information is used for indicating the position of the embedded window relative to the Web page, and submitting data and a digital signature of an electronic seal to a server, and the seal position information comprises the following steps: and submitting the data, the digital signature and the seal position information of the electronic seal to a server.
For example, the stamping control can obtain the stamp position information while signing the Web page. Here, the stamp position information may refer to a position of the embedding window relative to the Web page when the stamping control signs the Web page, and the position may be a suitable position where the electronic stamp is displayed on the Web page.
Because the stamp position information can indicate the position of the embedded window relative to the Web page, when the content of the Web page is verified to be tampered, the stamping control can automatically move the embedded window to the position specified by the stamp position information according to the stamp position information, so that the electronic stamp can be displayed at the proper position of the Web page.
In another embodiment of the present invention, an electronic seal is drawn in an embedded window of a Web page according to data of the electronic seal, and the method of fig. 2 may include: acquiring and analyzing data of the electronic seal to obtain a stamp image; and drawing the electronic seal on the embedded window according to the stamp picture.
For example, when the data of the electronic seal includes at least one of a name of the seal, a color of the seal, a size of the seal, a certificate bound to the seal, signature information of a seal maker, and the like in addition to the stamp image, the stamping control may obtain and analyze the data of the electronic seal to obtain the stamp image, and then draw the electronic seal in the embedded window according to the stamp image, so that the electronic seal is displayed on the Web page. Specifically, the stamping control can draw the electronic stamp in the embedded window according to the stamp picture, and the stamp picture is still kept in the stamping control, so that a user cannot obtain the stamp picture through the embedded window.
The stamping control acquires the stamp image by analyzing the data of the electronic stamp, and then draws the electronic stamp in the embedded window according to the stamp image, wherein the drawn electronic stamp is only the display result of the electronic stamp and does not contain the stamp image or the link of the stamp image, and a user cannot acquire the stamp image through the embedded window, so that the stamp of the Web page is effectively prevented from being illegally acquired and used.
In another embodiment of the present invention, before signing the Web page, the implementation method of fig. 2 may further include: using a signature public key of a seal maker to verify whether the data of the electronic seal is legal or not, wherein the signature of the Web page comprises the following steps: and when the data of the electronic seal is verified to be legal, signing the Web page.
For example, in order to ensure the validity of the data of the electronic seal, when the signer makes the electronic seal, the signer may first receive the seal metadata of the electronic seal, and then use the signature private key to sign the seal metadata to generate a digital signature, which is the signature information of the signer, and the digital signature may be referred to as a first digital signature hereinafter. At this time, the data of the electronic seal may be classified into two types, which are seal metadata and signature information of the seal maker, where the seal metadata includes a stamp image, and in addition, may include at least one of a seal name, a seal color, a seal size, or a certificate bound to the seal. Before signing the Web page, the stamping control can firstly verify whether the data of the electronic seal is legal by using the signature public key of the stamping party, and when the data of the electronic seal is legal, the stamping control signs the Web page. The signature private key is owned by the signer and can be called as the signature private key of the signer. The signature private key of the signer and the signature public key of the signer form a signature key pair of the signer. The signature public key of the signer can be obtained from the signer, and the specific way is not limited here. The process that the stamping control uses the signature public key of the stamping party to verify whether the data of the electronic seal is legal or not can comprise the following steps: the stamping control uses a hash function to operate the stamp metadata to generate a first hash value; the stamping control uses a signature public key of a stamping party to verify and sign the first digital signature to generate a second hash value; and the seal control compares whether the first hash value and the second hash value are consistent, and if so, the verification is legal.
Before the electronic seal is stamped on the Web page, whether the data of the electronic seal is legal or not is verified, and the validity and the legality of the electronic seal stamped on the Web page can be ensured.
Fig. 3 is a schematic flow chart of a method for implementing a Web page stamp according to another embodiment of the present invention.
And 310, receiving the Web page, the data of the electronic seal and the digital signature of the Web page sent by the server.
For example, after a first user stamps an electronic seal on a Web page, a second user may access the electronic seal stamped Web page through a client of the second user. Specifically, the Web page content may be an electronic contract that requires both the first user and the second user to stamp electronic stamps in order to be effective. At this time, the first user has applied the electronic seal to the electronic contract, and the second user browses the electronic contract and applies the electronic seal of the second user to the electronic contract.
