CN111625787A - OFD-based electronic signature multi-version traceable rapid signature checking method - Google Patents

OFD-based electronic signature multi-version traceable rapid signature checking method Download PDF

Info

Publication number
CN111625787A
CN111625787A CN202010435389.8A CN202010435389A CN111625787A CN 111625787 A CN111625787 A CN 111625787A CN 202010435389 A CN202010435389 A CN 202010435389A CN 111625787 A CN111625787 A CN 111625787A
Authority
CN
China
Prior art keywords
signature
file
ofd
abstract
version
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010435389.8A
Other languages
Chinese (zh)
Other versions
CN111625787B (en
Inventor
吕涛
邓志英
王海峰
徐俊杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Bestsign Network Technology Co ltd
Original Assignee
Hangzhou Bestsign Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Bestsign Network Technology Co ltd filed Critical Hangzhou Bestsign Network Technology Co ltd
Priority to CN202010435389.8A priority Critical patent/CN111625787B/en
Publication of CN111625787A publication Critical patent/CN111625787A/en
Application granted granted Critical
Publication of CN111625787B publication Critical patent/CN111625787B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses an OFD-based electronic signature multi-version traceable rapid signature verification method, which comprises the steps of analyzing an OFD file into a file structure consisting of a plurality of XML files and other resource files; traversing all file object entries in the file main entry file, and judging whether each file object contains a signature according to whether each file object contains a signature list entry; establishing an original text abstract comparison table for the file object containing the signature list; generating a difference comparison chart between signature versions according to the difference of the summary recording nodes among the existing signatures; and searching whether the original text abstract comparison table is included or not for all abstract nodes in each signature file, and then comparing. If the comparison fails, the return reason of the verification failure forms a signature verification report of the file object; and verifying the electronic signature according to the standard to form a signature verification report return. The invention reduces the repeated calculation of the abstract of the original text and greatly accelerates the speed of signature verification.

Description

OFD-based electronic signature multi-version traceable rapid signature checking method
Technical Field
The invention relates to the technical field of OFD format files, in particular to an OFD-based electronic signature multi-version traceable rapid signature verification method.
Background
The OFD (OpenFixed-layout) is a format document standard with independent intellectual property rights in China, and the software product has the characteristics of independent controllability, safety, technical advancement and no change of presentation effect due to the software and hardware environment and the change of operators, and plays an important role in storing and exchanging electronic files. In order to replace international standard PDF (portable document format), OFD has many characteristics of PDF, including electronic signature, i.e. electronic signature, to ensure the integrity of document, the authenticity and non-repudiation of signer, so that OFD is also more applied to the fields of electronic invoice, electronic document, file, electronic certificate, etc.
With the popularity of OFD applications, there are problems that slowly evolve during use, such as:
how to increase the speed of signature verification by having a large number of electronic signatures on one OFD?
Secondly, the conventional OFD signature only informs whether the original text is tampered or not, and specific parts cannot be known to be tampered.
Third, how can changes between signatures be traced back for electronic contract application of OFD?
……
In view of the above problems, the present invention provides an OFD-based electronic signature multi-version traceable fast signature verification method, and the present invention will be described in a deep scheme around this.
Disclosure of Invention
The invention provides an OFD-based multi-version traceable rapid signature verification method for an electronic signature, which aims at an OFD file and an electronic signature, can accelerate signature verification for a large number of electronic signatures on one OFD, informs whether an original text is falsified, knows which parts are falsified, and can trace changes between the signatures for the electronic contract of the OFD.
An OFD-based electronic signature multi-version traceable rapid signature verification method comprises the following steps:
1) receiving and temporarily storing OFD files uploaded by a user, and analyzing the OFD into a file structure consisting of a plurality of xml files and resource files, wherein the plurality of xml files comprise the OFD.xml files;
2) traversing all file object entries in an OFD (office file format) xml file, judging whether a file object pointed by the current file object entry contains a signature according to whether each file object entry contains a signature list entry, skipping over file objects not containing signatures, and directly verifying the next file object until all file objects are verified;
3) establishing an original text abstract comparison table for the file object containing the signature;
4) traversing all signature files, generating a difference comparison chart among signature versions according to the difference of the summary recording nodes among the existing signature files, and recording the difference comparison chart into a signature checking report;
5) searching whether the original text abstract comparison table obtained in the step 3) is recorded or not for all abstract recording nodes in each signature file;
if the recorded direct comparison abstracts are consistent and not recorded, calculating abstracts of the files in the package pointed by the abstract recording nodes, firstly recording an original text abstract comparison table, and then comparing whether the abstracts are consistent or not;
if the comparison abstracts are consistent, checking the next abstract record node, if the comparison abstracts are not consistent, recording the abstract record node with the failed comparison, and recording the abstract record node in the signature verification report in the form of changed content;
6) and (4) verifying the electronic signature according to the standard to obtain a signature verification result, adding the signature verification result into the signature verification report, and finishing the signature verification report.
In the step 1), the resource file comprises a font, a color space, a drawing parameter, a vector image and multimedia;
the OFD.xml file is a file main entry file and comprises a plurality of file object entries and corresponding file objects;
in the step 2), a signature list entry corresponds to a signature list file, and the signature list entry points to a path where the corresponding signature list file is located;
the signature list file comprises a plurality of signature file entries, and each signature file entry points to a path where a corresponding signature file is located;
in the step 3), the establishment of the original text abstract comparison table can accelerate the signature verification speed of a lot of electronic signatures on one OFD.
The original text abstract comparison table comprises a first row of abstract recording nodes, a second row of abstract methods and a third row of abstract values, wherein the abstract recording nodes, the abstract methods and the abstract values in each row are in one-to-one correspondence.
The abstract recording node is an entrance corresponding to a file in a package protected by a certain signature;
the digest method is the digest method specified by the signature digest record list, and is generally the algorithm name of the digest method, such as SM3, SHA-256 and the like;
the abstract value is the result of base64 encoding of the files in the package pointed by the file abstract nodes.
In step 4), a difference comparison map between signature versions is generated according to the difference of the summary recording nodes between the existing signature files, and the change among a plurality of signature/signature versions can be traced back to the electronic document of the OFD.
Generating a difference comparison map between signature versions according to the difference of the summary record nodes between the existing signature files, which specifically comprises the following steps:
a) generating difference content according to the types of the files in the package pointed by different abstract record nodes among the signature files;
b) when the difference content is page content, rendering the changed page content;
c) when the difference content is the electronic signature, rendering the content of the page where the electronic signature is located, rendering the picture of the electronic signature in the electronic signature to a corresponding position, and marking the picture with a dotted line frame;
d) and if the difference content is a picture, rendering the changed picture to the content of the page, marking the content with a dotted line frame, finally expressing the difference and the sameness between the signature versions in a picture form, completing a difference comparison graph, and recording the difference comparison graph into a signature verification report.
In the step 5), the summary comparison is carried out on the files in the package corresponding to the summary recording node in the signature file by using the original text summary comparison table, so that whether the original text is tampered or not can be informed, the tampered content of each signature version can be known, and the details of the page, the multimedia content of the page, such as pictures, audio and video, and the like, the font of a certain section of characters on the page can be accurately obtained. The form of the changed content comprises the tampered content of each signature version, and the tampered content is accurate to the page, the pictures on the page, the audio, the video and other multimedia content; the font of the text on the page, etc.
Compared with the prior art, the invention has the following advantages:
the invention can show the content change difference between the document versions corresponding to each signature for the user, is convenient for the user to better confirm the signed content, and can effectively prevent the change of the uninformed clauses; meanwhile, for the traditional OFD electronic signature and signature verification, the loophole that the specific contents cannot be tampered are filled up if only the tampering is known; and finally, repeated calculation of the original text abstract is reduced, and the signature checking speed is greatly increased.
Drawings
FIG. 1 is a schematic flow diagram of an OFD-based electronic signature multi-version traceable rapid signature verification method of the present invention;
FIG. 2 is a file level organizational chart of an OFD-based electronic signature multi-version traceable rapid signature verification method for analyzing the OFD according to the present invention;
FIG. 3 is a schematic diagram of the OFD main inlet configuration of the present invention;
fig. 4 is a schematic diagram of the OFD-based electronic signature multi-version traceable fast signature verification method for tracing differences of the signature versions.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, an OFD-based electronic signature multi-version traceable fast signature verification method includes the following steps:
1) receiving and temporarily storing OFD files uploaded by a user, and analyzing the OFD into a file structure consisting of a plurality of xml files and other resource files;
2) and traversing all file object entries in the main file entry file, and judging whether the current file object contains a signature according to whether each file object contains a signature list entry. The file object not containing the signature is skipped and the next file object is directly verified.
3) And establishing an original text abstract comparison table for the file object containing the signature.
4) And traversing all the signature files, and generating a difference comparison chart between the signature versions according to the difference of the summary record nodes among the existing signatures.
5) For all abstract nodes in each signature file, searching whether an original text abstract comparison table is recorded or not, whether the recorded direct comparison abstract is consistent or not and not, calculating the abstract of the file pointed by the abstract node, then recording the abstract comparison table, and then comparing. And recording file information pointed by the summary node failed to be contrasted, and embodying the file information in the final signature report in the form of changed content.
6) And verifying the electronic signature to form a signature verification report.
In the step 1), the other resource files comprise fonts, color spaces, drawing parameters, vector images and multimedia. Xml files are file main entry files and comprise a plurality of file object entries and corresponding file objects. When the OFD file is parsed, the OFD is parsed into a file hierarchy organization structure as shown in fig. 2. In fig. 2, the ofd.xml is a file main entry file, and one package exists and only one ofd.xml file exists, and this file name should not be modified; doc _ N is the folder of the Nth document; xml is the root node of the document; page _ N is the N Page folder; xml is the content description of the nth page; xml is the resource description of page N; res is a resource folder; xml is the document public resource index; xml is the document resource index; image _ M.png/Font _ M.ttf is a resource file; signs is a digital signature storage directory; xml is a signature list file; sign _ N is the nth signature/signature; xml is a signature/signature description file; esl is an electronic seal file; dat signature value file.
The master file entry file UML in step 2) is shown in fig. 3, where OFD is the master file entry, DocBody is the file object entry, and signalres contained in the file object entry is the signature list entry pointing to the file, and if no signature exists, this entry is not present. In fig. 3, Version is a Version number of a file format, and takes a value of "1.0", which is indispensable; the DocType is a file format subset type, takes the value of 'OFD', indicates that the file meets the standard, takes the value of 'OFD-A', indicates that the file meets the OFD archiving standard, and is optional; DocBody is a file object entry, and a plurality of DocBody entries can exist, so that a plurality of layout documents are contained in one document, and the multiple layout documents are optional; DocInfo is the description of the metadata information of the document, and is optional; DocRoot is a document pointing to a document root node, and is optional; the Versions comprise a plurality of version description nodes, are used for defining the version information of the file generated by annotation and other changes, and are optional; signatures is an optional structure that points to Signatures and Signatures in the document.
In the step 3), the established original abstract comparison table is used for performing original abstract verification in the step 5), the structure of the original abstract comparison table is shown in table 1, and the table 1 is the original abstract comparison table of the OFD-based electronic signature multi-version traceable rapid signature verification method. The original text abstract comparison table consists of three columns, the first column is an abstract recording node, the second column is an abstract method, the third column is an abstract value, the abstract recording nodes, the abstract methods and the abstract values in each row are in one-to-one correspondence, abstract calculation is carried out on files in a package pointed by the abstract recording node files according to the abstract method, and the abstract values are obtained by carrying out base64 coding on obtained binary abstract values. Because the original text abstract comparison table is used, the file pointed by each abstract record node only needs to be subjected to abstract calculation once, and the signature verification speed can be greatly accelerated.
TABLE 1
Abstract recording node Abstract method Abstract value
In the step 4), the files in the package covered by each signature are different, and if the difference content is the page content, the changed page content is rendered; if the difference content is the electronic signature, rendering the content of the page where the electronic signature is located, rendering the picture of the electronic signature in the electronic signature to a corresponding position, and marking the picture with a dotted frame; if the difference content is a picture, the changed picture is rendered on the content of the page where the picture is located, and the picture is marked by a dashed box. Finally, the differences between the signature versions are represented in the form of pictures, and the representation form is shown in fig. 4.
In step 5), the file pointed by the summary node which does not pass the summary detection is recorded in the final signature verification report by the changed content.
In step 6), the electronic signature verification process for verifying the electronic signature specifically includes:
a) verifying the correctness of the electronic signature data format;
b) verifying whether the signature value of the electronic signature is correct or not;
c) verifying the matching of the signer certificate and the electronic seal;
d) verifying the validity of the electronic seal;
e) verifying the validity of the signer certificate;
f) verifying the validity of the signature time;
g) verifying the hash of the original text;
h) the validity of the timestamp is verified.
The results for the signature tests of steps b) and g) in steps 5) and 6) may yield the results shown in table 2. Table 2 is a comparison table of the signature verification results generated by the OFD-based multi-version traceable rapid signature verification method for multiple inspections according to the present invention.
TABLE 2
Figure BDA0002502046770000071
The above description is only for the preferred embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An OFD-based electronic signature multi-version traceable rapid signature verification method is characterized by comprising the following steps:
1) receiving and temporarily storing OFD files uploaded by a user, and analyzing the OFD into a file structure consisting of a plurality of xml files and resource files, wherein the plurality of xml files comprise the OFD.xml files;
2) traversing all file object entries in an OFD (office file format) xml file, judging whether a file object pointed by the current file object entry contains a signature according to whether each file object entry contains a signature list entry, skipping over file objects not containing signatures, and directly verifying the next file object until all file objects are verified;
3) establishing an original text abstract comparison table for the file object containing the signature;
4) traversing all signature files, generating a difference comparison chart among signature versions according to the difference of the summary recording nodes among the existing signature files, and recording the difference comparison chart into a signature checking report;
5) searching whether the original text abstract comparison table obtained in the step 3) is recorded or not for all abstract recording nodes in each signature file;
if the recorded direct comparison abstracts are consistent and not recorded, calculating abstracts of the files in the package pointed by the abstract recording nodes, firstly recording an original text abstract comparison table, and then comparing whether the abstracts are consistent or not;
if the comparison abstracts are consistent, checking the next abstract record node, failing to compare, recording the abstract record node failing to compare, and recording the abstract record node in the signature verification report in the form of changed content;
6) and (4) verifying the electronic signature according to the standard to obtain a signature verification result, adding the signature verification result into the signature verification report, and finishing the signature verification report.
2. The OFD-based multi-version traceable rapid signature verification method of an electronic signature according to claim 1, wherein in step 1), the resource files comprise fonts, color spaces, rendering parameters, vector images and multimedia.
3. The OFD-based electronic signature multi-version traceable fast signature verification method according to claim 1, wherein in step 1), the ofd.xml file is a file main entry file, and comprises a plurality of file object entries and file objects corresponding to the plurality of file object entries.
4. The OFD-based electronic signature multi-version traceable fast signature verification method according to claim 1, wherein in step 2), the signature list entry corresponds to the signature list file, and the signature list entry points to a path where the corresponding signature list file is located;
the signature list file comprises a plurality of signature file entries, and each signature file entry points to a path where a corresponding signature file is located.
5. The OFD-based multi-version traceable rapid signature verification method of an electronic signature according to claim 1, wherein in step 3), the original abstract comparison table includes a first column of abstract record nodes, a second column of abstract methods, and a third column of abstract values, and the abstract record nodes, the abstract methods, and the abstract values in each row are in one-to-one correspondence.
6. The OFD-based multi-version traceable rapid signature verification method according to claim 5, wherein the digest recording node is an entry corresponding to a file in a package protected by a certain signature.
7. The OFD-based multi-version traceable rapid signature verification method according to claim 5, wherein the digest method is a digest method specified by the signature digest record list.
8. The OFD-based multi-version traceable rapid signature verification method according to claim 5, wherein the digest value is a result of base64 encoding of the in-package files pointed by the file digest nodes.
9. The OFD-based multi-version traceable rapid signature verification method for electronic signatures according to claim 1, wherein in step 4), the difference comparison map between the signature versions is generated according to the difference between the digest recording nodes of the existing signature files, which specifically includes:
a) generating difference content according to the types of the files in the package pointed by different abstract record nodes among the signature files;
b) when the difference content is page content, rendering the changed page content;
c) when the difference content is the electronic signature, rendering the content of the page where the electronic signature is located, rendering the picture of the electronic signature in the electronic signature to a corresponding position, and marking the picture with a dotted line frame;
d) and if the difference content is a picture, rendering the changed picture to the content of the page, marking the content with a dotted line frame, finally expressing the difference and the sameness between the signature versions in a picture form, completing a difference comparison graph, and recording the difference comparison graph into a signature verification report.
10. The OFD-based electronic signature multi-version traceable rapid signature verification method according to claim 1, wherein in step 5), the form of the modified content comprises obtaining tampered content of each signature version; the method comprises the steps of accurately obtaining pages, pictures on the pages, audio and video multimedia contents; and, details of the text on the page.
CN202010435389.8A 2020-05-21 2020-05-21 OFD-based multi-version traceable quick signature verification method for electronic signature Active CN111625787B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010435389.8A CN111625787B (en) 2020-05-21 2020-05-21 OFD-based multi-version traceable quick signature verification method for electronic signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010435389.8A CN111625787B (en) 2020-05-21 2020-05-21 OFD-based multi-version traceable quick signature verification method for electronic signature

Publications (2)

Publication Number Publication Date
CN111625787A true CN111625787A (en) 2020-09-04
CN111625787B CN111625787B (en) 2023-04-25

Family

ID=72272786

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010435389.8A Active CN111625787B (en) 2020-05-21 2020-05-21 OFD-based multi-version traceable quick signature verification method for electronic signature

Country Status (1)

Country Link
CN (1) CN111625787B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732649A (en) * 2020-12-21 2021-04-30 航天信息股份有限公司 OFD document signing method, electronic device and medium
CN112862425A (en) * 2021-01-12 2021-05-28 江苏中威科技软件系统有限公司 Device and technology for reading OFD format file life cycle information
CN113254210A (en) * 2021-05-31 2021-08-13 深圳高灯计算机科技有限公司 OFD file signature verification method, system and equipment based on cloud service
CN115455492A (en) * 2022-09-30 2022-12-09 百望股份有限公司 OFD file manufacturing method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000250408A (en) * 1999-03-01 2000-09-14 Ntt Data Corp File authentication system, system and method for signature, system and method for authentication, and recording medium
CN101702150A (en) * 2009-12-02 2010-05-05 江西金格网络科技有限责任公司 Method for protecting, verifying and repealing content of PDF document page
CN102043912A (en) * 2009-10-15 2011-05-04 广州市百成科技有限公司 Method for using fingerprint signature and seal
US20140237238A1 (en) * 2010-01-28 2014-08-21 Adsensa Ltd. Document authentication data embedding method and apparatus
JP2015090529A (en) * 2013-11-05 2015-05-11 日本電信電話株式会社 Device and method for detecting modification in excerpted documents
US20150295718A1 (en) * 2012-12-27 2015-10-15 Feitian Technologies Co., Ltd Method and system for implementing digital signature in mobile operating system
CN105373933A (en) * 2015-11-16 2016-03-02 河北华烨冀科信息技术有限责任公司 Food circulation traceability method based on electronic inspection report
US20170338994A1 (en) * 2014-11-12 2017-11-23 Sony Corporation Receiver and method of receiving
CN110490004A (en) * 2018-06-11 2019-11-22 腾讯科技(深圳)有限公司 Processing method, client, computer equipment and the medium of Electronic Signature file
CN110826109A (en) * 2019-10-23 2020-02-21 杭州安存网络科技有限公司 Penetrating signature method suitable for PDF document

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000250408A (en) * 1999-03-01 2000-09-14 Ntt Data Corp File authentication system, system and method for signature, system and method for authentication, and recording medium
CN102043912A (en) * 2009-10-15 2011-05-04 广州市百成科技有限公司 Method for using fingerprint signature and seal
CN101702150A (en) * 2009-12-02 2010-05-05 江西金格网络科技有限责任公司 Method for protecting, verifying and repealing content of PDF document page
US20140237238A1 (en) * 2010-01-28 2014-08-21 Adsensa Ltd. Document authentication data embedding method and apparatus
US20150295718A1 (en) * 2012-12-27 2015-10-15 Feitian Technologies Co., Ltd Method and system for implementing digital signature in mobile operating system
JP2015090529A (en) * 2013-11-05 2015-05-11 日本電信電話株式会社 Device and method for detecting modification in excerpted documents
US20170338994A1 (en) * 2014-11-12 2017-11-23 Sony Corporation Receiver and method of receiving
CN105373933A (en) * 2015-11-16 2016-03-02 河北华烨冀科信息技术有限责任公司 Food circulation traceability method based on electronic inspection report
CN110490004A (en) * 2018-06-11 2019-11-22 腾讯科技(深圳)有限公司 Processing method, client, computer equipment and the medium of Electronic Signature file
CN110826109A (en) * 2019-10-23 2020-02-21 杭州安存网络科技有限公司 Penetrating signature method suitable for PDF document

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
冯辉;陈留勇;樊孝龙;李海波;王寒冰;: "OFD的安全应用分析" *
周明: "基于国产算法的OFD版式文件电子签章系统的设计与实现" *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732649A (en) * 2020-12-21 2021-04-30 航天信息股份有限公司 OFD document signing method, electronic device and medium
CN112732649B (en) * 2020-12-21 2024-03-12 航天信息股份有限公司 OFD document signing method, electronic equipment and medium
CN112862425A (en) * 2021-01-12 2021-05-28 江苏中威科技软件系统有限公司 Device and technology for reading OFD format file life cycle information
CN112862425B (en) * 2021-01-12 2021-11-12 江苏中威科技软件系统有限公司 Device and technology for reading OFD format file life cycle information
CN113254210A (en) * 2021-05-31 2021-08-13 深圳高灯计算机科技有限公司 OFD file signature verification method, system and equipment based on cloud service
CN115455492A (en) * 2022-09-30 2022-12-09 百望股份有限公司 OFD file manufacturing method and device
CN115455492B (en) * 2022-09-30 2024-02-13 百望股份有限公司 Method and device for manufacturing OFD file

Also Published As

Publication number Publication date
CN111625787B (en) 2023-04-25

Similar Documents

Publication Publication Date Title
CN111625787B (en) OFD-based multi-version traceable quick signature verification method for electronic signature
KR102289995B1 (en) Data storage, data check, and data linkage method and apparatus
US8977860B2 (en) Method and apparatus for tamper proof camera logs
US7716570B2 (en) Interfaces for creation and access of extensible markup language paper specification documents
US8190902B2 (en) Techniques for digital signature formation and verification
CN110532811B (en) PDF (Portable document Format) signature method and PDF signature system
US20110182422A1 (en) Document authentication data embedding method and apparatus
US20150178476A1 (en) System and method of monitoring font usage
US7602972B1 (en) Method and apparatus for identifying white space tables within a document
US20140032912A1 (en) Trust context for document signatures
CN107391292B (en) Block chain verification method and system for realizing error correction aiming at data of block body
CN106897211A (en) For the localization method and system of obscuring script
CN110347678B (en) Financial data storage method, system, device and equipment
US20240119084A1 (en) Source identifying forensics system, device, and method for multimedia files
CN111930708B (en) Ceph object storage-based object tag expansion system and method
US20240005043A1 (en) Unique Content Determination of Structured Format Documents
Milon Islam et al. A novel approach towards tamper detection of digital holy quran generation
CN104462025A (en) Buffering method and system for accelerating bidding document generation
CN114493551A (en) Contract generation method and device, electronic equipment and storage medium
CN100507913C (en) File processing method and system
CN116166617B (en) Catalog generation method and device for combined open format document OFD
US11681862B1 (en) System and method for identifying location of content within an electronic document
CN114756837B (en) Block chain-based digital content tracing method and system
US20230103486A1 (en) Secure content management and verification systems and methods
CN111915424A (en) Information storage method and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant