CN101661573B - Method for producing electronic seal and method for using electronic seal - Google Patents

Method for producing electronic seal and method for using electronic seal Download PDF

Info

Publication number
CN101661573B
CN101661573B CN2008101190652A CN200810119065A CN101661573B CN 101661573 B CN101661573 B CN 101661573B CN 2008101190652 A CN2008101190652 A CN 2008101190652A CN 200810119065 A CN200810119065 A CN 200810119065A CN 101661573 B CN101661573 B CN 101661573B
Authority
CN
China
Prior art keywords
seal
information
data
related data
specific
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2008101190652A
Other languages
Chinese (zh)
Other versions
CN101661573A (en
Inventor
王东临
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sursen Electronic Technology Co., Ltd.
Original Assignee
TIANJIN SCHOLAR SOFTWARE TECHNOLOGY Co Ltd
BEIJING SURSEN ELECTRONIC TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TIANJIN SCHOLAR SOFTWARE TECHNOLOGY Co Ltd, BEIJING SURSEN ELECTRONIC TECHNOLOGY Co Ltd filed Critical TIANJIN SCHOLAR SOFTWARE TECHNOLOGY Co Ltd
Priority to CN2008101190652A priority Critical patent/CN101661573B/en
Publication of CN101661573A publication Critical patent/CN101661573A/en
Application granted granted Critical
Publication of CN101661573B publication Critical patent/CN101661573B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a method for producing an electronic seal and a method for using the electronic seal. The method for producing the electronic seal comprises the following steps of: confirming information on a specific location having the permission to use the electronic seal; and binding the confirmed information on the specific location with related data of the electronic seal. The method for using the electronic seal comprises the following steps of: acquiring the information on the current location of the electronic seal; confirming whether the information on the current location is in accordance with the information on the specific location bound with the related data of the electronic seal; and when the information on the current location is confirmed to be in accordance with the information on the specific location bound with the related data of the electronic seal, permitting the current location to use the electronic seal, and otherwise, rejecting the current location to use the electronic seal. By using the method for producing the electronic seal and the method for using the electronic seal provided by the embodiment of the invention, the use location of the electronic seal can be restricted, and the use safety of the electronic seal is improved.

Description

Producing electronic seal method and E-seal using method
Technical field
The present invention relates to the E-seal technology, particularly a kind of producing electronic seal method and a kind of E-seal using method.
Background technology
E-seal is application and the form of expression of electronic signature, and and if only if with electronic signature technology when verifying that certain part of e-file is authentic and valid, just normally shows/print E-seal.The E-seal technology is simulated traditional seal in kind with advanced person's digital technology, cannot see, impalpable electronic signature has become the seal that meets traditional habit and experience/signature, the e-file of adding a cover E-seal has similar validity to the paper document of adding a cover seal in kind/signature.Generally, E-seal takes the form of official seal, signature etc. traditionally for figure, the image of confirming file availability, custom and experience that it is managed, use-pattern meets seal in kind.
At present the E-seal technology usually use the mode of digital signature guarantee data file integrality, authenticity and can not tamper.Each E-seal corresponding one unique based on international public key architecture (Public Key Infrastructure, PKI) digital certificate of standard, this digital certificate is equivalent to this E-seal user's I.D., identity that can this E-seal of unique identification user.
When needs show or print through the data file of affixing one's seal, at first the authenticity and integrity of data document is verified, after checking is passed through, just in data file, show or print E-seal.The identity that is shown the E-seal user through the data file of affixing one's seal by this E-seal, and guarantee data file integrality, authenticity and can not tamper.
But existing E-seal technology only limits the rights of using of E-seal by the digital certificate of E-seal, the field of employment of E-seal do not limited.If the carrier of electronic seal data is stolen, be stolen such as the USB flash disk of having stored electronic seal data, anyone who has then stolen this carrier can utilize the electronic seal data of storage in this carrier arbitrarily to add a cover E-seal, thereby so that legitimacy and security that E-seal uses can't guarantee.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of producing electronic seal method and E-seal using method, to improve the safety in utilization of E-seal.
The producing electronic seal method that the embodiment of the invention provides comprises:
Obtain described E-seal specific with equipment one or more characterization information or specific one or more characterization information of depositing carrier of obtaining described E-seal define the particular place information that authority is used E-seal;
Determined particular place information is appended in the related data of described E-seal; Or utilize determined particular place information that the related data of described E-seal is encrypted.
The E-seal using method that the embodiment of the invention provides comprises:
Obtain the current place information of E-seal; The current place information of described E-seal comprises the current use facility information of described E-seal, and/or the described current carrier information of depositing;
The current use facility information of described E-seal is determined according to one or more characterization information of the current use equipment of described E-seal;
The current carrier information of depositing of described E-seal is determined according to current one or more characterization information of depositing carrier of described E-seal;
Determine whether described current place information is with consistent with the particular place information of E-seal related data binding;
Determine described current place information with and the E-seal related data particular place information of binding when consistent, allow current place to use described E-seal; Otherwise refuse current place and use described E-seal.
The embodiment of the invention is by particular place information and the binding of E-seal related data with E-seal, when using E-seal, whether the place information of verifying current E-seal is consistent with the particular place information of this E-seal binding, only when consistent, just allow current place to use described E-seal, thereby limited the field of employment of E-seal, improved the safety in utilization of E-seal.Producing electronic seal method and the using method of utilizing the embodiment of the invention to provide can limit validated user and use E-seal in illegal place, have greatly improved the safety in utilization of E-seal.
Description of drawings
Fig. 1 is the process flow diagram of producing electronic seal method in the embodiment of the invention.
Fig. 2 is the process flow diagram of E-seal using method in the embodiment of the invention.
Fig. 3 is the process flow diagram of E-seal using method in the embodiment of the invention.
Embodiment
In the producing electronic seal process that the embodiment of the invention provides, at first define the particular place information that authority is used E-seal; Then the authority that has that will determine is used particular place information and the binding of E-seal related data of E-seal.Correspondingly, in the E-seal use procedure that the embodiment of the invention provides, at first determine the current place information of E-seal, then verify whether the current place information of determining is with consistent with the particular place information of E-seal related data binding, when determining that particular place information that described current place information and E-seal related data are bound is consistent, allow current place to use described E-seal; Otherwise refuse current place and use described E-seal.
Fig. 1 is the process flow diagram of producing electronic seal method in the embodiment of the invention.As shown in Figure 1, the method may further comprise the steps:
Step 101: define the particular place information that authority is used E-seal.
Particular place information can comprise specific use facility information and/or the specific carrier information of depositing.
Determine the method for particular place information, reflected that directly Zhang Fang processed is to the restriction of E-seal particular place.Can use this E-seal at specific use equipment when chapter side processed wishes any user, then particular place information comprises specific use facility information.E-seal is specific deposits the carrier holder and can use this E-seal in any apparatus when chapter side processed wishes to only have, and then particular place information comprises the specific carrier information of depositing.E-seal is specific deposits the carrier holder when specific use equipment uses this E-seal when chapter side processed wishes to only have, and then particular place information comprises specific use facility information and the specific carrier information of depositing.
Wherein specific use facility information can obtain according to one or more characterization information of specific use equipment.The specific carrier information of depositing can obtain according to specific one or more characterization information of depositing carrier.
Specifically, a string serial data of one or more characterization information combination producings with specific use equipment obtains specific use facility information according to serial data; With the specific a string serial data of one or more characterization information combination producings of depositing carrier, obtain the specific carrier information of depositing according to serial data.
More specifically, can be with a string serial data of the direct combination producing of one or more characterization information of specific use equipment; Also can adopt preset algorithm respectively each characterization information of specific use equipment to be calculated digest value, with a string serial data of digest value combination producing that generates respectively.Can be with the specific a string serial data of the direct combination producing of one or more characterization information of depositing carrier; Also can adopt preset algorithm respectively specific each characterization information of depositing carrier to be calculated digest value, with a string serial data of digest value combination producing that generates respectively.
In addition, can be directly with the serial data that obtains as specific use facility information or the specific carrier information of depositing.Also can adopt preset algorithm that serial data is processed, with the serial data after processing as specific use facility information or the specific carrier information of depositing.Wherein preset algorithm can be hash algorithm, and said processing is the calculating digest value.
The below illustrates the specific use facility information of how to confirm.All characterization information of selected specific use equipment are formed a string data, adopt the hash algorithm this string data to be generated the summary of a regular length, should make a summary as using facility information.Perhaps, each characterization information of the specific use equipment that employing hash algorithm will be selected generates a summary, and then the summary that will generate forms a string data, process summary of generation by this string data that the hash algorithm will generate, this that generates at last made a summary as this specific use facility information.
Use equipment can be conventional equipment or safety equipment, and depositing carrier can be general carrier or safety barrier.Wherein conventional equipment can be computing machine, portable terminal etc.; General carrier can be the movable storage devices such as USB Key, USB flash disk, portable hard drive, IC-card.
When using equipment to be computing machine, then use the characterization information of equipment can be one of the following or arbitrarily combination: the sequence number of the MAC Address of the hard reel number of computing machine, CPU sequence number, network interface card, mainboard sequence number, internal memory sequence number, this computer specialized equipment etc.
When using equipment to be portable terminal, then use the characterization information of equipment can be one of the following or arbitrarily combination: the MAC Address of the SIM card of portable terminal number, IMEI, equipment Serial Number, CPU sequence number, network interface card etc.
Be USB flash disk when depositing carrier, the characterization information of then depositing carrier can be with the sequence number of this USB flash disk.
When carrying the right digital certificate of the PKI key that meets the PKI system in conventional equipment or the general carrier, these conventional equipments or general carrier just can be described as safety equipment or safety barrier.As the computing machine that carries private key is safety equipment; The secure hardware carrier that carries private key is safety barrier.When using equipment or deposit carrier as safety equipment or safety barrier, the characterization information of then using equipment or depositing carrier is PKI key pair.
Step 102: the authority that has that will determine is used particular place information and the binding of E-seal related data of E-seal.
Wherein, the E-seal related data can be electronic seal data itself, also can be the data relevant with E-seal, as: the usefulness Zhang Jilu of E-seal, the timestamp of E-seal, the pattern of E-seal, the digital certificate of E-seal etc.
Concrete binding mode can be: the authority that has that will determine uses the particular place information of E-seal to append in the E-seal related data.
Binding mode can also be: utilizing has authority to use the particular place information of E-seal that the E-seal related data is encrypted.Cryptographic algorithm can be general symmetric encipherment algorithm, and this algorithm is this area common technology means, repeats no more here.
When the particular place information of E-seal comprises specific use facility information and specific when depositing carrier information simultaneously, when the particular place information of E-seal and E-seal relevant data are bound, both can bind first specific use facility information and E-seal related data, bind again specific carrier information and the E-seal related data deposited; Also can bind first specific carrier information and the E-seal related data deposited, bind again specific use facility information and E-seal related data.But when using E-seal, whether the process consistent with described particular place information has fixing order to the current place information of checking E-seal, and this order is determined by the order of chapter process processed.
Illustrate above-mentioned producing electronic seal method, suppose Zhang Fang processed being restricted to the E-seal particular place: the holder of safety equipment can use this E-seal on any use equipment.Concrete chapter process processed is: utilize the disclosed development interface of safety equipment key manufacturer to obtain the PKI of the PKI system cipher key pair of safety equipment key, adopt the PKI that obtains that the E-seal related data is encrypted.
Need to prove, can limit E-seal can only use at a selected specific use equipment, also can limit E-seal and use at selected a plurality of specific use equipment.If selected E-seal can use at a plurality of specific use equipment, then need to generate a plurality of specific use facility informations, then the particular place information of this E-seal is combined by each specific use facility information.
Fig. 2 is the process flow diagram of E-seal using method in the embodiment of the invention.As shown in Figure 2, the method may further comprise the steps:
Step 201: obtain the current place information of E-seal, comprise the current use facility information and/or the current carrier information of depositing that obtain E-seal.
Current use facility information can obtain according to one or more characterization information of current use equipment.Wherein the step of " the one or more characterization information according to current use equipment obtain current use facility information " is similar with the step of " the one or more characterization information according to specific use equipment obtain specific use facility information " in the chapter process processed.
The current carrier information of depositing can obtain according to current one or more characterization information of depositing carrier.The step that wherein " according to current one or more characterization information of depositing carrier, obtains the current carrier information of depositing " is similar with the step of " according to specific one or more characterization information of depositing carrier, obtaining the specific carrier information of depositing " in the chapter process processed.
Step 202: determine whether the current place information of E-seal is with consistent with the particular place information of E-seal related data binding; If consistent; Execution in step 203; Otherwise execution in step 204.
When chapter side processed adopts the mode that directly particular place information is appended to the E-seal related data to bind particular place information and E-seal related data, the current place information of determining E-seal with and the particular place information of E-seal related data binding whether consistent process be: compare the current place information of E-seal whether with the E-seal related data in the particular place information of carrying consistent.
When chapter side processed adopts the mode that the E-seal related data is encrypted to bind particular place information and E-seal related data, the current place information of determining E-seal with and the particular place information of E-seal related data binding whether consistent process be: use current place information that the E-seal related data is decrypted, if successful decryption, then prove current place information with consistent with the particular place information of E-seal related data binding, namely current place has the authority of using this E-seal.
The current place information of determining E-seal with and the E-seal related data particular place information of binding whether consistent before, can also at first carry out the user validation inspection.
In addition, if at first will be by specific use facility information and electronic seal data binding in the chapter process processed, and then deposit the binding of carrier information and electronic seal data with specific, then in proof procedure, need at first verify and currently deposit carrier information to deposit carrier information consistent with E-seal specific, if consistent, further whether the current use facility information of checking is consistent with the specific use facility information of E-seal again, if consistent, then allow current place to use this E-seal, carry out follow-up operation, as affix one's seal, check seal information etc.; Otherwise refuse current place and use this E-seal.
Step 203: allow current place to use this E-seal.
When adding a cover E-seal, can further use characteristic and the binding of E-seal related data of the file of being affixed one's seal, comprise: all or part of data of extracting the file of being affixed one's seal, adopt preset algorithm such as hash algorithm that data are processed, data after processing as secret key encryption E-seal related data, are kept at the E-seal related data after encrypting in the file of being affixed one's seal.So correspondingly, the affixed one's seal method of the E-seal that file covered of checking comprises: adopt method identical when affixing one's seal, the affixed one's seal all or part of data of file of extraction, adopt preset algorithm that data are processed, the E-seal related data that the data after processing are encrypted when affixing one's seal as key is decrypted.
The affixed one's seal method of the characteristic of file and the binding of E-seal related data of use can also be: all or part of data of extracting the file of being affixed one's seal, adopt preset algorithm that data are processed, after data after processing and E-seal related data synthesized, use private key corresponding to E-seal or unique identification that the data after synthetic are signed electronically, E-seal related data and electronic signature are saved in the file of being affixed one's seal.So correspondingly, the affixed one's seal method of the E-seal that file covered of checking comprises: adopt method identical when affixing one's seal, the affixed one's seal all or part of data of file of extraction, adopt preset algorithm that data are processed, the data after processing and E-seal related data is synthetic after checking when affixing one's seal the electronic signature of generation whether effective.
Step 204: refuse current place and use this E-seal.
The below illustrates the described E-seal using method of the embodiment of the invention.
Suppose that the use scenes that chapter side processed limits uses at specific use equipment for only having E-seal to deposit the carrier holder, and the E-seal related data is electronic seal data itself.This moment, the E-seal using method can be as shown in Figure 3.Fig. 3 is the process flow diagram of E-seal using method in the embodiment of the invention.As shown in Figure 3, the method may further comprise the steps: step 301: the current use equipment of E-seal obtains the electronic seal data head by disclosed development interface.
Step 302: whether judge the electronic seal data head that obtains by the specific public key encryption of depositing carrier of E-seal, if encrypt, then execution in step 303; Otherwise, execution in step 305.
Here, judge whether encrypted method is the electronic seal data head: judge whether the electronic seal data head meets the form of the electronic seal data head of definition, if it is not meet, then encrypted; If do not meet, then encrypted.
Step 303: by disclosed development interface, obtain the key supplier that current E-seal is deposited carrier, if obtain successfully, execution in step 304; Otherwise, show that the current carrier of depositing is not that legal E-seal is deposited carrier, do not support to use under this mode this E-seal, process ends.
Step 304: by disclosed development interface, use from current and deposit the key supplier who obtains the carrier electronic seal data is deciphered, if successful decryption, execution in step 305; Otherwise currently deposit the specific carrier of depositing that carrier is not E-seal, do not support to use E-seal under this mode, process ends.
Step 305: judge after the current deciphering the electronic seal data head whether with the specific use apparatus bound of E-seal, if binding, then execution in step 308; Otherwise execution in step 306.
Step 306: utilize the mode identical with the specific use facility information of generation in the chapter process processed, according to one or more characterization information of current use equipment, generate current use facility information.
Step 307: judge whether the current use facility information that generates is consistent with the specific use facility information of electronic seal data binding, if consistent, then execution in step 308; Otherwise, determine that the current use equipment of E-seal does not have authority to use this E-seal, refuse current use equipment and use this E-seal, and process ends.
Step 308: utilize the electronic seal data obtain to carry out subsequent operation, as: use E-seal to affix one's seal at document, check E-seal information, and check E-seal with Zhang Jilu etc.
Suppose that use scenes that chapter side processed limits can be at a certain specific use equipment for anyone---computing machine is using this E-seal, and in the chapter process processed particular place information by the hard reel number of computing machine and/or internal memory sequence number through the generation of hash algorithm.Then before using E-seal, at first carry out the user validation inspection, if inspection is not passed through, then refuse current place and use this E-seal; If check and pass through, then need to obtain current use facility information, such as hard reel number and the internal memory sequence number according to current use equipment, adopt the hash algorithm identical with chapter side processed to generate the current use facility information of E-seal.The current use facility information that adopt to generate is decrypted the E-seal related data, if successful decryption, then current use equipment place has authority to use this E-seal, otherwise, refuse current place and use this E-seal.
Suppose that the use scenes that chapter side processed limits is: the holder of safety equipment can use this E-seal on any use equipment.Before using E-seal, at first carry out the user validation inspection, validity checking can have various ways, for example checks the hash of decruption key; If check and do not pass through, then refuse current place and use this E-seal; If check and to pass through, then need to obtain the private key of the cipher key pair of current safety equipment key, then utilize the private key that obtains that the E-seal related data is decrypted, if successful decryption proves that then current place has authority to use this E-seal; Otherwise, refuse current field of employment and use this E-seal.In addition, above-mentioned user validation inspection also can be omitted, and namely directly is decrypted.
Usually, for safety, private key in the E-seal safety equipment can not be obtained by miscellaneous equipment, for the E-seal related data of encrypting is decrypted, the current use equipment of E-seal needs at first to obtain by the disclosed development interface of safety equipment key manufacturer the key supplier of E-seal safety equipment, then by disclosed development interface, utilize the key supplier who obtains that the E-seal related data of encrypting is decrypted.Here, the key supplier is the standard processing mode that E-seal safety equipment manufacturer provides, and is techniques well known, repeats no more here.
By above embodiment as seen, by in chapter process processed with E-seal related data and have authority to use the particular place information of this E-seal to bind together, limited the field of employment of E-seal, further improved the security that E-seal uses.Such as, when E-seal is stolen, can also guarantee by the particular place information of E-seal binding the security of E-seal.Therefore, the field of employment that the producing electronic seal method that the embodiment of the invention provides and using method can limit E-seal, realization improves the goal of the invention of E-seal safety in utilization.
In a word, the above is preferred embodiment of the present invention only, is not for limiting protection scope of the present invention.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (15)

1. a producing electronic seal method is characterized in that, comprising:
Obtain described E-seal specific with equipment one or more characterization information or specific one or more characterization information of depositing carrier of obtaining described E-seal define the particular place information that authority is used E-seal;
Determined particular place information is appended in the related data of described E-seal; Or utilize determined particular place information that the related data of described E-seal is encrypted.
2. method according to claim 1 is characterized in that, the serial data that the characterization information of the specific use equipment of described E-seal generates for one or more characterization information of the specific use equipment that uses described E-seal;
The serial data that the specific characterization information of depositing carrier of described E-seal generates for specific one or more characterization information of depositing carrier of using described E-seal.
3. method according to claim 1, it is characterized in that, the characterization information of the specific use equipment of described E-seal is for adopting the serial data after preset algorithm is processed the serial data of one or more characterization information generations of the specific use equipment of described E-seal; Or
The specific characterization information of carrier of depositing of described E-seal is for adopting the serial data after preset algorithm is processed the specific serial data of depositing one or more characterization information generations of carrier of described E-seal.
4. according to claim 2 or 3 described methods, it is characterized in that, the serial data that the one or more characterization information of the specific use equipment of the described E-seal of described use generate is: the serial data that one or more characterization information of the specific use equipment of described E-seal are arranged in, or the serial data that is arranged in of each digest value that adopts preset algorithm respectively each characterization information of the specific use equipment of described E-seal to be calculated;
The described E-seal of described use specific deposited the serial data that one or more characterization information of carrier generate: the serial data that specific one or more characterization information of depositing carrier of described E-seal are arranged in, or the serial data that is arranged in of each digest value that adopts preset algorithm respectively specific each characterization information of depositing carrier of described E-seal to be calculated.
5. method according to claim 4 is characterized in that, described preset algorithm is hash algorithm.
6. according to claim 2 or 3 described methods, it is characterized in that, the specific equipment that uses of described E-seal is computing machine; One or more characterization information of the specific use equipment of described E-seal are: the sequence number of the specialized equipment of the MAC Address of the hard reel number of computing machine, CPU sequence number, network interface card, mainboard sequence number, internal memory sequence number, computing machine; Or
The specific equipment that uses of described E-seal is portable terminal; One or more characterization information of the specific use equipment of described E-seal are: the MAC Address of the SIM card of portable terminal number, IMEI, equipment Serial Number, CPU sequence number, network interface card.
7. according to claim 2 or 3 described methods, it is characterized in that, the specific carrier of depositing of described E-seal is USB flash disk; Specific one or more characterization information of depositing carrier of described E-seal are: the equipment Serial Number of described USB flash disk.
8. method according to claim 1, it is characterized in that, described E-seal related data comprises one of the following or arbitrarily combination: the usefulness Zhang Jilu of electronic seal data itself, E-seal, the timestamp of E-seal, the pattern of E-seal, the digital certificate of E-seal.
9. an E-seal using method is characterized in that, comprising:
Obtain the current place information of E-seal; The current place information of described E-seal comprises the current use facility information of described E-seal, and/or the described current carrier information of depositing;
The current use facility information of described E-seal is determined according to one or more characterization information of the current use equipment of described E-seal;
The current carrier information of depositing of described E-seal is determined according to current one or more characterization information of depositing carrier of described E-seal;
Determine whether described current place information is with consistent with the particular place information of E-seal related data binding;
Determine described current place information with and the E-seal related data particular place information of binding when consistent, allow current place to use described E-seal; Otherwise refuse current place and use described E-seal.
10. method according to claim 9, it is characterized in that, when Zhang Fang processed is when utilizing determined particular place information that the related data of described E-seal is encrypted with the method for the related data of determined particular place information and E-seal binding; Described determine current place information with and the E-seal related data particular place information of binding consistent comprising whether:
Utilize described current place information that the E-seal related data is decrypted;
If described current place information can be deciphered described E-seal relevant information, show that described place information is consistent with the particular place information of E-seal related data binding.
11. method according to claim 9 is characterized in that, when Zhang Fang processed with the method for the related data of determined particular place information and E-seal binding for the related data that determined particular place information is appended to described E-seal in the time; Described determine described current place information with and the E-seal related data particular place information of binding consistent comprising whether:
Whether more current place information is with consistent with the particular place information of E-seal related data binding.
12. method according to claim 9 is characterized in that, use after the described E-seal in the current place of described permission, further comprises:
When adding a cover E-seal, the characteristic of the file of will being affixed one's seal and the binding of E-seal related data.
13. method according to claim 12 is characterized in that, further comprises:
The checking E-seal that file covered of being affixed one's seal.
14. method according to claim 13 is characterized in that, the characteristic of the described file of will being affixed one's seal and the binding of E-seal related data comprise:
The all or part of data that file is affixed one's seal in extraction adopt preset algorithm that data are processed, and the data after processing as secret key encryption E-seal related data, are kept at the E-seal related data after encrypting in the file of being affixed one's seal;
The affixed one's seal method of the E-seal that file covered of described checking comprises:
The affixed one's seal all or part of data of file of extraction, adopt preset algorithm that data are processed, the E-seal related data that data after processing are encrypted when affixing one's seal as key is decrypted, the E-seal related data of encrypting when checking institute counts key and whether can decipher described affixing one's seal.
15. method according to claim 14 is characterized in that, the characteristic of the described file of will being affixed one's seal and the binding of E-seal related data comprise:
The affixed one's seal all or part of data of file of extraction, adopt preset algorithm that data are processed, after data after processing and E-seal related data synthesized, use private key corresponding to E-seal or unique identification that the data after synthetic are signed electronically, E-seal related data and electronic signature are saved in the file of being affixed one's seal;
The affixed one's seal method of the E-seal that file covered of described checking comprises:
The affixed one's seal all or part of data of file of extraction adopt preset algorithm that data are processed, the data after processing and E-seal related data is synthetic after checking when affixing one's seal the electronic signature of generation whether effective.
CN2008101190652A 2008-08-28 2008-08-28 Method for producing electronic seal and method for using electronic seal Active CN101661573B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101190652A CN101661573B (en) 2008-08-28 2008-08-28 Method for producing electronic seal and method for using electronic seal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101190652A CN101661573B (en) 2008-08-28 2008-08-28 Method for producing electronic seal and method for using electronic seal

Publications (2)

Publication Number Publication Date
CN101661573A CN101661573A (en) 2010-03-03
CN101661573B true CN101661573B (en) 2013-03-27

Family

ID=41789581

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101190652A Active CN101661573B (en) 2008-08-28 2008-08-28 Method for producing electronic seal and method for using electronic seal

Country Status (1)

Country Link
CN (1) CN101661573B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761641B (en) * 2011-03-08 2017-02-15 天津书生软件技术有限公司 Electronic-seal using method and device
CN104698887B (en) * 2015-02-12 2018-01-12 西安印艺苑实业有限公司 The recording method and device and querying method and device of seal use information
CN110955921A (en) * 2019-12-09 2020-04-03 中国移动通信集团江苏有限公司 Electronic signature method, device, equipment and storage medium
CN116842582B (en) * 2023-07-06 2024-04-23 上海朗晖慧科技术有限公司 Intelligent analysis and identification system and method based on data anti-counterfeiting technology

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183439A (en) * 2006-11-14 2008-05-21 中国民生银行股份有限公司 Electronic bill processing system and processing method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1882962A (en) * 2003-11-21 2006-12-20 松下电器产业株式会社 License acquiring system, server apparatus and terminal apparatus
CN1838163B (en) * 2006-01-17 2012-04-11 沈前卫 Universal electronic stamping system implementation method based on PKI
CN101241569B (en) * 2008-03-07 2011-09-14 北京华大恒泰科技有限责任公司 Electronic signature method and device and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183439A (en) * 2006-11-14 2008-05-21 中国民生银行股份有限公司 Electronic bill processing system and processing method

Also Published As

Publication number Publication date
CN101661573A (en) 2010-03-03

Similar Documents

Publication Publication Date Title
CN107566116B (en) Method and apparatus for digital asset weight registration
CN110474898B (en) Data encryption and decryption and key distribution method, device, equipment and readable storage medium
CN107742212B (en) Asset verification method, device and system based on block chain
CN102271042B (en) Certificate authorization method, system, universal serial bus (USB) Key equipment and server
JP3902440B2 (en) Cryptographic communication device
CN107146120B (en) Electronic invoice generation method and generation device
CN102802036B (en) System and method for identifying digital television
JPH11231775A (en) Device and method for conditional authentication
CN104463554A (en) Electronic seal achieving method and device
WO2004042516A2 (en) Digital-rights management system
JPH10308732A (en) Access right authenticating device and method therefor
JP4788213B2 (en) Time stamp verification program and time stamp verification system
CN106953732B (en) Key management system and method for chip card
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
CN1925392A (en) Method for identification of equipment validity
CN101465728A (en) Method, system and device for distributing cipher key
CN104322003A (en) Cryptographic authentication and identification method using real-time encryption
CN111814132B (en) Security authentication method and device, security authentication chip and storage medium
JPH09282155A (en) Method for equipping cipher authentication function
CN109640175A (en) A kind of block chain encipher-decipher method based on video file
CN101661573B (en) Method for producing electronic seal and method for using electronic seal
CN102270285B (en) Key authorization information management method and device
JP2010068527A (en) Authentication method of content file producer
CN117436043A (en) Method and device for verifying source of file to be executed and readable storage medium
CN103577966A (en) Electronic seal manufacturing method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: BEIJING SURSEN ELECTRONIC TECHNOLOGY CO., LTD. BEI

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100089 5/F, NORTHERN REAL ESTATE BUILDING, NO.81, ZIZHUYUAN ROAD, HAIDIAN DISTRICT, BEIJING TO: 100191 ROOM 408, TAIXING BUILDING, NO.11, HUAYUAN EAST ROAD, HAIDIAN DISTRICT, BEIJING

TA01 Transfer of patent application right

Effective date of registration: 20101027

Address after: 100191, Room 408, Taixing building, 11 Garden East Road, Beijing, Haidian District

Applicant after: Beijing Suresense International Information Technology Co., Ltd.

Co-applicant after: Beijing Sursen Electronic Technology Co., Ltd.

Co-applicant after: Beijing Sursen Network Technology Co., Ltd.

Co-applicant after: Beijing Sursen Digital Library Software Technology Co., Ltd.

Address before: North real estate building 81 No. 100089 Beijing Haidian District Zizhuyuan Road 5 layer

Applicant before: Beijing Suresense International Information Technology Co., Ltd.

ASS Succession or assignment of patent right

Owner name: TIANJIN SHUSHEN SOFTWARE TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: BEIJING SURSEN ELECTRONIC CO., LTD. BEIJING SURSEN NETWORK TECHNOLOGY CO., LTD. BEIJING SURSEN DIGITAL LIBRARY SOFTWARE TECHNOLOGY CO., LTD.

Effective date: 20120509

Owner name: BEIJING SURSEN ELECTRONIC CO., LTD.

Free format text: FORMER OWNER: BEIJING SURESENSE INTERNATIONAL INFORMATION TECHNOLOGY CO., LTD.

Effective date: 20120509

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20120509

Address after: 100191, room 4, 407 floor, Taixing building, 11 Garden East Road, Beijing, Haidian District

Applicant after: Beijing Sursen Electronic Technology Co., Ltd.

Co-applicant after: Tianjin Scholar Software Technology Co., Ltd.

Address before: 100191, Room 408, Taixing building, 11 Garden East Road, Beijing, Haidian District

Applicant before: Beijing Suresense International Information Technology Co., Ltd.

Co-applicant before: Beijing Sursen Electronic Technology Co., Ltd.

Co-applicant before: Beijing Sursen Network Technology Co., Ltd.

Co-applicant before: Beijing Sursen Digital Library Software Technology Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20181126

Address after: 100029 Changxin Building 408-409, 39 Anding Road, Chaoyang District, Beijing

Patentee after: Beijing Sursen Electronic Technology Co., Ltd.

Address before: Room 407, 4th floor, Taixing Building, 11 Garden East Road, Haidian District, Beijing, 100191

Co-patentee before: Tianjin Scholar Software Technology Co., Ltd.

Patentee before: Beijing Sursen Electronic Technology Co., Ltd.

TR01 Transfer of patent right