Further, the second user can send an access request of the Web page to the server through the client of the second user, and the server responds to the access request of the client of the second user and sends the Web page, the data of the electronic seal and the digital signature of the Web page to the client of the second user. Specifically, the server may simultaneously send the Web page, the data of the electronic seal, and the digital signature of the Web page to the client of the second user, may also send the Web page to the client of the second user first, and then send the data of the electronic seal and the digital signature of the Web page to the client of the second user, and may also send the data of the electronic seal and the digital signature of the Web page to the client of the second user first, and then send the Web page to the client of the second user. Here, the data of the electronic seal may be used to make the Web page display the electronic seal, and the digital signature may be used to verify the validity of the content of the Web page.
And 320, drawing the electronic seal on the embedded window of the Web page according to the data of the electronic seal.
For example, the client of the second user may be installed with a sealing control, and may also receive the sealing control from the server. When the client of the second user receives the data of the electronic seal and the digital signature of the Web page, the position where the Web page is inserted into the stamping control can be automatically inserted into the stamping control again, and then the stamping control can draw the electronic seal in the embedded window of the Web page according to the data of the electronic seal, so that the electronic seal is displayed on the Web page. Specifically, after the stamping control is inserted into the Web page, the stamping control starts to operate the embedded window, so that the embedded window is presented on the Web page, and then, the specific process of drawing the electronic seal at the embedded window by the stamping control may refer to the description of the implementation method in fig. 2, which is similar to the description of the implementation method in fig. 2 and is not repeated here.
The Web page is verified 330 based on the digital signature.
For example, the stamping control can verify whether the content of the Web page is tampered with according to the digital signature. The generation process of the digital signature may refer to the description of the implementation method in fig. 2, which is similar to that of fig. 2 and is not described herein again. The process of the seal control verifying the Web page according to the digital signature can include: the stamping control uses a signature public key corresponding to the electronic seal to decrypt and sign the digital signature to generate a third hash value; using a hash function to operate all or part of contents of the Web page to generate a fourth hash value; and comparing whether the third hash value and the fourth hash value are consistent, if so, indicating that the Web page content is not tampered and the Web page content is effective.
According to the technical scheme provided by the embodiment of the invention, the electronic seal is drawn on the embedded window of the Web page by using the data of the electronic seal through receiving the Web page, the data of the electronic seal and the digital signature of the Web page sent by the server, and the Web page is verified according to the digital signature, so that the electronic seal is drawn on the embedded window of the Web page by using the data of the electronic seal, the drawn electronic seal is only the display result of the electronic seal and does not contain the data of the electronic seal or the link of the data of the electronic seal, and therefore, a user cannot obtain the data of the electronic seal from the embedded window, and the seal of the Web page is effectively prevented from being illegally obtained and used.
In another embodiment of the present invention, receiving a Web page, data of an electronic seal, and a digital signature of the Web page sent by a server, the implementation method of fig. 3 may include: receiving a Web page, data of an electronic seal, a digital signature of the Web page and seal position information sent by a server, wherein the seal position information is used for indicating a position of an embedding window relative to the Web page, and before drawing the electronic seal on the embedding window of the Web page according to the data of the electronic seal, the implementation method shown in fig. 3 may further include: and moving the embedded window to the position indicated by the seal position information according to the seal position information.
For example, before drawing an electronic seal on an embedded window of a Web page according to data of the electronic seal, a stamping control may first move the embedded window to a position indicated by seal position information according to the seal position information, where the position may be a position of the embedded window relative to the Web page when the stamping control on a client of a first user signs a signature on the Web page, and the position may be a suitable position for displaying the electronic seal on the Web page.
The stamping control acquires the stamp position information, so that the stamping control can quickly and accurately determine the display position of the electronic stamp on the Web page.
In another embodiment of the present invention, in 330, the method of fig. 3 may include: analyzing the data of the electronic seal to obtain a stamp image; and drawing the electronic seal on the embedded window according to the stamp picture.
Specifically, the detailed situation of drawing the electronic seal by embedding the seal control in the window may refer to the description in the implementation method of fig. 2, which is similar to the above description, and is not repeated here.
