CN112560050B - Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium - Google Patents

Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium Download PDF

Info

Publication number
CN112560050B
CN112560050B CN202011352634.5A CN202011352634A CN112560050B CN 112560050 B CN112560050 B CN 112560050B CN 202011352634 A CN202011352634 A CN 202011352634A CN 112560050 B CN112560050 B CN 112560050B
Authority
CN
China
Prior art keywords
electronic certificate
seal
target information
ciphertext
signer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011352634.5A
Other languages
Chinese (zh)
Other versions
CN112560050A (en
Inventor
程巍
冯超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Huibo Wending Information Technology Co ltd
Original Assignee
Xi'an Huibo Wending Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Huibo Wending Information Technology Co ltd filed Critical Xi'an Huibo Wending Information Technology Co ltd
Priority to CN202011352634.5A priority Critical patent/CN112560050B/en
Publication of CN112560050A publication Critical patent/CN112560050A/en
Application granted granted Critical
Publication of CN112560050B publication Critical patent/CN112560050B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention provides a secure electronic certificate issuing method, a secure electronic certificate issuing device, terminal equipment and a storage medium, wherein the secure electronic certificate issuing method comprises the following steps: acquiring electronic certificate information, acquiring target information from the electronic certificate information according to preset requirements, encrypting the target information to obtain corresponding ciphertext, storing the target information and the ciphertext into a seal, and marking the seal as a first seal; and receiving an electronic certificate issuing request, and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request. Compared with the prior art, after the information of the electronic certificate is obtained, the corresponding ciphertext is calculated by adopting an encryption algorithm and is stored in the seal of the signer, when a user has the requirement of issuing the certificate, a new electronic certificate is generated by adopting the current time parameter and the target information stored in the signer, and the generated certificate seal is ensured to be different by adopting the current time parameter, so that the uniqueness, the safety and the reliability of the electronic certificate are ensured.

Description

Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a secure electronic certificate issuing method, apparatus, electronic device, and storage medium.
Background
In the prior art, compared with paper files, the electronic files have the characteristics of large storage capacity, space saving and convenient transmission, and simultaneously, the electronic files are convenient to copy and tamper.
In addition, when a user goes to transact business related to himself or a company, the user needs to present a certificate with a stamp in order to verify the user's identity and record user information, but there are cases where many user certificates are lost or tampered with for fraudulent use.
Disclosure of Invention
Therefore, the invention provides a safe electronic certificate issuing method, a device, electronic equipment and a storage medium, which improve the safety of electronic certificates or certificates.
In a first aspect, the present invention provides a secure electronic certificate issuing method, comprising:
the information of the electronic certificate is obtained,
obtaining target information from the electronic certificate information to a signer according to preset requirements, wherein the signer comprises an encryption algorithm and a seal,
encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext, and storing the target information and the ciphertext into the seal to be marked as a first seal;
a request for issuance of an electronic certificate is received,
and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
Optionally, before the storing the target information and the ciphertext into the seal and marking the target information and the ciphertext as the first seal, the method further includes: and decrypting the ciphertext according to an encryption algorithm in the signer to obtain a corresponding plaintext, and correspondingly, storing the target information, the ciphertext and the plaintext into the seal to be marked as a second seal.
Optionally, receiving an electronic certificate issuance request,
and adding the current time parameter to the second seal to generate a new electronic certificate according to the electronic certificate issuing request.
Optionally, the method further comprises: and hashing the new electronic certificate by adopting a hashing algorithm to generate a hash value, and signing the generated new electronic certificate.
Optionally, the method further comprises: and uploading the hash value and the signature to a server.
Optionally, the encryption algorithm includes a symmetric encryption algorithm, an asymmetric encryption algorithm, and a hash algorithm.
In a second aspect, the present invention also provides a secure electronic certificate issuing apparatus, comprising:
an electronic certificate information acquisition module for acquiring electronic certificate information,
a target information acquisition module for acquiring target information from the electronic certificate information according to preset requirements to a signer, wherein the signer comprises an encryption algorithm and a seal,
an encryption module for encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext,
the storage marking module is used for storing the target information and the ciphertext into the seal and marking the target information and the ciphertext as a first seal;
a receiving module for receiving an electronic certificate issuing request,
and the generation module is used for adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
Optionally, before the storing the marking module, the method further includes:
a decryption module for decrypting the ciphertext according to the encryption algorithm in the signer to obtain a corresponding plaintext,
correspondingly, the storage marking module is also used for storing the target information, the ciphertext and the plaintext into the seal and marking the second seal.
In a third aspect, the present invention further provides a terminal device, including a memory, and a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to:
the information of the electronic certificate is obtained,
obtaining target information from the electronic certificate information to a signer according to preset requirements, wherein the signer comprises an encryption algorithm and a seal,
encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext,
storing the target information and the ciphertext into the seal, and marking the seal as a first seal;
a request for issuance of an electronic certificate is received,
and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
In a fourth aspect, the present invention also provides a computer readable storage medium having stored therein computer executable instructions for implementing the secure electronic certificate issuing method when executed by a processor.
The invention provides a safe electronic certificate issuing method, device, equipment and storage medium. After the information of the electronic certificate is obtained, the corresponding ciphertext is calculated by adopting an encryption algorithm and is stored in the seal of the signer, when a user has the requirement of issuing the certificate, a new electronic certificate is generated by adopting the current time parameter and the target information stored in the signer, and the generated license seal is ensured to be different by adopting the current time parameter, so that the uniqueness and the safety of the electronic certificate are ensured.
Further, the encryption algorithm in the signer decrypts the ciphertext to plaintext, stores the ciphertext in the seal of the signer, synthesizes the current time parameter and the target information stored in the signer during issuing, prevents modification, and further improves the safety and reliability of the electronic certificate.
Further, the synthesized electronic certificate is hashed, authenticity of the electronic certificate can be verified by adopting the hash value, and safety and reliability of the electronic certificate and non-tamper property are ensured again.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, a brief description will be given below of the drawings that are needed in the embodiments or the prior art descriptions, it being obvious that the drawings in the following description are some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort to a person skilled in the art.
Fig. 1 is a schematic diagram of a network architecture according to an embodiment of the present invention;
FIG. 2 is an interactive flow chart of a secure electronic certificate issuing method according to an embodiment of the present invention.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, based on the embodiments herein, which would be apparent to one of ordinary skill in the art without making any inventive effort, are intended to be within the scope of the present application.
Fig. 1 is a schematic diagram of a network architecture according to an embodiment of the present invention, where the network architecture includes at least one server and one terminal, and fig. 1 includes a terminal device, which are respectively a server 1 and a request end 2, and they respectively can communicate with a network device 3 through a wireless interface. It should be noted that the present application is applicable to the network architecture shown in fig. 1, but is not limited thereto.
The network device referred to in the present application may be a base station (Base Transceiver Station, BTS) in global mobile communications (Global System of Mobile communication, GSM) or code division multiple Access (Code Division Multiple Access, CDMA), a base station (NodeB, NB) in wideband code division multiple Access (Wideband Code Division Multiple Access, WCDMA), an evolved NodeB (eNB) in long term evolution (Long Term Evolution, LTE) or enhanced long term evolution (evolved Long Term Evolution, eete), or a next generation evolved NodeB (ng-eNB), an Access Point (AP) or a relay station in WLAN, or a gNB in 5G NR, which is not limited herein.
In addition, the terminal devices referred to in this application may be devices that provide voice and/or data connectivity to a user, handheld devices with wireless connectivity, or other processing devices connected to a wireless modem. The terminal device may communicate with at least one core network via a radio access network (Radio Access Network, RAN). The terminal device may be a mobile terminal, such as a mobile telephone (or "cellular" telephone) and a computer with a mobile terminal, for example, a portable, pocket, hand-held, computer-built-in or vehicle-mounted mobile device that exchanges voice and/or data with the radio access network. The Terminal device may also be referred to as a Subscriber Unit (Subscriber Unit), a Subscriber Station (Subscriber Station), a Mobile Station (Mobile Station), a Remote Station (Remote Station), an Access Point (Access Point), a Remote Terminal (Remote Terminal), an Access Terminal (Access Terminal), a User Terminal (User Terminal), a User Agent (User Agent), or a User Equipment (User Equipment), without limitation.
As described above, in the prior art, when the terminal device is in a state of requesting download to issue an electronic certificate, any user can download, cannot distinguish the authenticity, and is easily tampered with. In order to solve the technical problem, the application provides the following technical scheme.
FIG. 2 is an interactive flow chart of a secure electronic certificate issuing method according to an embodiment of the present invention. Wherein the network element involved in the method comprises: part or all of the terminal devices (i.e., may be the requesting end shown in fig. 1), and the server. The following describes a secure electronic certificate issuing method with a terminal device and a server as execution subjects. As shown in fig. 2, the method comprises the steps of:
step S201: and the server acquires the electronic certificate information.
Step S202: the server obtains target information from the electronic certificate information to a signer according to preset requirements, and the signer comprises an encryption algorithm and a seal.
Step S203: and the server encrypts the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext.
Step S204: the server stores the target information and the ciphertext into the seal, and marks the seal as a first seal.
Step S205: the terminal device sends a request to issue an electronic certificate to the server.
Step S206: and the server adds the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
The following description is made for step S201:
the electronic certificate information comprises common information and private information, wherein the common information comprises a license template, file information, paper size, picture size and the like; the private information includes personal identification information such as identification card information, name, age, sex, etc.; the application is not limited in this regard as to business information, such as business name, business uniform social credit code, business license number, etc.
The following description is made for step S202:
the server obtains target information from the electronic certificate information according to preset requirements, wherein the preset requirements refer to information capable of representing the uniqueness of the electronic certificate, and the target information comprises information which is selected from the electronic information according to the preset requirements and has the uniqueness, so that the safety and the reliability of the electronic certificate can be embodied.
Signers include, but are not limited to, asymmetric algorithms, symmetric algorithms, hash functions, and key generation algorithms.
The following description is made for step S203:
the server encrypts the target information according to the encryption algorithm in the signer to obtain corresponding ciphertext, and one or more encryption algorithms can be adopted to generate corresponding ciphertext with unique representativeness.
The following description is made with respect to steps S204, S205, and S206:
the server stores the target information and the ciphertext into the seal, the seal is marked as a first seal, and the terminal equipment sends a request for issuing the electronic certificate to the server. And the server adds the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
When the terminal equipment sends a request for issuing the electronic certificate to the server, the server adds the current time parameter into the seal in the signer according to the current time to immediately synthesize a new electronic certificate, so that the new electronic certificate obtained by the terminal equipment is the electronic certificate with uniqueness and safety.
The current time parameter is year, month, day, time, second, and the unit can be set to millisecond, minute, second or nanosecond, namely the time parameter is expressed to be constantly changed, so that the request of the user cannot be repeated even in a very short time, and the uniqueness of the electronic certificate of the user is ensured.
Preferably, storing the target information and the ciphertext into the seal, before marking as the first seal, further includes: and decrypting the ciphertext according to an encryption algorithm in the signer to obtain a corresponding plaintext, and correspondingly, storing the target information, the ciphertext and the plaintext into the seal to be marked as a second seal.
Preferably, an electronic certificate issuing request is received, and a current time parameter is added to a second seal to generate a new electronic certificate according to the electronic certificate issuing request.
Preferably, a hash algorithm is adopted to hash the new electronic certificate, a hash value is generated, and the generated new electronic certificate is signed.
Preferably, the hash value and the signature are uploaded to a server.
Note that, the signer algorithms include, but are not limited to, an asymmetric algorithm, a symmetric algorithm, and a hash function and key generation algorithm, where the hash function library supports MD5, SHA256, SHA512, and SM3 cryptographic algorithms, and the hash algorithm is used in the future in configuration compiling selection.
Illustratively, the compiling is configured as an SM3 algorithm, and the SM3 hash algorithm is subjected to padding and iterative compression to generate a hash value, the length of the hash value is 256 bits, and the algorithm is compiled into software.
The symmetric algorithm comprises the steps of reading the current time as a random parameter, acquiring a random number by using a random function, generating a random number with the length of 16 bits as a key of the SM4 symmetric algorithm, and encrypting or decrypting the data by using the key by the symmetric algorithm.
The asymmetric algorithm library contains RSA, ECC and SM2 algorithms, and is also configured by compiling a certain type of algorithm, and an SM2 cryptographic algorithm is used for example, and the SM2 algorithm is compiled into software. SM2 relies on Miracl library function interface, initializes elliptic curve, randomly generates private key, generates public key according to private key, hashes plaintext by hash function, signs or encrypts hash value
The server provides a port for the terminal device, the user writes user information, account passwords and the like through the port, and the user logs in through the account numbers and the passwords. The server communicates with the internal module thereof through the port, the terminal device issues a private communication protocol command, and the server generates a pair of asymmetric algorithm key and symmetric algorithm key, wherein the asymmetric key is used for transmitting symmetric key encryption and certificate license signature. And storing the secret key into a storage area set by the server, issuing a command message for acquiring the secret key by the terminal equipment, taking out the corresponding asymmetric algorithm public key from the storage area set by the server, acquiring symmetric algorithm secret key ciphertext encrypted by the private key, and decrypting by using the public key to acquire the symmetric algorithm secret key. And the user information and the seal are kept and managed in the server.
The terminal device illustratively encrypts the electronic certificate information using a symmetric algorithm and stores it in the server. The specific process is to import the certification template, write in the related certification information, certificate number, grant object name, etc., extract the common template, seal and private object respectively, carry out SM4 symmetric encryption on the object information respectively, generate certification ciphertext, and store the ciphertext in the safe storage device in sequence.
When the electronic certificate is required to be provided, a user logs in a port, issues a certificate issuing request to a server, decrypts a seal in the electronic certificate information, adds time parameter information, maps the seal to a pixel point of a seal graph, marks the image, decrypts by using a symmetric key to obtain a certificate template and private object plaintext information, synthesizes the electronic certificate information into a new electronic certificate, and signs the certificate.
The terminal device obtains the certificate and the signature. And uploading the file hash and the signed electronic evidence to a server. The client can directly carry out signature verification on the certificate by using the public key, and if doubtful, the connectable server carries out comparison verification, thereby ensuring that the certificate is not tampered and can be verified.
The invention also provides a secure electronic certificate issuing device, which comprises:
an electronic certificate information acquisition module for acquiring electronic certificate information,
the target information acquisition module is used for acquiring target information from the electronic certificate information to a signer according to preset requirements, the signer comprises an encryption algorithm and a seal,
the encryption module is used for encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext,
the storage marking module is used for storing the target information and the ciphertext into the seal and marking the target information and the ciphertext as a first seal;
a receiving module for receiving an electronic certificate issuing request,
and the generation module is used for adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
Optionally, before storing the marking module, the method further includes:
a decryption module for decrypting the ciphertext according to the encryption algorithm in the signer to obtain a corresponding plaintext,
correspondingly, the storage marking module is also used for storing the target information, the ciphertext and the plaintext into the seal and marking the second seal.
The device generating module further comprises a step of adding the current time parameter to the second seal to generate a new electronic certificate according to the electronic certificate issuing request.
The device also comprises a hash signing module which hashes the new electronic certificate to generate a hash value and signs the generated new electronic certificate.
The safe electronic certificate issuing device can be used for executing the technical scheme in the embodiment of the safe electronic certificate issuing method, and the implementation principle and the technical effect are similar and are not repeated here.
The terminal equipment provided by the invention can be used for executing the technical scheme in the embodiment of the secure electronic certificate issuing method, and the implementation principle and the technical effect are similar and are not repeated here.
The embodiment of the application also provides a computer readable storage medium, wherein computer executable instructions are stored in the computer readable storage medium, and the computer executable instructions are used for realizing any one of the above safe electronic certificate issuing methods when being executed by a processor.
Embodiments of the present application also provide a computer program product comprising computer-executable instructions for implementing any of the secure electronic certificate issuing methods described above when executed by a processor.
In the specific implementation of the terminal device, it should be understood that the processor may be a central processing unit (english: central Processing Unit, abbreviated as CPU), or may be other general purpose processors, digital signal processors (english: digital Signal Processor, abbreviated as DSP), application specific integrated circuits (english: application Specific Integrated Circuit, abbreviated as ASIC), or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in the processor for execution.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the method embodiments described above may be performed by hardware associated with program instructions. The foregoing program may be stored in a computer readable storage medium. The program, when executed, performs steps including the method embodiments described above; and the aforementioned storage medium includes: read-only memory (ROM), RAM, flash memory, hard disk, solid state disk, magnetic tape, floppy disk, optical disk, and any combination thereof.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A secure electronic certificate issuing method, comprising:
the information of the electronic certificate is obtained,
obtaining target information from the electronic certificate information to a signer according to preset requirements, wherein the signer comprises an encryption algorithm and a seal,
encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext,
storing the target information and the ciphertext into the seal, and marking the seal as a first seal;
a request for issuance of an electronic certificate is received,
and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
2. The secure electronic certificate issuing method according to claim 1, wherein the storing the target information and the ciphertext into the stamp, before marking as a first stamp, further comprises:
decrypting the ciphertext according to an encryption algorithm in the signer to obtain a corresponding plaintext,
correspondingly, the target information, the ciphertext and the plaintext are stored in the seal and marked as a second seal.
3. The method of claim 2, wherein the secure electronic certificate issuing process,
a request for issuance of an electronic certificate is received,
and adding the current time parameter to the second seal to generate a new electronic certificate according to the electronic certificate issuing request.
4. A method of secure electronic certificate issuance according to claim 1 or 3, further comprising: and hashing the new electronic certificate by adopting a hashing algorithm to generate a hash value, and signing the generated new electronic certificate.
5. The secure electronic certificate issuing method according to claim 4, further comprising: and uploading the hash value and the signature to a server.
6. The secure electronic certificate issuing method according to claim 1, wherein the encryption algorithm includes a symmetric encryption algorithm, an asymmetric encryption algorithm, and a hash algorithm.
7. A secure electronic certificate issuing apparatus, comprising:
an electronic certificate information acquisition module for acquiring electronic certificate information,
a target information acquisition module for acquiring target information from the electronic certificate information according to preset requirements to a signer, wherein the signer comprises an encryption algorithm and a seal,
an encryption module for encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext,
the storage marking module is used for storing the target information and the ciphertext into the seal and marking the target information and the ciphertext as a first seal;
a receiving module for receiving an electronic certificate issuing request,
and the generation module is used for adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
8. The secure electronic certificate issuing apparatus according to claim 7, comprising:
before the storing and marking module, the method further comprises:
a decryption module for decrypting the ciphertext according to the encryption algorithm in the signer to obtain a corresponding plaintext,
correspondingly, the storage marking module is also used for storing the target information, the ciphertext and the plaintext into the seal and marking the second seal.
9. A terminal device comprising a memory, a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to:
the information of the electronic certificate is obtained,
obtaining target information from the electronic certificate information to a signer according to preset requirements, wherein the signer comprises an encryption algorithm and a seal,
encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext,
storing the target information and the ciphertext into the seal, and marking the seal as a first seal;
a request for issuance of an electronic certificate is received,
and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
10. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are for implementing the secure electronic certificate issuing method of any one of claims 1 to 6.
CN202011352634.5A 2020-11-26 2020-11-26 Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium Active CN112560050B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011352634.5A CN112560050B (en) 2020-11-26 2020-11-26 Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011352634.5A CN112560050B (en) 2020-11-26 2020-11-26 Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112560050A CN112560050A (en) 2021-03-26
CN112560050B true CN112560050B (en) 2023-05-30

Family

ID=75045965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011352634.5A Active CN112560050B (en) 2020-11-26 2020-11-26 Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112560050B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113221186A (en) * 2021-04-09 2021-08-06 西安慧博文定信息技术有限公司 Signing and signature checking method based on time encryption algorithm

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231331A (en) * 2016-03-23 2017-10-03 阿里巴巴集团控股有限公司 Obtain, issue the implementation method and device of electronic certificate
CN109118229A (en) * 2018-08-24 2019-01-01 长威信息科技发展股份有限公司 A kind of electronics license signature method
JP6465426B1 (en) * 2018-07-20 2019-02-06 Gmoグローバルサイン株式会社 Electronic signature system, certificate issuing system, key management system, and electronic certificate issuing method
CN111291392A (en) * 2020-01-22 2020-06-16 京东数字科技控股有限公司 Electronic signature method and device, electronic equipment and storage medium
CN111506632A (en) * 2020-04-23 2020-08-07 腾讯科技(深圳)有限公司 Data processing method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020144110A1 (en) * 2001-03-28 2002-10-03 Ramanathan Ramanathan Method and apparatus for constructing digital certificates

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231331A (en) * 2016-03-23 2017-10-03 阿里巴巴集团控股有限公司 Obtain, issue the implementation method and device of electronic certificate
JP6465426B1 (en) * 2018-07-20 2019-02-06 Gmoグローバルサイン株式会社 Electronic signature system, certificate issuing system, key management system, and electronic certificate issuing method
CN109118229A (en) * 2018-08-24 2019-01-01 长威信息科技发展股份有限公司 A kind of electronics license signature method
CN111291392A (en) * 2020-01-22 2020-06-16 京东数字科技控股有限公司 Electronic signature method and device, electronic equipment and storage medium
CN111506632A (en) * 2020-04-23 2020-08-07 腾讯科技(深圳)有限公司 Data processing method and device

Also Published As

Publication number Publication date
CN112560050A (en) 2021-03-26

Similar Documents

Publication Publication Date Title
CN107483212B (en) Method for generating digital signature by cooperation of two parties
US9853816B2 (en) Credential validation
JP4870155B2 (en) Electronic passport authentication protocol with enhanced privacy
KR101658501B1 (en) Digital signature service system based on hash function and method thereof
CA2976795C (en) Implicitly certified digital signatures
US20190007215A1 (en) In-vehicle information communication system and authentication method
US20110093714A1 (en) Systems and methods for asymmetric cryptographic accessory authentication
CN106452770B (en) Data encryption method, data decryption method, device and system
CN109829269A (en) Method, apparatus and system based on E-seal authenticating electronic documents
US20060225126A1 (en) Securely using a display to exchange information
CN108900528B (en) Block chain real-name authentication method, device, equipment and storage medium
US9143323B2 (en) Securing a link between two devices
CN101247605A (en) Short information enciphering and endorsement method, mobile terminal and short information ciphering system
WO2016086788A1 (en) Method and apparatus for encrypting/decrypting data on mobile terminal
CN109068322B (en) Decryption method, system, mobile terminal, server and storage medium
CN107333263B (en) Improved SIM card and mobile communication identity recognition method and system
WO2012075764A1 (en) Method for storing key parameters and terminal device
CN109391473B (en) Electronic signature method, device and storage medium
CN114257562B (en) Instant messaging method, device, electronic equipment and computer readable storage medium
CN112560050B (en) Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium
CN107947939A (en) Support the PDF endorsement methods and system of SM3 cryptographic Hash algorithm and SM2 Digital Signature Algorithms
CN111177748A (en) Fingerprint storage encryption method, device and system
CN113392418B (en) Data deployment method and device, computer readable storage medium, deployment device and user side
CN113918970A (en) Data processing method, communication device and storage medium
Baek et al. Secure and lightweight authentication protocol for NFC tag based services

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant