CN104376252B - Content verification method based on digital signature code - Google Patents

Content verification method based on digital signature code Download PDF

Info

Publication number
CN104376252B
CN104376252B CN201310349633.9A CN201310349633A CN104376252B CN 104376252 B CN104376252 B CN 104376252B CN 201310349633 A CN201310349633 A CN 201310349633A CN 104376252 B CN104376252 B CN 104376252B
Authority
CN
China
Prior art keywords
stamped signature
code
digital
signature code
stamped
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310349633.9A
Other languages
Chinese (zh)
Other versions
CN104376252A (en
Inventor
陈杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310349633.9A priority Critical patent/CN104376252B/en
Publication of CN104376252A publication Critical patent/CN104376252A/en
Application granted granted Critical
Publication of CN104376252B publication Critical patent/CN104376252B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A kind of content verification method based on digital signature code, comprises:One endorses step, is endorsed using one first private key pair one first digital content, to produce one first digital signature corresponding with this first digital content and one first stamped signature code;One dual stamped signature step, first according to this this first digital signature of the first stamped signature code verification, one second private key is recycled to be endorsed again according to this first stamped signature code, to produce one second corresponding digital signature and one second stamped signature code, between this first stamped signature code and this second stamped signature code, there is a connection, and form a stamped signature code-group, and this first digital signature and this second digital signature form a digital signature group and a verification step, according in this stamped signature code-group at least one, verify at least one in this digital signature group.The present invention can easily confirm the true and false of digital content endorsed.