In another embodiment of the present invention, the implementation method of fig. 3 may further include: and verifying whether the data of the electronic seal is legal or not by using the signature public key of the seal maker.
For example, when the stamping control verifies the Web page according to the digital signature, the signature public key of the stamping party can be used for verifying whether the data of the electronic seal is legal or not. The specific situation that the stamping control uses the signature public key of the stamping party to verify whether the data of the electronic seal is legal or not can refer to the description in the implementation method of fig. 2, which is similar to the above description and is not repeated here.
The stamping control verifies whether the data of the electronic seal is legal or not, so that the second user can ensure that the electronic seal displayed on the Web page on the client of the second user is effective.
Fig. 4 is a schematic flow chart of a method for implementing a Web page stamp according to another embodiment of the present invention.
And 410, receiving the data of the electronic seal and the digital signature of the Web page submitted by the client of the first user.
For example, the server may receive data of the electronic seal submitted by the client of the first user and a digital signature of a Web page, and may store them in a database, where the server is used to provide the Web page, and may be a single server, a server group, or a cloud computing service center. The specific situations of the data of the electronic seal and the digital signature can refer to the description of the implementation method in fig. 2, which are similar to each other and are not described herein again.
And 420, sending the Web page, the data of the electronic seal and the digital signature of the Web page to the client of the second user.
For example, the server may send the Web page, the data of the electronic seal, and the digital signature of the Web page to the client of the second user in response to the access request of the client of the second user, or the server may actively push the Web page, the data of the electronic seal, and the digital signature of the Web page to the client of the second user. For other situations related to the Web page, data of the electronic seal, and the digital signature of the Web page, reference may be made to the description of the implementation method in fig. 3, which is similar to the above, and details are not repeated here.
The server receives and stores the data of the electronic seal and the digital signature of the Web page, so that the data of the electronic seal and the digital signature of the Web page can be obtained when the client browses the Web page again, the electronic seal is drawn by utilizing the data of the electronic seal in an embedded window of the Web page, the drawn electronic seal is only the display result of the electronic seal and does not contain the data of the electronic seal or the link of the data of the electronic seal, and therefore a user cannot obtain the data of the electronic seal from the embedded window, and the seal of the Web page is effectively prevented from being illegally obtained and used.
Embodiments of the present invention are described in more detail below with reference to specific examples.
FIG. 5 is a schematic flow chart diagram of a process for implementing a Web page stamp, according to one embodiment of the present invention.
505, a client of a first user sends a request to a server for access to a first Web page.
When a first user needs to stamp an electronic seal on a first Web page, the first user sends an access request of the first Web page to a server through a client of the first user, and the server is used for providing the first Web page.
The server returns 510 the first Web page to the client of the first user.
And the server responds to the access request and returns a first Web page to the client of the first user, and the first user browses the first Web page by using the browser. And a stamping button is arranged on the browser interface and used for stamping an electronic seal on the Web page. The first user clicks the seal button, the Web page inserts the seal control, and then the seal control starts to run the embedded window, so that the embedded window is presented on the first Web page.
515, the client of the first user verifies whether the data of the electronic seal is legal by using the public signature key of the seal maker.
The stamping control can acquire the data of the electronic seal and verify whether the data of the electronic seal is legal by using a signature public Key of a stamping party, wherein the data of the electronic seal can be acquired from a server or a USB-Key (Intelligent password Key) and the like for storing the electronic seal. In addition, the signature public key of the signer and the signature private key of the signer form a signature key pair of the signer, wherein the signature public key of the signer can be obtained from the signer or a Certificate Authority (CA Authority).
Specifically, the data of the electronic seal may include a first digital signature and seal metadata, where the seal metadata may include a seal name, a seal color, a seal size, a certificate bound to the seal, a stamp image, and the like. The process of verifying whether the data of the electronic seal is legal by the stamping control may include: the stamping control uses a hash function to operate the stamp metadata to generate a first hash value; the stamping control uses the stamping signature public key to verify and sign the first digital signature to generate a second hash value; and the seal control compares whether the first hash value and the second hash value are consistent, and if so, the verification is legal. Upon verification of legitimacy, execution 520; when the electronic seal is verified to be illegal, displaying illegal verification information, for example, displaying characters such as abnormal data of the electronic seal, and the like, for informing the first user that the data verification of the electronic seal is not passed, and the stamping control quits the operation of stamping the electronic seal.
