CN112560050B - Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium - Google Patents
Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium Download PDFInfo
- Publication number
- CN112560050B CN112560050B CN202011352634.5A CN202011352634A CN112560050B CN 112560050 B CN112560050 B CN 112560050B CN 202011352634 A CN202011352634 A CN 202011352634A CN 112560050 B CN112560050 B CN 112560050B
- Authority
- CN
- China
- Prior art keywords
- electronic certificate
- seal
- target information
- ciphertext
- signer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The invention provides a secure electronic certificate issuing method, a secure electronic certificate issuing device, terminal equipment and a storage medium, wherein the secure electronic certificate issuing method comprises the following steps: acquiring electronic certificate information, acquiring target information from the electronic certificate information according to preset requirements, encrypting the target information to obtain corresponding ciphertext, storing the target information and the ciphertext into a seal, and marking the seal as a first seal; and receiving an electronic certificate issuing request, and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request. Compared with the prior art, after the information of the electronic certificate is obtained, the corresponding ciphertext is calculated by adopting an encryption algorithm and is stored in the seal of the signer, when a user has the requirement of issuing the certificate, a new electronic certificate is generated by adopting the current time parameter and the target information stored in the signer, and the generated certificate seal is ensured to be different by adopting the current time parameter, so that the uniqueness, the safety and the reliability of the electronic certificate are ensured.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a secure electronic certificate issuing method, apparatus, electronic device, and storage medium.
Background
In the prior art, compared with paper files, the electronic files have the characteristics of large storage capacity, space saving and convenient transmission, and simultaneously, the electronic files are convenient to copy and tamper.
In addition, when a user goes to transact business related to himself or a company, the user needs to present a certificate with a stamp in order to verify the user's identity and record user information, but there are cases where many user certificates are lost or tampered with for fraudulent use.
Disclosure of Invention
Therefore, the invention provides a safe electronic certificate issuing method, a device, electronic equipment and a storage medium, which improve the safety of electronic certificates or certificates.
In a first aspect, the present invention provides a secure electronic certificate issuing method, comprising:
the information of the electronic certificate is obtained,
obtaining target information from the electronic certificate information to a signer according to preset requirements, wherein the signer comprises an encryption algorithm and a seal,
encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext, and storing the target information and the ciphertext into the seal to be marked as a first seal;
a request for issuance of an electronic certificate is received,
and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
Optionally, before the storing the target information and the ciphertext into the seal and marking the target information and the ciphertext as the first seal, the method further includes: and decrypting the ciphertext according to an encryption algorithm in the signer to obtain a corresponding plaintext, and correspondingly, storing the target information, the ciphertext and the plaintext into the seal to be marked as a second seal.
Optionally, receiving an electronic certificate issuance request,
and adding the current time parameter to the second seal to generate a new electronic certificate according to the electronic certificate issuing request.
Optionally, the method further comprises: and hashing the new electronic certificate by adopting a hashing algorithm to generate a hash value, and signing the generated new electronic certificate.
Optionally, the method further comprises: and uploading the hash value and the signature to a server.
Optionally, the encryption algorithm includes a symmetric encryption algorithm, an asymmetric encryption algorithm, and a hash algorithm.
In a second aspect, the present invention also provides a secure electronic certificate issuing apparatus, comprising:
an electronic certificate information acquisition module for acquiring electronic certificate information,
a target information acquisition module for acquiring target information from the electronic certificate information according to preset requirements to a signer, wherein the signer comprises an encryption algorithm and a seal,
an encryption module for encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext,
the storage marking module is used for storing the target information and the ciphertext into the seal and marking the target information and the ciphertext as a first seal;
a receiving module for receiving an electronic certificate issuing request,
and the generation module is used for adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
Optionally, before the storing the marking module, the method further includes:
a decryption module for decrypting the ciphertext according to the encryption algorithm in the signer to obtain a corresponding plaintext,
correspondingly, the storage marking module is also used for storing the target information, the ciphertext and the plaintext into the seal and marking the second seal.
In a third aspect, the present invention further provides a terminal device, including a memory, and a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to:
the information of the electronic certificate is obtained,
obtaining target information from the electronic certificate information to a signer according to preset requirements, wherein the signer comprises an encryption algorithm and a seal,
encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext,
storing the target information and the ciphertext into the seal, and marking the seal as a first seal;
a request for issuance of an electronic certificate is received,
and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
In a fourth aspect, the present invention also provides a computer readable storage medium having stored therein computer executable instructions for implementing the secure electronic certificate issuing method when executed by a processor.
The invention provides a safe electronic certificate issuing method, device, equipment and storage medium. After the information of the electronic certificate is obtained, the corresponding ciphertext is calculated by adopting an encryption algorithm and is stored in the seal of the signer, when a user has the requirement of issuing the certificate, a new electronic certificate is generated by adopting the current time parameter and the target information stored in the signer, and the generated license seal is ensured to be different by adopting the current time parameter, so that the uniqueness and the safety of the electronic certificate are ensured.
Further, the encryption algorithm in the signer decrypts the ciphertext to plaintext, stores the ciphertext in the seal of the signer, synthesizes the current time parameter and the target information stored in the signer during issuing, prevents modification, and further improves the safety and reliability of the electronic certificate.
Further, the synthesized electronic certificate is hashed, authenticity of the electronic certificate can be verified by adopting the hash value, and safety and reliability of the electronic certificate and non-tamper property are ensured again.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, a brief description will be given below of the drawings that are needed in the embodiments or the prior art descriptions, it being obvious that the drawings in the following description are some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort to a person skilled in the art.
Fig. 1 is a schematic diagram of a network architecture according to an embodiment of the present invention;
FIG. 2 is an interactive flow chart of a secure electronic certificate issuing method according to an embodiment of the present invention.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, based on the embodiments herein, which would be apparent to one of ordinary skill in the art without making any inventive effort, are intended to be within the scope of the present application.
Fig. 1 is a schematic diagram of a network architecture according to an embodiment of the present invention, where the network architecture includes at least one server and one terminal, and fig. 1 includes a terminal device, which are respectively a server 1 and a request end 2, and they respectively can communicate with a network device 3 through a wireless interface. It should be noted that the present application is applicable to the network architecture shown in fig. 1, but is not limited thereto.
The network device referred to in the present application may be a base station (Base Transceiver Station, BTS) in global mobile communications (Global System of Mobile communication, GSM) or code division multiple Access (Code Division Multiple Access, CDMA), a base station (NodeB, NB) in wideband code division multiple Access (Wideband Code Division Multiple Access, WCDMA), an evolved NodeB (eNB) in long term evolution (Long Term Evolution, LTE) or enhanced long term evolution (evolved Long Term Evolution, eete), or a next generation evolved NodeB (ng-eNB), an Access Point (AP) or a relay station in WLAN, or a gNB in 5G NR, which is not limited herein.
In addition, the terminal devices referred to in this application may be devices that provide voice and/or data connectivity to a user, handheld devices with wireless connectivity, or other processing devices connected to a wireless modem. The terminal device may communicate with at least one core network via a radio access network (Radio Access Network, RAN). The terminal device may be a mobile terminal, such as a mobile telephone (or "cellular" telephone) and a computer with a mobile terminal, for example, a portable, pocket, hand-held, computer-built-in or vehicle-mounted mobile device that exchanges voice and/or data with the radio access network. The Terminal device may also be referred to as a Subscriber Unit (Subscriber Unit), a Subscriber Station (Subscriber Station), a Mobile Station (Mobile Station), a Remote Station (Remote Station), an Access Point (Access Point), a Remote Terminal (Remote Terminal), an Access Terminal (Access Terminal), a User Terminal (User Terminal), a User Agent (User Agent), or a User Equipment (User Equipment), without limitation.
As described above, in the prior art, when the terminal device is in a state of requesting download to issue an electronic certificate, any user can download, cannot distinguish the authenticity, and is easily tampered with. In order to solve the technical problem, the application provides the following technical scheme.
FIG. 2 is an interactive flow chart of a secure electronic certificate issuing method according to an embodiment of the present invention. Wherein the network element involved in the method comprises: part or all of the terminal devices (i.e., may be the requesting end shown in fig. 1), and the server. The following describes a secure electronic certificate issuing method with a terminal device and a server as execution subjects. As shown in fig. 2, the method comprises the steps of:
step S201: and the server acquires the electronic certificate information.
Step S202: the server obtains target information from the electronic certificate information to a signer according to preset requirements, and the signer comprises an encryption algorithm and a seal.
Step S203: and the server encrypts the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext.
Step S204: the server stores the target information and the ciphertext into the seal, and marks the seal as a first seal.
Step S205: the terminal device sends a request to issue an electronic certificate to the server.
Step S206: and the server adds the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
The following description is made for step S201:
the electronic certificate information comprises common information and private information, wherein the common information comprises a license template, file information, paper size, picture size and the like; the private information includes personal identification information such as identification card information, name, age, sex, etc.; the application is not limited in this regard as to business information, such as business name, business uniform social credit code, business license number, etc.
The following description is made for step S202:
the server obtains target information from the electronic certificate information according to preset requirements, wherein the preset requirements refer to information capable of representing the uniqueness of the electronic certificate, and the target information comprises information which is selected from the electronic information according to the preset requirements and has the uniqueness, so that the safety and the reliability of the electronic certificate can be embodied.
Signers include, but are not limited to, asymmetric algorithms, symmetric algorithms, hash functions, and key generation algorithms.
The following description is made for step S203:
the server encrypts the target information according to the encryption algorithm in the signer to obtain corresponding ciphertext, and one or more encryption algorithms can be adopted to generate corresponding ciphertext with unique representativeness.
The following description is made with respect to steps S204, S205, and S206:
the server stores the target information and the ciphertext into the seal, the seal is marked as a first seal, and the terminal equipment sends a request for issuing the electronic certificate to the server. And the server adds the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
When the terminal equipment sends a request for issuing the electronic certificate to the server, the server adds the current time parameter into the seal in the signer according to the current time to immediately synthesize a new electronic certificate, so that the new electronic certificate obtained by the terminal equipment is the electronic certificate with uniqueness and safety.
The current time parameter is year, month, day, time, second, and the unit can be set to millisecond, minute, second or nanosecond, namely the time parameter is expressed to be constantly changed, so that the request of the user cannot be repeated even in a very short time, and the uniqueness of the electronic certificate of the user is ensured.
Preferably, storing the target information and the ciphertext into the seal, before marking as the first seal, further includes: and decrypting the ciphertext according to an encryption algorithm in the signer to obtain a corresponding plaintext, and correspondingly, storing the target information, the ciphertext and the plaintext into the seal to be marked as a second seal.
Preferably, an electronic certificate issuing request is received, and a current time parameter is added to a second seal to generate a new electronic certificate according to the electronic certificate issuing request.
Preferably, a hash algorithm is adopted to hash the new electronic certificate, a hash value is generated, and the generated new electronic certificate is signed.
Preferably, the hash value and the signature are uploaded to a server.
Note that, the signer algorithms include, but are not limited to, an asymmetric algorithm, a symmetric algorithm, and a hash function and key generation algorithm, where the hash function library supports MD5, SHA256, SHA512, and SM3 cryptographic algorithms, and the hash algorithm is used in the future in configuration compiling selection.
Illustratively, the compiling is configured as an SM3 algorithm, and the SM3 hash algorithm is subjected to padding and iterative compression to generate a hash value, the length of the hash value is 256 bits, and the algorithm is compiled into software.
The symmetric algorithm comprises the steps of reading the current time as a random parameter, acquiring a random number by using a random function, generating a random number with the length of 16 bits as a key of the SM4 symmetric algorithm, and encrypting or decrypting the data by using the key by the symmetric algorithm.