Description

Content verification method based on digital signature code
Technical field
The invention relates to a kind of content verification method, particularly relate to a kind of content verification based on digital signature code Method.
Background technology
On 2 23rd, 2013 reports of United Daily News, the Ministry of Internal Affairs represents:" natural person's voucher IC-card combines convenient super business's service mesh The convenience store of front cooperation, 4791 unifications providing ibon service including the whole nation surpass business's retail sales, the whole nation provides FamiPort clothes The convenient super business of 2830 whole family of business, the whole nation provide life-ET and 1252 Lai Erfu of large-scale compounding machine service to surpass business's retail sales, With OK convenience store Taibei city wherein 5 branch.”.Illustrate in news that government energetically guides natural person's voucher IC-card Enter among the daily life of the people.But, when inspecting published many patents at present, such as encryption and decryption technology, digital certificate, During asymmetric key digital signature etc., due to excessively complicated using program, using upper more inconvenience for common people, thus Abandon the use of related stamped signature and encryption and decryption functions.In fact, rigorous asymmetric key digital signature mechanism such as natural person with Card IC-card, be the important tool of the Government Electronic thoughts administration, through some improvement after can also easily inter-trade, And use in common people's daily life.
Content of the invention
Therefore, the purpose of the present invention, is to provide a kind of content verification method based on digital signature code.
Then the content verification method based on digital signature code for the present invention is it is adaptable to one has the server of data base, Comprise endorse step, a dual stamped signature step and a verification step.
This step of endorsing, is endorsed using one first private key pair one first digital content, to produce and this first numeral One first corresponding digital signature of content and one first stamped signature code, then by this first digital content, the first digital signature And first stamped signature code upload to this server data base.
This dual stamped signature step, first according to this this first digital signature of the first stamped signature code verification, recycles one second private Key is endorsed again according to this first stamped signature code, to produce one second corresponding digital signature and one second stamped signature code And it is uploaded to the data base of this server, between this first stamped signature code and this second stamped signature code, there is a connection, and formed One stamped signature code-group, and this first digital signature and this second digital signature form a digital signature group.
This verification step, according at least one of this stamped signature code-group, verifies at least one of this digital signature group.
The beneficial effects of the present invention is:The present invention is carried out repeatedly to digital content in different forms using multiple private keys Endorse, to produce multiple associated stamped signature codes and digital signature, the user of the true and false to be confirmed simply enters above-mentioned Stamped signature code, you can easily confirm the true and false of digital content endorsed.
Brief description
Fig. 1 is a flow chart, and the first, second, the 5th and the 7th preferred embodiment of the present invention is described;
Fig. 2 is a flow chart, and the 3rd preferred embodiment of the present invention is described;
Fig. 3 is a flow chart, and the 4th preferred embodiment of the present invention is described;
Fig. 4 is a flow chart, and the 6th preferred embodiment of the present invention is described;
Fig. 5 is an Operation interface diagram, and first and second digital content of the present invention is described;
Fig. 6 is an Operation interface diagram, illustrates to produce the first digital signature;
Fig. 7 is an Operation interface diagram, illustrates to produce the first stamped signature code;
Fig. 8 is an Operation interface diagram, and line data base is described;
Fig. 9 is an Operation interface diagram, and write into Databasce success is described;
Figure 10 is an Operation interface diagram, illustrates to verify the first digital signature;
Figure 11 is an Operation interface diagram, illustrates to produce the second digital signature;
Figure 12 is an Operation interface diagram, database of descriptions field;
Figure 13 is an Operation interface diagram, database of descriptions field;
Figure 14 is an Operation interface diagram, illustrates to verify stamped signature code-group;
Figure 15 is an Operation interface diagram, and input document IC-card number is described;
Figure 16 is an Operation interface diagram, illustrates to download voucher (public key);
Figure 17 is an Operation interface diagram, illustrates to verify stamped signature;
Figure 18 is an Operation interface diagram, illustrates that display is proved to be successful information;
Figure 19 is an Operation interface diagram, illustrates to show stamped signature people and checking unit;
Figure 20 is an Operation interface diagram, illustrates to show first, second digital content being proved to be successful;
Figure 21 is an Operation interface diagram, and player display preset data content is described;
Figure 22 is an Operation interface diagram, and player display network address is described;
Figure 23 is an Operation interface diagram, illustrates to input custom identifying code (the first stamped signature code);
Figure 24 is an Operation interface diagram, illustrates to select certificate file;
Figure 25 is an Operation interface diagram, illustrates to show certificate file;
Figure 26 is an Operation interface diagram, illustrates to show stamped signature people and checking unit;
Figure 27 is an Operation interface diagram, illustrates to show webpage (digital content);And
Figure 28 is a schematic diagram, and a check that can see corrigendum date and two stamped signature people is described.
Specific embodiment
Below in conjunction with the accompanying drawings and embodiment the present invention is described in detail it is noted that, in the following description content In, similar element is to be represented with being identically numbered.
Refering to Fig. 1, the first preferred embodiment based on the content verification method of digital signature code for the present invention is it is adaptable to one There is the server (not shown) of data base, comprise endorse step S1, dual stamped signature step S2 and a verification step S3.With The lower computer (not shown) using a terminating machine software program having been loaded with realizing the present invention and this there is data base Server, coordinate " the dynamic business card of Li Mushan " character file(Archives and shelves described later, are typically expressed as in the term of continent " file ")Further illustrate the details when carrying out " more signing " for this method.This dynamic business card is one (the first) digital content (digital content), content is academic title, the time in this position and the affiliated company of Mr. Li Mushan.
First, in this step S1 of endorsing, endorsed using one first private key pair one first digital content, to produce and to be somebody's turn to do Corresponding one first digital signature of first digital content and one first stamped signature code, then by this first digital content, the first number Word stamped signature and the first stamped signature code upload to this server data base.
In this step, the management personnel of the affiliated company of Mr. Li Mushan, by voucher IC-card, insert the card reader of computer In, then click " generation stamped signature ", endorsed using this dynamic business card of the first private key pair in this voucher IC-card, this one endorses The method that process produces digital signature with known use voucher IC-card is identical, so repeating no more.Then, complete it endorsing Afterwards, this computer uploads this first digital content, the first digital signature and the first stamped signature code to this server, preferably real at this Apply in example, this server is arranged at Hinet company, this terminating machine software program is according to dbip (data base IP), dbna (number According to library name), dbacc (data base's account number), dbpwd (database password), link to this server.After uploading success, This terminating machine software program display information:" stamped signature data write into Databasce success!", server returns a storage successful information To computer, and stamped signature code " 16472455 " produced by Computer display.This 16472455 stamped signature code is This first stamped signature code.In this preferred embodiment, this voucher IC-card is Ministry of Economic Affaris's industry and commerce voucher card, for providing this first private To be endorsed, this first stamped signature code is the word string digital including 8 to key, or is converted to bar code form it is also possible to pass through One QR Code (Quick Response Code) generator or software (not shown), by produced stamped signature code with QR The form of Code presents, and its form and producing method are not limited with the present embodiment.
Then, in this dual stamped signature step S2, first according to this this first digital signature of the first stamped signature code verification, recycle One second private key is endorsed again according to this first stamped signature code, to produce corresponding one second digital signature and one second Stamped signature code upload to this server data base.This first stamped signature code and this second stamped signature code have a connection, and shape Become a stamped signature code-group, and this first digital signature and this second digital signature form a digital signature group.Using this second Before private key is endorsed again according to this first stamped signature code, updating this first digital content is one second digital content, makes This second stamped signature code is to should the second digital content.And, this first private key and the second private key be belong to same user (or Same company) same private key.
Changed because the academic title of Mr. Li Mushan is existing, so when carrying out dual stamped signature step S2, affiliated company Management personnel first pass through the computer having been loaded with terminating machine software program, carry out checking sub-step S21, by inputting first Stamped signature code " 16472455 ", is downloaded for verifying the data needed for the first digital signature by server, including this dynamic business card (the first digital content) and this first digital signature, is then obtained the card number of industrial and commercial voucher card by the data base of server " MT00000001252127 ", then by Ministry of Economic Affaris " credentials download and query webpage " according to this card number download one correspond to this First public key of one private key(This first public key is among the voucher downloaded), to verify the first digital signature, this proof procedure Also verify that the method for digital signature is identical with known use voucher IC-card, so repeating no more.It is proved to be successful and can continue to hold Ensuing sub-step S22 of endorsing of row is that is to say, that carry out during dual stamped signature step S2 it is necessary to first be verified first using computer Front (first) digital signature.After a successful authentication, computer screen shows " stamped signature people:The limited public affairs of Taiwan high-order net share Department ", " checking unit:Industrial and commercial credential management " center ", allows next person to be endorsed confirm the status of the previous person of endorsing, that is, this first Private key everyone (being same people in this preferred embodiment).Now, screen display " stamped signature is proved to be successful ", and " Li Mu The dynamic business card on mountain " also during be downloaded in computer.
Then, in sub-step S22 of endorsing, management personnel click " renewal stamped signature " in the form of terminating machine software program, " the dynamic business card of Li Mushan " character file of input redaction, i.e. the second digital content, then input previous label in input field Chapter code, i.e. this first stamped signature code 16472455.It is inserted into and the industry and commerce voucher of identical Ministry of Economic Affaris in this endorses step Card, then clicks on " updating stamped signature content ", and now, " the dynamic business card of Li Mushan " of this redaction produces the second number in a computer Word stamped signature and the second stamped signature code, 16472686, and it is uploaded to this server, and this second stamped signature code and the first stamped signature code Between set up a connection in the data base of server, to form the label including this second stamped signature code and the first stamped signature code Chapter code-group.Similarly, due to the corresponding relation between this connection, and stamped signature code and digital signature, this second numeral is signed Also form one between chapter and the first digital signature and include this second digital signature and the first numeral label in the data base of server The digital signature group of chapter.
Then, in this verification step S3, according in this stamped signature code-group at least one, verify in this digital signature group at least One.In this step, any user wanting confirmation " the dynamic business card of Li Mushan " true and false, can be according in this stamped signature code-group The first stamped signature code, by this connection, verify the first digital signature in this digital signature group and the second digital signature, and To this second digital content.After the completion of the checking of this second digital signature, and then verify the first digital signature.This user exists Load the computer of this terminating machine software program, clicked " checking stamped signature ", then input this first stamped signature code " 16472455 ", download this second digital signature by this server, and after finding card number in the data base of this server, then by " credentials download and query webpage " of Ministry of Economic Affaris downloads the public key (being also called voucher) of stamped signature corresponding with this private key, then point Hit button to be verified, after being proved to be successful, screen display " stamped signature people:Taiwan high-order net limited company, checking are single Position:Industrial and commercial credential management " center ".Then, computer is successfully downloaded " the dynamic business card of Li Mushan " and is shown on screen.Because being Same private key is endorsed, so voucher also can be downloaded by inputting this second stamped signature code " 16472686 ".But display Stamped signature code on (being sent out) paper namecard or the online business card is with the optimal also optimum of the first stamped signature code.
" unusual fluctuation state shown in dynamic business card by redaction:From on 2 19th, 2013, Li Mushan is promoted to Taibei branch company Business assistant manager " can confirm that Mr. Li Mushan in the business assistant manager that 2 months 19 days has been Taibei branch company afterwards.It is this above First aspect of bright first preferred embodiment.
Significantly, since after carrying out this sub-step S22 of endorsing, this second stamped signature code and the first stamped signature code Between there is a connection in the data base of server, it is also possible to be connected to the therefore after inputting this second stamped signature code One stamped signature code, to download the first digital signature and corresponding prototype version " the dynamic business card of Li Mushan " and second simultaneously Digital signature and " the dynamic business card of Li Mushan " of corresponding redaction, complete certification in the public key decoding passing through respectively to download Afterwards, can confirm that " the dynamic business card of Li Mushan " of this two version all belongs to truly, and check dynamic business card in annotation time permissible The position unusual fluctuation of solution Mr. Li Mushan.This is the second aspect of the present invention first preferred embodiment.
According to " letter alarm " report:Liu Yonghong pretends to be People Daily agency's pair using the employee's card altered and the business card privately printed Editor-in-chief, pretends to be People Daily agency leader to deceive to obtain 620,000 yuan of RMB to help people to handle affairs to run after fame, Liu Yonghong is sentenced by Dongcheng law court Fixed-term imprisonment 12 years.On March 28th, 2013 Today Evening is reported:" Zhao Xiyong pretends to be State Council high-ranking official to swindle four provinces, more than 2 years Come, with oneself once in automobile industry working experience, and well understanding of national policy is investigated everywhere, be local economy " Arteries and veins ", until March 8 this year, is penetrated by Research Office of the State Council, ' false imperial envoy ' Zhao ' director ' ".If the present invention is able to popularization and application, This generation pretending to be event then can be avoided.
Refering to Fig. 1, the present invention is equally comprised based on the second preferred embodiment of the content verification method of digital signature code One endorses step S1, dual stamped signature step S2 and a verification step S3.
Need to have wrongly write check content when financial institution faces cabinet below to change, carry out the situation of " multiple label ", enter one Step explanation this method.Check in this preferred embodiment and bank first have an agreement as needing company and commissarial confirmation Can come into force.
First, in this step S1 of endorsing, endorsed using one first private key pair one first digital content, to produce and to be somebody's turn to do One first corresponding digital signature of first digital content and one first stamped signature code, then by this first digital content, first Digital signature and the first stamped signature code upload to this server data base.In this step, the check withheld is swept by bank Retouch and save as " altered cheque content .pdf on line " archives and pass to the company opening this check, that is, in this first numeral Hold, then utilize a private key pair of company should " altered cheque content .pdf on line " archives be endorsed, signed with producing (first) Chapter code " 453D321D " and the first digital signature " SignFile.pdf ", are then uploaded to this server.Preferably implement at this In example, this first private key is provided by the industrial and commercial voucher card of company.
Then, in this dual stamped signature step S2, first according to this this first digital signature of the first stamped signature code verification, recycle One second private key is endorsed again according to this first stamped signature code, to produce corresponding one second digital signature and one second Stamped signature code upload to this server data base.Between this first stamped signature code and this second stamped signature code, there is a connection, And form a stamped signature code-group, and this first digital signature and this second digital signature form a digital signature group.Should utilizing After second private key is endorsed again according to this first stamped signature code, this first stamped signature code phase corresponding with the second stamped signature code The first same digital content.And, this first private key and the second private key are different private keys.In this step, company is intended to this " altered cheque content .pdf on line " archives carry out " multiple label ", and therefore corporate operations personnel should prior to the input of terminating machine software program First stamped signature code " 453D321D ", by this first digital signature " SignFile.pdf " and " altered cheque content .pdf on line " It is downloaded to computer, to carry out verifying sub-step 21.In checking sub-step 21, management personnel first by Ministry of Economic Affaris " under voucher Carry and query webpage " download corresponding public key (public key is being downloaded among voucher), if this first numeral can be signed by this public key really Zhang Xiekai, is endorsed by company before expression really.Then carry out endorsing sub-step S22, and the representative representing company is using genus (second) private key pair in his natural person's voucher card should " altered cheque content .pdf on line " be endorsed, to produce second again Digital signature and the second stamped signature code " 4B19332C ", and it is uploaded to the data base of this server.
Then, in this verification step S3, according in this stamped signature code-group at least one, verify in this digital signature group extremely Few one.This preferred embodiment is according to the first stamped signature code in this stamped signature code-group, by this connection, verifies this number The first digital signature in word stamped signature group and the second digital signature, and obtain this first digital content.In this step, people from bank Whether the check after member is intended to confirm this corrigendum has obtained company and commissarial accreditation, therefore has been loaded with this at any one The computer of terminating machine software program, inputs the first stamped signature code informed by corporate operations personnel or representative " 453D321D ", due to there is a connection between this second stamped signature code and the first stamped signature code, therefore can be by server count According to finding corresponding card number (source of the second private key and the first private key) in storehouse, it is respectively in this preferred embodiment " TP03120322092065 " and " MT00000001252127 ", bank personnel can be according to this by the " credentials download and looking into of Ministry of Economic Affaris Ask webpage " download to corresponding second public key and the first public key.Then, then by server download this second digital signature and first Digital signature, and first using the second public key decryptions, it is then used by the first public key decryptions, if success, representing should " change on line Ticket content .pdf " archives are really through company and commissarial accreditation.In this preferred embodiment, data base includes following hurdle Position, schematically as follows:
Stamped signature code Card number Digital signature Connect
453D321D TP03120322092065 SignFile.pdf 4B19332C
4B19332C MT00000001252127 SignFile2.pdf 453D321D
Figure 28 is the schematic diagram of this check it can be seen that corrigendum date, and two stamped signature people.
It should be noted that " multiple sign " used in this preferred embodiment with used in the first good embodiment " more The difference of label " is, the first private key when " more signing " and the second private key are that same people (or company, legal person) owns, and " multiple label " When for different people (or company, legal person) own.In addition, when " more sign ", this first digital content is updated to redaction or not The electronic record of same format, when " multiple sign ", the first numeral for identical content that this first private key and the second private key are endorsed Content.All it is uploaded to the server of bank with the first private key, so bank personnel is looked into after endorsing after endorsing and with the second private key The Business Name of this check is opened, you can learn this first stamped signature code in the data base asking bank.
In this preferred embodiment, written agreement is agreed to bank money order, is propped up in advance for company, the personal bank with contact In ticket, various subpoena, when client there occurs that some minor errors (for example the date wrongly writes) are corrected for using the present invention filling in, Client is just not required to as in person carried seal to return bank's corrigendum in the past.When the method for the present invention makes client right the wrong more just Profit, also saves the daily workload of bank cashier.
In addition, the present invention can be used with contract or insurance, when insurer has part information unusual fluctuation, such as personal phase Pass information unusual fluctuation, or even such as beneficiary change, insurance coverage and insurant etc., and these unusual fluctuations need each side party's Agree to, under agree to according to legal provisions and with written agreement in advance, insurance company parent need not must go to party because of insurance regulation Place asks its change of in person signing, and has been issued to the digital signature of insurance use using government, when company can save insurance operation Between with oily grid electricity fee cost.The construction of policy (as each change and payment) of checking insurance company and checking declaration form content are through supervisor Appraise and decide for each time (code) of office falls within present invention scope applicatory.
Refering to Fig. 2, the 3rd preferred embodiment based on the content verification method of digital signature code for the present invention, comprise one and add Sign step S1, dual stamped signature step S2, multiple stamped signature step S4 and a verification step S3.With this first and second preferably real The difference applying example is, also has multiple stamped signature step S4, first basis between this dual stamped signature step S2 and verification step S3 This this second digital signature of the second stamped signature code verification, recycles one the 3rd private key to carry out again adding according to this second stamped signature code Sign, to produce one the 3rd digital signature and one the 3rd stamped signature code, and the 3rd stamped signature code is added into this stamped signature code-group, should 3rd digital signature is added into this digital signature group.For example, when having the 3rd stamped signature people that is to say, that the 3rd stamped signature people When carrying out " multiple label ", set and between each of data base of this server digital signature code, have a connection, index or a meter Calculation machine routine data makes to be associated between described digital signature code, and when there being the 4th stamped signature people, the rest may be inferred.Similarly, exist When carrying out " more signing ", set in the data base of this server, more sign generation each time or custom stamped signature code is once produced with front Raw or custom stamped signature code has a connection with associated.It is noted that for example more being signed in the 3rd stamped signature people Before, corresponding be a secondary entitled docx of shelves Microsoft Word archives (the first digital content), more signed into A corresponding MP4 archives (the second digital content) can be updated to after work(.
Same taking check as a example, when with bank be about set in addition to company representative people, company in addition it is also necessary to the 3rd people When agreeing to this check ability effective force, after carrying out this endorse step S1 and dual stamped signature step S2, the 3rd people can be prior to this Checking sub-step S41 in multiple stamped signature step S4 first inputs this second stamped signature code to test to this second digital signature Then the digital archives of this check are carried out using (the 3rd) private key in its natural person's voucher by card in sub-step S42 of endorsing again Endorse, to produce the 3rd digital signature and the 3rd stamped signature code, and be uploaded to this server.In the data base of this server, In this stamped signature code-group, the first stamped signature code, the second stamped signature code and the 3rd stamped signature code, and there is connection each other.Should Digital signature group includes the first digital signature, the second digital signature and the 3rd digital signature.
Then, in this verification step S3, due to this connection, bank office staff either pass through this first stamped signature code, second Stamped signature code or the 3rd stamped signature code, or wherein appoint the two, even all, all this first numeral can be downloaded by this server Stamped signature, the second digital signature and the 3rd digital signature, and verified.Certainly, it is suitable for more than three people situation.
Refering to Fig. 3, the 4th preferred embodiment based on the content verification method of digital signature code for the present invention, comprise one and add Sign step S1, dual stamped signature step S2, expiry date verification step S5 and a verification step S3.This dual stamped signature step S2 Confirm that sub-step S23, checking sub-step S21 and are endorsed sub-step S22 including an expiry date.
Its difference from this first, second preferred embodiment is, this first stamped signature code corresponded to for one first effect duration Limit, before carrying out checking sub-step S21 or this verification step S3 in this dual stamped signature step S2, this server first checks at present Whether the time alreadys exceed this first expiry date, if inspection result is yes, represents that this first stamped signature code is invalid and stops Only verify, if inspection result is no, represent that this first stamped signature code is effective and continues checking.In the same manner, this second stamped signature generation Corresponding one second expiry date of code, before carrying out this verification step, this server first checks whether the current time alreadys exceed This second expiry date, if inspection result is yes, represents that this second stamped signature code is invalid and stops checking, if inspection result It is no, represent that this second stamped signature code is effective and continues checking.
As, in step S1 of endorsing taking " the dynamic business card of Li Mushan " in the first aspect of the first preferred embodiment as a example, Its affiliated company first sets one (the first) expiry date and is stored in the data base of this server when this dynamic business card is endorsed, Now this pen data in data base can include the field of one (the first) expiry date, and such as 2013/9/20.Then, dual at this Stamped signature step S2, when company is intended to be endorsed again, after inputting this first stamped signature code, confirms sub-step in expiry date S23 can first check whether the current time alreadys exceed this first stamped signature code (first) expiry date.If now surpassed Cross expiry date, represent that the previous data endorsed is expired, lose credibility, therefore there is no need to be endorsed again.Phase Instead, if not less than expiry date, carry out verifying sub-step S21, related data is downloaded to enter to the first digital signature Row checking, if success, then is endorsed with the second private key, and is set one second expiry date.
Similarly, when any human desires confirms the true and false of this dynamic business card with the second stamped signature code, in this verification step S3 Expiry date verification step S5 before, inputting this server after this second stamped signature code can be by data base stored second (second) expiry date of stamped signature code and current Time transfer receiver, if the current time already exceed this expiry date then it represents that should Second stamped signature code is expired, loses effect, therefore cannot determine the true and false of this dynamic business card.If on the contrary, mesh after comparing The front time not less than this (second) expiry date, then enters this verification step S3, and this second digital signature is verified, when testing Demonstrate,prove successfully then it represents that this dynamic business card is real.
Refering to Fig. 1, the 5th preferred embodiment based on the content verification method of digital signature code for the present invention, this is preferably real Apply example and show how one to be divided in advance two MP3 music multimedia shelves carry out by stamped signature code-group with digital signature group " more signing ", and coordinate the user interface of the present invention to further illustrate.Next, with Taiwan artist Miss Zhang Shaohan one As a example the MP3 voice files of 3.12MB.
5th preferred embodiment based on the content verification method of digital signature code for the present invention, comprises step of endorsing S1, dual stamped signature step S2 and a verification step S3.
In this step S1 of endorsing, endorsed using one first private key pair one first digital content, with produce with this first One first corresponding digital signature of digital content and one first stamped signature code, then by this first digital content, the first numeral Stamped signature and the first stamped signature code upload to this server data base.
In this preferred embodiments, this first private key comes from a voucher IC-card, is Ministry of Economic Affaris's industry and commerce voucher card, it is connected to One mobile computer, has been loaded with realizing a terminating machine software program of the present invention.User is first grasped using Windows The WINRAR compression shelves software making system is divided into Zhang Shaohan mp3 digital music shelves 100 as shown in desktop in Fig. 5 as in Fig. 5 A 1.69MB " Zhang Shaohan part1.rar " shelves 103 (the first digital content), with another 1.38MB's " Zhang Shaohan Part2.rar " shelves 113 (the second digital content).Click option " generation stamped signature " 101, screen display goes out an entitled generation stamped signature Form, as shown in fig. 6, clicking button 102:Selection will be endorsed archives choose the Zhang Shaohan part1.rar shelves on desktop 103, in the password of input field 104 input document IC-card, then, click button 105:Produce Electronic Signature, now voucher IC-card Card reader because execution stamped signature flashing light occurs, window state row 106 show:" starting to produce Electronic Signature " (digital signature). Then, as shown in fig. 7, window state row 106 show:" starting to produce Electronic Signature identifying code " (stamped signature code).Then, as schemed Shown in 8, window state row 106 show:" line data Kucheng's work(!!In write data, please wait a moment ... ".When the form shape in Fig. 9 State row 106 show:" stamped signature data write into Databasce success!!", data base returns a storage successful information and calculates to notes type Machine, as shown in Fig. 9 information boxes 110, " producing Electronic Signature success ", and the produced first stamped signature code of stamped signature success; “72245B3E”.
Refering to Fig. 1 and Figure 10, in this dual stamped signature step S2, first signed according to this first numeral of this first stamped signature code verification Chapter, recycles one second private key to be endorsed again according to this first stamped signature code, is signed with one second numeral producing corresponding Chapter and one second stamped signature code upload, to the data base of this server, have between this first stamped signature code and this second stamped signature code There is a connection, and form a stamped signature code-group, and this first digital signature and this second digital signature form a digital signature group. And, before being endorsed again according to this first stamped signature code using this second private key, increase one second digital content newly extremely The data base of this server.
In this step, using same Ministry of Economic Affaris industry and commerce voucher card with the Zhang Shaohan part2.rar shelves 113 of 1.38MB (the Two digital contents) carry out " more signing ", and newly-increased Zhang Shaohan part2.rar shelves 113, " input previous Electronic Signature in input field Identifying code " 112:" 72245B3E ", then, input and endorse Zhang Shaohan part1.rar shelves 103 when this Ministry of Economic Affaris industry and commerce voucher The password of card, after clicking button " updating stamped signature content " 114, when window state row 106 show:" checking stamped signature success!!", this Step inputs this first stamped signature code " 72245B3E " in mobile computer, and is sent to the data base of server, completes down Carry for verifying that data needed for this first digital signature, to mobile computer, verifies this first digital signature, verify into Work(can continue executing with sub-step S22 of endorsing and test it is necessary to first carry out before sub-step 22 that is to say, that execution each time is endorsed Demonstrate,prove sub-step S21, what the checking of using terminal machine software program had previously produced the first digital content of the first digital signature is Accurate.Then, flashing light in the card reader of voucher IC-card, and now the window state row 106 in Figure 11 show:" update Stamped signature content, is stored in data base's success!!”.Then, server returns a storage successful information, such as Figure 11 information boxes 117: " update stamped signature content, be stored in data base's success!!" shown in, and stamped signature code " 72A331C6 " produced by stamped signature success.This Individual " 72A331C6 " stamped signature code is the second stamped signature code.
Figure 12 and Figure 13 is that in display Hinet Microsoft SQL database storing step, each has stored data. Refering to field title VerifyCode in Figure 12, ID2181 arranges 72245B3E corresponding to 2185 row, is the first stamped signature code.Field Title VerifyCode, ID2190 arranges 72A331C6 corresponding to 2193 row, is the second stamped signature code.The EncData field of Figure 12, It is that this first digital content is converted into two-symbol data that ID2181 arranges to 2185 row, is stored in data after being sent to server Storehouse.The DecData field of Figure 12, it is that this second digital content is converted into two-symbol data that ID2190 arranges to 2193 row, transmission It is stored in data base to server.
Refering to Fig. 1 and Figure 14, this verification step S3, according in this stamped signature code-group at least one, verify this digital signature In group at least one.According to the first stamped signature code in this stamped signature code-group, by this connection, verify in this digital signature group First digital signature and the second digital signature, and obtain this first digital content and this second digital content.
Want the user of download this mp3 archives of certification, in this terminating machine software program, click option " download voucher " 118, screen display goes out the form 119 of one entitled " download voucher ".In input field " Electronic Signature identifying code please be input " 120, will " 72245B3E " (first stamped signature code) inputs, and then push button " obtaining card number by data base " 121, stamped signature people's voucher IC-card Card number display field 122 shows " MT00000001252127 ", and this card number is also printed on the outward appearance of industrial and commercial voucher card, and MT means that it is Industrial and commercial voucher card.After clicking the button " going to " 123 of industrial and commercial credentials download network address, triggering one preset browsing device connects upper Ministry of Economic Affaris " credentials download and query webpage ", such as Figure 15, in the input field " voucher IC card numbers " 124 of webpage, by voucher IC card numbers: MT00000001252127 inputs, then as Figure 16, after pressing " download " button 125 in webpage, credentials download to desktop. Then, refering to Figure 17, in the form returning to terminating machine software program, click option " checking stamped signature ", screen display goes out one and entitled tests The form of signed certificate chapter, continues to click option " selection certificate file ", just now from Ministry of Economic Affaris website on certificate file input desktop The voucher downloaded in webpage, then clicks button " checking Electronic Signature " 126, now, such as Figure 18, screen display one information boxes 127, content is " checking stamped signature success ", after pressing determination key, refering to Figure 19 and Figure 20, screen display stamped signature people:Taiwan high-order Net limited company, checking unit:Industrial and commercial credential management center.At the same time, screen display is downloaded to C:ICheck catalogue In VerifyCert.rar shelves 128.The Zhang Shaohan part1.rar of the 1.69MB in archives 128 and Fig. 5 that this is proved to be successful Shelves 103 (the first digital content) content is identical, the multimedia shelves VerifyCert1.rar shelves that in Figure 20, another is proved to be successful 129 (the second digital contents) are identical with Zhang Shaohan part2.rar shelves 113 contents of the 1.38MB in Fig. 5.Click VerifyCert1.rar shelves 129, will hear that pen electricity plays the mp3 music shelves of Zhang Shaohan.Refering to Figure 21 and 22, play Zhang Shao During containing this section of music shelves, preset information contents 130 " the Zhang Shaohan mandate yam network sky being proved to be successful can be shown by discontinuous Empty ", and " iCheck network address ".
Refering to Fig. 4 and Fig. 6, the 6th preferred embodiment based on the content verification method of digital signature code for the present invention, bag Endorse step S1, dual stamped signature step S2, an a preset times verification step S6 and verification step S3 containing one.This dual stamped signature Sub-step S22 that step S2 includes preset times checking sub-step S24, checking sub-step S21 and is endorsed.It is with the 5th relatively The difference of good embodiment is, this first stamped signature code corresponds to one first preset times, is carrying out this dual stamped signature step S2 In checking sub-step S21 or this verification step S3 before, this server first checks whether this first stamped signature code defeated Enter to exceed this first preset times, if inspection result is yes, stop checking, if inspection result is no, continue checking.Similar Ground, this second stamped signature code corresponds to one second preset times, before carrying out this verification step S3, this server first check this Whether two stamped signature codes have been enter into exceeding this second preset times, if inspection result is yes, stop checking, if checking knot Fruit is no, then continue checking.
Endorse in step S1 at this, user can be default secondary in selectionbar 107 input one first of effective degree at this moment Number is so that this first stamped signature code is to should the first preset times.Similarly, one can also be inputted in this endorses sub-step S22 Second preset times are so that this second stamped signature code is to should the second preset times.And due to this first stamped signature code and this Between two stamped signature codes, there is a connection, and form a stamped signature code-group, therefore in this preferred embodiment, this preset times meeting With the latter, that is, based on this second preset times, when this first preset times is set as 5 times, judge in this step S24 without departing from Preset times, and be able to be set as 2 times it is desirable to download and the user of this mp3 archives of certification is tested at this in the second preset times Card step S3, according to the first stamped signature code in this stamped signature code-group, by this connection, verifies first in this digital signature group Digital signature and the second digital signature, and when obtaining this first digital content and this second digital content, this first number can be judged Word content and this second digital content are after sub-step S22 that carries out endorsing, if be all downloaded beyond 2 times, if NO, just enter Row this verification step S3.
By " whether checking network audiovisual program service website has using illegal piracy video " IFPI IFPI International always 2013/03/26 news release:" after being scanned for for keyword with any one singer's name plus ' mp3 ', homepage Still there is substantial amounts of illegal connection in Search Results, ".Understand accordingly, the present invention, for the illegal download of mp3, has very big sending out Wave, room for improvement.
Refering to Fig. 1, the 7th preferred embodiment based on the content verification method of digital signature code for the present invention, comprise one and add Sign step S1, dual stamped signature step S2 and a verification step S3.Then, cooperation one website and webpage checking flow process further illustrates The present invention.It should be noted that in this preferred embodiment, the first digital signature code of this generation, the second digital signature code, All custom and produce by user.
In this step S1 of endorsing, endorsed using one first private key pair one first digital content, with produce with this first One first corresponding digital signature of digital content and one first stamped signature code, then by this first digital content, the first numeral Stamped signature and the first stamped signature code upload to this server data base.
In this preferred embodiment, this first private key comes from Taiwan high-order net limited company industry and commerce voucher card, should First digital content is webpage shelves, on January 6th, 2013, is endorsed and produced this first numeral and sign by this first private key Chapter code, its content by user institute custom for 12345ABCD.
In this dual stamped signature step S2, first according to this this first digital signature of the first stamped signature code verification, recycle one the Two private keys are endorsed again according to this first stamped signature code, to produce one second corresponding digital signature and one second stamped signature Code upload, to the data base of this server, has a connection between this first stamped signature code and this second stamped signature code, and shape Become a stamped signature code-group, and this first digital signature and this second digital signature form a digital signature group.Preferably implement at this In example, this second private key comes from payment company on a line, and it carries out this checking sub-step according to the first stamped signature code 12345ABCD After the completion of rapid S21, then sub-step S22 that carries out endorsing.
In this verification step S3, according in this stamped signature code-group at least one, verify at least one in this digital signature group. In this preferred embodiment, string webpage hyper linking is had to write " iCheck Home Network when the person that browses webpage sees a webpage upper right corner Page identifying code 12345ABCD ", point is even after this hyper linking, the person that browses webpage first download enable the present invention a terminating machine soft Part program, it connects to the Hinet server database storing the custom identifying code of 12345ABCD.Figure 23 to Figure 27 is to use In this preferred embodiment of explanation.When the terminating machine software program starting, click:Download voucher, screen display goes out an entitled " download The form of voucher " such as Figure 23, in input field:" Electronic Signature identifying code please be input ", 12345ABCD stamped signature code (namely First stamped signature code) input, push button:After " card number is obtained by data base ", stamped signature people's voucher IC card numbers display field: " MT00000001252127 ", after clicking the button " going to " of an entitled industry and commerce credentials download network address in Figure 23, terminating machine is just Connected using a preset browsing device " credentials download and the query webpage " of upper Ministry of Economic Affaris, input " MT00000001252127, with Card selects to be downloaded to the desktop of such as terminating machine.Then, click option in the form returning to terminating machine software program:" checking electricity Sub- stamped signature ", such as Figure 24, screen display goes out the form of an entitled checking stamped signature, continues to click an option:Select certificate file, Certificate file inputs the voucher just now downloaded from Ministry of Economic Affaris's website and webpage on desktop, in input field " if there being oneself of countersigning officer Order code please input ":12345ABCD, hits and selects button:Checking Electronic Signature, such as Figure 25, computer screen shows and is downloaded to C:\ VerifyCert.html shelves in iCheck catalogue, such as Figure 26, screen display stamped signature people:Taiwan high-order net limited company, Checking unit:Industrial and commercial credential management center.Then the content automatically opening up VerifyCert.htm shelves is as shown in figure 27.This enforcement Example can have at least one to sign people again, i.e. pay company on this line, be proved to be successful and download at least one and related to webpage (set Have password) multimedia shelves or the shelves unrelated with webpage such as multimedia advertising shelves.Can also raise one's voice through one when being proved to be successful Device sends sound to inform user, and such as " being proved to be successful, stamped signature people Taiwan high-order net limited company " is to have recognized Demonstrate,prove successfully.
Reported according to China Times's on December 6th, 2012:Well-known Blogger " Pickles princess " spreads out of article, picture meet with another Name Blogger " family matters queen " is usurped, picture, after renaming, is published on the blogger of oneself.Www.chinanews.com 2013 2 months 27 Day:" certain website is palmed off《I is singer》The name of column group, carries out SMS prize drawing business, obtains illicit income.", permissible Understand that the present invention is very helpful for the checking of the webpage true and false.
The occasion of other application of the present invention such as " real estate DNA ".Refer to provide real estate Electronic Signature such as product using the present invention Matter QC, presell, dealing, lease net price login, bank loan.When the digital signature code in input advertisement is it may be verified that have or not The following file processing through digital signature with as guarantee, such as each important construction material certificate of guarantee (survey report, reinforcing bar "dead" pollution testimonial, reinforced concrete test report, the report of mixed mud comprcssive strength, premixing mixed mud quality guarantee Book, mixed mud chloride ion content examining report book, haunted house investigation proof etc.).Using input validation code of the present invention, it is proved to be successful When, can also show that the digital signature data that board of trustee club is signed includes each family plane graph, each family net price logs in record, administration commission is every Administration fee record is paid in session record, resident family of administration commission, (stamped signature and board of trustee do to the record of management company of administration commission in such as management company Multiple label can be made), building monthly income with expenditure, building repair record, building bulletin record etc..Administration commission is to use organization credentials IC-card does stamped signature.New house or old room, all can set up one and build thing DNA, provide all electronics in the relevant house of house purchaser to house Stamped signature mark is demonstrate,proved, be not necessary to when selling room in the future time-consuming go for data to prove room rate, have real estate DNA to may prove because losing to sell and It is not necessary to pay the tax that need not pay.Real estate DNA be also used in letting agency business, be used in bank to mortgage money melt formality, The formality of mortgage loan.One stamped signature code (identifying code) of input will show this praedial DNA, more sign and complete with multiple label To praedial checking.
Or, it is also possible to apply the invention to " object is cracked down on counterfeit goods ".High price object or the checking of special object:(a) thing The manufacturer of part or whole seller are to one password of setting in Word or Excel or PDF " archives "." archives " also set volume Collect a password, archives just cannot be edited by others.B () is realizing a terminating machine of the present invention (may also be the mobile phone of a buyer) Software program, the buyer of object after the scene of selling inputs identifying code (product serial number on such as object) 12345678, After the seller retailer of checking " live " and manufacturer's status success, one " archives " are just downloaded in terminating machine and open this " archives ", but the case password that is this moment still in short supply could open " archives ".Buyer now requires seller retailer's use to be proved to be successful Email address in downloaded retailer's " voucher " afterwards, (live) sends an Email to buyer, and buyer receives retailer's Whether the E-mail address comparing retailer after Email is correct.C () then, buyer is selling live input product sequence number (that is, identifying code 12345678), download the public key of encryption, after clicking " encryption " option, select " to do with the owner of voucher After the button of encryption contact " option, this software will Email to voucher main body (namely manufacturer), wait voucher owner (raw Business men) reply Email to this " archives " password of buyer and be used for can file opening success, this moment verify complete.Can open " archives " every content in Viewed file for buyer's (before price gold) and object main points afterwards.Then manufacturer does more to sign and goes After the new password of change archives and new content, if during the product serial number 12345678 of wired upper input, just will run into because " shelves Case " has separately newly set the situation of password " password bad and cannot open ".The present invention is used in anti-distributor or ruffian with likelihood Packaging internal memory fake products.Verify production upstream company, middle reaches mid-game business, downstream distributor, prevent mid-game business or distributor from altering life Produce data.The current authorised dealer register of checking production company.2 months 19 days telegrams of www.chinanews.com are led:" national consumers' association group in 2012 Knit and accept Chinese liquor complaint 1038, just have 1 to be related to personation problem in every 5 complaints, some operators are turned on the banner of sale monopoly, Sell personation tobacco and wine to consumer, part high price famous brand of wine becomes the severely afflicated area of personation.”.Another " thing is cracked down on counterfeit goods " example be Be equipped with one (at least) (custom) identifying code in outside the packing box of thing or in packing box, identifying code can be tear after or erasing Just observable identifying code (such as QR code) after going, identifier A sells website or manufacture with what membership password entered this thing Businessman's affiliate web site of this thing, identifying code is inputted after website and webpage by identifier, and website will Email mono- multi-medium file To identifier A, after identifier A is proved to be successful using identifying code, one " multi-medium file " is just downloaded to terminating machine to password B In and open this " multi-medium file ", but the case password that is this moment still in short supply could open " multi-medium file ", identifier is defeated If can open after entering password B is exactly to complete the checking of cracking down on counterfeit goods to this thing.The content of multimedia opened, has the manufacturer of this thing Various explanations to this thing.
On April 23rd, 2013 Sina's science and technology news:" only 2012, Chinese Alibaba (Taobao) just provided line to the police Rope is related to 72 brand article information altogether, 1.7 hundred million yuans of case-involving total amount, arrests suspect's total number of persons 324 people, clique's number 43.”.For the certification of article genuine-fake, it is also the adaptable scope of the present invention.
Then illustrate that other can complete the software of the present invention, the layout of hardware and apply.Endorsed in the present invention The computer of step S1, dual stamped signature step S2 and verification step S3 is all not limited to same computer, this terminal of any loading The computer of machine software program, terminating machine, tablet PC, even intelligent mobile phone all can be used for completing the present invention.
Relevant " other hardware ":Terminating machine for example handheld-type intelligent type device, personal digital assistant device (PDA), one Google acoustic control intelligent eyeglass device.Terminating machine may also be intelligence (high image quality such as 4K, 3D) TV, Apple iTV or an intelligence Can watch device, information kiosk (kiosk), handheld game device, digital frame, Apple iPAD, cash register (terminal) machine (POS), Network equipment (network device), vehicular computer, (containing electronic chart) vehicle navigation device, (data base) service Device, high in the clouds computing device or multimedia messages machine, multimedia messages machine can be the use nature being for example placed on convenience store The multimedia messages machine of people's voucher IC-card.The present invention may be present in the associated component of hardware unit of an access terminals machine.This Invention can also be deployed in the computing device of any species and form.
Relevant " being verified with mobile phone, hand held readers ":There is such as one (JAVA) in mobile phone, hand held readers device Touch-control APP operates software to connect the Microsoft MSSQL data base of a server through an ActiveX program, in this server Equipped with the software realizing the present invention or hardware, the result is back to and is shown in mobile phone, hand held readers.
About " the connected data base's species of server, the data storing ":The title of the database software using is illustrated such as Microsoft SQL, SyBase, DB2, Oracle, Informix, PostgreSQL, MySQL, mSQL, a high in the clouds device simultaneously have There are data base, Microsoft SkyDrive high in the clouds or the Google high in the clouds of calculation function, but not limited to this, store up in the data base of server Data base's field documentary IC card numbers of depositing, name, e-mail box, IC-card voucher sequence number, IC-card holder's identity card Number, digital signature encryption data, digital signature ciphertext data, stamped signature code (identifying code), custom stamped signature code (identifying code), Expiry date, preset times, have verified that number of times, have verified that the date, more sign or signs again the front stamped signature code being used, answer label Person's name, again label data, the secondary shelves name type of archives of endorsing.
About " stamped signature and encryption and decryption mechanism, digital certificate and IC-card ":The algorithm being used is also not necessarily limited to RSA, such as DSA, ECDSA, ECDSA or P52 are all applicable to the present invention.Voucher IC-card can be contact or contactless (vicariouss) The chip credit card or chip fiscard.The digital signature mechanism that smart card (such as ISO7816 specification) of the present invention is supported is non-right Title formula encryption and decryption RSA mechanism, DSA mechanism or any one mechanism.Digital certificate (digital certificate, also someone be translated into Electronic certificate or digital certificate), generally include ID, voucher sequence number serial number, valid period expiration Period, the information information related to the issuer of sufficient vouchers originator and voucher finger print data Fingerprint data etc..The voucher of IC smart card can also use EAP transport layer (EAP-Transport Layer Security (EAP-TLS) protocol) transmission data.In addition, after the step of the password of input natural person's voucher IC-card, If if having (natural person) voucher in terminating machine, a step (not shown) can be connect and abrogate key function to internal affairs subordinate load Ledger and confirmation status data, and whether inspect card out of date.
In each preferred embodiment, the source of described private key and public key is that a token system with third party's public credibility is sent out Job service main frame, can be to be set up in Ministry of Internal Affairs's natural person's credential management center, Ministry of Economic Affaris's industry and commerce credential management center, tissue And intracardiac in group's credential management center, doctor thing credential management center or government's arbitrary legal person voucher, or it is erected at other people Intracardiac in the credential management of battalion dealer, credential management the department such as credit card, China Unionpay card, the Ren Minyin of such as financial circles IC-card Financial instruments IC-card that row financial IC card, Tianjin and Bank of China are issued, proficiency machine telecommunication operator, a well-known game company IC-card, the IC-card of a chain cafe.Industrial and commercial voucher IC-card, natural person's voucher IC-card, tissue and group's voucher IC-card use API (Application Program Interface) program is using the provided download of Hinet company, and uses The one card management tool software (HICOS Token Utility) of the user side voucher IC-card that Hinet provides, for example HiCOS Client v2.1.8.exe archives.Private key can be previously stored in a voucher IC-card or be stored in realizes the present invention There is in software a software program of the equal function of private key.At least one data of private key associated, for example, include voucher IC-card Card number, name, e-mail box, IC-card voucher sequence number, IC-card holder's identity card number, the high in the clouds correlation of IC-card holder Data.Can be using a USB (the Universal Serial Bus) ciphering and deciphering device containing documentary or a USB flash memory (flash memory) device or a USB security token device with the intelligent equal function of fixture.
About " digital content endorsed ":Can be audio content (Audio Content), video content (Movie Content), drawing (Graphics Content), image (Image Content), word (Text Content), or by Above-mentioned format combination form or encoded (digital compression) content.Encoded digital media content is for example logical Cross computer operation, distribution and conversion (broadcasting), and be transmitted between computer network, the example bag of Digital Media type Include:Windows Media Audio (WMA), Windows Media Video (WMV), MP3, JPEG and AVI.And it is relevant The Digital Media type that Windows Media Player is supported.The archive content endorsed can be to do increasing to content to add deduct Few.It is that numeral (multimedia) archives are endorsed in each embodiment, but being also not necessarily limited to can be to more than one numeral Multi-medium file does continuous way and endorses, and this continuously endorses can be all same identifying code, i.e. stamped signature code, or each quilt The archives endorsed each have an identifying code.
This first, second digital content can be the archives of any pair shelves name, such as txt, pdf, docx, png, Png, xps, gif, eml, jpg, gif, pub, rar, xml etc..Digital signature can be executed to any digital document archives Endorse it is also possible to read all or part of data from any digital document archives to produce digital signature and stamped signature generation Code.Any digital document archives do the content more signed or sign again after change and can be full content or portion in physical objects Divide content.Can also increase or decrease.
Relevant " how inputting digital signature code ":The input method of the present invention is included using keyboard, touch-control, acoustic control (sound Stricture of vagina) identification, retina, slide-mouse, human-body biological identification (as fingerprint), abnormal smells from the patient identification, audio frequency, password, infrared ray, sensing eyeball shifting Move and be fed back to mobile device(Namely smart mobile phone, tablet PC, digital camera etc., vehicular computer, contain electronic chart Vehicle navigation device), the picture rolling on display, at least one in gesture etc..
About " producing the mode of stamped signature code and the type of stamped signature code ":For convenience of explanation, described identifying code, or It is custom identifying code, refer to is all stamped signature code.It is not limited to produce using One-Way Hash Function, or custom with user Mode.And, its type is not limited to one or mixing of Arabic numerals, symbol, length, various countries' font etc., digital signature code Type can be any type of code via reading, storage, identification, computing after input terminal machine.When using, " Yahoo believes When this four traditional Chinese words of breath " are custom stamped signature code (custom identifying code), be stored in data base is exactly that " Yahoo believes This four words of breath ".Likewise, being to test when using " group of Alibaba " this 6 word simplified Chinese characters or other Japanese or Korean When card code or custom identifying code, be stored in the data base being connected with server is exactly simplified Chinese character or Japanese or Korean.Plus Identifying code produced by label or custom identifying code (stamped signature code), when being stored in data base it is necessary to label with present use Chapter code differs, if if identical, the information that server will return during an identifying code has been used is whole to computer In the screen of terminal.But the server differing just is not limited by identical identifying code.Stamped signature code can be via any one method With system encryption.
About " species of server and quantity ":Using the cloud database with computing and server capability, such as one Store the high in the clouds data server of the various data of sufferer.Server can be a multimedia video server or data, services Device.Data server can also be provided in one (hand-held) running gear.Can use and include at least one server Data base and at least one token system send out and Job Server.
About " terminating machine has the role at stamped signature end and verifying end ":Produce the terminating machine of stamped signature code, or computer is same When be also server (data base) end, i.e. server end (data base) is also stamped signature end.Server end (data base) may also be to be tested Card end.Any terminal machine all can be as stamped signature end and verifying end.In addition, can go automatically equipped with a computer program in server end The digital content of at least more than one is done with the required parameters after stamped signature, stamped signature code, connection server data base being connected Value, stamped signature data Email are to other-end machine.Realize can setting a regular timing journey automatically in terminating machine in the software of the present invention Sequence, this program goes to execute checking (checking using the identifying code (digital signature code) previously having had verified that and voucher (public key) again As having or not new more label, multiple label), and by regular for the result time display, and the result is stored into terminating machine simultaneously certainly Move and be sent to other terminating machines.
About " display of the result, method and display end ":The result of stamped signature checking and data are with least one display Method, snapshot, SMS, audio-visual, video etc., network is sent to other at least one station terminal machines and shows, and so at least two Platform above terminating machine user can know who has done a result to what digital content immediately, or will verify Result passes to which people (terminating machine) to be known.If in addition, execution checking success, terminal screen show at least one under The content carrying, and show at least one of terminal screen picture.If execution digital signature checking failure, in terminal Machine storage the content in the reason screen display failure.
Relevant " browser, webpage and e-book ":Using web page tools, such as vernier, slip over show tools, situation instrument, Dynamically invite instrument, bifurcation thixotroping show tools etc., make in a webpage, an Electronic Paper (book), one kind of the archives of a unlatching Slip over (hover over reveal) with slide-mouse vernier, parked, touch-control is parked or slide-mouse hits choosing (once or secondary) in more than one Behind the vicinity of the word content of media, show an action key containing content presentation, after pressing action key, browser The required parameters value that just (or another unlatching one new form) is connected by a website, download server database.Terminating machine makes Browser can be Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Apple Safari or Opera.Software for realizing the present invention can set and be installed in browser.
About " connection of terminating machine and network ":The present invention can use any existing network facilities, such as ISDN, Internet, intranet, extranet, wireless network, VPN, bluetooth, Local Area Network (LAN), Wide Area Network (WAN), metropolitan area network (MAN, metropolitan area network), phone wireless communication networks, public switched telephone Network (PSTN), business's internet, IP network and/or 3G, 4G network.
About " connection of terminating machine and wireless telecommunication system ":The present invention can be via a wireless telecommunication system, for example, but not It is limited to:GSM, GPRS, CDMA, WIMAX, PHS, Wi-Fi, wireless (radio) technology, such as radio frequency identification (RFID) or low coverage Connect one from wireless telecommunications (NFC), bluetooth (Bluetooth), infrared ray (infrared), WLAN, AMPS, TDMA, UMTS etc. Close network, at least one terminating machine being connected with wireless telecommunication system such as handheld wire-less apparatus (mobile phone), a credential management The heart, such as Ministry of Internal Affairs's IC-card credential management center, and connect at least one server with commercial activity.For example using integration Packet radio technology GPRS (General Packet Radio Service) Mobile Communications network, connection activation communicates The wireless communication base platform that service dealer is set up.The side of desktop PC, mobile computer or tablet PC online Formula can also be to carry out wireless networking connection via mobile phone.Present invention resides in smart card such as SIM used in mobile phone telecommunications industry Using asymmetric encryption and decryption mechanism in card, i.e. using digital signature credential mechanism in SIM cards of mobile phones.
The present invention allows user can rapid, immediately, effectively and easily judge the multimedia true and false, execution to " people, thing, The Dynamic Identification of the various information authenticity such as thing ".Use the software realizing the present invention, be one can to provide the motor-driven of proving program Property, one kind of convenience there is the Electronic Signature application tool with ISO/IEC as standard of " universality with comprehensive purposes ".Energy Enough easily and be generally performed in the whole people, each businessman, each inter-agency, particularly can be used in " people of various countries, businessman and mechanism " right The checking of the Electronic Signature that the people of " China ", each businessman, the voucher IC-card of each mechanism are endorsed, and the phase can make tribute to GDP Offer.
The technical field further illustrating the present invention is not to be only applicable to a certain enclosed single (for example declaring dutiable goods) application System or single service platform, and it is intended to reach the high usage of whole people's popularization, and certain be practiced in daily life Used in a comprehensive purposes application tool.
Further, since the present invention has the good suitability, future, user can be using the handss using the method for the present invention Held device, immediately and be performed quickly " people, thing, thing " is cracked down on counterfeit goods, is not limited to the application scenario that the present invention is proposed at present, And be also possible to and derive more extensive, easily application mode.Compare with other digital signature use patterns on the market, this Invention not only can allow the program of checking information public credibility significantly simplify, for having immediately solving, subtracting of ageing information Few both sides of supply and demand dispute, promotes the utilization output value of product, and effectively checking is counterfeit, can also derive further more extensive just Sharp application mode.
In addition, it is also possible to apply the invention to following occasion, such as it is applied to the status of person " test know cell phone incoming call ", not Before answering cell phone is called or mobile phone has shown call missing, mobile phone Mobile Communications service dealer or the Crinis Carbonisatus called Go out that first news in brief contains identifying code and database parameter shelves can connect the mobile phone to reception for the network address of download, verify caller Real status.When data base is the data base servicing dealer using mobile phone Mobile Communications, can be sent by the server at dealer end Display caller's status information, to the mobile phone of reception people, by the application of the present invention, because of " no caller identification ", and will not be missed Answer important incoming call, be more desirable to make " the swindle incoming call of illegal status " to be able to be checked.Except using the transmission of mobile phone news in brief, other For example utilize E-mail, Twitter (tweets), facebook (Facebook), microblogging, (LINE) mobile telephone instant communication software, " micro- Soft Inform ation " center ", high in the clouds (as Microsoft SkyDrive), network send voice messaging or video, support that the mobile phone of many people group chat is chatted Its software etc..
It is applied to " whether checking network audiovisual program service website has using illegal piracy video ", on December 23rd, 2012 The Beijing News is reported:" Cheng Long acts the leading role《The 12 symbolic animals associated with a 12 year cycle》Just show, but piracy early has occurred on world-wide web.Beijing broadcasts Film and television office represents, 17 no cards are engaged in network audiovisual program service website using illegal piracy video, and these websites are all Illegal website overseas.The website of Beijing area registration just reaches hundreds of thousands, needs regulatory measure constantly to strengthen.”.
It is applied to " consumer's end checking registered trade mark and mark chapter, checking performance bond people and content, checking personalogy experience And the various licenses true and false whether of an established trade mark with license timeliness phase, commodity such as doctor's operation, anti-Du's item verification prove adulterium, test The true and false of card network address and web page contents producer, the designer verifying a certain design and authorized content, checking publication print media Or the status of multimedia advertising person and ad content are in case Du Bufa publishes people.”.
" all rights reserved TAOBAONET.COM " that such as point is selected in the bottom of webpage can verify that the electronics label of TAOBAONET Zhang Renyu relevant information, for example, click " value-added telecom service business licence:Zhejiang W2-20080224 " is it may be verified that " Zhejiang W2- 20080224 " Electronic Signature people and relevant information.Single webpage can be endorsed and verify for netizen, can be in all websites Each webpage uses more to sign and verifies for netizen.
It is applied to " dynamic certificate ", the present invention proposes a kind of multimedia certificate of innovation, i.e. the dynamic certificate of Electronic Signature, checking (tool Effect duration) gift token of hard copy form or electronic multimedia shelves, valuable certificate, coupon, reward voucher, admission ticket." dynamic certificate " i.e. Shi Tongzhi consumer or businessman field salesperson, the content of (include network download) certificate whether have newer using regulation, Promotional offer, improve certificate instant effectiveness and solve certificate onsite application when it may happen that dispute.In a paper be printed on reduce the price excellent Favour but be to be printed on " this reward voucher belongs to dynamic certificate " on businessman's leaflet of validity period, bearer of this note is using testing of being printed on certificate Card code and connection network address are verified that (1) this expired certificate is expired and whether are had forbearance.(2) place to use, occupation mode, points for attention Whether have altered.(3) preferential having or not subtracts, and then can download further and show the provided renewal of this businessman after being proved to be successful Preferential and Commdity advertisement.
" alleged sending to the status of live people etc., thing, thing " is applied on on-site verification work distribute leaflets and " checking is pressed outdoors People's things of doorbell ", verifies to business card in embodiment, can have trustee's appointment & performance to not recognizing but having to call oneself further Content (people's things) is verified.Before not opening the door, or it is desirable to first be visited with mobile phone checking before money not being consigned to the people visiting Maintainer with send company's status, photo, maintenance content and date.The people of (or gathering of visiting) passes " a status please outdoors With work distribute leaflets content " give your mobile phone (terminating machine).Mobile phone news in brief receives an identifying code and a data base can connect net Location, touch-control APP application interface program software program (can coordinate pinup picture use) through realizing the present invention reads into mobile phone (terminal Machine) after, verify the real status passing news in brief to your person and send single digital media content.
It is applied to " ticket checking ", " number and list are arrived in checking scene ", this is the application examples that stamped signature people is also identifier.Example As Taiwan High Speed Rail, platform ferrum, tourist coach, be built into after the other NFC induction apparatuss in compartment doorway close for mobile phone after passenger loading, The each item data being detected be communicated wirelessly to high ferro server database be sent on car the PDA of ticket checker or Among mobile phone, test the booking relevant information knowing each rider, the every content on entity ticket, download passenger's appearance if necessary Multi-medium file.
If monarch A does not also climb up high-speed railway but uninscribed ticket wants that being given to monarch B takes, and monarch A (steps in the website input of high ferro Record) monarch B phone number, that is, cellular phone numbers (MSISDN), and input in high ferro webpage and related transfer the possession of ticket letter Breath, the server of high ferro will complete to transfer the possession of to execute more to sign.
Free Times on April 12nd, 2013 is reported:" timing explosion thing seen unexpectedly by high ferro train ".The present invention can be with respect to real name The factor such as not convenient of ticket processed, strengthens the trace ability to ruffian for the high ferro, increases the trust to high ferro dimension peace for the passenger.
" on 01 20th, 2013 reports of Epoch Times:University students have a winter vacation the date going home to celebrate the New Year or the Spring Festival, Shandong Rizhao university science and technology The thousands of students in garden have but unfortunately bought false ticket, meet with difficulty of going home.”.
On 01 16th, 2013 South Daily reports:" Railway Station in Guangzhou public security office smashes up manufacturing and selling of the counterfeit goods ticket major case den, pays altogether Obtain false train ticket, bus ticket 9.26 ten thousand.”.
The set of such as any one group or party (meal), use a mobile phone or a PDA just permissible in venue Test and know and (member) number name that real-time statistic is reported for work at present and related data.
It is applied to " true verification platform ", the content of a multi-medium file is endorsed (i.e., again through at least client Sign), finally endorse through platform (can be a website or a notary) again.Platform is that to sign people again be also one simultaneously for last position Position can then continue to be the people of more label.
Be applied to " checking registered trade mark photograph, the music copyright power of attorney, SGS check authenticated unit core can code and content, Haunted house investigation prove, organic farm products, carbon footprint label certificate, the excellent agricultural product in CAS Taiwan, (any kind of) power of attorney, Agreement, (personal) medical records information, medical prescription pad, medical diagnosiss statement, electronic health record, invention patent certificate (state/power Sharp unusual fluctuation), photo, picture, chant music, electronic record, books, the real copyright owner of e-book, current possessor, and Content, purpose and scope that checking authorizes.”.The multi-medium file of transmission in network, if statement has copyright, appoints without agreement Meaning distribution is exactly illegal.It is used in and notarize to notary or group of copyright intermediary or register.
It is applied to obligee and achieve and endorse (more label, multiple label) for checking and proof to relating to infringement website data.(overseas) The real status of the owner of website and webpage and producer is available for everybody and immediately verifies (as the 7th preferred embodiment), protecting and Improve the intellectual property correlation output value.
It is applied to " platform disclosed in every contribution detail flow direction whole process ".Using the software realizing the present invention, one is contributed money In first unit terminal machine execution first label receiving contribution, the amount of money contributed money by this pen, if there being and continue to be divided into (or with become) Different n pen gold flow to the second payee and n-th payee, then by second payee's terminating machine and n-th Payee's terminating machine makees individually multiple label.When the identifying code (the first stamped signature code) that contributor for example uses " the first label " can be tested Demonstrate,prove the detailed whole courses of his this contribution are open, including such as " receipt, flow direction, using content, use object with using remaining Volume ", can advantageously and be verified the whole typing of information at different levels contributed money using more label and multiple label.
On May 5th, 2013 Beijing Times is reported, and centenarian Guan Yinghan 100,000 yuan of RMB of donations in Shenyang is deposited to red ten Word meeting, because pass is English-Chinese has query to contribution whereabouts, the Red Cross of Shenyang City replies it is impossible to distinguish the flow direction of contribution, draws Send out network to discuss warmly.The Red Cross of Shenyang City sole duty deputy chairman place Shandong is said:" Yaan earthquake, can only on the red meeting in city searching platform Find the money item comprising a few individual's contribution volumes, without everyone detail.Always put down unless there are really comprehensive Platform is it is ensured that the whole typing of information at different levels.Such platform not yet really builds up.The not only Red Cross, China does not also have any big Type charity can accomplish that every contribution is whole open.”
It is applied to " platform of tissue and group, the such as platform of trade council member unusual fluctuation state ".According to Continental Area China Medical practitioner's law regulation, the administrative department of public health that matriculation should be arrived in the professional place of doctor's change handles alternation procedure.In Taiwan In city administrative area, the doctor of legal operation or the neck tool certificate of competency, all obtains and freely applies for into doctor trade council.Sufferer uses the present invention In the speciality for example verifying that A doctor is called oneself, its first sign be using Department of Health's institute's management and control and the doctor thing related to A doctor with Card IC-card, the second label (multiple label) are the tissue of doctor trade council being added using A doctor and group's voucher IC-card.
Beijing Sina website on 2 11st, 2,013 one Zhao's surname of report is pretended to be doctor to visit to Mr. Shi Mr. and Mrs to see a doctor and take this opportunity Promote guarantor and deceive 3000 yuan of strong product of RMB.
On December 6th, 2012 Ming Newspaper special news, buy false doctor's paper and seal in Taobao, sick-leave certificates are filled in data, Impress and emit label doctor's signature.Zhong Guang News Network on December 26th, 2012, the report close doctor of woods surname itself only had educational background in state, was engaged in Tooth molding is made for many years, to borrow board with the Chen dentist of 70 years old, woods surname close doctor diagnosis and treatment sufferer people more than 2,900, is accused of swindleness neck political affairs The up to ten million unit of mansion health care expense.Woods surname close doctor pay 130,000 yuan of Chen dentist New Taiwan Currency every month.
Be applied to " net purchase, net clap, purchase by group or collect purchase conclude the transaction before and after, but each quasi- negotiator oneself is carried out with each other Verify real real name status, the transaction content of each negotiator, protect buyer, the seller and credit card side.”.Checking network is handed over Whether easily ATM remits money success in case ATM swindles.Verify the state withholdd, state of paying by instalments.Maximum in ecommerce One of problem is that commodity are counterfeit, if the buyer of network has bought to directly find seller by buyer during counterfeit merchandise and ask repaying, reduces net Stand and the management manpower of each side expends.
It is applied to " system of real name being voluntarily responsible for by website user ", the content of multimedia to message endorses (more sign, sign again), In case Du's netizen's mat anonymous way is after (lie) speech is stayed in website, the content relating to infringement is but reprinted again and again and is endangered society.Test The personal declaration (original text) of the status of card web documents author (reporter) content, checking.
Free Times on May 22nd, 2013, report Miss Dong write out " Fei Lao buys box lunch and refused " article in facebook, caused The nearly 80,000 people's musters of network are reprinted, and are proved to fake!Miss Dong is summoned to court by Jing Zhongshan branch office of Taibei city and appears in court, and refuses to sell luxuriant and rich with fragrance labor box lunch Literary composition, heavy losses Taiwan image.
Standing Committee of National People's Congress passes through " with regard to the decision of Strengthens network information protection " it is desirable to network service provides within 2012 The control that person's reinforcement releases news to user, if finding, illegal information should stop transmitting immediately, preserves relative recording to supervisor Section report, violator can revoke licence, shut down web sites or investigate the people, criminal responsibility.The content that network anonymous user uploads, net Network ISP must labor intensive inspection and need to bear illegal information immediately do not stop transmit legal responsibility.
It is applied to " system of real name being voluntarily responsible for by the sender of Express Logistics ", (multimedia) content posting part is endorsed, In case Du Bufa article, danger prohibit the piggybacking logistics of (malicious) product.
It is applied to " clerical mistakes are more signed on line ", bank clients correct the minor error facing cabinet operation as shown in the Examples, And company please clients right the wrong via on line.
It is applied to " verifying the DNA related to people's things ", such as vehicle DNA, verified whether " non-soaked Vehicle Certificate is bright ", sold car Mileage proves, custom identifying code can be the part number of car, verifies whether to be really genuine goods when buying part to garage Rather than buy booty." the inspection record table " of car proves.
Real estate DNA.2013/04/07 China Times's report:" Taichung one room once had the outer labor of female to hang oneself in doors death, Sold with house owner and during room, do not inform it is that " haunted house " carries announcement.
Tai Zhongdi institute concludes, and sentences and should pay for more than 2,080,000 yuan to house-purchase person.”.United Daily News 2013/04/25 is reported:" high The one female lecturer's homicide case house in male city, Chen Shuzhen was bought by intermediary, and what discovery was bought later is that haunted house carries announcement, and Kaohsiung Di Yuan tries Sentence intermediary company and compensate 2,250,000 yuan.”.
It is applied to " entrust and hire out (multiple label) power of attorney, consignment (the signing again) power of attorney, and political affairs competent authority of cities and counties (server) can immediately be verified the power of attorney and grant tenant and do Companies Registry and move into and move out.”.
It is applied to that " check sheet, company are to the related application of the file of client, board of shareholders record, shareholder's certificate of entrustment, stock business Book.”.
It is applied to " time of checking diploma content and content alteration ", after being proved to be successful, can download and play the many of correlation Media.TVBS news on April 27th, 2012 is reported:The awards of generic name " autumn excellent food criticism meeting gold medal ", originally core is sent out Unit Bu Shi cuisines group or evaluation, but family's plane publication, and dismissed for 1991, on network, there is a " entry blank ", Fill in and can add prize-giving, but amount of donation is 70,000 6 thousand yuan, equal in a disguised form spending money on prize.Indicate on the packaging and cover medal, As food gold medal, gold-lettered signboard prize, the first quality are encouraged, part awards are of unknown origin, do not indicate unit of awarding prizes, get the prize time continuously All do not state clearly.
It is applied to " the every educational background experience in checking curriculum vitae table (including webpage resume) ".Save employer or manpower Intermediary company checks time and the manpower of original, and job hunter is not required to application and reissues diploma original.Leaving office (or on-job) proves Electronic Signature:The number of original hard copy is no longer limited.Such as Word shelves resume suggestion is using password and setting Edit Password.
It is applied to " (window) on-site verification somatopsychic disturbance person, student, soldier's foreign nationality's residence certificate and content "
China Times's on May 11st, 2013 is reported:Can be rated as the maximum forgery Foreign Resident's Certificate head Cao's Dehong in full court gulf, two Year partly to introduce hundreds illegally outer labor, therefrom to exploit commission, monthly at least 2,000,000 yuan of income, to make a profit and be up to 60,000,000 yuan.
In sum, the present invention carries out multiple endorsing to digital content in different forms using multiple private keys, to produce Raw multiple associated stamped signature codes and digital signature, as long as the user of the true and false to be confirmed inputs according to this stamped signature code correspond to Software after, you can easily confirm the true and false of digital content endorsed, so the purpose of the present invention really can be reached.

Claims (14)

1. a kind of content verification method based on digital signature code is it is adaptable to one has the server of a data base, its feature It is, the method comprises the steps of:
One endorses step, is endorsed using one first private key pair one first digital content, to produce and this first digital content One first corresponding digital signature and one first stamped signature code, then by this first digital content, the first digital signature and One stamped signature code upload to this server data base;
One dual stamped signature step, first according to this this first digital signature of the first stamped signature code verification, recycles one second private key root Endorsed again according to this first stamped signature code, with produce one second corresponding digital signature and one second stamped signature code and on It is loaded onto the data base of this server, between this first stamped signature code and this second stamped signature code, there is a connection, and form label Chapter code-group, and this first digital signature and this second digital signature form a digital signature group;And
One verification step, according at least one of this stamped signature code-group, verifies at least one of this digital signature group.
2. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:In this dual stamped signature In step, before being endorsed again according to this first stamped signature code using this second private key, update this first digital content For one second digital content, make this second stamped signature code to should the second digital content.
3. the content verification method based on digital signature code as claimed in claim 2 it is characterised in that:In this verification step In, according to the first stamped signature code in this stamped signature code-group, by this connection, verify that the first numeral in this digital signature group is signed Chapter and the second digital signature, and obtain this second digital content.
4. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:In this dual stamped signature In step, before being endorsed again according to this first stamped signature code using this second private key, increase one second digital content newly Data base to this server.
5. the content verification method based on digital signature code as claimed in claim 4 it is characterised in that:In this verification step In, according to the first stamped signature code in this stamped signature code-group, by this connection, verify that the first numeral in this digital signature group is signed Chapter and the second digital signature, and obtain this first digital content and this second digital content.
6. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:This first private key and Second private key is the same private key belonging to same user.
7. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:In this dual stamped signature In step, after being endorsed again according to this first stamped signature code using this second private key, this first stamped signature code and Two stamped signature codes correspond to identical first digital content.
8. the content verification method based on digital signature code as claimed in claim 7 it is characterised in that:In this verification step In, according to the first stamped signature code in this stamped signature code-group, by this connection, verify that the first numeral in this digital signature group is signed Chapter and the second digital signature, and obtain this first digital content.
9. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:This first private key and Second private key is different private keys.
10. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:The method is also wrapped It is contained in the multiple stamped signature step between this dual stamped signature step and verification step, this multiple stamped signature step is first according to this second label This second digital signature of chapter code verification, recycles one the 3rd private key to be endorsed again according to this second stamped signature code, to produce Raw one the 3rd digital signature and one the 3rd stamped signature code, and the 3rd stamped signature code is added into this stamped signature code-group, the 3rd number Word stamped signature is added into this digital signature group.
11. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:This first stamped signature Code corresponds to one first expiry date, before the checking sub-step in carrying out this dual stamped signature step or this verification step, should Server first checks whether the current time alreadys exceed this first expiry date, if inspection result is yes, represents this first stamped signature Code is invalid and stops checking, if inspection result is no, represents that this first stamped signature code is effective and continues checking.
The 12. content verification methods based on digital signature code as claimed in claim 1 it is characterised in that:This second stamped signature Code corresponds to one second expiry date, and before carrying out this verification step, this server first checks whether the current time has surpassed Crossing this second expiry date, if inspection result is yes, representing that this second stamped signature code is invalid and stops checking, if checking knot Fruit is no, represents that this second stamped signature code is effective and continues checking.
The 13. content verification methods based on digital signature code as claimed in claim 1 it is characterised in that:This first stamped signature Code corresponds to one first preset times, before the checking sub-step in carrying out this dual stamped signature step or this verification step, should Server first checks whether the number of times that this first stamped signature code has been enter into exceedes this first preset times, if inspection result is It is then to stop checking, if inspection result is no, continue checking.
14. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:This second stamped signature Code corresponds to one second preset times, and before carrying out this verification step, this server has first checked this second stamped signature code Whether the number of times being transfused to exceedes this second preset times, if inspection result is yes, stops checking, if inspection result is no, Then continue checking.
CN201310349633.9A 2013-08-12 2013-08-12 Content verification method based on digital signature code Expired - Fee Related CN104376252B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310349633.9A CN104376252B (en) 2013-08-12 2013-08-12 Content verification method based on digital signature code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310349633.9A CN104376252B (en) 2013-08-12 2013-08-12 Content verification method based on digital signature code

Publications (2)

Publication Number Publication Date
CN104376252A CN104376252A (en) 2015-02-25
CN104376252B true CN104376252B (en) 2017-03-01

Family

ID=52555154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310349633.9A Expired - Fee Related CN104376252B (en) 2013-08-12 2013-08-12 Content verification method based on digital signature code

Country Status (1)

Country Link
CN (1) CN104376252B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI637322B (en) * 2017-12-14 2018-10-01 開曼群島商庫幣科技有限公司 Method of updating firmware of closed storage device

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106960346A (en) * 2016-01-11 2017-07-18 茂邦电子有限公司 The carrying device and its application process of network trading are carried out with running gear for individual
WO2017153495A1 (en) * 2016-03-08 2017-09-14 Appii Pty Ltd A system and method for creating a database of independently validated educational and work experience profiles (curricula vitae) using blockchain smart contracts
CN106330863B (en) * 2016-08-11 2020-05-19 武汉益模科技股份有限公司 Management method and system for realizing instant online countersigning of multi-party conference
JP7126822B2 (en) * 2017-12-18 2022-08-29 Line株式会社 Program, information processing method, and information processing apparatus
CN108288162A (en) * 2018-01-15 2018-07-17 安趣盈(上海)投资咨询有限公司 A kind of security authentication systems and method
CN110046524A (en) * 2019-04-16 2019-07-23 昆山丘钛微电子科技有限公司 A kind of processing method of data, device, electronic equipment and medium
CN113139197B (en) * 2021-04-27 2024-05-28 上海淇玥信息技术有限公司 Project label checking method and device and electronic equipment
CN115879136B (en) * 2023-02-09 2023-06-06 蒲惠智造科技股份有限公司 Cloud data protection method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101018117A (en) * 2006-02-11 2007-08-15 鸿富锦精密工业(深圳)有限公司 Webpage log encryption system and method
CN101022339A (en) * 2007-03-23 2007-08-22 郭传真 Electronic sign stamp identifying method combined with digital centifi cate and stamp
CN101037059A (en) * 2003-07-03 2007-09-19 北京东方金鹰信息科技股份有限公司 Method for realizing stamp for signature and the system managing method for realizing the same

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1390005A (en) * 2001-06-06 2003-01-08 陈杰 Safety marking network system and its data processing method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101037059A (en) * 2003-07-03 2007-09-19 北京东方金鹰信息科技股份有限公司 Method for realizing stamp for signature and the system managing method for realizing the same
CN101018117A (en) * 2006-02-11 2007-08-15 鸿富锦精密工业(深圳)有限公司 Webpage log encryption system and method
CN101022339A (en) * 2007-03-23 2007-08-22 郭传真 Electronic sign stamp identifying method combined with digital centifi cate and stamp

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI637322B (en) * 2017-12-14 2018-10-01 開曼群島商庫幣科技有限公司 Method of updating firmware of closed storage device

Also Published As

Publication number Publication date
CN104376252A (en) 2015-02-25

Similar Documents

Publication Publication Date Title
TWI614636B (en) Content verification method based on digital signature code
CN104376252B (en) Content verification method based on digital signature code
US11727226B2 (en) Digital identity system
EP4165855B1 (en) Systems and methods for building blockchains for verifying assets for smart contracts
Abou Jaoude et al. Blockchain applications–usage in different domains
US12020178B2 (en) Method and apparatus for information representation, exchange, validation, and utilization through digital consolidation
US10594484B2 (en) Digital identity system
US20200013073A1 (en) Systems and methods for using codes and images within a blockchain
AU2019348201B2 (en) System, devices, and methods for acquiring and verifying online information
WO2016128569A1 (en) Digital identity system
JP2014515142A (en) Method and system for authenticating an entity by a terminal
JP2002334162A (en) System for managing person and object information
Soner et al. Exploring blockchain and smart contract technology for reliable and secure land registration and record management
US20230259919A1 (en) Review engine verification with non-fungible authentication tokens
Bhardwaj et al. Direct benefit transfer using Aadhaar: improving transparency and reducing corruption
Kshetri Blockchains with Chinese characteristics
CN111985905B (en) Socialization manpower resource management system and method based on blockchain technology
Fort et al. Chinese business and the Internet: The infrastructure for trust
Elhag et al. Blockchain and cryptocurrency technology in the Saudi Arabia
US20240012944A1 (en) System and method for authenticating certificates using nfts
Coelho Blockchain-based reputation models for e-commerce: a systematic literature review
Sharma Digital Locker-A study on the Paperless Future
AU2023206308A1 (en) Digital consolidation
ESCAP Harmonized development of legal and regulatory systems for e-commerce in Asia and the Pacific: current challenges and capacity-building needs
Mushi Impact of E-commerce on the Legal Regime in Tanzania. A Case Study of the Law of Contracts in Tanzania vis-à-vis on-line Contracts made in Dar-es-Salaam Region

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170301

Termination date: 20210812

CF01 Termination of patent right due to non-payment of annual fee