And 520, the client of the first user analyzes the data of the electronic seal and draws the electronic seal.
And after the stamping control on the client of the first user verifies that the data of the electronic seal is legal, analyzing the data of the electronic seal to obtain a stamping image, and drawing the electronic seal in the embedded window according to the stamping image so as to display the electronic seal on a first Web page. Specifically, the stamping control renders and presents the electronic stamp in the embedded window according to the stamp picture, the stamp picture is still kept in the stamping control, and a user cannot obtain the stamp picture through the embedded window. In addition, when the electronic seal is displayed at the proper position of the first Web page, the first user can drag the embedded window to display the electronic seal at the proper position of the first Web page.
And 525, the client of the first user signs the first Web page by using a signature private key corresponding to the electronic seal.
After the display position of the electronic seal is determined, the first user can click a right mouse button on the embedded window, select a signature option and obtain seal position information through the seal control. Here, the signature option may also be called a stamping option, and is only a difference of nomenclature, and is not limited herein. In addition, the stamp location information is used to identify the location of the embedded window relative to the first Web page when the first Web page is signed. And the stamping control uses a signature private key corresponding to the electronic seal to sign all or part of the content of the first Web page to generate a second digital signature. The signature private Key corresponding to the electronic seal can be stored in the USB-Key. Before signing, the first user can firstly insert the USB-Key into the client of the first user, so that the stamping control on the client of the first user can use a signature private Key corresponding to an electronic stamp stored in the USB-Key, and the signature private Key in the USB-Key cannot be backed up. The specific process of signing the first Web page by the seal control may include: the stamping control uses a hash function to operate all or part of the content of the first Web page to generate a third hash value; and the stamping control uses a signature private key corresponding to the electronic seal to encrypt and sign the third hash value to generate a second digital signature. The data of the electronic seal, the second digital signature, and the seal position information may be referred to herein as page seal data. When the first user has the filling content on the first Web page, the page seal data may further include the filling content.
530, the client of the first user submits the page seal data to the server.
The stamping control can submit the page stamp data to a server, and the server provides the first Web page.
535, the server stores the page seal data.
After the server receives the page seal data, the page seal data can be stored in the database. When the client of the user accesses the first Web page again, the server returns the first Web page carrying the page seal data to the client of the user. Herein, for convenience of description, the first Web page carrying the page stamp data may be referred to as a second Web page.
The server receives 540 a request to access a second Web page.
The client of the second user sends a request for access to the second Web page to the server. For example, the first Web page is a contract, and the contract is valid only when both the first user and the second user stamp an electronic seal on the contract. When the client of the first user has stamped the electronic seal of the first user on the agreement, the client of the second user also needs to access the agreement, and the client stamps the electronic seal of the second user on the agreement.
The server returns 545 the second Web page to the client of the second user.
And the server responds to an access request of the second Web page sent by the client of the second user, and returns the second Web page to the client of the second user, so that the second user can browse the second Web page by using the browser.
And 550, verifying the validity of the data of the electronic seal by the client of the second user.
When the second user opens the second Web page by using the browser, the stamping control is inserted again at the position where the stamping control is originally inserted into the second Web page, and then the stamping control acquires the data of the electronic seal and verifies whether the data of the electronic seal is legal or not by using the signature public key of the stamping party. The specific verification process may be the same as the verification process in step 515, and is not described here. When the verification is legal, 555 is performed.
555, the client of the second user draws the electronic seal.
And the stamping control analyzes the data of the electronic stamp to obtain a stamping image. And after the second Web page is inserted into the stamping control, the stamping control starts to operate the embedding window, the embedding window is moved to the position indicated by the stamp position information according to the stamp position information, so that the embedding window is displayed on the second Web page, and the electronic stamp is drawn on the embedding window according to the stamp picture, so that the electronic stamp is displayed on the second Web page. The specific process of drawing the electronic seal is similar to that described in step 520, and is not described herein again.
560, the client of the second user authenticates the second Web page.
