CN101714222A - Safe electronic stamping method based on notarization stamp of notarization institution - Google Patents

Safe electronic stamping method based on notarization stamp of notarization institution Download PDF

Info

Publication number
CN101714222A
CN101714222A CN200810046234A CN200810046234A CN101714222A CN 101714222 A CN101714222 A CN 101714222A CN 200810046234 A CN200810046234 A CN 200810046234A CN 200810046234 A CN200810046234 A CN 200810046234A CN 101714222 A CN101714222 A CN 101714222A
Authority
CN
China
Prior art keywords
notarization
user
stamped signature
text
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810046234A
Other languages
Chinese (zh)
Inventor
刘学明
申杰锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN200810046234A priority Critical patent/CN101714222A/en
Publication of CN101714222A publication Critical patent/CN101714222A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a safe electronic stamping method based on a notarization stamp of notary authority. The notarization stamp is used for user identification verification, user electronic stamp making, user identification authentication, user stamping and electronic text transmission and authenticating links to ensure the truth of user identification, the legality of electronic stamps, the integrity of electronic texts and the nonrepudiation of an the process of the electronic stamping by adopting a notarization institution notarization stamp technology and sufficiently utilizing a unique position and function, i.e. a verification authority granted by a notarization institution law, thus the safe electronic stamping method based on the notarization stamp is formed. The invention can effective solve the problems of nonuniform technical standards, low authentication authority and impartiality, larger change of a habitual transactional mode, low popularity due to obvious regionalism and profession, and the like which are generated on a PKI system by replacing the CA authentication mechanism mode of the PKI system with the safe electronic stamping method, thereby effectively promoting the fast development of the electronic commerce and the e-government of our country.

Description

Safe electronic signature method based on notary organization's notarization stamp
One. technical field
The present invention discloses a kind of safe electronic signature method, particularly stabs based on notary organization notarization rather than based on the safe electronic signature method of at present common PKI system digital certificate.
Two. background technology
E-file is to produce and store by computing machine and at the text and the figure of transmission over networks, for example trade contract, government document etc. are the bases of E-Government and ecommerce.Electronic Signature then is at the affirmation process of e-file lid with E-seal.Because e-file and E-seal all are to exist with electronic form, so the encryption of the affirmation of participant's true identity, information stores and transmission, and guarantee that the integrality of text and the non repudiation of stamped signature process are four key elements of Electronic Seal System security.
Since the formal enforcement of China's Electronic Signature Law, domestic various Electronic Seal System product continues to bring out, making a general survey of these products, is " public key architecture " based on the PKI system all aspect security almost, and PKI has become the mainstream technology of China's safety of network trade platform.PKI (Public Key Infrastructure) is a kind of key management platform of following set standard, and it can use cryptographic service and essential key and certificate management systems such as encryption and digital signature are provided for all-network.In simple terms, PKI is exactly the infrastructure that security service is provided of utilizing the PKI theory and technology to set up.The basic technology of PKI comprises encryption, digital signature, data integrity mechanism, digital envelope, dual digital signature etc.Complete PKI system must have authenticating authority mechanism (CA), digital certificate storehouse, key backup and recovery system, certificate calcellation system, application interface basic comprising parts such as (API).In the PKI system, e-file signatory's identity is confirmed by its digital certificate of holding, and digital certificate is signed and issued by having authenticating authority mechanism (CA), and it is the core of PKI.Because the importance of CA in the PKI system, if CA mechanism is dangerous or the digital certificate of granting does not have authority, fairness and trustworthiness, ecommerce is not just known where to begin at all.The signature and the distribution of all entity certificates is responsible at the CA safety certification center.The CA safety certification system is made up of certificate departments of examination and approval and certificate operation department.See that theoretically the security of PKI system is at present reliable technique scheme.But PKI is also pessimistic in the present application situation of China, and national departments concerned has been carried out a large amount of guiding popularizations, yet only sees with regard to construction and the ruuning situation of CA, and before practical application was promoted and still walked to and for not for many years, effect was very undesirable.Trace it to its cause, have some relations with the existing following problem of CA:
1. from technological layer, owing to be subjected to the influence of u.s. export restriction, domestic ca authentication technology is researched and developed one's very own, because participating department is a lot, has caused the standard disunity, existing international current standard, the standard that independent research is arranged again, even if same standard, its core content is deviation to some extent also, cause occurring in the cross-certification process " card " thus and go out situation multi-door and " each says he is right ".
2. from application, number of C A certification authority is rigorous inadequately to the granting and the audit of certificate.Though the audit of true identity is also done one's utmost to carry out in domestic relevant CA center before issuing CA certificate at present, but the personnel that examine owing to be correlated with are the staff at CA center oneself or the other staff of its trust often, do not possess desired legally audit reference qualification from these auditors of legal principle, also can't corresponding legal responsibilities; Present on the other hand CA center itself often also is a side of transaction or contract, ordering about of commercial interest, there is unfairness unavoidably, in order to seize market, strict status is confirmed and certificate is just arbitrarily provided in checking not carrying out, be difficult to guarantee the authority and the fairness that authenticate, the certificate legal agency of providing under this background is difficult to accept and believe fully.
3. on business model, ecommerce based on the PKI security platform is in service, it is the participation of CA that both parties must have the third party at trading time period, for example digital certificate issues and online verification etc., the pattern that only needs both parties to participate in getting final product with traditional transaction has very big change, makes both parties feel uncomfortable.
4. on Distribution Pattern, China does not also set up at present national authoritative ca authentication mechanism, according to self needs, many industries and enterprise drop into a huge sum of money one after another and set up the ca authentication mechanism of oneself, because these ca authentication mechanisms exist tangible region and professional, can't satisfy the basic demand of serving as fully towards third party's authenticating authority mechanism of the whole society, and with regard to the internet, should can not there be the region restriction yet, the region of ca authentication mechanism and professional cause the enterprise of the many PKI of entering systems and the electronic transaction that unit could not realize and stride this locality or industry smoothly, this present situation has seriously restricted the practical application of PKI system in China, its result causes the construction of the security platform of Electronic Commerce in China and E-Government can't obtain satisfied propelling always, and also the normal development to Electronic Commerce in China and E-Government has produced adverse influence.
Notary system is the preventative structure of the law of a current international practice, be the specialized agency and the professional thereof of state's laws mandate, through litigant's application,, prove the structure of the law of its authenticity, legitimacy, legitimacy to the relevant law behavior, by the document and the fact of legal sense.The preventive measure of notary system and to the appropriateness intervention of people's business activity for ensureing transaction security, is dissolved transaction risk, reduces cost of judicial, alleviates litigant's caseloads, and strengthening the social credibility construction has irreplaceable vital role undoubtedly.Notarization is the application of notary organization according to nature person, legal person or its hetero-organization, according to legal procedure to the authenticity of act in-the-law, the fact that legal sense is arranged and document, the activity that legitimacy is proved, notarization is a sign that society is sincere, it is the system of a national preclude disputes, be the means that reduce the marketing risk, reduce the dependence of right relief cost especially.Notary organization sets up in accordance with the law, does not accomplish the object of profit making, independent in accordance with the law public welfare and non-profit-making certifying authority of exercising attest function, independent by bear civil liability.Notary organization or notary public obtain and exercise this proof power by the mode of state's laws mandate.Through the item of certification by a notary, has preferential evidential effect and the corresponding effectiveness of executing in accordance with the law.At present notarization mechanism of the existing thousands of families of China has covered all parts of the country with relevant professional website, proves the basis of having established legal principle and practice for the unit that participates in e-commerce and e-government and enterprise and even individual provide the public affairs of legal identity to believe.Therefore, in e-commerce and e-government, especially in the safe electronic sealing system, utilize this national special resource of notary organization and make it give full play to the proof that law authorizes and weigh this unique status and effect, can effectively improve many challenges that the ca authentication organizational construction is faced under the PKI system, thereby effectively promote the fast development of Electronic Commerce in China and E-Government.
Three. summary of the invention
The object of the present invention is to provide a kind of new safe electronic signature method, the security of this method is based on the notarization stamp of notary organization rather than based on common PKI system and digital certificate, special role with the existing notary organization of performance China improves some application problems that the PKI system is caused.
For realizing this purpose, the invention provides a kind of new safe electronic signature method, may further comprise the steps:
A, user real identification notarization.The user submits true legal proof of identification to notary organization, and notary organization provides papery notarization file, provides a description the e-file of this notarial document key message and notary organization's industrial and commercial registration information simultaneously, is called " notarization is stabbed " among the present invention.Form notarization stamp summary with the HASH coding and stab encryption and package, the stamp information of notarizing can not be changed with notarization.The electronic edition of this notarization literary composition and notarization are stabbed in notarization machine system database and are retained its copy.
B, user's electronic making stamp.The electronic pictures of user's seal is imported the special-purpose ActiveX control of user's electronic seal, and in this ActiveX control, be encapsulated into the user and stab with chapter key, notarization, stab with HASH coding formation summary and E-seal, user key, notarization then and carry out encryption and package, make user's electronic seal and notarization stab and to change, thereby guarantee the authenticity and the legitimacy of user's electronic seal.User's electronic seal, user can be stored in the special memory storage according to actual conditions with chapter key, notarization stamp and summary info.
C, subscriber authentication.The user provides through the notarization of the own legal identity of proof of special stores processor and stabs system, and the system decrypts notarization is stabbed and content is stabbed in the checking notarization.Can be verified by the network-in-dialing notary organization's server of awaring a certificate in case of necessity.
D, user's stamped signature.During stamped signature, system verifies that at first the user uses the chapter key, after using the chapter key authentication by the user, and the special-purpose ActiveX control of its user's electronic seal of user's may command, implement the stamped signature operation in the e-text appropriate location, perhaps according to circumstances system operates at the stamped signature that desired location is implemented to set automatically.
In case the user determines stamped signature and finishes that system will generate two packets: stamped signature text packets and decruption key bag:
At first, system obtains summary and the encryption and package that e-text, user's electronic seal and notarization are stabbed by the HASH encryption algorithm, forming three's stamped signature text that is mutually related, but the stamped signature text after the encapsulation is with the packing of operating file form, to generate " stamped signature text packets ".When different user adds new stamped signature at same e-text, system will obtain summary and the encryption and package that e-text, all stamped signature users' E-seal and all stamped signature users' notarization is stabbed by hashing algorithm, with be mutually related " the stamped signature text packets " that the E-seal that forms new e-text, all stamped signature users and all stamped signature users' notarization is stabbed, follow-up stamped signature operation can not be made amendment to the e-text of previous stamped signature and stamped signature information and notarization stamp information.
After this, system generates required " the decruption key bag " of this " stamped signature text packets " deciphering automatically.This decruption key bag comprises stamped signature text packets decruption key, stab with the correlation tag of stamped signature text packets, notarization and obtain this three's summary by the HASH encryption algorithm, and system carries out encryption and package with these information, but and packs with the operating file form.In " decruption key bag " generative process, can increase the operation of User Defined decruption key as required.
E, e-text transmission and checking.The present invention adopts security and the non repudiation of two step transmission methods to guarantee that e-text sends.
The first step sends: when transmit leg confirms that system only sends " stamped signature text packets " when other addresses send the stamped signature text.The take over party system at first checks by the summary info that receives whether received file is changed or destroyed, to confirm the integrality of file.When needing deciphering to use e-text, system at first generates one " electronics payment received letter ", and this electronics payment received letter content comprises take over party's system's register information, take over party address, time of reception, take over party notarize stamp, letter in reply time, letter in reply take over party address information etc.Electronics payment received letter sends to transmit leg by the transmission address of e-file.
Second step sent: after transmit leg receives and confirms " the electronics payment received letter " of stamped signature text, " the decruption key bag " of this stamped signature text correspondence sent to the take over party.The take over party system is after receiving " decruption key bag ", and click can use this packet that " stamped signature text packets " is decrypted use after making it to move automatically and unpacking.The electronics authority that e-file sends and receives is retained and be can be used as to " electronics payment received letter " in the transmit leg system.Certainly, " the stamped signature text packets " retained in the reciever system can be used as the proof that transmit leg has sent e-file.
Result of use of the present invention is:
The present invention is on the basis of the validity, integrality and the non repudiation that guarantee Electronic Signature, adopt notary organs' notarization stamp technology, make full use of the mode of notary organization by the state's laws mandate and obtain and exercise this proof power, item through its certification by a notary has preferential evidential effect in accordance with the law and executes special status and the function that this law of effectiveness is authorized accordingly, and covers distribution service mechanism in all parts of the country.The simple extension of carrying out special value-added service on the original functional basis of notary organization gets final product smooth implementation " E-seal and legal identity notarization " work.Substitute present ca authentication mechanic mode thus, can effectively improve the authority of the technical standard disunity that causes by the PKI system, authentication and fairness is not high, bigger change takes place the trade mode of custom and significantly region and professional cause problems such as versatility is not high.
Four. description of drawings
Fig. 1 is the logical process schematic flow sheet that the present invention is based on the safe electronic signature method of notary organization's notarization stamp.
Five. embodiment
Embodiment 1
Present embodiment explanation the present invention is based on the preservation of information such as user's electronic seal, user key, notary organization's notarization stamp under the conventional applicable cases in the safe electronic signature method that notary organization's notarization stabs.In the present embodiment, the dedicated storage means of information such as storage user's electronic seal, user key, notary organization's notarization stamp adopts USB-KEY.Common occasions such as e-commerce and e-government can adopt this scheme.
Embodiment 2
Present embodiment explanation the present invention is based on the preservation of information such as user's electronic seal, user key, notary organization's notarization stamp under the special cases in the safe electronic signature method that notary organization's notarization stabs.In the present embodiment, the dedicated storage means of information such as storage user's electronic seal, user key, notary organization's notarization stamp adopts through custom-designed isolated plant.This scheme can be adopted in some special application scenarios.
Embodiment 3
Present embodiment explanation the present invention is based on the preservation of information such as user's electronic seal, user key, notary organization's notarization stamp under bank's IC-card applicable cases in the safe electronic signature method that notary organization's notarization stabs.Need provide the notarization and the notarization of notary organization to stab when in the present embodiment, the user opens the books the family.Information such as user's electronic seal, user key, notary organization's notarization stamp will directly store in the IC-card.When the user carried out the transaction of storage/access money on electric terminals such as bank outlets and ATM, the true and false of differentiating user identity was stabbed in the notarization of directly reading in the IC-card, and keeps information such as user's electronic seal, user key in Flow Record.The user's electronic seal can be printed on this transaction authority during the printout of transaction authority.

Claims (1)

1. based on the safe electronic signature method of notary organization's notarization stamp, it is characterized in that may further comprise the steps:
A, user real identification notarization.The user submits true legal proof of identification to notary organization, and notary organization provides papery notarization file, provides a description the e-file of this notarial document key message and notary organization's industrial and commercial registration information simultaneously, is called " notarization is stabbed " among the present invention.Form notarization stamp summary with the HASH coding and stab encryption and package, the stamp information of notarizing can not be changed with notarization.The electronic edition of this notarization literary composition and notarization are stabbed in notarization machine system database and are retained its copy.
B, user's electronic making stamp.The electronic pictures of user's seal is imported the special-purpose ActiveX control of user's electronic seal, and in this ActiveX control, be encapsulated into the user and stab with chapter key, notarization, stab with HASH coding formation summary and E-seal, user key, notarization then and carry out encryption and package, make user's electronic seal and notarization stab and to change, thereby guarantee the authenticity and the legitimacy of user's electronic seal.User's electronic seal, user can be stored in the dedicated storage means according to actual conditions with chapter key, notarization stamp and summary info.
C, subscriber authentication.The user provides through the notarization of the own legal identity of proof of special stores processor and stabs system, and the system decrypts notarization is stabbed and content is stabbed in the checking notarization.Can be verified by the network-in-dialing notary organization's server of awaring a certificate in case of necessity.
D, user's stamped signature.During stamped signature, system verifies that at first the user uses the chapter key, after using the chapter key authentication by the user, and the special-purpose ActiveX control of its user's electronic seal of user's may command, implement the stamped signature operation in the e-text appropriate location, perhaps according to circumstances system operates at the stamped signature that desired location is implemented to set automatically.
In case the user determines stamped signature and finishes that system will generate two packets: stamped signature text packets and decruption key bag:
At first, system obtains summary and the encryption and package that e-text, user's electronic seal and notarization are stabbed by the HASH encryption algorithm, forming three's stamped signature text that is mutually related, but the stamped signature text after the encapsulation is with the packing of operating file form, to generate " stamped signature text packets ".When different user adds new stamped signature at same e-text, system will obtain summary and the encryption and package that e-text, all stamped signature users' E-seal and all stamped signature users' notarization is stabbed by hashing algorithm, with be mutually related " the stamped signature text packets " that the E-seal that forms new e-text, all stamped signature users and all stamped signature users' notarization is stabbed, follow-up stamped signature operation can not be made amendment to the e-text of previous stamped signature and stamped signature information and notarization stamp information.
After this, system generates required " the decruption key bag " of this " stamped signature text packets " deciphering automatically.This decruption key bag comprises stamped signature text packets decruption key, stab with the correlation tag of stamped signature text packets, notarization and obtain this three's summary by the HASH encryption algorithm, and system carries out encryption and package with these information, but and packs with the operating file form.In " decruption key bag " generative process, can increase the operation of User Defined decruption key as required.
E, e-text transmission and checking.The present invention adopts security and the non repudiation of two step transmission methods to guarantee that e-text sends.
The first step sends: when transmit leg confirms that system only sends " stamped signature text packets " when other addresses send the stamped signature text.The take over party system at first checks by the summary info that receives whether received file is changed or destroyed, to confirm the integrality of file.When needing deciphering to use e-text, system at first generates one " electronics payment received letter ", and this electronics payment received letter content comprises take over party's system's register information, take over party address, time of reception, take over party notarize stamp, letter in reply time, letter in reply take over party address information etc.Electronics payment received letter sends to transmit leg by the transmission address of e-file.
Second step sent: after transmit leg receives and confirms " the electronics payment received letter " of stamped signature text, " the decruption key bag " of this stamped signature text correspondence sent to the take over party.The take over party system is after receiving " decruption key bag ", and click can use this packet that " stamped signature text packets " is decrypted use after making it to move automatically and unpacking.The electronics authority that e-file sends and receives is retained and be can be used as to " electronics payment received letter " in the transmit leg system.Certainly, " the stamped signature text packets " retained in the take over party system can be used as the proof that transmit leg has sent e-file.
CN200810046234A 2008-10-08 2008-10-08 Safe electronic stamping method based on notarization stamp of notarization institution Pending CN101714222A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810046234A CN101714222A (en) 2008-10-08 2008-10-08 Safe electronic stamping method based on notarization stamp of notarization institution

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810046234A CN101714222A (en) 2008-10-08 2008-10-08 Safe electronic stamping method based on notarization stamp of notarization institution

Publications (1)

Publication Number Publication Date
CN101714222A true CN101714222A (en) 2010-05-26

Family

ID=42417853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810046234A Pending CN101714222A (en) 2008-10-08 2008-10-08 Safe electronic stamping method based on notarization stamp of notarization institution

Country Status (1)

Country Link
CN (1) CN101714222A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104166936A (en) * 2014-08-14 2014-11-26 江苏买卖网电子商务有限公司 Electronic contract storage and validation method
CN104766172A (en) * 2015-04-15 2015-07-08 上海辉印电子科技有限公司 Verifiable seal mold obtaining method
WO2017024934A1 (en) * 2015-08-07 2017-02-16 阿里巴巴集团控股有限公司 Electronic signing method, device and signing server
CN107392431A (en) * 2017-06-26 2017-11-24 南京田中机电再制造有限公司 A kind of intelligent online official seal print system
CN110232282A (en) * 2019-05-20 2019-09-13 深圳市中电数通智慧安全科技股份有限公司 A kind of fire-fighting checks the electronic signature method and system of table
CN111769955A (en) * 2020-06-30 2020-10-13 成都卫士通信息产业股份有限公司 Electronic signature generation method and device, electronic signature verification method and device and related components
CN116132069A (en) * 2023-04-10 2023-05-16 江苏省国信数字科技有限公司 Method for realizing interconnection and intercommunication of multi-CA digital certificate and multi-electronic signature

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104166936A (en) * 2014-08-14 2014-11-26 江苏买卖网电子商务有限公司 Electronic contract storage and validation method
CN104166936B (en) * 2014-08-14 2018-08-10 江苏买卖网电子商务有限公司 A kind of storage of electronic contract and verification method
CN104766172A (en) * 2015-04-15 2015-07-08 上海辉印电子科技有限公司 Verifiable seal mold obtaining method
WO2017024934A1 (en) * 2015-08-07 2017-02-16 阿里巴巴集团控股有限公司 Electronic signing method, device and signing server
CN107392431A (en) * 2017-06-26 2017-11-24 南京田中机电再制造有限公司 A kind of intelligent online official seal print system
CN110232282A (en) * 2019-05-20 2019-09-13 深圳市中电数通智慧安全科技股份有限公司 A kind of fire-fighting checks the electronic signature method and system of table
CN111769955A (en) * 2020-06-30 2020-10-13 成都卫士通信息产业股份有限公司 Electronic signature generation method and device, electronic signature verification method and device and related components
CN111769955B (en) * 2020-06-30 2022-08-23 成都卫士通信息产业股份有限公司 Electronic signature generation method and device, electronic signature verification method and device and related components
CN116132069A (en) * 2023-04-10 2023-05-16 江苏省国信数字科技有限公司 Method for realizing interconnection and intercommunication of multi-CA digital certificate and multi-electronic signature

Similar Documents

Publication Publication Date Title
TWI701623B (en) Logistics information transmission method, system and device based on blockchain
US11481768B2 (en) System and method of generating and validating encapsulated cryptographic tokens based on multiple digital signatures
US10410213B2 (en) Encapsulated security tokens for electronic transactions
CN109409122A (en) File memory method and its electronic equipment, storage medium
CN107180350A (en) A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system
CN109547206B (en) Digital certificate processing method and related device
CN101546407B (en) Electronic commerce system and management method thereof based on digital certificate
Chen et al. An IoT-based traceable drug anti-counterfeiting management system
CN107196762A (en) One kind weighs method really towards big data
CN112613956B (en) Bidding processing method and device
CN112257085B (en) Bid bidding processing method, system, equipment and medium based on blockchain
CN101714222A (en) Safe electronic stamping method based on notarization stamp of notarization institution
Li et al. A decentralized and secure blockchain platform for open fair data trading
CN102609834A (en) Countersigning method and system
CN109858911A (en) Qualification verification method, device, system, equipment and readable storage medium storing program for executing
CN101447985A (en) Digital credentials method based on notarization information
CN101833724A (en) System and method for saving e-commerce data telegraph text and forming judicial evidence by other party
US11334884B2 (en) Encapsulated security tokens for electronic transactions
CN109858904A (en) Data processing method and device based on block chain
CN111417945A (en) Credible insurance letter based on block chain
CN112801778A (en) Federated bad asset blockchain
CN114358766A (en) Method, equipment and blockchain system for trading green electric certificates
Rattan et al. E-Commerce Security using PKI approach
CN110502931B (en) Block chain-based internet arbitration and privacy protection method
Boontaetae et al. RDI: Real digital identity based on decentralized PKI

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20100526