CA2986828A1 - Data recording method, device and system, and computer storage medium - Google Patents

Data recording method, device and system, and computer storage medium

Info

Publication number
CA2986828A1
CA2986828A1 CA2986828A CA2986828A CA2986828A1 CA 2986828 A1 CA2986828 A1 CA 2986828A1 CA 2986828 A CA2986828 A CA 2986828A CA 2986828 A CA2986828 A CA 2986828A CA 2986828 A1 CA2986828 A1 CA 2986828A1
Authority
CA
Canada
Prior art keywords
data
key
image
embedded
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CA2986828A
Other languages
French (fr)
Inventor
Yi Zhang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
10353744 Canada Ltd
Original Assignee
10353744 Canada Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 10353744 Canada Ltd filed Critical 10353744 Canada Ltd
Priority to PCT/CN2015/078141 priority Critical patent/WO2016172982A1/en
Publication of CA2986828A1 publication Critical patent/CA2986828A1/en
Application status is Pending legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Abstract

A data recording method, device and system, and a computer storage medium. The method comprises: collecting data of each state of each party in an e-commerce transaction (202); generating an image according to the collected data (204); obtaining a key of the data (206); correspondingly storing the collected data and the key of the data (208); embedding the key within the image (210); storing the image having the embedded key (212); performing digital signing on the image having the embedded key to generate a data image electronic certificate (214); generating check data with regard to the image having the embedded key (216); storing the check data (218). In the data recording method, device and system, and the computer storage medium, digital signing is performed on the image having the embedded key to generate the data image electronic certificate, it is not easy to tamper with the generated image and the data image electronic certificate, the data and the key are correspondingly stored, and the image having the embedded key and the check data are stored separately, not easily obtained at the same time, subject to multiple instances of security protection, and highly secure.

Description

2 PCT/CN2015/078141 Title: DATA RECORDING METHOD, DEVICE AND SYSTEM, AND COMPUTER
STORAGE MEDIUM
Technical Field The present invention relates to data process field, especially to data process method, device and system, and computer storage medium.
Background Technology With the development of network technology, the continuous development of e-commerce, the traditional use of various kinds of objects, tickets, receipts, etc. are replaced by electronic, its manifestations are mainly three kinds: character data, image data and streaming media data. The kind of e-commerce activity is replaced by the image data, the image represents the actual attribute of the item, and the security is important in the e-commerce activity.
Traditional e-commerce activities used in the electronic certificate image goods can be copied freely, or even tamper with low security.
Summary of the invention Based on this, it is necessary to improve the security of data in the e-commerce activities by providing data recording method, device and system, and computer storage medium for solving the problem that the data in the traditional e-commerce activity is easily copied and tampered.
The data recording method comprises:
Collecting the data of the state of each e-commerce transaction party;
Generating the image based on the collected data;
Obtaining the key of the said data;
Storing the collected data and the key of the said data;
Embedding the key in the image;
Storing the image that is embedded into the key;
Generating the data image electronic certificate by digitally signing the embedded image;
Generating check data for the embedded image of the key;
Storing the said check data.
The data recording device comprises:
The collection module for collecting the data of each state of each party in e-commerce transactions;
The image generation module for generating an image based on the collected data;

The key generation module for acquiring the key of the said data;
The storage module for storing the collected data and the key of the said data;
The embedding module for embedding the key in the said image;
The memory module is further configured to store the image that is embedded into the key;
The digital signature module for digitally signing the image that is embedded into the key to generate a data image electronic certificate;
The check generation module for generating check data for the image that is embedded into the key;
The memory module is further configured to store the check data.
The data recording system comprises an image generation processing server, a verification server, a signature server and a cloud database server connected to each other through a network;
The image generation processing server is used for collecting the data of each state of each party in the e-commerce transaction and generating the image based on the collected data and acquiring the key of the data, embedding the key in the image;
The verification server for generating check data for the image that is embedded into the key;
The signature server for digitally signing the image that is embedded into the key to generate a data image electronic certificate;
The said cloud database server for storing the data and the key correspondingly and storing the embedded image and the check data.
One or more computer storage media contains computer-executable instructions, the said computer executable instruction is used for executing a kind of data recording method, and the method comprises the following steps:
Collecting the data of the state of each e-commerce transaction party;
Generating an image based on the collected data;
Obtaining the key of the said data;
Storing the collected data and the key of the said data;
Embedding the key in the image;
Store the image that is embedded into the key;
The image that is embedded into the key is digitally signed to generate a data image electronic certificate;
Generating check data for the embedded image of the key;
Storing the said check data.
The aforesaid data recording method, device and system, and the computer storage medium, convert the data into the image and embeds the key of the data into the image, digital signing is performed on the image having the embedded key to generate the data image electronic certificate, it is not easy to tamper with the generated image and the data image electronic certificate, the data and the key are correspondingly stored, and the image having the embedded key and the check data are stored separately, not easily obtained at the same time, subject to multiple instances of security protection, and highly secure. The data of each state of each party in the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixed, which ensure the continuity and integrity of the data. The generated data image electronic certificate can be circulated in various electronic devices, through the background authentication system to identify its authenticity; after identifying the authenticity, and then extracted the important transaction state data from the image.
Brief Description Figure 1 is an architectural block diagram of the data recording system in one example;
Figure 2 is a flow chart of the data recording method in one example;
Figure 3 is a block diagram of the structure of the data recording device in one example;
Figure 4 is an internal schematic diagram of the server in one example.
Description of the Preferred Examples The present invention will be described in further detail with reference to the accompanying drawings and the accompanying examples, so as to describe the invention purposes, technical solutions and advantages more clearly. It is to be understood that the specific examples described herein are merely illustrative of the invention and are not intended to limit the invention.
Figure 1 is an architectural block diagram of the data recording system in one example. As shown in Figure 1, the data recording system includes an image generation processing server 110, a verification server 120, a digital certificate management server 130, a signature server 140, and a cloud database server 150. The image generation processing server 110, the verification server 120, the digital certificate management server 130, the signature server 140, and the cloud database server 150 are connected via a local area network and connected to the Internet 170 through the firewall 160.
The image generation processing server 110 collects the data of the respective states in the e-commerce transaction and generates an image based on the collected data and acquires the key of the data to embed the key in the image.
Specifically, the data of each state of each party in the e-commerce transaction may include the warehouse information, the generated order information, the delivery information, and the goods receipt information. The end of the transaction and the ownership of the goods and other information. Among them, the warehouse information can include the items belong to the warehouse, such as No. 1 Warehouse, ABC Building, Futian District, Shenzhen.
The order information can include order generation time, item information in order, order number, and

3 consignee information. The consignee information may include the consignee's name, the consignee's address, and the consignee's contact details. The shipping information may include the name of the logistics company, the invoice number, the delivery time, and the consignee information. The consignor information may include the name of the consignor, the address of the consignor, and the contact information of the consignor. The receipt information may include receipt information, and receipt time. The signer information can sign the recipient name, picture, ID information and so on.
The data of each state of each party in the e-commerce transaction may be generated in various aspects and stored on the cloud database server 150.
The image generation processing server 110 may obtain data of each state in the e-commerce transaction from the cloud database server 150.
In one example, the image generation processing server 110 is further configured to generate a key for the data using an order number, or a key for generating the data using an order number and a system clock.
Specifically, the key of the data is generated by the order number, and the key of the data may be the same as the order number. Using the order number and the system clock to generate the data key, you can obtain the MD5 value after calculating the order number and the system clock to generate the corresponding key. The key can also be a UUID (Universally Unique Identifier) algorithm. The UUID refers to the number generated on a machine, which guarantees that all machines in the same space and time are unique. The key can be represented by 8-bit, 16-bit, 32-bit, 64-bit, and so on. Using the order number or order number and the system to generate data key, simple and convenient, and high security.
In one example, the image generation processing server 110 is also used to add the key to the binary code of the image.
Specifically, the key is a character that embeds the key in the binary code of the image, and the specific typing location may be at the head of the image binary code, either in the middle or in the tail, as long as the original image file is not destroyed.
The verification server 120 is configured to generate the check data for the image that is embedded into the key.
Specifically, the verification server 120 may generate a check data by performing a function operation on an image that is embedded into the key by other algorithms such as a hash algorithm.
The digital certificate management server 130 is used to provide a digital certificate. The data certificate management server 130 is used to issue and manage digital certificates. The digital certificates can be used to encrypt, sign and so on.
The signature server 140 is used to digitally sign an image that is embedded into the key to

4 generate a data image electronic certificate.
In particular, the signature server 140 is further configured to digitally generate an electronic image of the data image by digitally signing the embedded image with the supplied digital certificate.
The digital signature is a generic physical signature similar to that written on paper, but uses a technique of public key encryption to identify digital information. A set of digital signatures usually defines two complementary operations, one for signing and the other for authentication. The digital signature is to encrypt the digest information with the sender's private key and send it to the recipient along with the original text. The recipient can decrypt the encrypted digest information only with the public key of the sender, and then use the hash function to generate a summary information on the original text received, compared with the deciphered summary information, if the same, then the received information is complete, but has not been modified in the transmission process, otherwise the information has been modified, so the digital signature can verify the integrity of the information. There are many digital signature algorithms, which can be RSA (public key encryption algorithm), ECC, and so on. RSA public key encryption algorithm was introduced in 1977 by Ron Rivest, Adi Sliamir and Leonard Adleman. ECC is an elliptic encryption algorithm, which is a public key cryptography system, originally proposed by Kobiitz and Miller in 1985, whose mathematical basis is to use the rational points on the elliptic curve to compose the calculation of elliptic discrete logarithms on Abel additive group.
The cloud database server 150 stores the data and the key corresponding to the image and the check data that is embedded into the key.
The digital certificate management server 130 may not be included in other data recording systems.
In the data recording system converts the data into the image and embeds the key of the data into the image, digital signing is performed on the image having the embedded key to generate the data image electronic certificate, it is not easy to tamper with the generated image and the data image electronic certificate, the data and the key are correspondingly stored, and the image having the embedded key and the check data are stored separately, not easily obtained at the same time, subject to multiple instances of security protection, and highly secure. The data of each state of each party in the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixed to ensure the continuity and integrity of the data. The generated data image can be circulated in various electronic devices, the background authentication system is used to identify its true #, and then identify the authenticity, and then extracted from the image of the transaction state of important data.
Figure 2 is a flow chart of the number of examples: a recording method. As shown in Figure 2, the data recording method includes:
Step 202, and collects the data of each state of the parties.
Specifically, the data of each state in the e-commerce transaction may include information such as the warehouse information, the generation order information, the delivery information, the end of the goods receipt transaction, and the ownership of the goods. Among them, the warehouse information can include the items belong to the warehouse, such as No. 1 Warehouse, ABC
Building, Futian District, Shenzhen. The order information can include order generation time, item information in order, order number, and consignee information. The consignee information may include the name of the consignee, and the consignee address of the consignee.
The shipping information may include the name of the logistics company, the delivery time, and the consignor information. The consignor information may include the name of the consignor, the address of the consignor, and the contact information of the consignor. The receipt information may include receipt information, and receipt time. The signer information can sign the recipient name, picture, ID information and so on.
The data of each state of the each party in the transaction can be generated in all aspects and stored on the cloud database server.
Step 204 generates an image based on the collected data.
Step 206 obtains the key of the data.
In one example, the step of obtaining the key of the data comprises:
generating the key of the data using the order number; or generating the key of the data using the order number and the system clock.
Specifically, the key of the data is generated using the order number, and the key of the data can be the same as the order number. Using the order number and the system clock to generate the data key, you can obtain the MD5 value after calculating the order number and the system clock to generate the corresponding key. The key can also be generated using the UUID
algorithm, which is a number generated on a machine that guarantees that all machines in the same space are unique.
The key can be represented by 8-bit, 16-bit, 32-bit, 64-bit, and so on. Using the order number or order number and the system to generate data key, simple and convenient, and high security.
In Step 208, the collected data is stored corresponding to the key of the data.
Specifically, the collected data and the data key are stored in the cloud database server together.
Step 210, embedding the key in the image.
In one example, the step of embedding the key in the image comprises adding the key to the binary code of the image.
Specifically, the key is a string in which the key can be embedded in the binary code of the image, and the specific typing position may be at the head of the image binary code, either in the middle or in the tail, as long as the original image file is not destroyed.
In Step 212, an image that is embedded into the key is stored.
In Step 214, the data of the embedded key is digitally signed to generate a data image electronic certificate.
Specifically, a data signature electronic certificate is generated by digitally signing the embedded image with a digital certificate provided in advance.
Digital signatures are many ways, through RSA, ECC and other algorithms to achieve.
In Step 216, the check data is generated for the image that is embedded into the key.
The algorithm is used to generate the calibration data for the image embedded with the key by using other algorithms such as hash algorithm.
Step 218 stores the check data.
The data recording method, converts the data into the image and embeds the key of the data into the image, digital signing is performed on the image having the embedded key to generate the data image electronic certificate, it is not easy to tamper with the generated image and the data image electronic certificate, the data and the key are correspondingly stored, and the image having the embedded key and the check data are stored separately, not easily obtained at the same time, subject to multiple instances of security protection, and highly secure. The data of each state of each party in the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixed, which ensure the continuity and integrity of the data. The generated data image electronic certificate can be circulated in various electronic devices, through the background authentication system to identify its authenticity; after identifying the authenticity, and then extracted the important transaction state data from the image.
Figure 3 is a block diagram showing the structure of the data recording device in one example.
As show in Figure 3, the data recording device includes an acquisition module 310, an image generation module 320, a key generation module 330, an embedding module 340, a digital signature module 350, a check generation module 360, and a storage module 370. Among them:
The collection module 310 is used to collect the data of the respective states of each party.
Specifically, the data of each state in the e-commerce transaction may include warehouse information, information such as order information, shipping information, receipt information, end of transaction, and ownership of the goods. Among them, the warehouse information can include the items belong to the warehouse, such as No. 1 Warehouse, ABC Building, Futian District, Shenzhen. The order information can include order generation time, item information in order, order number, and consignee information. The consignee information may include the consignee's name, the consignee's address, and the consignee's contact details. The shipping information may include the name of the logistics company, the invoice number, the delivery time, and the consignee information. The consignor information may include the name of the consignor, the address of the consignor, the contact information of the consignor, etc.) The goods receipt information may include the receipt information, and the receipt time. The signer information can sign the recipient name, picture, ID information and so on.
The image generation module 320 is configured to generate the image based on the collected data.
The key acquisition module 330 is used to acquire the key of the data.
In one example, the key acquisition module 330 is also used to generate the key for the data using the order number, or to generate the key of the data using the order number and the system clock.
Specifically, the key of the data is generated using the order number, and the key of the data can be the same as the order number. Using the order number and the system clock to generate the data key, you can obtain the MD5 value after calculating the order number and the system clock to generate the corresponding key. The key can also be generated using the UUID
algorithm, which is a number generated on a machine that guarantees that all machines in the same space are unique.
The key can be represented by 8-bit, 16-bit, 32-bit, 64-bit, and so on. Using the order number or order number and the system to generate data key, simple and convenient, and high security.
The storage module 370 is used to store the collected data and the key of the data.
The embedding module 340 is used to embed the key in the image.
In one example, the embedding module 340 is also used to add the key to the binary code of the image. Specifically, the key is a string in which the key can be embedded in the binary code of the image, and the specific typing position may be at the head of the image binary code, either in the middle or in the tail, as long as the original image file is not destroyed.
The storage module 370 is also used to store an image of the embedded key.
The digital signature module 350 is used for digitally signing the embedded image to generate the data image electronic certificate. Specifically, a data signature electronic certificate is generated by digitally signing the embedded image with a digital certificate provided in advance. There are many digital signature algorithms, such as RSA, ECC and other algorithms.
The verification generation module 360 is used to generate the check data for the image that is embedded into the key. The algorithm is used to generate the calibration data for the image embedded with the key by using other algorithms such as hash algorithm.
The storage module 370 is used to store the check data.
The aforesaid data recording method converts the data into the image and embeds the key of the data into the image, digital signing is performed on the image having the embedded key to generate the data image electronic certificate, it is not easy to tamper with the generated image and the data image electronic certificate, the data and the key are correspondingly stored, and the image having the embedded key and the check data are stored separately, not easily obtained at the same time, subject to multiple instances of security protection, and highly secure.
The data of each state of each party in the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixed, which ensure the continuity and integrity of the data. The generated data image electronic certificate can be circulated in various electronic devices, through the background authentication system to identify its authenticity; after identifying the authenticity, and then extracted the important transaction state data from the image.
Figure 4 is an internal schematic diagram of the server in one example. As shown in Figure 4, it is the internal structure of a server in one of the examples including a processor, a storage medium, a memory, and a network interface connected via a system bus. Wherein the storage medium of the server stores operating system, database and data recording device for storing data, keys, images and check data in the quotient transaction, and the data recording device for realizing a data applicable to a server Data record method. The processor of the server is used to provide calculation and control capabilities to support the operation of the entire server. The memory of the server provides an environment for the operation of the network transaction information processing device in the storage medium. The display screen of the server may be a liquid crystal display screen or an electronic ink display screen. The input device may be a touch layer covered on the display screen or a button, a trackball or a touch panel provided on the terminal housing, or an external keyboard, touch pad or mouse. The network interface of the server is used to communicate with an external terminal over a network connection, such as a request sent by the receiving terminal and to return data to the terminal. The server can be implemented as a separate server or a server cluster of multiple servers.
The ordinary technicians in the field that can understand and implement all or part of the processes in the above mentioned method of the examples which can be accomplished by means of a computer program that can be stored in a computer-readable storage medium.
The program may, when executed, include flows of all examples as described above. Among them, the storage medium can be a magnetic disk, an optical disk, a read-only memory (ROM) or a random access memory (RAM), etc.
The above-described examples show only a few methods of execution of the present invention, and its descriptions are comparatively specific and detailed, however, it can not to be construed as a limitation of the scope of the invention patent. It should be noted that various modifications and improvements can be made by those skilled in the field without departing froth the inventive concept, which belong to the protection scope of the present invention.
Accordingly, the protection scope of patent of the present invention should be measured by the appended claims.

Claims (17)

The Claims
1. The data recording method characterized by comprising:
Collecting the data of the state of each e-commerce transaction party;
Generating an image based on the collected data;
Obtaining the key of the said data;
Storing the collected data and the key of the said data;
Embedding the key in the image;
Storing the image that is embedded into the key;
Generating the data image electronic certificate by digitally signing the embedded image;
Generating check data for the embedded image of the key;
Storing the said check data.
2. The data recording method according to Claim 1, characterized in that said Step of acquiring a key of said data comprises:
Generating a key of the data using an order number;
Or the key of the data is generated using the order number and the system clock.
3. The data recording method according to Claim 1 or 2, characterized in that the step of embedding the key in the image comprises:
Adding the key to the binary code of the image.
4. The data recording method according to Claim 1 or 2, characterized in that the step of generating the check data for the image that is embedded into the key comprises:
The calibration data is generated by the hash algorithm for the image that is embedded into the key.
5. The data recording device, comprising:
The collection module for collecting the data of each state of each party in e-commerce transactions;
An image generation module for generating an image based on the collected data; a key acquisition module for acquiring a key of the data; a storage module for storing the collected data and the key of the data;
The embedding module for embedding the key in the said image;
The memory module is further configured to store the image that is embedded into the key;
The digital signature module for digitally signing the image that is embedded into the key to generate a data image electronic certificate;
The check generation module for generating check data for the image that is embedded into the key;

The memory module is further configured to store the check data.
6. The data recording device according to Claim 5, wherein the key acquisition module is further configured to generate a key of the data using an order number or to generate the data using an order number and a system clock Key.
7. The data recording device according to Claim 5 or 6, wherein said embedding module is further adapted to add said key to the binary code of said image.
8. The data recording device according to Claim 5 or 6, wherein the check generation module is further configured to generate a check result by a hash algorithm for an image that is embedded into the key.
9. The data recording system comprising: an image generation processing server, a verification server, a signature server, and a cloud database server connected to each other through a network;
The image generation processing server is used for collecting the data of each state of each party in the e-commerce transaction and generating the image based on the collected data and acquiring the key of the data, embedding the key in the image ;
The verification server for generating check data for the image that is embedded into the key;
The signature service being adapted to digitally generate an electronic image of the data image by digitally signing the embedded key image;
The cloud database server is used to store the data and the key correspondingly and store the image and the verification data embedded in the key.
10. The data recording system according to Claim 9, wherein the image generation processing server is further configured to generate a key of the data using an order number or to generate the data using an order number and a system clock Key.
11. The data recording system according to Claim 9 or 10, wherein the image generation processing server is further configured to add the key to the binary code of the image.
12. The data recording system according to Claim 9 or 10, characterized in that said data recording system further comprises:
The digital certificate management server for providing a digital certificate;
The signature server is further configured to digitally generate an electronic image of the data image by digitally signing the embedded key image using the provided digital certificate.
13. The data recording system according to Claim 9 or 10, wherein the image generation processing server is further configured to generate check data by a hash algorithm for an image in which a key is embedded.
14. One or more computer storage media containing computer-executable instructions for executing a network transaction information processing method, which characterized in that the method including the following steps:

Collecting the data of the state of each e-commerce transaction parties;
Generating an image based on the collected data;
Obtaining the key of the said data;
Storing the collected data and the key of the said data;
Embedding the key in the image;
Storing the image that is embedded into the key;
Generating the data image electronic certificate by digitally signing the embedded image;
Generating check data for the embedded image of the key;
Storing the said check data.
15. The general machine storage medium according to Claim 14, wherein said Step of acquiring a key of said data comprises:
Generating a key of the data using an order number;
Or the key of the data is generated using the order number and the system clock.
16. A computer storage medium according to Claim 14 or 15, characterized in that the step of embedding said key in said image comprises:
Adding the key to the binary code of the image.
17. The computer storage medium according to Claim 14 or 15, characterized in that the step of generating the check data for the image that is embedded into the key comprises:
The calibration data is generated by the hash algorithm for the image that is embedded into the key.
CA2986828A 2015-04-30 2015-04-30 Data recording method, device and system, and computer storage medium Pending CA2986828A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/078141 WO2016172982A1 (en) 2015-04-30 2015-04-30 Data recording method, device and system, and computer storage medium

Publications (1)

Publication Number Publication Date
CA2986828A1 true CA2986828A1 (en) 2016-11-03

Family

ID=57198000

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2986828A Pending CA2986828A1 (en) 2015-04-30 2015-04-30 Data recording method, device and system, and computer storage medium

Country Status (3)

Country Link
CN (1) CN106415588A (en)
CA (1) CA2986828A1 (en)
WO (1) WO2016172982A1 (en)

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5436970A (en) * 1993-02-18 1995-07-25 Eastman Kodak Company Method and apparatus for transaction card verification
EP1196913B1 (en) * 1999-05-17 2007-02-21 Samsung Electronics Co., Ltd. Digital image watermarking method
JP2004536504A (en) * 2001-06-25 2004-12-02 ジェイピー・モーガン・チェイス・バンク System and method for issuing electronic vouchers and electronic vouchers
CN101409813A (en) * 2007-10-08 2009-04-15 诚 陈 Image encoding method for preventing and identifying image tamper
CN101222334B (en) * 2008-01-11 2010-08-04 华中科技大学 Cipher token safety authentication method adopting picture interference
CN101847249A (en) * 2009-03-27 2010-09-29 上海德通能源环保科技有限公司 Method for implementing image digital watermark
CN101763613B (en) * 2009-10-23 2012-08-29 北京派瑞根科技开发有限公司 Method for signing on mixed electronic bill
US9355389B2 (en) * 2010-12-06 2016-05-31 Voltage Security, Inc. Purchase transaction system with encrypted payment card data
CN104077624A (en) * 2013-03-26 2014-10-01 中国银联股份有限公司 Methods and systems for generating and checking electronic note with anti-counterfeiting two-dimension code

Also Published As

Publication number Publication date
WO2016172982A1 (en) 2016-11-03
CN106415588A (en) 2017-02-15

Similar Documents

Publication Publication Date Title
Sundareswaran et al. Ensuring distributed accountability for data sharing in the cloud
US8078878B2 (en) Securing documents with electronic signatures
US8583931B2 (en) Electronic signing apparatus and methods
JP4622811B2 (en) Authenticity assurance system of electronic document
US6301660B1 (en) Computer system for protecting a file and a method for protecting a file
EP1055989A1 (en) System for digitally signing a document
US6725373B2 (en) Method and apparatus for verifying the integrity of digital objects using signed manifests
EP1056014A1 (en) System for providing a trustworthy user interface
US8983076B2 (en) Methods and apparatus for key delivery in HTTP live streaming
US20130166906A1 (en) Methods and Apparatus for Integrating Digital Rights Management (DRM) Systems with Native HTTP Live Streaming
US7167986B2 (en) Upgradeable timestamp mechanism
US20070016785A1 (en) System and method for digital signature and authentication
US20120308003A1 (en) Authentic barcodes using digital signatures
US20090006860A1 (en) Generating multiple seals for electronic data
JP2012530391A (en) Secure private backup storage and processing for computing services trusted and data services
JP2006157914A (en) Document authentication method, detectable document generation method and apparatus and program
JP2012518330A (en) Of highly reliable cloud computing and cloud services framework
KR20060006770A (en) Long-term secure digital signatures
WO2007106280A1 (en) Generation of electronic signatures
US9317715B2 (en) Data protection compliant deletion of personally identifiable information
AU2012211684A1 (en) Creation of signatures for authenticating applications
US9009477B2 (en) Archiving electronic content having digital signatures
WO2010053999A1 (en) Methods and systems for allocating and indicating trustworthiness of secure communications
US20140019761A1 (en) Self-contained electronic signature
US20090031135A1 (en) Tamper Proof Seal For An Electronic Document