And after the stamping control acquires the second digital signature, verifying whether the second Web page content is tampered by using a signature public key corresponding to the electronic stamp, wherein the verification of whether the second Web page content is tampered is to verify whether the first Web page content is tampered. The verification process of the second Web page content may include: the stamping control uses a signature public key corresponding to the electronic seal to decrypt and sign the second digital signature to generate a third hash value; using a hash function to operate all or part of contents of the second Web page to generate a fourth hash value; and comparing whether the third hash value and the fourth hash value are consistent, and if so, indicating that the content of the second Web page is not tampered. And if the contents of the second Web page are inconsistent with the contents of the second Web page, displaying tampering information of the contents of the second Web page, such as the changed webpage, and the like, for prompting the second user that the contents of the second Web page are tampered. When the second user knows that the electronic seal stamped on the second Web page is legal and the content of the second Web page is not tampered, the client of the second user can also stamp the electronic seal of the second user on the second Web page as described above.
The method for implementing a Web page stamp according to an embodiment of the present invention is described above, and the apparatus for implementing a Web page stamp according to an embodiment of the present invention is described below with reference to fig. 6 to 9, respectively.
Fig. 6 is a schematic block diagram of a client 600 according to an embodiment of the present invention. The client 600 may include: a drawing module 610, a signature module 620, and a submission module 630. The client 600 may be a client of the first user in fig. 2 to 5.
The drawing module 610 draws the electronic seal on the embedded window of the Web page according to the data of the electronic seal. The signature module 620 signs the Web page, generating a digital signature. The submission module 630 submits the data and digital signature of the electronic seal to a server, where the server is used to provide a Web page.
According to the technical scheme provided by the embodiment of the invention, the electronic seal is drawn on the embedded window of the Web page according to the data of the electronic seal, the Web page is signed, the digital signature is generated, and the data and the digital signature of the electronic seal are submitted to the server, wherein the server is used for providing the Web page, the electronic seal is drawn on the embedded window of the Web page by using the data of the electronic seal, the drawn electronic seal is only the display result of the electronic seal and does not contain the data of the electronic seal or the link of the data of the electronic seal, so that a user cannot obtain the data of the electronic seal from the embedded window, and the seal of the Web page is effectively prevented from being illegally obtained and used.
The operations and functions of the rendering module 610, the signature module 620, and the submission module 630 of the client 600 may refer to the methods 210, 220, and 230 of fig. 2, and are not described herein again to avoid redundancy.
Fig. 7 is a schematic block diagram of a client 700 according to another embodiment of the present invention. The client 700 includes: a drawing module 710, a signature module 720, and a submission module 730. The rendering module 710, the signature module 720, and the rendering module 730 are similar to the rendering module 610, the signature module 620, and the rendering module 630 of fig. 6, and are not described herein again to avoid repetition.
According to an embodiment of the present invention, the client 700 further comprises: an acquisition module 740. The obtaining module 740 obtains stamp position information, where the stamp position information is used to indicate the position of the embedded window relative to the Web page, and the submitting module submits the data of the electronic stamp, the digital signature, and the stamp position information to the server.
In another embodiment of the present invention, the drawing module 710 obtains and parses the data of the electronic stamp to obtain a stamp image, and draws the electronic stamp in the embedded window according to the stamp image.
In another embodiment of the present invention, before signing the Web page, the signature module 720 further verifies whether the data of the electronic seal is legal by using the public signature key of the seal maker, wherein the signature module 720 signs the Web page when verifying that the data of the electronic seal is legal.
The operations and functions of the rendering module 710, the signature module 720, the submitting module 730, and the obtaining module 740 of the client 700 may refer to the method of the embodiment of fig. 2, and are not described herein again to avoid repetition.
Fig. 8 is a schematic structural diagram of a client 800 according to still another embodiment of the present invention. The client 800 includes: a receiving module 810, a drawing module 820, and a verification module 830. The client 800 may be a client of the second user in fig. 2 to 5.
The receiving module 810 receives the Web page, the data of the electronic seal and the digital signature of the Web page sent by the server. The drawing module 820 draws the electronic seal on the embedded window of the Web page according to the data of the electronic seal. The verification module 830 verifies the Web page based on the digital signature. Specifically, in an embodiment of the present invention, the receiving module 810 may specifically refer to a browser.