The asymmetric algorithm library contains RSA, ECC and SM2 algorithms, and is also configured by compiling a certain type of algorithm, and an SM2 cryptographic algorithm is used for example, and the SM2 algorithm is compiled into software. SM2 relies on Miracl library function interface, initializes elliptic curve, randomly generates private key, generates public key according to private key, hashes plaintext by hash function, signs or encrypts hash value
The server provides a port for the terminal device, the user writes user information, account passwords and the like through the port, and the user logs in through the account numbers and the passwords. The server communicates with the internal module thereof through the port, the terminal device issues a private communication protocol command, and the server generates a pair of asymmetric algorithm key and symmetric algorithm key, wherein the asymmetric key is used for transmitting symmetric key encryption and certificate license signature. And storing the secret key into a storage area set by the server, issuing a command message for acquiring the secret key by the terminal equipment, taking out the corresponding asymmetric algorithm public key from the storage area set by the server, acquiring symmetric algorithm secret key ciphertext encrypted by the private key, and decrypting by using the public key to acquire the symmetric algorithm secret key. And the user information and the seal are kept and managed in the server.
The terminal device illustratively encrypts the electronic certificate information using a symmetric algorithm and stores it in the server. The specific process is to import the certification template, write in the related certification information, certificate number, grant object name, etc., extract the common template, seal and private object respectively, carry out SM4 symmetric encryption on the object information respectively, generate certification ciphertext, and store the ciphertext in the safe storage device in sequence.
When the electronic certificate is required to be provided, a user logs in a port, issues a certificate issuing request to a server, decrypts a seal in the electronic certificate information, adds time parameter information, maps the seal to a pixel point of a seal graph, marks the image, decrypts by using a symmetric key to obtain a certificate template and private object plaintext information, synthesizes the electronic certificate information into a new electronic certificate, and signs the certificate.
The terminal device obtains the certificate and the signature. And uploading the file hash and the signed electronic evidence to a server. The client can directly carry out signature verification on the certificate by using the public key, and if doubtful, the connectable server carries out comparison verification, thereby ensuring that the certificate is not tampered and can be verified.
The invention also provides a secure electronic certificate issuing device, which comprises:
an electronic certificate information acquisition module for acquiring electronic certificate information,
the target information acquisition module is used for acquiring target information from the electronic certificate information to a signer according to preset requirements, the signer comprises an encryption algorithm and a seal,
the encryption module is used for encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext,
the storage marking module is used for storing the target information and the ciphertext into the seal and marking the target information and the ciphertext as a first seal;
a receiving module for receiving an electronic certificate issuing request,
and the generation module is used for adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
Optionally, before storing the marking module, the method further includes:
a decryption module for decrypting the ciphertext according to the encryption algorithm in the signer to obtain a corresponding plaintext,
correspondingly, the storage marking module is also used for storing the target information, the ciphertext and the plaintext into the seal and marking the second seal.
The device generating module further comprises a step of adding the current time parameter to the second seal to generate a new electronic certificate according to the electronic certificate issuing request.
The device also comprises a hash signing module which hashes the new electronic certificate to generate a hash value and signs the generated new electronic certificate.
The safe electronic certificate issuing device can be used for executing the technical scheme in the embodiment of the safe electronic certificate issuing method, and the implementation principle and the technical effect are similar and are not repeated here.
The terminal equipment provided by the invention can be used for executing the technical scheme in the embodiment of the secure electronic certificate issuing method, and the implementation principle and the technical effect are similar and are not repeated here.
The embodiment of the application also provides a computer readable storage medium, wherein computer executable instructions are stored in the computer readable storage medium, and the computer executable instructions are used for realizing any one of the above safe electronic certificate issuing methods when being executed by a processor.
Embodiments of the present application also provide a computer program product comprising computer-executable instructions for implementing any of the secure electronic certificate issuing methods described above when executed by a processor.
In the specific implementation of the terminal device, it should be understood that the processor may be a central processing unit (english: central Processing Unit, abbreviated as CPU), or may be other general purpose processors, digital signal processors (english: digital Signal Processor, abbreviated as DSP), application specific integrated circuits (english: application Specific Integrated Circuit, abbreviated as ASIC), or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in the processor for execution.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the method embodiments described above may be performed by hardware associated with program instructions. The foregoing program may be stored in a computer readable storage medium. The program, when executed, performs steps including the method embodiments described above; and the aforementioned storage medium includes: read-only memory (ROM), RAM, flash memory, hard disk, solid state disk, magnetic tape, floppy disk, optical disk, and any combination thereof.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present application.
Claims (10)
1. A secure electronic certificate issuing method, comprising:
the information of the electronic certificate is obtained,
obtaining target information from the electronic certificate information to a signer according to preset requirements, wherein the signer comprises an encryption algorithm and a seal,
encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext,
storing the target information and the ciphertext into the seal, and marking the seal as a first seal;
a request for issuance of an electronic certificate is received,
and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
2. The secure electronic certificate issuing method according to claim 1, wherein the storing the target information and the ciphertext into the stamp, before marking as a first stamp, further comprises:
decrypting the ciphertext according to an encryption algorithm in the signer to obtain a corresponding plaintext,
correspondingly, the target information, the ciphertext and the plaintext are stored in the seal and marked as a second seal.
3. The method of claim 2, wherein the secure electronic certificate issuing process,
a request for issuance of an electronic certificate is received,
and adding the current time parameter to the second seal to generate a new electronic certificate according to the electronic certificate issuing request.
4. A method of secure electronic certificate issuance according to claim 1 or 3, further comprising: and hashing the new electronic certificate by adopting a hashing algorithm to generate a hash value, and signing the generated new electronic certificate.
5. The secure electronic certificate issuing method according to claim 4, further comprising: and uploading the hash value and the signature to a server.
6. The secure electronic certificate issuing method according to claim 1, wherein the encryption algorithm includes a symmetric encryption algorithm, an asymmetric encryption algorithm, and a hash algorithm.
7. A secure electronic certificate issuing apparatus, comprising:
an electronic certificate information acquisition module for acquiring electronic certificate information,
a target information acquisition module for acquiring target information from the electronic certificate information according to preset requirements to a signer, wherein the signer comprises an encryption algorithm and a seal,
an encryption module for encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext,
the storage marking module is used for storing the target information and the ciphertext into the seal and marking the target information and the ciphertext as a first seal;
a receiving module for receiving an electronic certificate issuing request,
and the generation module is used for adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
8. The secure electronic certificate issuing apparatus according to claim 7, comprising:
before the storing and marking module, the method further comprises:
a decryption module for decrypting the ciphertext according to the encryption algorithm in the signer to obtain a corresponding plaintext,
correspondingly, the storage marking module is also used for storing the target information, the ciphertext and the plaintext into the seal and marking the second seal.
9. A terminal device comprising a memory, a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to:
the information of the electronic certificate is obtained,
obtaining target information from the electronic certificate information to a signer according to preset requirements, wherein the signer comprises an encryption algorithm and a seal,
encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext,
storing the target information and the ciphertext into the seal, and marking the seal as a first seal;
a request for issuance of an electronic certificate is received,
and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
10. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are for implementing the secure electronic certificate issuing method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011352634.5A CN112560050B (en) | 2020-11-26 | 2020-11-26 | Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011352634.5A CN112560050B (en) | 2020-11-26 | 2020-11-26 | Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112560050A CN112560050A (en) | 2021-03-26 |
CN112560050B true CN112560050B (en) | 2023-05-30 |
Family
ID=75045965
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011352634.5A Active CN112560050B (en) | 2020-11-26 | 2020-11-26 | Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112560050B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113221186A (en) * | 2021-04-09 | 2021-08-06 | 西安慧博文定信息技术有限公司 | Signing and signature checking method based on time encryption algorithm |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107231331A (en) * | 2016-03-23 | 2017-10-03 | 阿里巴巴集团控股有限公司 | Obtain, issue the implementation method and device of electronic certificate |
CN109118229A (en) * | 2018-08-24 | 2019-01-01 | 长威信息科技发展股份有限公司 | A kind of electronics license signature method |
JP6465426B1 (en) * | 2018-07-20 | 2019-02-06 | Gmoグローバルサイン株式会社 | Electronic signature system, certificate issuing system, key management system, and electronic certificate issuing method |
CN111291392A (en) * | 2020-01-22 | 2020-06-16 | 京东数字科技控股有限公司 | Electronic signature method and device, electronic equipment and storage medium |
CN111506632A (en) * | 2020-04-23 | 2020-08-07 | 腾讯科技(深圳)有限公司 | Data processing method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020144110A1 (en) * | 2001-03-28 | 2002-10-03 | Ramanathan Ramanathan | Method and apparatus for constructing digital certificates |
-
2020
- 2020-11-26 CN CN202011352634.5A patent/CN112560050B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107231331A (en) * | 2016-03-23 | 2017-10-03 | 阿里巴巴集团控股有限公司 | Obtain, issue the implementation method and device of electronic certificate |
JP6465426B1 (en) * | 2018-07-20 | 2019-02-06 | Gmoグローバルサイン株式会社 | Electronic signature system, certificate issuing system, key management system, and electronic certificate issuing method |
CN109118229A (en) * | 2018-08-24 | 2019-01-01 | 长威信息科技发展股份有限公司 | A kind of electronics license signature method |
CN111291392A (en) * | 2020-01-22 | 2020-06-16 | 京东数字科技控股有限公司 | Electronic signature method and device, electronic equipment and storage medium |
CN111506632A (en) * | 2020-04-23 | 2020-08-07 | 腾讯科技(深圳)有限公司 | Data processing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN112560050A (en) | 2021-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107483212B (en) | Method for generating digital signature by cooperation of two parties | |
US9853816B2 (en) | Credential validation | |
JP4870155B2 (en) | Electronic passport authentication protocol with enhanced privacy | |
KR101658501B1 (en) | Digital signature service system based on hash function and method thereof | |
CA2976795C (en) | Implicitly certified digital signatures | |
US20190007215A1 (en) | In-vehicle information communication system and authentication method | |
US20110093714A1 (en) | Systems and methods for asymmetric cryptographic accessory authentication | |
CN106452770B (en) | Data encryption method, data decryption method, device and system | |
CN109829269A (en) | Method, apparatus and system based on E-seal authenticating electronic documents | |
US20060225126A1 (en) | Securely using a display to exchange information | |
CN108900528B (en) | Block chain real-name authentication method, device, equipment and storage medium | |
US9143323B2 (en) | Securing a link between two devices | |
CN101247605A (en) | Short information enciphering and endorsement method, mobile terminal and short information ciphering system | |
WO2016086788A1 (en) | Method and apparatus for encrypting/decrypting data on mobile terminal | |
CN109068322B (en) | Decryption method, system, mobile terminal, server and storage medium | |
CN107333263B (en) | Improved SIM card and mobile communication identity recognition method and system | |
WO2012075764A1 (en) | Method for storing key parameters and terminal device | |
CN109391473B (en) | Electronic signature method, device and storage medium | |
CN114257562B (en) | Instant messaging method, device, electronic equipment and computer readable storage medium | |
CN112560050B (en) | Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium | |
CN107947939A (en) | Support the PDF endorsement methods and system of SM3 cryptographic Hash algorithm and SM2 Digital Signature Algorithms | |
CN111177748A (en) | Fingerprint storage encryption method, device and system | |
CN113392418B (en) | Data deployment method and device, computer readable storage medium, deployment device and user side | |
CN113918970A (en) | Data processing method, communication device and storage medium | |
Baek et al. | Secure and lightweight authentication protocol for NFC tag based services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |