CN111431916A - Seal verification method based on asymmetric encryption, seal and computer storage medium - Google Patents

Seal verification method based on asymmetric encryption, seal and computer storage medium Download PDF

Info

Publication number
CN111431916A
CN111431916A CN202010240286.6A CN202010240286A CN111431916A CN 111431916 A CN111431916 A CN 111431916A CN 202010240286 A CN202010240286 A CN 202010240286A CN 111431916 A CN111431916 A CN 111431916A
Authority
CN
China
Prior art keywords
seal
stamp
verification
verification code
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010240286.6A
Other languages
Chinese (zh)
Other versions
CN111431916B (en
Inventor
朱丽珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ma Yingna
SHAOXING ZHANGKONG INTELLIGENT TECHNOLOGY Co.,Ltd.
Original Assignee
朱丽珍
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 朱丽珍 filed Critical 朱丽珍
Priority to CN202010240286.6A priority Critical patent/CN111431916B/en
Publication of CN111431916A publication Critical patent/CN111431916A/en
Application granted granted Critical
Publication of CN111431916B publication Critical patent/CN111431916B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of seal anti-counterfeiting verification, and provides a seal verification method based on asymmetric encryption, a seal and a computer storage medium, wherein the seal verification method comprises the following steps: generating a seal graph with a corresponding shape according to the type of the seal request, extracting a stamping time stamp, region information and characteristic information by a processing module, obtaining a seal verification code through hash function operation, adding the seal verification code on the seal graph, encrypting and uploading the seal verification code to a block chain network; and acquiring a verification request of the mobile terminal, and comparing the consistency of the seal verification code in the verification request with the seal verification code in the block chain network, thereby judging the validity of the seal verification code in the verification request and outputting a verification result. The invention records the information stamped each time on the stamp graph and the block chain, can record, trace and carry out multiple identity verification on the whole life cycle of the stamp, and improves the difficulty of forging the stamp.

Description

Seal verification method based on asymmetric encryption, seal and computer storage medium
Technical Field
The invention relates to the technical field of seal anti-counterfeiting verification, in particular to a seal verification method based on asymmetric encryption, a seal and a computer storage medium.
Background
The seal is taken as a legal certificate for confirming identity and willingness of a legal person, and plays an indispensable role in social and economic life of China. Ensuring the correctness and the effectiveness of the seal is a necessary condition for ensuring the legal person to normally carry out activities and realizing social purposes and values.
At present, a legal seal is carved by a seal shop which is approved and recorded by a management department, initial identity information of the seal and time information of the beginning and the end of the life of the seal are recorded by the management department, the information can be inquired and obtained by the management department, however, the dynamic use condition of the seal in the life cycle is nowhere to be checked, seal ownership records are stamp pre-approval control information and stamp records of a rough final link, people are difficult to accurately judge the legality and validity of the seal, and huge economic loss is easily caused.
In the prior art, the principle of seal anti-counterfeiting verification is symmetric identity verification, namely, a figure or character string copy stored in advance is directly or singly compared, and a common verification means is offline manual comparison or online query of various query codes and supervision codes related to a seal. For a novel electronic seal adopting digital modeling, the anti-counterfeiting principle is to extract the seal characteristics and compare the characteristics. However, the reliability of the anti-counterfeiting means of the seal is not high, the shape, the query code, the supervision code and the characteristics of the seal can be forged in a short time, and still huge potential safety hazards exist.
Disclosure of Invention
The invention aims to overcome the defect that the existing seal can not reliably store and check all stamping records in the whole life cycle.
In order to achieve the above object, a first aspect of the embodiments of the present invention provides a seal verification method based on asymmetric encryption, including:
when the seal is signed and stamped, the seal generates a seal graph with a corresponding shape according to the type of the stamp request, the processing module extracts a time stamp, region information and characteristic information during stamping, obtains a seal verification code through hash function operation, adds the seal verification code on the seal graph, encrypts and uploads the seal verification code to a block chain network;
the preset verification platform acquires a verification request of the mobile terminal, decrypts the timestamp, the region information and the characteristic information of the seal verification code to be verified through the public key, and compares the seal verification code to be verified with the seal verification code in the block chain network, so that the validity of the seal verification code to be verified in the verification request is judged, and a verification result is output.
A second aspect of the embodiments of the present invention provides a stamp, which has a processing module, a positioning module, a storage module, a jet printing module, a communication module, a biometric identification module, a display module, a monitoring module, and a computer program embedded in the storage module, wherein the processing module executes the computer program and executes the following steps:
when the seal graph is sprayed, the seal time stamp, the region information and the characteristic information which are from the communication module and are prestored in the storage module are extracted, the seal verification code is obtained through the operation of the Hash function, and the seal verification code is added to the seal graph and is encrypted and uploaded to the block chain network.
A third aspect of embodiments of the present invention provides a computer storage medium storing a computer program, the computer program being executed by a processing module to perform:
when the seal is signed with the seal, the seal generates a seal graph with a corresponding shape according to the type of the seal request, a processing module of the seal extracts the time stamp, the region information and the characteristic information of the secondary seal and obtains a seal verification code through the operation of a hash function, and the seal verification code is added on the seal graph and is encrypted and uploaded to a block chain network;
the preset verification platform acquires a verification request of the mobile terminal, decrypts the timestamp, the region information and the characteristic information of the seal verification code to be verified through the public key, and compares the seal verification code to be verified with the seal verification code in the block chain network, so that the validity of the seal verification code to be verified in the verification request is judged, and a verification result is output.
The invention has the beneficial effects that: the characteristic information generated during each stamping is recorded by the entity stamp, is uploaded to the block chain network through encryption operation and is added to the stamp graph at the same time, the stamp can be recorded dynamically in real time, the whole life cycle of the stamp is traced, the stamp using flow of the stamp unit can be standardized by using multiple identity verification, a reliable stamp verification system is established at the same time, the counterfeiting difficulty is improved, the commercial risk is reduced, and more data information can be provided for management departments.
Drawings
FIG. 1: the embodiment of the invention provides an implementation process of a seal verification method based on asymmetric encryption.
FIG. 2: the second embodiment of the invention provides an implementation process of a seal verification method based on asymmetric encryption.
FIG. 3: the third embodiment of the invention provides an implementation process of a seal verification method based on asymmetric encryption.
FIG. 4: the fourth embodiment of the invention provides a structural schematic diagram of the seal.
FIG. 5: the fifth embodiment of the invention provides a schematic diagram of a stamp anti-counterfeiting system.
FIG. 6: the fifth embodiment of the invention provides a topological structure schematic diagram of a stamp anti-counterfeiting system.
Detailed Description
The embodiment of the invention records the characteristic information generated in each stamping process through the stamp, uploads the characteristic information to the block chain network through encryption operation and is added on the stamp graph at the same time, so that a unit or an individual who obtains the stamp graph can identify the stamp verification code on the stamp graph through a mobile terminal such as a mobile phone, check the legality of the stamp graph and inquire the related information of the stamp graph.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments and the accompanying drawings.
As shown in fig. 1, an implementation flow of a seal verification method based on asymmetric encryption is provided in an embodiment of the present invention, which is specifically described as follows:
and S10, generating a seal graph with a corresponding shape according to the seal request type, generating a seal verification code to be added on the seal graph, encrypting and uploading the seal verification code to the block chain network.
Specifically, the seal is internally provided with a processing module 41 used for generating a unique seal verification code, when the seal is signed, the processing module 41 acquires current timestamp information, regional information and other user-defined characteristic information, a seal verification code is obtained through hash function operation, a private key of a seal management department is hidden in the seal verification code, the seal verification code is encrypted and sent to a block chain network on one hand and used for recording the seal, and on the other hand, a seal graph is signed on a file along with the seal graph and used for verifying the validity of the current seal. The processing module 41 may obtain the timestamp information and the region information by a real-time clock chip and a positioning chip arranged inside the seal, or by obtaining the current timestamp information and the current geographic location of the seal through a network before the seal is signed.
S20, the preset verification platform acquires the verification request of the mobile terminal, decrypts the time stamp, the region information and the characteristic information of the seal verification code to be verified through the public key, and compares the seal verification code to be verified with the seal verification code in the block chain network, so that the validity of the seal verification code to be verified in the verification request is judged, and the verification result is output.
Specifically, the verification platform is preset by a seal management department and used for public verification to obtain the validity of the seal, the public key capable of obtaining partial information of the seal verification code is stored in the verification platform, the verification platform receives a seal verification code identification request of any terminal, and timestamp information, regional information and partial characteristic information in the seal verification code are obtained through decryption of the public key.
The verification platform searches whether a seal verification code block with the same timestamp information, region information and characteristic information matched exists in the block chain network, if the corresponding seal verification code block in the block chain network is searched, the seal verification code to be verified is judged to be legal, the timestamp information, the region information and the characteristic information of the seal verification code are fed back to the verification terminal, otherwise, the seal verification code to be verified is judged to be illegal, and the seal verification code to be verified is fed back to the verification terminal to be forged.
It should be noted that the characteristic information may include, but is not limited to, the unique device ID number of the physical seal, the seal type, the seal size, and the related business license information issued by the business administration department (including the business name and legal information). In this embodiment, if the seal verification code to be verified is legal, the information that the public can obtain through the verification platform includes timestamp information, region information, device ID serial number and enterprise business license information, the private key is kept by the legal seal unit, all the information of use record in the seal life cycle can be called from the block chain network through the private key by the seal unit, besides the public information, a series of original identity information such as seal pattern, size and seal type is included, and external personnel is prevented from mastering all seal information. The disclosed information can be selected by the user in the form of a chapter, and this embodiment is merely illustrative and not intended to limit the present invention.
As shown in fig. 2, on the basis of the first embodiment, the embodiment of the present invention further includes the identification of the signer before stamping, and the implementation flow is specifically described as follows:
s00, before signing the seal, the seal carries out living body authentication to the current signer, and after the current signer is confirmed to be an authorized signer, the identity information of the signer is added to the seal verification code through Hash function operation.
Specifically, the method is suitable for preventing the stamp body from being stolen, abusing related personnel and the like, preauthorizing specific available stamp personnel by using the stamp unit, recording information of the preauthorizing personnel in the stamp body, and stamping by using the stamp personnel behind the preauthorizing personnel through living body authentication and confirmation of the stamp, wherein the living body authentication mode comprises but is not limited to fingerprint, pupil, human face, hand vein, voice, nucleic acid and the like verification, so that loss caused by using the stamp by unauthorized personnel is prevented. The information of the preauthorization personnel is recorded in the seal body, after the authorized seal personnel is sealed by the seal, the personal information of the authorized seal personnel can be calculated by a Hash function together with the timestamp information, the region information and the related characteristic information, and then the personal information is added into the seal verification code, and the seal personnel and the seal are associated together to define the authority relationship.
As shown in fig. 3, on the basis of the first embodiment, the embodiment of the present invention further includes a mechanism for monitoring and reminding that there may be counterfeit stamps, and the implementation flow is specifically described as follows:
s30, setting a region variation range capable of receiving the same seal in unit time, analyzing the time information and the region information in the seal verification code generated by the same seal by the server, judging whether the seal is copied according to the region variation range of the seal in unit time, and triggering an alarm if the seal is copied.
The stamp forging method for the signer mainly comprises two methods: one is that the original contract document which is sealed is stolen, and the complete picture copy is carried out according to the genuine document, because the seal verification code generated by each seal contains the seal time information, each seal has uniqueness, a plurality of contract documents of the first party and the second party need to be forged; secondly, all characteristic information (including equipment ID serial numbers carried by the seal) of the seal body is stolen, so that a completely same forged seal is imitated, the forged seal is used for signing a file, the seal is legal, and the mode has high difficulty but is difficult to verify.
The present embodiment is used for identifying the second counterfeit means, and the specific process includes: the seal is communicated with the server, the server forwards a seal verification code generated by the seal to the block chain network, and after receiving the seal verification code, the server automatically records the equipment ID serial number, the timestamp information and the region information contained in the seal verification code and monitors the timestamp information and the region information change condition of the seal verification code with the same equipment ID serial number. For example, the unit time is set to be 3 minutes, the server can receive the change situation of the region information of the seal verification code within 3 minutes and is within 1km, the seal verification code which exceeds the acceptable region change range in the unit time is regarded as a forged seal, meanwhile, the forged seal is reflected to the seal management department, and the seal management department informs the seal management department of the actual seal unit.
As shown in fig. 4, a schematic structural diagram of a stamp is provided for an embodiment of the present invention, and the stamp is provided with a processing module 41, a positioning module 42 (for example, a GPS module), a storage module 43, an inkjet printing module 44, a communication module 45, a biometric identification module 46, a display module 47, a monitoring module 48, and a computer program 5 embedded in the storage module 43. Wherein, the orientation module 42 is used for obtaining the real-time geographical position of seal, memory module 43 is used for prestoring computer program 5 and seal data, it is used for spraying seal figure to spout seal module 44, during the actual use, carry out identification through biological identification module 46 with the seal person, frequent discernment is failed then trigger monitoring module 48 and report to the police, begin to carry out the seal action after the discernment passes through, orientation module 42 obtains regional information and time information in real time, when spouting seal figure when spouting seal module 44, processing module 41 carries out the following step when computer program 5 carries out: extracting a stamping timestamp, region information and characteristic information (including a device ID serial number of a stamp, stamp type, stamp size, enterprise business license information and the like), obtaining a stamp verification code through hash function operation, adding the stamp verification code on a stamp graph, encrypting and uploading to a block chain network.
Optionally, the stamp may further include a selecting module 49, which is used for a signer to retrieve a stamp pattern preset in the stamp and edit text information in the stamp pattern, and the stamp pattern, the text information, and a selecting result are displayed in the display module 47. The seal is internally stored with a plurality of seal types, such as official seal, invoice special seal, legal seal and the like, and the required seal type is called by a seal person and then the character information in the seal graph can be selected or edited according to the actual requirement, so that the effect of one seal and multiple seals is realized, and each seal has a unique mark when being stamped in real time.
It should be noted that the processing module 41 may be a central processing unit, and may also be other general processors, digital signal processors, application specific integrated circuits, off-the-shelf programmable gate arrays or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Fig. 5 is a schematic diagram of a stamp anti-counterfeiting system composed of a stamp 1, a server 2, and a verification platform 3 according to an embodiment of the present invention, and fig. 6 is a schematic diagram of a specific topology structure of the stamp anti-counterfeiting system, in which a computer program 5 is divided into a plurality of units, and the units are respectively stored in the stamp 1, the server 2, or the verification platform 3, and are respectively executed by the stamp 1, the server 2, and the verification platform 3, so as to complete the embodiment.
The computer program 5 may be divided into a generation unit 51, a verification unit 52 and an authentication unit 53, each functioning as follows:
the generating unit 51 is stored in the seal and used for generating a seal graph with a corresponding shape according to the seal request type, the processing module 41 of the seal 1 extracts the stamping time stamp, the region information and the characteristic information and obtains a seal verification code through hash function operation, and the seal verification code is added on the seal graph and is encrypted and uploaded to the server 2;
a transmission and detection unit 52, stored in the server 2, for transmitting the seal verification code from the seal 1, on one hand, transmitting the seal verification code to the block chain network, on the other hand, comparing the timestamp information and the region information change of the seal verification code with the same equipment ID number, judging whether the seal 1 has the risk of being copied or stealing data, and sending an alarm;
and the verification unit 53 is stored in the verification platform 3, decrypts the timestamp, the region information and the characteristic information of the seal verification code to be verified through the public key, and compares the seal verification code to be verified with the seal verification code in the block chain network, so as to judge the validity of the seal verification code to be verified in the verification request and output a verification result.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of each functional unit is merely illustrated, and in practical applications, the foregoing function distribution may be performed by different functional units according to needs, that is, the internal structure of the terminal device is divided into different functional units to perform all or part of the above-described functions. Each functional unit in the embodiments may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units are only used for distinguishing one functional unit from another, and are not used for limiting the protection scope of the application. For the specific working process of the unit in the system, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Although the present invention has been described in detail with reference to the foregoing embodiments, those skilled in the art will understand that various changes, modifications and substitutions can be made without departing from the spirit and scope of the invention as defined by the appended claims. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A seal verification method based on asymmetric encryption is characterized in that a processing module is arranged in a seal, and the anti-counterfeiting verification method comprises the following steps:
when the seal is signed and stamped, the seal generates a seal graph with a corresponding shape according to the type of the stamp request, the processing module extracts a time stamp, region information and characteristic information during stamping, obtains a seal verification code through hash function operation, adds the seal verification code on the seal graph, encrypts and uploads the seal verification code to a block chain network;
the preset verification platform acquires a verification request of the mobile terminal, decrypts the timestamp, the region information and the characteristic information of the seal verification code to be verified through the public key, and compares the seal verification code to be verified with the seal verification code in the block chain network, so that the validity of the seal verification code to be verified in the verification request is judged, and a verification result is output.
2. The asymmetric encryption based stamp verification method according to claim 1, further comprising the steps of: before signing and stamping, a seal unit is used for preauthorizing specific personnel, the seal is used for carrying out living body authentication on the current signer, and after the current signer is confirmed to be an authorized signer, the identity information of the signer is added to the seal verification code through Hash function operation.
3. The asymmetric encryption based stamp verification method according to claim 1, further comprising the steps of:
setting a region variation range which can accept the same seal in unit time, analyzing time information and region information in a seal verification code generated by the same seal by a server, judging whether the seal is copied according to the region variation range of the seal in unit time, and triggering an alarm if the seal is copied.
4. The asymmetric encryption-based seal verification method as claimed in claim 1, wherein the verification result includes a timestamp, region information and partial public feature information of the secondary seal, and the seal unit obtains the timestamp, the region information and all the feature information from the blockchain network through a private key.
5. The asymmetric encryption based stamp verification method according to claim 4, wherein the characteristic information includes a device ID number of the stamp, a stamp type, a stamp size, and related enterprise license information.
6. The utility model provides a seal, its characterized in that, seal embeds there are processing module, orientation module, storage module, spouts seal module, communication module, biological identification module, display module, monitoring module and the computer program who embeds in storage module, the following step of operation when processing module carries out computer program:
when the seal graph is sprayed, the seal time stamp, the region information and the characteristic information which are from the communication module and are prestored in the storage module are extracted, the seal verification code is obtained through the operation of the Hash function, and the seal verification code is added to the seal graph and is encrypted and uploaded to the block chain network.
7. The stamp according to claim 6, further comprising a stamp selecting module, wherein the stamp selecting module is used for the stamping person to retrieve the stamp graphics preset in the stamp and edit the text information in the stamp graphics.
8. A computer storage medium, in which a computer program is stored, wherein the computer program, when executed by a processing module, implements the steps of the seal recording and anti-counterfeiting method according to any one of claims 1 to 5.
CN202010240286.6A 2020-03-30 2020-03-30 Seal verification method based on asymmetric encryption, seal and computer storage medium Active CN111431916B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010240286.6A CN111431916B (en) 2020-03-30 2020-03-30 Seal verification method based on asymmetric encryption, seal and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010240286.6A CN111431916B (en) 2020-03-30 2020-03-30 Seal verification method based on asymmetric encryption, seal and computer storage medium

Publications (2)

Publication Number Publication Date
CN111431916A true CN111431916A (en) 2020-07-17
CN111431916B CN111431916B (en) 2021-12-24

Family

ID=71549846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010240286.6A Active CN111431916B (en) 2020-03-30 2020-03-30 Seal verification method based on asymmetric encryption, seal and computer storage medium

Country Status (1)

Country Link
CN (1) CN111431916B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112381507A (en) * 2020-11-11 2021-02-19 杭州甘道智能科技有限公司 Block chain-based stamp circulation supervision system and method and stamp
CN112583991A (en) * 2020-11-09 2021-03-30 河北戈德防伪科技有限公司 Chip cipher network seal inquiry and verification system
CN112866205A (en) * 2020-12-31 2021-05-28 杭州甘道智能科技有限公司 Intelligent seal credible verification platform and method based on block chain
CN112995225A (en) * 2021-05-12 2021-06-18 杭州甘道智能科技有限公司 Intelligent stamp credible verification system based on block chain
CN114077641A (en) * 2020-08-14 2022-02-22 支付宝(杭州)信息技术有限公司 Block chain-based stamping processing method and device
CN114157503A (en) * 2021-12-08 2022-03-08 北京天融信网络安全技术有限公司 Access request authentication method and device, API gateway equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030294A (en) * 2007-02-13 2007-09-05 江苏国盾科技实业有限责任公司 Production of electronic-physical seal and its synthetic seal
CN103310164A (en) * 2013-06-18 2013-09-18 齐宇庆 Verification method of electronic seal pattern and verification method of file containing electronic seal
CN107081974A (en) * 2017-04-28 2017-08-22 西安焱晟科技有限公司 A kind of unique stamp device of printed text and a kind of method of information tracing
CN108154351A (en) * 2018-02-05 2018-06-12 胡金钱 The electrical integrated seal of object and affairs examination & approval implementation method, system, platform, medium
CN108573140A (en) * 2018-05-02 2018-09-25 大连声鹭科技有限公司 Intelligent seal and it establishes server and the intelligent seal service system based on block chain technology beyond the clouds
CN108985364A (en) * 2018-07-05 2018-12-11 招银云创(深圳)信息技术有限公司 Verification method, device, computer equipment and the storage medium of sealed files
CN109377217A (en) * 2018-09-03 2019-02-22 深圳壹账通智能科技有限公司 The bookkeeping methods and terminal device of entity seal
CN109409110A (en) * 2018-10-18 2019-03-01 胡金钱 A kind of electronic document signature method, device, equipment and readable medium
CN109472166A (en) * 2018-11-01 2019-03-15 恒生电子股份有限公司 A kind of electronic signature method, device, equipment and medium
CN109756341A (en) * 2018-12-05 2019-05-14 新华三技术有限公司 Electronic signature method and device
US20190394052A1 (en) * 2018-06-25 2019-12-26 Auth9, Inc. Method, computer program product and apparatus for creating, registering, and verifying digitally sealed assets

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030294A (en) * 2007-02-13 2007-09-05 江苏国盾科技实业有限责任公司 Production of electronic-physical seal and its synthetic seal
CN103310164A (en) * 2013-06-18 2013-09-18 齐宇庆 Verification method of electronic seal pattern and verification method of file containing electronic seal
CN107081974A (en) * 2017-04-28 2017-08-22 西安焱晟科技有限公司 A kind of unique stamp device of printed text and a kind of method of information tracing
CN108154351A (en) * 2018-02-05 2018-06-12 胡金钱 The electrical integrated seal of object and affairs examination & approval implementation method, system, platform, medium
CN108573140A (en) * 2018-05-02 2018-09-25 大连声鹭科技有限公司 Intelligent seal and it establishes server and the intelligent seal service system based on block chain technology beyond the clouds
US20190394052A1 (en) * 2018-06-25 2019-12-26 Auth9, Inc. Method, computer program product and apparatus for creating, registering, and verifying digitally sealed assets
CN108985364A (en) * 2018-07-05 2018-12-11 招银云创(深圳)信息技术有限公司 Verification method, device, computer equipment and the storage medium of sealed files
CN109377217A (en) * 2018-09-03 2019-02-22 深圳壹账通智能科技有限公司 The bookkeeping methods and terminal device of entity seal
CN109409110A (en) * 2018-10-18 2019-03-01 胡金钱 A kind of electronic document signature method, device, equipment and readable medium
CN109472166A (en) * 2018-11-01 2019-03-15 恒生电子股份有限公司 A kind of electronic signature method, device, equipment and medium
CN109756341A (en) * 2018-12-05 2019-05-14 新华三技术有限公司 Electronic signature method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114077641A (en) * 2020-08-14 2022-02-22 支付宝(杭州)信息技术有限公司 Block chain-based stamping processing method and device
CN112583991A (en) * 2020-11-09 2021-03-30 河北戈德防伪科技有限公司 Chip cipher network seal inquiry and verification system
CN112381507A (en) * 2020-11-11 2021-02-19 杭州甘道智能科技有限公司 Block chain-based stamp circulation supervision system and method and stamp
CN112866205A (en) * 2020-12-31 2021-05-28 杭州甘道智能科技有限公司 Intelligent seal credible verification platform and method based on block chain
CN112995225A (en) * 2021-05-12 2021-06-18 杭州甘道智能科技有限公司 Intelligent stamp credible verification system based on block chain
CN112995225B (en) * 2021-05-12 2021-08-03 杭州甘道智能科技有限公司 Intelligent stamp credible verification system based on block chain
CN114157503A (en) * 2021-12-08 2022-03-08 北京天融信网络安全技术有限公司 Access request authentication method and device, API gateway equipment and storage medium

Also Published As

Publication number Publication date
CN111431916B (en) 2021-12-24

Similar Documents

Publication Publication Date Title
CN111431916B (en) Seal verification method based on asymmetric encryption, seal and computer storage medium
CN109409122B (en) File storage method, electronic device and storage medium
CN109088871B (en) Data transmission method and system based on block chain technology
CN107070938A (en) Data access control system based on block chain
WO2019237570A1 (en) Electronic contract signing method, device and server
CN105260640B (en) A kind of evidence-obtaining system and method based on finger print identifying and GPS
CN107358551A (en) Notarization system and method based on block chain
CN110086608A (en) User authen method, device, computer equipment and computer readable storage medium
CN106778343A (en) It is a kind of that the data sharing method of private data is related to based on block chain
CN109753817A (en) Medical information secure storage scheme based on block chain
CN111507709A (en) Data traceability system
CN109242481A (en) Information approach, device and computer equipment are pledged based on block chain query
WO2020000777A1 (en) Method and apparatus for acquiring individual credit information on the basis of block chain, and computer device
CN112036995A (en) Large-scale enterprise financial data management method and system based on block chain and readable storage medium
CN110830259A (en) Method and system for providing originality and integrity certification for multimedia data
CN104464114A (en) System and method for managing and monitoring safety of application of financial terminals
CN110689348B (en) Revenue verification method, device, terminal and medium based on alliance chain
CN109714169B (en) Data credible circulation platform based on strict authorization and circulation method thereof
CN111639355A (en) Data security management method and system
CN113452526A (en) Electronic document storage and verification method and corresponding device
CN103106560A (en) Anti-fake management method of seal of internet of things
CN112241541A (en) Community security application method based on block chain and portrait recognition technology
CN111369364A (en) Electronic signature method and device based on super counter
CN111027990A (en) Product anti-counterfeiting method and system based on material mark block chain
CN110995661A (en) Network card platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200928

Address after: Room 1713, 17th floor, No. 683, Yangming North Road, Yuecheng District, Shaoxing City, Zhejiang Province 312000

Applicant after: SHAOXING ZHANGKONG INTELLIGENT TECHNOLOGY Co.,Ltd.

Applicant after: Ma Yingna

Address before: Room 103, building 17, xinloufan, nianmutou, Yuecheng District, Shaoxing City, Zhejiang Province

Applicant before: Zhu Lizhen

GR01 Patent grant
GR01 Patent grant