According to the technical scheme provided by the embodiment of the invention, the electronic seal is drawn on the embedded window of the Web page by using the data of the electronic seal through receiving the Web page, the data of the electronic seal and the digital signature of the Web page sent by the server, and the Web page is verified according to the digital signature, so that the electronic seal is drawn on the embedded window of the Web page by using the data of the electronic seal, the drawn electronic seal is only the display result of the electronic seal and does not contain the data of the electronic seal or the link of the data of the electronic seal, and therefore, a user cannot obtain the data of the electronic seal from the embedded window, and the seal of the Web page is effectively prevented from being illegally obtained and used. In another embodiment of the present invention, the receiving module 810 receives the Web page, the data of the electronic seal, the digital signature of the Web page and the seal position information sent by the server, wherein the seal position information is used for indicating the position of the embedded window relative to the Web page. Before drawing the electronic seal on the embedded window of the Web page according to the data of the electronic seal, the drawing module 820 moves the embedded window to the position indicated by the seal position information according to the seal position information.
In another embodiment of the present invention, the drawing module 820 parses the data of the electronic stamp to obtain a stamp image, and draws the electronic stamp on the embedded window according to the stamp image.
In another embodiment of the present invention, the verification module 830 further verifies whether the data of the electronic seal is legal by using the public signature key of the signer.
The operations and functions of the receiving module 810, the drawing module 820 and the verifying module 830 of the client 800 may refer to the method in fig. 3 and the embodiment in fig. 3, and are not repeated herein for avoiding repetition.
Fig. 9 is a schematic block diagram of a server 900 according to an embodiment of the present invention. The server 900 includes: a receiving module 910 and a transmitting module 920. The server 900 may be the server in fig. 2-5.
The receiving module 910 receives data of an electronic seal and a digital signature of a Web page submitted by a client of a first user. The sending module 920 sends the Web page, the data of the electronic seal, and the digital signature of the Web page to the client of the second user.
The server receives and stores the data of the electronic seal and the digital signature of the Web page, so that the data of the electronic seal and the digital signature of the Web page can be obtained when the client browses the Web page again, the electronic seal is drawn by utilizing the data of the electronic seal in an embedded window of the Web page, the drawn electronic seal is only the display result of the electronic seal and does not contain the data of the electronic seal or the link of the data of the electronic seal, and therefore a user cannot obtain the data of the electronic seal from the embedded window, and the seal of the Web page is effectively prevented from being illegally obtained and used.
The operations and functions of the receiving module 910 and the sending module 920 of the server 900 may refer to the methods 410 and 420 of fig. 4, and are not described herein again to avoid repetition.
FIG. 10 is a block diagram of a computer device 1000 for implementing Web page stamping, according to one embodiment of the present invention.
Referring to fig. 10, apparatus 1000 includes a processing component 1010 that further includes one or more processors and memory resources, represented by memory 1020, for storing instructions, such as application programs, that are executable by processing component 1010. The application programs stored in memory 1020 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1010 is configured to execute instructions to perform the above-described method of implementing Web page stamping.
The device 1000 may also include a power supply component configured to perform power management of the device 1000, a wired or wireless network interface configured to connect the device 1000 to a network, and an input output (I/O) interface. The device 1000 may operate based on an operating system stored in the memory 1020, such as Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTMOr the like.
A non-transitory computer readable storage medium having instructions therein, which when executed by a processor of the apparatus 1000, enable the apparatus 1000 to perform an access method, comprising: drawing an electronic seal on an embedded window of a Web page according to the data of the electronic seal; signing the Web page to generate a digital signature; and submitting the data of the electronic seal and the digital signature to a server, wherein the server is used for providing a Web page.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program check codes, such as a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (15)

1. A method for realizing a Web page seal is characterized by comprising the following steps:
drawing the electronic seal on an embedded window of a Web page according to the data of the electronic seal;
signing the Web page to generate a digital signature;
acquiring seal position information, wherein the seal position information is used for indicating the position of the embedding window relative to the Web page;
and submitting the data of the electronic seal, the digital signature and the seal position information to a server, wherein the server is used for providing the Web page.
