CN100505621C - Method for digital signature locking localization - Google Patents

Method for digital signature locking localization Download PDF

Info

Publication number
CN100505621C
CN100505621C CNB2005100258902A CN200510025890A CN100505621C CN 100505621 C CN100505621 C CN 100505621C CN B2005100258902 A CNB2005100258902 A CN B2005100258902A CN 200510025890 A CN200510025890 A CN 200510025890A CN 100505621 C CN100505621 C CN 100505621C
Authority
CN
China
Prior art keywords
document
digital signature
data
signature
digital
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005100258902A
Other languages
Chinese (zh)
Other versions
CN1694399A (en
Inventor
李嫚
陈少鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI LONGFANG INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI LONGFANG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI LONGFANG INFORMATION TECHNOLOGY Co Ltd filed Critical SHANGHAI LONGFANG INFORMATION TECHNOLOGY Co Ltd
Priority to CNB2005100258902A priority Critical patent/CN100505621C/en
Publication of CN1694399A publication Critical patent/CN1694399A/en
Application granted granted Critical
Publication of CN100505621C publication Critical patent/CN100505621C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

This invention relates to a digital signature locking domain including a digital signature generation method and a verification method, among which, the generation method includes: collecting information of the locking domain, carrying out data clearing operation and normalized conversion operation, computing abstracts one by one, carrying out data merging operation, digital signature operation and inserting the digital signature objects into the documentation. The verification method includes: collecting locking domain information, carrying out data clearing operation and normalized conversion operation, computing abstracts one by one, carrying out data merge operation, digital signature verification to get the verification result.

Description

The method of digital signature locking localization
Technical field
The present invention relates to field of computer information security, particularly computer document digital signature field specifically is meant a kind of method of digital signature locking localization.
Background technology
In the modern life, computer more and more becomes people's necessary tool, and simultaneously also more and more higher for the requirement of computer information safe, particularly for computer document digital signature and authentication, that uses especially is very extensive.
And in real life and work, a file needs the situation of signature more than two and two can be found everywhere, but a lot of digital signature products, the notion that does not possess locking localization, their signature is write fully extremely in the middle of program, giving tacit consent to whole file is the object of signature, this means that a file can only have a signature; In case because file has any change, such as adding second signature, first signature just lost efficacy immediately, added the 3rd signature again, second signature also can lose efficacy; So, on the one hand, people must continue to use the mode of written signature when a plurality of people of needs are to a file signature; On the other hand, do not realize multi-level signature, just can not allow people free from written signature fully, the meaning of digital signature is seen clumsy with regard to phase shape, and its function as the protected data integrality is all gone simultaneously, has used and need not have what difference.
Summary of the invention
The objective of the invention is to have overcome above-mentioned shortcoming of the prior art, provide a kind of with the binding of digital signature control and document locking localization, can support that same document is signed at many levels, the method for safe and efficient, compatible strong, widely applicable digital signature locking localization.
In order to realize above-mentioned purpose, the method for digital signature locking localization of the present invention is as follows:
The method of this digital signature locking localization comprises digital signature generation method and digital signature authentication method, and its main feature is that described digital signature generation method may further comprise the steps:
(1) the locking localization information of the collection control that bears the signature from document;
(2) the locking localization information of collecting is carried out the data scrubbing operation;
(3) to the locking localization information after the data scrubbing operation of the carrying out conversion operations that standardizes;
(4) each locking localization information behind the conversion operations that standardizes is calculated the summary operation one by one;
(5) carry out the operation of data union operation to calculating the pairing data of each locking localization that obtain after the summary operation, generate data;
(6) resulting data are carried out the digital signature arithmetic operation according to the algorithm of appointment in the customer digital certificate;
(7) the digital signature object that produces in the step (6) is embedded document function, become the part of document content, and demonstrate the digital signature information of intuitive according to the display packing of corresponding system;
Described digital signature authentication method may further comprise the steps:
(1) the locking localization information of the collection control that bears the signature from document;
(2) the locking localization information of collecting is carried out the data scrubbing operation;
(3) to the locking localization information after the data scrubbing operation of the carrying out conversion operations that standardizes;
(4) each locking localization information behind the conversion operations that standardizes is calculated the summary operation one by one;
(5) carry out the operation of data union operation to calculating the pairing data of each locking localization that obtain after the summary operation, generate data;
(6) resulting data are carried out digital signature verification operations according to user's employed algorithm when carrying out digital signature;
(7) result according to digital signature verification operations draws the signature verification result;
Described locking localization is a part of content of binding mutually with the digital signature control of user's appointment in the document, and described locking localization information comprises the content of the sign and the locking localization of locking localization.
In the digital signature generation method of the method for this digital signature locking localization, after the pairing data of each locking localization being carried out the operation of data union operation, also comprise the processing operation of importing digital seal.
The processing operation of the importing digital seal of the method for this digital signature locking localization may further comprise the steps:
(1) to the digital sealing conversion operations that standardizes;
(2) the digital sealing information behind the conversion operations that standardizes is calculated the summary operation.
In the digital signature authentication method of the method for this digital signature locking localization, after the pairing data of each locking localization being carried out the operation of data union operation, also comprise the processing operation that the former data of digital sealing that embed in the document are carried out, when carrying out digital signature verification operations, also comprise the verification operation of digital sealing and the verification operation of digital certificate.
The processing operation that the former data of digital sealing to embedding in the document of the method for this digital signature locking localization are carried out may further comprise the steps:
(1) to the former data of the digital sealing conversion operations that standardizes;
(2) the digital sealing information behind the conversion operations that standardizes is calculated the summary operation.
The verification operation of the digital certificate of the method for this digital signature locking localization comprises to the checking of the term of validity of digital certificate with to the checking of the effective status of digital certificate.
The method to the checking of the effective status of digital certificate of the method for this digital signature locking localization comprises:
(1) carries out the certificate validity checking by certificate revocation list CRL; And/or
(2) carry out the certificate validity checking by real-time online certificate status OCSP.
The locking localization information of the method for this digital signature locking localization comprises the content of the sign and the locking localization of locking localization.
The content of the locking localization of the method for this digital signature locking localization comprises:
(1) one section text;
(2) content of entire document;
(3) picture of various different-formats;
(4) whole form;
(5) certain cell in the form;
(6) a part of cell in the form;
Data content on (7) charts and the chart;
(8) objects that are embedded in the document;
(9) objects that in document, connect;
(10) another signature control.
The object in the document of being embedded in of the method for this digital signature locking localization comprises the Excel form that is embedded in the MS Word document, is embedded in another Word document in the MS Word document, is embedded in another MS Excel document in the MS Excel document or is embedded in MS Word document in the MS Excel document.
The object that connects in the document of the method for this digital signature locking localization is meant that the content of object of connection is not in this document, but pass through annexation, the content that can in this document, show connecting object, be included in and be connected to an external Excel form document or another one MS Word file in the MSWord document, perhaps in MS Excel document, be connected to an external MS Word file or another one MS Excel file, perhaps in a Web form, be connected to another one Web form.
The data scrubbing operation of the method for this digital signature locking localization may further comprise the steps:
(1) data beyond the locking localization content is got rid of;
(2) data redundant in the locking localization content are got rid of.
The data of the redundancy of the method for this digital signature locking localization comprise attribute, space, some labels, the identifier of some objects in the document.
Algorithm in the standardization conversion operations of the method for this digital signature locking localization be W3C (Chinese is: the normative translation algorithm of appointment in XML digital signature standard World Wide Web Consortium), the converting objects in XML document is the XML element; Converting objects in the Office document is text, picture, com object, ole object; Converting objects in html document is the html element element.
What the calculating summary operation of the method for this digital signature locking localization was adopted is MD5, SHA-1, SHA-256, SHA-512 algorithm.
In the operation of the data union operation of the method for this digital signature locking localization, the merge algorithm of XML signature is meant algorithm according to appointment in the XML digital signature standard of W3C; Merge algorithm to Office and html document is the data structure of setting with an oblique type Merkle, by merging from level to level, draws the data after overall the merging at last.
The algorithm of appointment comprises RSA Algorithm and DSA algorithm in the customer digital certificate of the method for this digital signature locking localization.
The digital signature object being embedded in the document function of the method for this digital signature locking localization is that method with the COM control is embedded in the document to the digital signature in the Office document, becomes the part of document; To XML document, digital signature wherein is an XML digital signature standard XML element of following W3C fully; To html document, digital signature wherein is that one section layer that floats is directly embedded in the html web page.
The digital signature information of the intuitive of the method for this digital signature locking localization comprises user's name, signature timestamp, locking localization tabulation, signature value, signature algorithm, seal information, the certificate information that is comprised in the signature object.
Adopted the method for the digital signature locking localization of this invention, owing to realized the binding of the digital signature control of locking localization in the document and user's appointment, the user is before signature, can specify the content that oneself will lock, legally, user's signature a part at locking localization, that is to say, content within the customer acceptance locking localization scope, and to its signature with the statement and the protection, in case any part has been changed in the locking localization, even be a numeral and punctuation mark, signature all can lose efficacy immediately; Simultaneously, because a signature control can be bound one or more locking localizations, and locking localization can be whole file content, it also can be one or more part, therefore do not lock under the condition of whole file content at a signature, even if the content of entire document has been changed to some extent, but as long as the content within the locking localization scope is not changed, user's signature still effectively.In other words, second user can also operate in same document, only otherwise within the locking localization of first user's signature, just do not influence the validity of first people's signature, so this method can be supported the multilayer signature; And the document that this method is supported comprises Office document, XML document and html document, the algorithm stability and high efficiency, and the scope of application is wider.
Description of drawings
Fig. 1 is the flow chart of digital signature generation method in the method for digital signature locking localization of the present invention.
Fig. 2 is the process schematic diagram of the data merge algorithm of Office and html document in the method for digital signature locking localization of the present invention.
Fig. 3 is the flow chart of digital signature authentication method in the method for digital signature locking localization of the present invention.
Embodiment
In order more to be expressly understood technology contents of the present invention, describe in detail especially exemplified by following examples.
At first introduce several notions:
Locking localization is with a part of content in the document, with the digital signature control binding of user's appointment.By the notion of locking localization, the user can specify the content that oneself will lock before signature; legally, user's signature a part at locking localization, that is to say; content within the customer acceptance locking localization scope, and to its signature with the statement and the protection.In case any part has been changed in the locking localization, even be a numeral and punctuation mark, signature all can lose efficacy immediately.
A signature control can be bound one or more locking localizations.Locking localization can be whole file content, also can be one or more part.Do not lock under the condition of whole file content at a signature, even if the content of entire document has been changed to some extent, but as long as the content within the locking localization scope is not changed, user's signature still effectively.In other words, second user can also operate in same document, only otherwise within the locking localization of first user's signature, just do not influence the validity of first people's signature.So utilize the notion of locking localization, a document can be supported the multilayer signature.
The notion of locking localization is very important, and it has opened the gate of multi-level signature, really the environment of written signature is fully moved in the Cyberspace.
The realization of locking localization is a very complicated process, because only handle challenges such as relation between content, the relation between the locking localization and algorithm, locking localization and the entire document of locking localization and algorithm well, could solve the function that multilayer is signed.
The content of locking localization can be:
One section text;
The content of entire document;
A picture (supporting the picture of different-format);
A form (whole form);
Certain cell in the form;
Part in the form (column or row) cell;
Data content on chart and the chart;
An object that is embedded in the document (comprises the Excel form that is embedded in the MS Word document, be embedded in another Word document in the MS Word document, be embedded in another MS Excel document in the MS Excel document, be embedded in the MS Word document in the MS Excel document, or the like);
An object that connects in document: the content of the object of connection but by annexation, can show the content of connecting object in this document not in this document.For example, in the MS Word document, be connected to an external Excel form document, perhaps another one MS Word file, perhaps in MS Excel document, be connected to an external MS Word file, perhaps another one MS Excel file perhaps is connected to another one Web form in a Web form;
Another signature control (for example, second people's signature can lock first people's signature, and that is to say, second people just can sign after will waiting until first idiograph).
See also shown in Figure 1ly, digital signature generation method realizes according to following flow process:
(1) sign of the locking localization of the collection control that bears the signature and the content of locking localization;
(2) content of locking localization is carried out data scrubbing and conversion.The process of cleaning, earlier the data beyond the content are got rid of, then the data of redundancy are got rid of, redundant data comprise attribute, space, some labels, the identifier of some objects in the document, or the like, data whether decided by situation by redundancy, sees mainly whether these data can influence the content of locking localization, if do not influence, just be used as redundant data processing;
Data after the cleaning will be through a normalized conversion, and the standardization transfer algorithm is according to the transfer algorithm of appointment in the XML digital signature standard of W3C, is called " Canonical Transformation ".In Office and html document, conversion method is consistent basically, and just the object of conversion is different.In XML document, conversion to as if the XML element.In the Office document, the object of conversion can be text, picture, com object, ole object, or the like.In html document, conversion to as if the html element element.Normalized conversion is equivalent to the notion of a clean room (Clean Room), and the assurance data are not with any flaw, to guarantee the stability of back algorithm;
(3) data after the standardization conversion will be by calculating summary.Summary can be calculated one by one to the content of all locking localizations by system, and summary can adopt MD5, SHA-1, SHA-256, SHA-512 algorithm;
(4) after all summaries calculate, to pass through a track data merge algorithm, many data are merged into data, the merge algorithm of XML signature is the algorithm according to appointment in the XML digital signature standard of W3C, the data merge algorithm of Office and html document sees also shown in Figure 2, it is the data structure with an oblique type Merkle tree, by merging from level to level, draws the data after overall the merging at last;
(5) this step is optional.If digital signature is not with seal, then this step can remove from; If affix one's seal simultaneously during signature, system just enters the operation of the 5th step; Here system's meeting importing digital seal carries out algorithm process to digital sealing, through one above-mentioned normalized conversion, carries out corresponding digest algorithm then;
(6) after the flow chart of data processing before the signature passed through, system can carry out digital signature; The algorithm of digital signature carries out computing according to the algorithm of appointment in the customer digital certificate, and general-purpose algorithm comprises RSA Algorithm, DSA algorithm etc.Whole algorithm is with content-data and seal data (if affixing one's seal simultaneously) computing together, and this guarantees the binding relationship of seal and digital signature;
(7) generate a complete digital signature object at last, become the part of document content, the digital signature object is in different document formats, embed with diverse ways, become the part of document, in Office, digital signature is the method with the COM control, be embedded in the document, become the part of document; In XML document, digital signature is an XML element, follows the XML digital signature standard of W3C fully.In html document, digital signature is one section layer (div paragraph) that floats, and is directly embedded in the html web page;
In the middle of reality was used, the integrated approach of Office was, dragon side provides an inserter tool, user installation after, normally use Office to write document, in the time of signing, the signature plug-in unit of Long Fang company is directly in user's appointed positions, the insertion control of signing;
The signature of XML document is the complete XML designer of a cover that provides with Long Fang company.This instrument allows the designer design the XML form, and the terminal use can adopt that the XML browser of dragon side is filled in a form, signed, checking etc.Signature and the function of verifying are all provided by designer and browser.During signature, instrument will write the XML signature element, follows the XML digital signature standard of W3C fully.
The integrated approach of HTML signature is also very simple, as long as add the div paragraph of Long Fang company appointment in html page, embedding signature Applet control is just passable then.Signature Applet control is the html document signature control that Long Fang company provides, and is embedded in the html page, and the digital signature function of Web application system is provided;
Then, the digital signature object is according to the display packing of system, the digital signature of intuitive display; The user can check user's name, signature timestamp, locking localization tabulation, signature value, signature algorithm, seal information, the certificate information that is comprised in the signature object, or the like.
See also shown in Figure 3ly again, the digital signature authentication method realizes according to following flow process:
(1) sign of the locking localization of the collection control that bears the signature and the content of locking localization;
(2) content of locking localization is carried out data scrubbing and conversion; The process of cleaning is earlier got rid of the data beyond the content, then the data of redundancy is got rid of, and is identical in its algorithm and the digital signature generation method.Data after the cleaning will be through a normalized conversion, and are identical in its algorithm and the digital signature generation method.Normalized conversion is equivalent to the notion of a clean room (Clean Room), and the assurance data are not with any flaw, to guarantee the stability of back algorithm;
(3) data after the standardization conversion will be by calculating summary; Summary can be calculated one by one to the content of all locking localizations by system, and is identical in its algorithm and the digital signature generation method;
(4) after all summaries calculate, pass through a track data merge algorithm, many data are merged into data, identical in its algorithm and the digital signature generation method;
(5) this step is optionally, if digital signature is not with seal, then this can remove from the step.If affix one's seal simultaneously during signature, system just enters the operation of the 5th step.Here system can the time be embedded in former data of digital sealing in the document to signature, carries out algorithm process, through normalized conversion together, carries out digest algorithm then;
(6) after the flow chart of data processing before the checking passed through, system can carry out digital signature authentication; The algorithm of signature verification carries out the verification algorithm computing according to user's used algorithm when digital signature generates, and general-purpose algorithm comprises RSA Algorithm, DSA algorithm etc.When doing signature verification, checking is done to the content of locking localization simultaneously by system.If find that the content of which bar locking localization is corrected one's mistakes, system can help the user to find out the locking localization that is changed.Also digital sealing is verified in the time of signature verification;
The user can also select the validity of certifying signature people's certificate, guarantees signer's correctness, and certification authentication comprises to be verified, the effective status (the non-term of validity) of certificate is verified the term of validity of certificate; To the available two kinds of methods of the checking of certificate validity (can simultaneously and with):
● by certificate revocation list (CRL) authentication certificate whether also effectively;
● by real-time online certificate status (OCSP) authentication certificate whether also effectively;
(7) last, by the result of every checking, draw the overall result of a signature verification, whether current signature is effective.
In the method for the invention, have the following aspects to guarantee the fail safe of digital signature:
(1) validity of certifying signature comprises several aspects, wherein if certifying signature people's identity just must check with signer's digital certificate.So, certifying signature goes into to take and maybe can be connected to the certificate issued server and verify.
(2) signature must use private key, and private key and certificate are distinct two notions.Certificate is a proof of identification; Private key is one and is used for signing.Even the people of checking takes certificate, there is not private key, can not pretend to be the signer to sign; In addition, in our software the inside, after having signed, just can't add new locking localization to it; If delete original locking localization, signature will lose efficacy immediately.So what the verifier can't leave no trace changes the signature locking localization.
In specific implementation, in MS Word and MS Excel, we carry out interactive work with VBA and Office software, and still all basically functions all realize in C++, comprise locking localization, signature, checking, or the like.The effect of VBA provides the function of user interface, and carries out the interface interaction with Office software.Other functions all realize in C++, and are integrated with COM control method and Office.
Adopted the method for the digital signature locking localization of this invention, owing to realized the binding of the digital signature control of locking localization in the document and user's appointment, the user is before signature, can specify the content that oneself will lock, legally, user's signature a part at locking localization, that is to say, content within the customer acceptance locking localization scope, and to its signature with the statement and the protection, in case any part has been changed in the locking localization, even be a numeral and punctuation mark, signature all can lose efficacy immediately; Simultaneously, because a signature control can be bound one or more locking localizations, and locking localization can be whole file content, it also can be one or more part, therefore do not lock under the condition of whole file content at a signature, even if the content of entire document has been changed to some extent, but as long as the content within the locking localization scope is not changed, user's signature still effectively.In other words, second user can also operate in same document, only otherwise within the locking localization of first user's signature, just do not influence the validity of first people's signature, so this method can be supported the multilayer signature; And the document that this method is supported comprises Office document, XML document and html document, the algorithm stability and high efficiency, and the scope of application is wider.
In this specification, the present invention is described with reference to its certain embodiments.But, still can make various modifications and conversion obviously and not deviate from the spirit and scope of the present invention.Therefore, specification and accompanying drawing are regarded in an illustrative, rather than a restrictive.

Claims (7)

1, a kind of method of digital signature locking localization comprises digital signature generation method and digital signature authentication method, it is characterized in that, described digital signature generation method may further comprise the steps:
(1) the locking localization information of the collection control that bears the signature from document;
(2) the locking localization information of collecting is carried out the data scrubbing operation, may further comprise the steps:
(a) data beyond the locking localization content are got rid of;
(b) data redundant in the locking localization content are got rid of;
The data of described redundancy comprise attribute, space, some labels, the identifier of some objects in the document;
(3) to the locking localization information after the data scrubbing operation of the carrying out conversion operations that standardizes, the algorithm in the described standardization conversion operations is the normative translation algorithm of appointment in the XML digital signature standard of W3C, and the converting objects in XML document is the XML element; Converting objects in the Office document is text, picture, com object, ole object; Converting objects in html document is the html element element;
(4) each locking localization information behind the conversion operations that standardizes is calculated the summary operation one by one;
(5) carry out the operation of data union operation to calculating the pairing data of each locking localization that obtain after the summary operation, generate data; In the operation of described data union operation, the merge algorithm of XML signature is meant algorithm according to appointment in the XML digital signature standard of W3C; Merge algorithm to Office and html document is the data structure of setting with an oblique type Merkle, by merging from level to level, draws the data after overall the merging at last;
(6) resulting data are carried out the digital signature arithmetic operation according to the algorithm of appointment in the customer digital certificate;
(7) the digital signature object that produces in the step (6) is embedded document function, become the part of document content, and demonstrate the digital signature information of intuitive according to the display packing of corresponding system; Described the digital signature object being embedded in the document function, is that method with the COM control is embedded in the document to the digital signature in the Office document, becomes the part of document; To XML document, digital signature wherein is an XML digital signature standard XML element of following W3C fully; To html document, digital signature wherein is that one section layer that floats is directly embedded in the html web page;
Described digital signature authentication method may further comprise the steps:
(1) the locking localization information of the collection control that bears the signature from document;
(2) the locking localization information of collecting is carried out the data scrubbing operation, may further comprise the steps:
(a) data beyond the locking localization content are got rid of;
(b) data redundant in the locking localization content are got rid of;
The data of described redundancy comprise attribute, space, some labels, the identifier of some objects in the document;
(3) to the locking localization information after the data scrubbing operation of the carrying out conversion operations that standardizes, the algorithm in the described standardization conversion operations is the normative translation algorithm of appointment in the XML digital signature standard of W3C, and the converting objects in XML document is the XML element; Converting objects in the Office document is text, picture, com object, ole object; Converting objects in html document is the html element element;
(4) each locking localization information behind the conversion operations that standardizes is calculated the summary operation one by one;
(5) carry out the operation of data union operation to calculating the pairing data of each locking localization that obtain after the summary operation, generate data; In the operation of described data union operation, the merge algorithm of XML signature is meant algorithm according to appointment in the XML digital signature standard of W3C; Merge algorithm to Office and html document is the data structure of setting with an oblique type Merkle, by merging from level to level, draws the data after overall the merging at last;
(6) resulting data are carried out digital signature verification operations according to user's employed algorithm when carrying out digital signature;
(7) result according to digital signature verification operations draws the signature verification result;
Described locking localization is a part of content of binding mutually with the digital signature control of user's appointment in the document, and described locking localization information comprises the content of the sign and the locking localization of locking localization.
2, the method for digital signature locking localization according to claim 1, it is characterized in that, in the described digital signature generation method, after the pairing data of each locking localization being carried out the operation of data union operation, also comprise the processing operation of importing digital seal, may further comprise the steps:
(1) to the digital sealing conversion operations that standardizes;
(2) the digital sealing information behind the conversion operations that standardizes is calculated the summary operation.
3, the method for digital signature locking localization according to claim 2, it is characterized in that, in the described digital signature authentication method, after the pairing data of each locking localization being carried out the operation of data union operation, also comprise the processing operation that the former data of digital sealing that embed in the document are carried out, when carrying out digital signature verification operations, comprise also that to the verification operation of digital sealing and the verification operation of digital certificate the described processing operation that the former data of digital sealing that embed in the document are carried out may further comprise the steps:
(1) to the former data of the digital sealing conversion operations that standardizes;
(2) the digital sealing information behind the conversion operations that standardizes is calculated the summary operation.
4, the method for digital signature locking localization according to claim 3, it is characterized in that, the verification operation of described digital certificate comprises to the checking of the term of validity of digital certificate with to the checking of the effective status of digital certificate, and the method for the checking of described effective status to digital certificate comprises:
(1) carries out the certificate validity checking by certificate revocation list CRL; And/or
(2) carry out the certificate validity checking by real-time online certificate status OCSP.
According to the method for each described digital signature locking localization in the claim 1 to 4, it is characterized in that 5, the content of described locking localization comprises:
(1) one section text;
(2) content of entire document;
(3) picture of various different-formats;
(4) whole form;
(5) certain cell in the form;
(6) a part of cell in the form;
Data content on (7) charts and the chart;
(8) objects that are embedded in the document;
(9) objects that in document, connect;
(10) another signature control;
The described object that is embedded in the document comprises the Excel form that is embedded in the MS Word document, be embedded in another Word document in the MS Word document, be embedded in another MS Excel document in the MS Excel document or be embedded in MS Word document in the MS Excel document; The object that connects in the described document is meant that the content of object of connection is not in this document, but pass through annexation, the content that can in this document, show connecting object, be included in and be connected to an external Excel form document or another one MS Word file in the MS Word document, perhaps in MS Excel document, be connected to an external MS Word file or another one MS Excel file, perhaps in a Web form, be connected to another one Web form.
According to the method for each described digital signature locking localization in the claim 1 to 4, it is characterized in that 6, the algorithm of appointment comprises RSA Algorithm and DSA algorithm in the described customer digital certificate.
7, according to the method for each described digital signature locking localization in the claim 1 to 4, it is characterized in that the digital signature information of described intuitive comprises user's name, signature timestamp, locking localization tabulation, signature value, signature algorithm, seal information, the certificate information that is comprised in the signature object.
CNB2005100258902A 2005-05-18 2005-05-18 Method for digital signature locking localization Expired - Fee Related CN100505621C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100258902A CN100505621C (en) 2005-05-18 2005-05-18 Method for digital signature locking localization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100258902A CN100505621C (en) 2005-05-18 2005-05-18 Method for digital signature locking localization

Publications (2)

Publication Number Publication Date
CN1694399A CN1694399A (en) 2005-11-09
CN100505621C true CN100505621C (en) 2009-06-24

Family

ID=35353215

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100258902A Expired - Fee Related CN100505621C (en) 2005-05-18 2005-05-18 Method for digital signature locking localization

Country Status (1)

Country Link
CN (1) CN100505621C (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4739000B2 (en) * 2005-12-07 2011-08-03 富士通株式会社 Electronic document management program, electronic document management system, and electronic document management method
CN101163001B (en) * 2006-10-11 2011-09-07 中国民生银行股份有限公司 Electronic seal production system and method
CN101751656B (en) * 2008-12-22 2012-03-28 北京大学 Watermark embedding and extraction method and device
CN101997643B (en) * 2009-08-27 2013-01-09 上海中信信息发展股份有限公司 Method and system for packing electronic files
CN103092940A (en) * 2013-01-10 2013-05-08 昆山百润科技有限公司 File structure, digital signature method and digital signature validation method with verifiable reconfiguration
CN103413096A (en) * 2013-08-22 2013-11-27 曙光云计算技术有限公司 Data transmission method and device and data receiving method and device
CN105096097A (en) * 2014-05-08 2015-11-25 深圳市创业印章实业有限公司 Electronic-seal digital signature generation method
CN105405003A (en) * 2015-10-22 2016-03-16 昆山百润科技有限公司 Electronic stamp realization method having area protection function and electronic stamp verification method
CN109902249A (en) * 2019-01-07 2019-06-18 成都多用科技有限公司 A method of local trusted content is provided for webpage
CN112464267B (en) * 2020-12-07 2024-04-02 中国标准化研究院 Electronic file packaging method

Also Published As

Publication number Publication date
CN1694399A (en) 2005-11-09

Similar Documents

Publication Publication Date Title
CN100505621C (en) Method for digital signature locking localization
US8200975B2 (en) Digital signatures for network forms
CN101800646B (en) Implementation method and system of electronic signature
CN111316595A (en) System for protecting a verification key from alteration and verifying the validity of a proof of correctness
EP1808795A2 (en) Digital document management system, digital document management method, and digital document management program
US20060212707A1 (en) Digitally signing an electronic document with a user-entered signature image
CN112740216B (en) System and computer-based method for document authentication and publication
CN101295387A (en) Method for implementing network transaction data text
WO2003021405A2 (en) Authentication of electronic documents
CN104734851A (en) Electronic seal method and system
CN101465734A (en) Online artificial signing system and method
US20130138965A1 (en) Control method, program and system for link access
CN101060400B (en) Data generating device, data analysis device, control method and data processing system
Boritz et al. Assurance reporting for XBRL: XARL (extensible assurance reporting language)
CN108446539A (en) A kind of software authorization method and soft ware authorization filing system
CN104951923A (en) Electronic signature system based on combination of PKI technology and anti-counterfeit technology of physical seal
CN104158662B (en) Many people's electronic certificates and implementation method based on XAdES
US7958363B2 (en) Toolbar signature
CA2986828A1 (en) Data recording method, device and system, and computer storage medium
CN104517203A (en) Stamping method, apparatus and system of electronic stamp
CN102024192A (en) Electronic reimbursement process using electronic transaction security support platform
CN101419681A (en) A kind of production method with electronic receipt of visual electronic signature
CN115659412A (en) Personal electronic seal signature and verification method
KR101417825B1 (en) Method of verification of electronic filing document and apparatuse for using the same
Erwig et al. Redactable graph hashing, revisited

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090624

Termination date: 20120518