2. The method according to claim 1, wherein the step of drawing the electronic seal in an embedded window of a Web page according to the data of the electronic seal comprises:
acquiring and analyzing the data of the electronic seal to obtain a stamp image;
and drawing the electronic seal at the embedding window according to the impression picture.
3. The method of claim 1 or 2, wherein before signing the Web page, the method further comprises:
verifying whether the data of the electronic seal is legal or not by using a signature public key of a seal maker,
wherein said signing the Web page comprises:
and when the data of the electronic seal is verified to be legal, signing the Web page.
4. A method for realizing a Web page seal is characterized by comprising the following steps:
receiving a Web page, data of an electronic seal, a digital signature of the Web page and seal position information sent by a server, wherein the seal position information is used for indicating the position of an embedded window of the Web page relative to the Web page;
moving the embedding window to a position indicated by the seal position information according to the seal position information;
drawing the electronic seal on the embedded window of the Web page according to the data of the electronic seal;
and verifying the Web page according to the digital signature.
5. The method according to claim 4, wherein said drawing said electronic seal in an embedded window of said Web page according to said electronic seal data comprises:
analyzing the data of the electronic seal to obtain a stamp image;
and drawing the electronic seal at the embedding window according to the impression picture.
6. The implementation method of claim 4 or 5, further comprising:
and verifying whether the data of the electronic seal is legal or not by using the signature public key of the seal maker.
7. A method for realizing a Web page seal is characterized by comprising the following steps:
receiving data of an electronic seal, a digital signature of a Web page and seal position information submitted by a client of a first user, wherein the seal position information is used for indicating the position of an embedded window of the Web page relative to the Web page;
and sending the Web page, the data of the electronic seal, the digital signature of the Web page and the seal position information to a client of a second user.
8. A client, comprising:
the drawing module is used for drawing the electronic seal on an embedded window of a Web page according to the data of the electronic seal;
the signature module is used for signing the Web page to generate a digital signature;
the acquisition module is used for acquiring stamp position information, wherein the stamp position information is used for indicating the position of the embedded window relative to the Web page;
and the submitting module is used for submitting the data of the electronic seal, the digital signature and the seal position information to a server, wherein the server is used for providing the Web page.
9. The client according to claim 8, wherein the drawing module obtains and analyzes data of the electronic seal to obtain an impression image, and draws the electronic seal in the embedded window according to the impression image.
10. The client according to claim 8 or 9, wherein the signature module further verifies whether the data of the electronic seal is legal by using a public signature key of a signer before signing the Web page, and wherein the signature module signs the Web page when verifying that the data of the electronic seal is legal.
11. A client, comprising:
the receiving module is used for receiving a Web page and data of an electronic seal sent by a server and a digital signature and seal position information of the Web page, wherein the seal position information is used for indicating the position of an embedded window of the Web page relative to the Web page;
the drawing module moves the embedded window to a position indicated by the seal position information according to the seal position information and draws the electronic seal on the embedded window of the Web page according to the data of the electronic seal;
and the verification module is used for verifying the Web page according to the digital signature.
12. The client according to claim 11, wherein the drawing module parses data of the electronic seal to obtain an impression image, and draws the electronic seal in the embedded window according to the impression image.
13. The client according to claim 11 or 12, wherein the verification module further verifies whether the data of the electronic seal is legal using a public signature key of a signer.
14. A server, comprising:
the receiving module is used for receiving data of an electronic seal, a digital signature of a Web page and seal position information submitted by a client of a first user, wherein the seal position information is used for indicating the position of an embedded window of the Web page relative to the Web page;
and the sending module is used for sending the Web page, the data of the electronic seal, the digital signature of the Web page and the seal position information to a client of a second user.
15. A storage medium having stored thereon computer-executable instructions, which when executed by a processor implement the method of any one of claims 1 to 7.
CN201810051857.4A 2018-01-18 2018-01-18 Method for realizing Web page seal, client and server Active CN108038388B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810051857.4A CN108038388B (en) 2018-01-18 2018-01-18 Method for realizing Web page seal, client and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810051857.4A CN108038388B (en) 2018-01-18 2018-01-18 Method for realizing Web page seal, client and server

Publications (2)

Publication Number Publication Date
CN108038388A CN108038388A (en) 2018-05-15
CN108038388B true CN108038388B (en) 2020-04-17

Family

ID=62096424

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810051857.4A Active CN108038388B (en) 2018-01-18 2018-01-18 Method for realizing Web page seal, client and server

Country Status (1)

Country Link
CN (1) CN108038388B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111092729A (en) * 2018-10-24 2020-05-01 方正国际软件(北京)有限公司 Electronic signature and seal verification method and device
TWI778361B (en) * 2020-05-18 2022-09-21 天逸財金科技服務股份有限公司 Distributed digital signature processing method and system
CN112165385B (en) * 2020-08-20 2022-09-09 中船重工(武汉)凌久高科有限公司 Universal digital signature method for Web application system
CN112559938A (en) * 2020-12-21 2021-03-26 深圳云之家网络有限公司 Electronic seal file generation method and device, computer equipment and storage medium
CN113014374A (en) * 2021-02-22 2021-06-22 汇链通供应链科技(上海)有限公司 Paperless receipt realization method and device for server/client terminal mode
CN113222592A (en) * 2021-02-22 2021-08-06 汇链通供应链科技(上海)有限公司 Method and system for realizing paperless receipt based on webpage

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101149770A (en) * 2007-09-21 2008-03-26 中山大学 Electronic stamp system based on Word/Excel electronic document
CN101311950A (en) * 2007-05-25 2008-11-26 北京书生国际信息技术有限公司 Electronic stamp realization method and device
CN104537318A (en) * 2014-12-30 2015-04-22 北京中科江南软件有限公司 Dynamic electronic seal generating system
JP2017200165A (en) * 2016-04-28 2017-11-02 エスケー プラネット カンパニー、リミテッド Electronic seal impression system for enhancing safety, control method for the same and recording medium having computer program recorded therein

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101311950A (en) * 2007-05-25 2008-11-26 北京书生国际信息技术有限公司 Electronic stamp realization method and device
CN101149770A (en) * 2007-09-21 2008-03-26 中山大学 Electronic stamp system based on Word/Excel electronic document
CN104537318A (en) * 2014-12-30 2015-04-22 北京中科江南软件有限公司 Dynamic electronic seal generating system
JP2017200165A (en) * 2016-04-28 2017-11-02 エスケー プラネット カンパニー、リミテッド Electronic seal impression system for enhancing safety, control method for the same and recording medium having computer program recorded therein

Also Published As

Publication number Publication date
CN108038388A (en) 2018-05-15

Similar Documents

Publication Publication Date Title
CN108038388B (en) Method for realizing Web page seal, client and server
CN108206831B (en) Electronic seal realization method, server, client and readable storage medium
US20200267003A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN110490004B (en) Processing method of electronic signature file, client, computer equipment and medium
CN110677376B (en) Authentication method, related device and system and computer readable storage medium
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN108234442B (en) Method, system and readable storage medium for acquiring contract
US9600690B2 (en) Secure access for sensitive digital information
CN112019493A (en) Identity authentication method, identity authentication device, computer device, and medium
CN111092729A (en) Electronic signature and seal verification method and device
CN107994993B (en) Application program detection method and device
CN111460410A (en) Server login method, device and system and computer readable storage medium
CN111859431A (en) Electronic file signature method and device, electronic equipment and storage medium
CN117561508A (en) Cross-session issuance of verifiable credentials
CN115225362A (en) Verification method, device, equipment and storage medium of man-machine behavior
CN107483190B (en) Electronic qualification certificate generation method, verification method, generation device and verification device
CN116528230A (en) Verification code processing method, mobile terminal and trusted service system
CN113111283B (en) Forensic server, forensic server method, storage medium, and program product
CN115086090A (en) Network login authentication method and device based on UKey
CN112380577A (en) Multiparty-supported electronic contract repeated signing method and device and computer equipment
CN111832046A (en) Trusted data evidence storing method based on block chain technology
US10680826B2 (en) Secure product identification and verification
CN113743932B (en) Data processing method, device, electronic equipment and computer storage medium
CN116992470B (en) Collaborative authorization protocol signing method, device, computer equipment and storage medium
CN110830449B (en) File processing method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant