CN107135079A - Electronic document verification method, equipment and system - Google Patents

Electronic document verification method, equipment and system Download PDF

Info

Publication number
CN107135079A
CN107135079A CN201710520337.9A CN201710520337A CN107135079A CN 107135079 A CN107135079 A CN 107135079A CN 201710520337 A CN201710520337 A CN 201710520337A CN 107135079 A CN107135079 A CN 107135079A
Authority
CN
China
Prior art keywords
electronic document
verified
query
information
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710520337.9A
Other languages
Chinese (zh)
Inventor
陈盛东
徐刚
胡淳
胡淳一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Win Win Network Technology Co Ltd
Original Assignee
Shanghai Win Win Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Win Win Network Technology Co Ltd filed Critical Shanghai Win Win Network Technology Co Ltd
Priority to CN201710520337.9A priority Critical patent/CN107135079A/en
Publication of CN107135079A publication Critical patent/CN107135079A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The purpose of the application is to provide a kind of scheme of electronic document checking, query facility obtains the Query Information including at least electronic document to be verified in the program, then inquired about to the storage device for storing electronic document original text still to be tested, determine electronic document to be verified, then electronic document to be verified and electronic signature to be verified are sent into checking equipment to be verified, checking equipment calculates its hash summaries according to the electronic document to be verified got, public key to be tested is calculated according to hash summaries and the electronic signature, then the public key to be tested is inquired about in the public key of storage, if inquiring, it can then determine that the electronic document passes through checking, represent that the electronic document is mutually corresponding with the electronic signature, the electronic document is authentic and valid and not tampered.

Description

Electronic document verification method, equipment and system
Technical field
The application is related to areas of information technology, more particularly to the scheme that a kind of electronic document is verified.
Background technology
With the development of ecommerce, the commercial document such as contract, agreement between transaction agent is increasing with electronics Form occurs, because the modification of electronic document is more convenient compared to traditional document made of paper, therefore a wherein side for transaction is real The electronic document that border is taken is likely to be the electronic document for the content that was maliciously tampered, it is also possible to be that third party falsely uses transaction separately The electronic document that the name of one side is signed, therefore how electronic document is verified, judge whether electronic document truly has Effect has become an e-commerce field urgent problem to be solved.
Apply for content
The purpose of the application is to provide a kind of scheme of electronic document checking, to solve how to enter electronic document The problem of row checking.
To achieve the above object, this application provides a kind of electronic document verification method in checking equipment, the checking Equipment is stored with the public key of electronic document associated user, and this method includes:
Electronic document to be verified and electronic signature to be verified are obtained from query facility;
The electronic document to be verified according to getting calculates its hash summaries, is made a summary according to the hash and described Electronic signature calculates public key to be tested;
The public key to be tested is inquired about in the public key of storage, and when inquiring the public key to be tested, determines the electronics Document passes through checking.
Further, the checking end equipment is also stored with the identity information of electronic document associated user, wherein, the body There are mapping relations in part information and the public key of the electronic document associated user;
This method also includes:
When inquiring the public key to be tested, the identity of the electronic document associated user is determined according to the mapping relations Information.
The embodiment of the present application provides a kind of electronic document verification method in query facility, and methods described includes:
Query Information is obtained, wherein, Query Information includes the electronic signature of electronic document to be verified;
Inquire about the electronic document to be verified to storage device, and receive from the storage device inquire described in treat The electronic document of checking;
The electronic document to be verified and electronic signature to be verified are sent to checking equipment, so that the checking equipment According to the electronic document to be verified got and electronic signature to be verified, the result is determined.
Further, the Query Information also includes other index informations;
The electronic document to be verified is inquired about to storage device, including:
The storage address of the electronic document to be verified is determined according to other described index informations, based on the storage The electronic document to be verified is inquired about in location to storage device.
Further, the Query Information also includes encrypted message;
The electronic document to be verified that storage device is returned is received, including:
The encrypted electronic document to be verified that storage device is returned is received, according to the encrypted message to the encryption Electronic document is decrypted, and obtains the electronic document to be verified.
Further, the Query Information also includes authority information, wherein, the authority information represents the query facility User obtain data restricted information.
Further, Query Information is obtained, including:
The Query Information is obtained by way of scanning Quick Response Code.
The embodiment of the present application also provides a kind of electronic document verification method in storage device, and the storage device is stored with Sign electronically corresponding electronic document, and methods described includes:
Inquiry request based on query facility, determines the electronic document to be verified, wherein, the inquiry request includes Electronic signature to be verified;
The electronic document to be verified is sent to the query facility.
Another aspect based on the application, additionally provides a kind of checking equipment verified for electronic document, the equipment Including:
Memory module, the public key for storing electronic document associated user,
Communication module, for obtaining electronic document to be verified and electronic signature to be verified from query facility;
Verification process module, for calculating its hash summaries according to the electronic document to be verified got, according to The hash summaries and the electronic signature calculate public key to be tested, and inquire about the public key to be tested in the public key of storage, and When inquiring the public key to be tested, determine that the electronic document passes through checking.
Further, the memory module, is additionally operable to store the identity information of electronic document associated user, wherein, it is described There are mapping relations in identity information and the public key of the electronic document associated user;
The verification process module, is additionally operable to, when inquiring the public key to be tested, institute be determined according to the mapping relations State the identity information of electronic document associated user.
Present invention also provides a kind of query facility verified for electronic document, the equipment includes:
Input module, for obtaining Query Information, wherein, Query Information includes the electronics label of electronic document to be verified Name;
Communication module, for inquiring about the electronic document to be verified to storage device, and is received from the storage device The electronic document to be verified inquired, and send the electronic document to be verified and to be verified to checking equipment Electronic signature, so that the checking equipment is according to the electronic document to be verified got and electronic signature to be verified, Determine the result.
Further, the Query Information also includes other index informations;
The communication module, the storage for determining the electronic document to be verified according to other described index informations Location, the electronic document to be verified is inquired about based on the storage address to storage device.
Further, the Query Information also includes encrypted message;
The communication module, the encrypted electronic document to be verified for receiving storage device return, according to described The encrypted electronic document is decrypted encrypted message, obtains the electronic document to be verified.
Further, the Query Information also includes authority information, wherein, the authority information represents the query facility User obtain data restricted information.
Further, the input module, for obtaining the Query Information by way of scanning Quick Response Code.
Present invention also provides a kind of storage device verified for electronic document, the equipment includes:
Memory module, for storing the corresponding electronic document of electronic signature;
Communication module, the inquiry request for receiving query facility, and send described to be verified to the query facility Electronic document, wherein, the inquiry request include electronic signature to be verified;
Query processing module, the electronic document to be verified is determined for the inquiry request based on query facility.
In addition, present invention also provides a kind of system verified for electronic document, the system is set including foregoing checking Standby, query facility and storage device.
Compared with prior art, this application provides a kind of scheme of electronic document checking, query facility is obtained in the program The Query Information including at least electronic document to be verified is taken, is then set to the storage for storing electronic document original text still to be tested It is standby to be inquired about, electronic document to be verified is determined, then electronic document to be verified and electronic signature to be verified is sent Verified to checking equipment, checking equipment calculates its hash summaries, root according to the electronic document to be verified got Public key to be tested is calculated according to hash summaries and the electronic signature, the public key to be tested is then inquired about in the public key of storage, If inquiring, it can determine that the electronic document, by checking, represents that the electronic document is mutually corresponding with the electronic signature, should Electronic document is authentic and valid and not tampered.
Brief description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 verifies the schematic diagram of system for a kind of electronic document that the embodiment of the present application is provided;
Fig. 2 is process chart when the embodiment of the present application realizes electronic document checking;
Fig. 3 is the principle schematic that the embodiment of the present application realizes electronic document checking;
The schematic diagram of each equipment in a kind of electronic document checking system that Fig. 4 provides for the embodiment of the present application;
The schematic diagram for another equipment for realizing electronic document checking that Fig. 5 provides for the embodiment of the present application;
Same or analogous reference represents same or analogous part in accompanying drawing.
Embodiment
The application is described in further detail below in conjunction with the accompanying drawings.
In one typical configuration of the application, terminal, the equipment of service network include one or more processors (CPU), input/output interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media, can be by any side Method or technology realize that information is stored.Information can be computer-readable instruction, data structure, the module of program or other numbers According to.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc (CD- ROM), digital versatile disc (DVD) or other optical storages, magnetic cassette tape, magnetic disk storage or other magnetic storages Equipment or any other non-transmission medium, the information that can be accessed by a computing device available for storage.
Fig. 1 shows that a kind of electronic document that the embodiment of the present application is provided verifies the schematic diagram of system, and the system includes Verify equipment 110, storage device 120 and query facility 130.In actual scene, the checking equipment and storage device can be with As service end, it can be multiple physical equipments that it, which is implemented, and it can be independent deployment for example to verify equipment and storage device Server either server cluster or checking equipment and storage device can also be realized by physical equipment, for example It is deployed in same server or server cluster.Query facility 130 is as client, and it can be all kinds of use that it, which is implemented, Family terminal, such as mobile phone, tablet personal computer, PC.
The system can realize the checking of electronic document, and the handling process of its verification method is as shown in Fig. 2 including following place Manage step:
Step S201, query facility obtains Query Information.Because in actual scene, the original text of electronic document may be related to And the information of some secrecy, and inquiry should not be directly disclosed to, such as commercial contract is secret due to the business for being related to contract parties Close and unsuitable external disclosure, due to being that the hash summary computations based on electronic document are obtained in the electronic signature of electronic document Arrive, therefore the information of these need for confidentiality will not be included, therefore the electronic signature of electronic document can be disclosed to inquiry, with For inquiring and authenticating.
Query Information has comprised at least the electronic signature of electronic document to be verified, and query facility is grasped according to the input of user Work can get the original text of electronic document.In actual scene, it is possible to use the mode of scanning Quick Response Code obtains to be verified Electronic document, i.e., generate Quick Response Code by the original text of electronic document, and user passes through mobile phone or other terminal device scans two dimensions After code, you can parse the textual content of electronic document to be verified.In addition, the Quick Response Code bag described in the embodiment of the present application Include but be not limited to the black and white Quick Response Code of rectangle, color 2 D code or other any special-shaped codes that can be used in carrying information, example Such as fingerprint code, circular code, fan-shaped code.
Step S202, query facility inquires about electronic document to be verified to storage device.Due to being stored with storage device Electronic signature to be verified can be directly included in electronic document, the inquiry request that query facility is sent, and with the work that signs electronically Inquired about for a kind of index information, it is possible thereby to inquire the electronic document to be verified.
In addition, the Query Information can also include other index informations.Now, query facility is inquired about to storage device During the electronic document to be verified, first depositing for the electronic document to be verified can be determined according to other index informations Address is stored up, the storage address is then based on and inquires about the electronic document to be verified to storage device.
For example, other index informations can represent to look into for the information such as addressing information or index number, addressing information The storage address of electronic document to be verified is ask, under different application scenarios, the storage address can be different contents, example Such as in following scene, if the number of servers as storage device of actual deployment only has one, then all electronics texts Book is stored in this server, then address (such as IP of the storage device can be pre-configured with query facility Location, port numbers etc.), when query facility needs to be inquired about, then it can directly read the address, you can determine storage device Address, now the storage address of electronic document is the store path in the storage device, based on the store path, storage device Can quick positioning electronic document, read and feed back to query facility.
And under another scene, the number of servers as storage device of actual deployment might have it is multiple, it is necessary to Inquire electronic document to be verified to there may be present in any one server, if each server has different ground Location, then query facility needs to obtain the address of the server where electronic document to be verified before transmitting, just can be suitable Profit completes inquiry.Thus, the content of the storage address of electronic document can be the electronic document in the entire system globally Location, i.e., include the store path of the address and electronic document of storage device in the storage device simultaneously.
Moreover, above-mentioned addressing information can also be the addressing system in the distributed network system (DNS) of decentralization, such as block Decentralization addressing system in chain.
Step S203, storage device receives inquiry request from query facility.
Step S204, storage device is based on the inquiry request, determines the electronic document to be verified.Because storage is set Electronic document corresponding with the electronic signature in inquiry request is stored in standby, then regard electronic signature to be verified as retrieval Condition, can inquire the corresponding electronic document of electronic signature to be verified.Or, it can also be inquired based on other retrieval information The electronic document to be verified needed.
Step S205, storage device sends the electronic document to be verified to query facility.In actual scene, storage During the electronic document that equipment is sent a query to the query facility, first electronic document can be encrypted, to query facility The electronic document after encryption is sent, so that the transmission process of electronic document is safer.
Step S206, query facility receives the electronic document to be verified that storage device is returned.If storage device pair Electronic document is encrypted, then what is now received is encrypted electronic document, if desired obtains normal electronic document, then needs The encrypted electronic document is decrypted.In the process, it is necessary to the encrypted message for decryption be used, the application's In a kind of embodiment, the encrypted message can be carried in the Query Information that query facility is got, when query facility is received During encrypted electronic document, it can be decrypted with it, further increase security.
In another embodiment of the application, authority information can also be further included in Query Information.The authority letter Breath can represent that the user of the query facility obtains the restricted information of data, and the user of query facility refers to currently used inquiry Equipment carries out the inquiry of electronic document checking, can be made a distinction by information such as account number, the user names of the user.Limitation letter Breath refer to user for query facility from storage device or checking equipment obtain data when some restrictive conditions, including look into Ask the one of which of restrictive condition or a variety of combinations such as number of times, query time, the content for the data that can be got.Example Such as, can be " same account can only obtain the relevant information of 3 electronic documents ", " can only be daily 9:00~17:During 00 work Section obtains data " or " electronic signature for being merely able to get electronic document " etc..
Step S207, query facility sends the electronic document to be verified and electronics label to be verified to checking equipment Name, so that the checking equipment is according to the electronic document to be verified and the electronic signature to be verified got, it is determined that The result.
Step S208, checking equipment obtains electronic document to be verified and electronic signature to be verified from query facility.
Step S209, checking equipment calculates its hash summaries according to the electronic document to be verified got, according to The hash summaries and the electronic signature calculate public key to be tested.Verify that equipment can be to be verified by hash (Hash) algorithm Electronic document in calculate hash summary, wherein, hash algorithm should use with generation electronic signature hash message digest phases Same algorithm, such as any one existing algorithm, such as MD5, SHA1., can be further after hash summaries are calculated Public key to be tested is calculated with reference to the electronic signature of the electronic document to be verified received.
Step S210, checking equipment inquires about the public key to be tested in the public key of storage, because public key can be identified as only One and do not have repeatability, when inquiring the public key to be tested, you can determine the electronic document pass through checking.Verify equipment In be at least stored with the public key of electronic document associated user, public keys of these storages can be used for inquiry as the database of inquiry Obtained public key to be tested is calculated, if in all public keys of storage, having inquired public key to be tested, then the electronics text can be determined Book is by checking, and it is authentic and valid to represent the electronic document, i.e., electronic document to be verified in Query Information is not tampered with.Should Checking equipment need to preserve individual or the public key information of legal person of sealed contract electronic document, such as existing ca authentication mechanism.
In actual scene, consideration for privacy reasons may be without the specific of signatory in the original text of electronic document Identity information, if inquiry needs to learn the actual signatory of some electronic documents in commercial activity, thus the application is implemented Example further provides following scheme, that is, verifies that end equipment can also be stored with the identity information of electronic document associated user, its In, there are mapping relations in the identity information and the public key of the electronic document associated user.Thus, inquire it is described to be tested During public key, the identity information of the electronic document associated user is determined according to the mapping relations.For example, in foregoing scene, Electronic document can be the contract signed in many ways, and its electronic document associated user can be a wherein side signatory for the contract, Thus user can pass through the signatory of the Pubic-Key search that calculates to electronic document while the electronic document of checking.
The result is fed back to query facility by step S211, checking equipment.In actual scene, query facility is fed back to The result in the content that includes can be pre-set according to the demand of practical application scene, for example represent what is be verified The result can be the information of " by checking ", can also inquire corresponding public key, or can also be and inquire Corresponding signatory's identity information etc..In addition, the content that includes of the result can when receiving every time after Query Information, Authority information in Query Information is determined.If for example, whether regulation " is merely able to get by checking in authority information Prompting ", then query facility is merely able to get the judged result for verifying whether to pass through, if if in authority information regulation " can only Enough get the identity information of electronic document signatory ", then the result that query facility is got is " the label of the electronic document Administration person is XXX " (being verified), or " electronic document is without corresponding informance " (checking do not pass through).
Fig. 3 shows the checking principle of electronic document proof scheme in the embodiment of the present application, and the figure has shown that the application is real Apply the possibility that the proof scheme of example offer is realized in technical principle., it is necessary to which two keys come in rivest, shamir, adelman It is encrypted and decrypted, the two keys are public key (i.e. public key, public-key cryptography) and private key (i.e. private key, private Have key), each user has respective public key and private key.RSA, DSA, ECDSA scheduling algorithm can be utilized in actual scene Generate key.
And the hash summaries of the electronic document can be obtained by carrying out hash calculating to electronic document, use electronic document related After hash summaries are encrypted the private key of user, the electronic signature of the electronic document can be obtained.Based on hash algorithm Characteristic, if after being distorted to the original text of electronic document, then re-starting hash and calculating and will be unable to obtain identical hash to pluck Will, it is impossible to obtain identical electronic signature.And storage device is stored with original in the embodiment of the present application electronic document (i.e. not by The electronic document distorted) and electronic signature, it is as shown in the table:
Index number Electronic document Electronic signature
1 Document1 Signature1 (hash1+ private keys 1)
2 Document2 Signature2 (hash2+ private keys 2)
3 Document3 Signature3 (hash3+ private keys 3)
4 Document4 Signature4 (hash4+ private keys 4)
User can input electronic signature to be verified in query facility, whether to judge the electronic signature to be verified It is corresponding with the electronic document in storage device.Query facility can use other index informations such as index number 3 or electronics Signature Signature3 is inquired about in storage device, and the original text that can inquire electronic document to be verified is Document3, then storage device return to Query Result Document3 to query facility.In actual scene, if storage device In do not have store Document3 relative recording, then can return to the Query Result not found.
Query facility sends electronic document Document3 and Query Result Signature3 to be verified to checking equipment Middle to be verified, verification process is:Hash calculating is carried out to Document3 using identical algorithm and obtains its hash summaries, if User can input electronic document to be verified in query facility and not be modified, then its hash calculated summaries must be Hash3, then can calculate correct public key 3, and then searched whether in checking equipment by Signature3 and hash3 Be stored with public key 3, then can determine whether the electronic document to be verified that query facility is sent is tampered.If electronics to be verified Document is tampered with, then its hash calculated summaries will not be necessarily hash3, therefore pass through Signature3 and the hash Summary can not also calculate correct public key 3, the public key now calculated be can not find in the public key of checking equipment storage, therefore It can determine that electronic document to be verified is tampered with.
By taking the key that ECDSA algorithms are generated as an example, the process that it generates signature is as follows:
1st, select an elliptic curve Ep (a, b), and elliptic curve basic point G;
2nd, selection private cipher key dA (dA<N, n are G rank), calculate public-key cryptography=dAG using basic point G;
3rd, a random integers k (k is produced<N), k × G=(x1,y1);
4th, r=x1, s=(hash+rdA)/k, hash is the correlation made a summary with the hash of electronic document here;
5th, r and s is as electronic signature, if r and s one of them be 0, performed again since the 3rd step.
It follows that electronic signature can be designated following form:
In the embodiment of the present application, checking equipment can utilize the above-mentioned principle of ECDSA algorithms, be plucked by electronic signature and hash When calculating the public key of electronic document associated user to be verified, specific calculating process is as follows:
SkG=hashG+rdAG
If storing the identity information of electronic document associated user in checking equipment, signatory's title of such as contract, There are mapping relations in identity information and the public key of contract signatory, as shown in the table:
Thus, the public key calculated is inquired about in checking equipment by searching, electronic document associated user can also be determined Identity information, checking equipment can return to the information such as " being verified ", public key or electronic document signatory's identity to query facility.
In the electronic document checking system that the embodiment of the present application is provided, checking equipment 110, storage device 120 and inquiry are set Standby 130 structure is as shown in Figure 4.Verify that equipment 110 includes memory module 111, communication module 112 and verification process module 113. Memory module 111 is used for the public key for storing electronic document associated user, and communication module 112 is used to obtain to be verified from query facility Electronic document and electronic signature to be verified, verification process module 113 is used for according to the electronics to be verified that gets Document calculates its hash summaries, and public key to be tested is calculated according to hash summaries and the electronic signature, and in the public affairs of storage The public key to be tested is inquired about in key, and when inquiring the public key to be tested, determines that the electronic document passes through checking.
Further, memory module 111 is additionally operable to store the identity information of electronic document associated user, wherein, the body There are mapping relations in part information and the public key of the electronic document associated user;And the verification process module 113 is additionally operable to When inquiring the public key to be tested, the identity information of the electronic document associated user is determined according to the mapping relations.
Storage device 120 includes memory module 121, communication module 122 and query processing module 123, wherein, memory module 121 are used to store the corresponding electronic document of electronic signature, and communication module 122 is used to receive electronics text to be verified from query facility Book, and the electronic document to be verified is sent to the query facility, wherein, the Query Information includes electricity to be verified Son signature.Query processing module 123 is used to inquire about the electronic document to be verified in the electronic document of the storage, it is determined that The electronic document to be verified.
Query facility 130 includes input module 131 and communication module 132, wherein, input module 131 is used to obtain at least The Query Information of electronic document to be verified is included, communication module 132 is used to inquire about the electronics to be verified to storage device Document, and the electronic document to be verified of storage device return is received, and send described to be verified to checking equipment Electronic document and electronic signature to be verified so that the checking equipment according to the electronic document to be verified got and Electronic signature to be verified, determines the result.
In one embodiment of the application, the Query Information can also include other index informations, now, described logical Letter module 132 can be used for the address that the storage end equipment is determined according to other described index informations, and according to the address The electronic document to be verified is sent to storage end equipment.
In another embodiment of the application, the Query Information also includes encrypted message, now, the communication module 132 are used to receive the encrypted electronic document to be verified that storage device is returned, according to the encrypted message to the encryption Electronic document is decrypted, and obtains the electronic document to be verified.
In addition, the Query Information can also include authority information, wherein, the authority information represents the query facility User obtain data restricted information.
Further, the input module can be obtained when obtaining Query Information by way of scanning Quick Response Code.
In summary, query facility obtains the Query Information including at least electronic document to be verified in the program, then Inquired about to the storage device for storing electronic document original text still to be tested, determine electronic document to be verified, then will treat The electronic document of checking and electronic signature to be verified are sent to checking equipment and verified, checking equipment is according to the institute got State electronic document to be verified and calculate its hash summaries, public key to be tested is calculated according to hash summaries and the electronic signature, Then the public key to be tested is inquired about in the public key of storage, if inquiring, can determine that the electronic document passes through checking, table Show that the electronic document is mutually corresponding with the electronic signature, the electronic document is authentic and valid and not tampered.
In addition, the part of the application can be applied to computer program product, such as computer program instructions, when its quilt When computer is performed, by the operation of the computer, it can call or provide according to the present processes and/or technical scheme. And the programmed instruction of the present processes is called, it is possibly stored in fixed or moveable recording medium, and/or pass through Broadcast or the data flow in other signal bearing medias and be transmitted, and/or be stored in the calculating run according to programmed instruction In the working storage of machine equipment.Here, one embodiment of the application includes an equipment as shown in Figure 5, the equipment bag The memory 510 for storing computer program instructions and the processor 520 for execute program instructions are included, wherein, when the meter When calculation machine programmed instruction is by the computing device, side of the equipment operation based on foregoing multiple embodiments according to the application is triggered Method and/or technical scheme, so as to realize query facility, storage device or the function of verifying equipment.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt Realized with application specific integrated circuit (ASIC), general purpose computer or any other similar hardware device.In one embodiment In, the software program of the application can realize above step or function by computing device.Similarly, the software of the application Program (include related data structure) can be stored in computer readable recording medium storing program for performing, for example, RAM memory, magnetic or CD-ROM driver or floppy disc and similar devices.In addition, some steps or function of the application can employ hardware to realize, for example, As coordinating with processor so as to performing the circuit of each step or function.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned one exemplary embodiment, Er Qie In the case of without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, scope of the present application is by appended power Profit is required rather than described above is limited, it is intended that all in the implication and scope of the equivalency of claim by falling Change is included in the application.Any reference in claim should not be considered as to the claim involved by limitation.This Outside, it is clear that the word of " comprising " one is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple Unit or device can also be realized by a unit or device by software or hardware.The first, the second grade word is used for table Show title, and be not offered as any specific order.

Claims (17)

1. a kind of electronic document verification method in checking equipment, wherein, the checking equipment is stored with, and electronic document is related to be used The public key at family, this method includes:
Electronic document to be verified and electronic signature to be verified are obtained from query facility;
The electronic document to be verified according to getting calculates its hash summaries, according to hash summaries and the electronics Signature calculation public key to be tested;
The public key to be tested is inquired about in the public key of storage, and when inquiring the public key to be tested, determines the electronic document Pass through checking.
2. according to the method described in claim 1, wherein, the checking end equipment is also stored with the body of electronic document associated user Part information, wherein, there are mapping relations in the identity information and the public key of the electronic document associated user;
This method also includes:
When inquiring the public key to be tested, the identity for determining the electronic document associated user according to the mapping relations is believed Breath.
3. a kind of electronic document verification method in query facility, wherein, methods described includes:
Query Information is obtained, wherein, Query Information includes the electronic signature of electronic document to be verified;
The electronic document to be verified is inquired about to storage device, and inquire described to be verified is received from the storage device Electronic document;
Send the electronic document to be verified and electronic signature to be verified to checking equipment so that the checking equipment according to The electronic document to be verified got and electronic signature to be verified, determine the result.
4. method according to claim 3, wherein, the Query Information also includes other index informations;
The electronic document to be verified is inquired about to storage device, including:
The storage address of the electronic document to be verified is determined according to other described index informations, based on the storage address to Storage device inquires about the electronic document to be verified.
5. method according to claim 3, wherein, the Query Information also includes encrypted message;
The electronic document to be verified that storage device is returned is received, including:
The encrypted electronic document to be verified that storage device is returned is received, according to the encrypted message to the encrypted electronic Document is decrypted, and obtains the electronic document to be verified.
6. method according to claim 3, wherein, the Query Information also includes authority information, wherein, the authority letter Breath represents that the user of the query facility obtains the restricted information of data.
7. the method according to any one of claim 3 to 6, wherein, Query Information is obtained, including:
The Query Information is obtained by way of scanning Quick Response Code.
8. a kind of electronic document verification method in storage device, wherein, the storage device electronic signature that is stored with is corresponding Electronic document, methods described includes:
Inquiry request based on query facility, determines the electronic document to be verified, wherein, the solicited message includes to be tested The electronic signature of card;
The electronic document to be verified is sent to the query facility.
9. a kind of checking equipment verified for electronic document, wherein, the equipment includes:
Memory module, the public key for storing electronic document associated user,
Communication module, for obtaining electronic document to be verified and electronic signature to be verified from query facility;
Verification process module, for calculating its hash summaries according to the electronic document to be verified got, according to described Hash makes a summary and the electronic signature calculates public key to be tested, and inquires about in the public key of storage the public key to be tested, and is looking into When asking the public key to be tested, determine that the electronic document passes through checking.
10. equipment according to claim 9, wherein, the memory module is additionally operable to store electronic document associated user's Identity information, wherein, there are mapping relations in the identity information and the public key of the electronic document associated user;
The verification process module, is additionally operable to, when inquiring the public key to be tested, the electricity be determined according to the mapping relations The identity information of Ziwen book associated user.
11. a kind of query facility verified for electronic document, wherein, the equipment includes:
Input module, for obtaining Query Information, wherein, Query Information includes the electronic signature of electronic document to be verified;
Communication module, is looked into for inquiring about the electronic document name to be verified to storage device, and being received from the storage device The electronic document to be verified ask, and send the electronic document to be verified and electricity to be verified to checking equipment Son signature, so that the checking equipment is according to the electronic document to be verified got and electronic signature to be verified, really Determine the result.
12. equipment according to claim 11, wherein, the Query Information also includes other index informations;
The communication module, the storage address for determining the electronic document to be verified according to other described index informations, The electronic document to be verified is inquired about to storage device based on the storage address.
13. equipment according to claim 11, wherein, the Query Information also includes encrypted message;
The communication module, the encrypted electronic document to be verified for receiving storage device return, according to the password The encrypted electronic document is decrypted information, obtains the electronic document to be verified.
14. equipment according to claim 11, wherein, the Query Information also includes authority information, wherein, the authority Information represents that the user of the query facility obtains the restricted information of data.
15. the equipment according to any one of claim 11 to 14, wherein, the input module, for passing through scanning two The mode of dimension code obtains the Query Information.
16. a kind of storage device verified for electronic document, wherein, the equipment includes:
Memory module, for storing the corresponding electronic document of electronic signature;
Communication module, the inquiry request for receiving query facility, and send the electricity to be verified to the query facility Ziwen book, wherein, the inquiry request includes electronic signature to be verified;
Query processing module, the electronic document to be verified is determined for the inquiry request based on query facility.
17. a kind of system verified for electronic document, wherein, the system includes:
Checking equipment as claimed in claim 1 or 2;
Query facility as any one of claim 3 to 7;
Storage device as claimed in claim 8.
CN201710520337.9A 2017-06-30 2017-06-30 Electronic document verification method, equipment and system Pending CN107135079A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710520337.9A CN107135079A (en) 2017-06-30 2017-06-30 Electronic document verification method, equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710520337.9A CN107135079A (en) 2017-06-30 2017-06-30 Electronic document verification method, equipment and system

Publications (1)

Publication Number Publication Date
CN107135079A true CN107135079A (en) 2017-09-05

Family

ID=59736707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710520337.9A Pending CN107135079A (en) 2017-06-30 2017-06-30 Electronic document verification method, equipment and system

Country Status (1)

Country Link
CN (1) CN107135079A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107342866A (en) * 2017-06-30 2017-11-10 上海策赢网络科技有限公司 Electronic document verification method, equipment and system
CN107659429A (en) * 2017-08-11 2018-02-02 四川大学 Data sharing method based on block chain
CN108681572A (en) * 2018-05-04 2018-10-19 蔷薇信息技术有限公司 Date storage method, device and the electronic equipment of block chain
CN109191122A (en) * 2018-08-10 2019-01-11 中国银行股份有限公司 A kind of method and device obtaining Transaction Information voucher
CN112039677A (en) * 2020-11-05 2020-12-04 飞天诚信科技股份有限公司 Method and system for code scanning operation processing based on server
CN113537984A (en) * 2018-06-26 2021-10-22 创新先进技术有限公司 Content verification method and device based on block chain and electronic equipment
CN113761578A (en) * 2021-09-10 2021-12-07 马治国 Document true checking method based on block chain

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1758585A (en) * 2004-10-10 2006-04-12 北京华旗数码影像技术研究院有限责任公司 Method for recogniting seal by digital watermark
CN101149770A (en) * 2007-09-21 2008-03-26 中山大学 Electronic stamp system based on Word/Excel electronic document
US20140149735A1 (en) * 2012-11-29 2014-05-29 Adobe Systems Incorporated Distributive computation of a digital signature
CN105809450A (en) * 2014-12-31 2016-07-27 航天信息股份有限公司 Electronic invoice generation and verification method and system
CN105871555A (en) * 2016-03-25 2016-08-17 苏盛辉 Electronic document forgery prevention and tampering prevention method based on asymmetric identity
CN106130885A (en) * 2016-07-18 2016-11-16 吴东辉 Method and system based on image recognition opening relationships

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1758585A (en) * 2004-10-10 2006-04-12 北京华旗数码影像技术研究院有限责任公司 Method for recogniting seal by digital watermark
CN101149770A (en) * 2007-09-21 2008-03-26 中山大学 Electronic stamp system based on Word/Excel electronic document
US20140149735A1 (en) * 2012-11-29 2014-05-29 Adobe Systems Incorporated Distributive computation of a digital signature
CN105809450A (en) * 2014-12-31 2016-07-27 航天信息股份有限公司 Electronic invoice generation and verification method and system
CN105871555A (en) * 2016-03-25 2016-08-17 苏盛辉 Electronic document forgery prevention and tampering prevention method based on asymmetric identity
CN106130885A (en) * 2016-07-18 2016-11-16 吴东辉 Method and system based on image recognition opening relationships

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107342866A (en) * 2017-06-30 2017-11-10 上海策赢网络科技有限公司 Electronic document verification method, equipment and system
CN107659429A (en) * 2017-08-11 2018-02-02 四川大学 Data sharing method based on block chain
CN108681572A (en) * 2018-05-04 2018-10-19 蔷薇信息技术有限公司 Date storage method, device and the electronic equipment of block chain
CN113537984A (en) * 2018-06-26 2021-10-22 创新先进技术有限公司 Content verification method and device based on block chain and electronic equipment
CN109191122A (en) * 2018-08-10 2019-01-11 中国银行股份有限公司 A kind of method and device obtaining Transaction Information voucher
CN112039677A (en) * 2020-11-05 2020-12-04 飞天诚信科技股份有限公司 Method and system for code scanning operation processing based on server
CN113761578A (en) * 2021-09-10 2021-12-07 马治国 Document true checking method based on block chain

Similar Documents

Publication Publication Date Title
CN107135079A (en) Electronic document verification method, equipment and system
AU2018246993B2 (en) Systems and methods for providing digital identity records to verify identities of users
Gutoski et al. Hierarchical deterministic bitcoin wallets that tolerate key leakage
CN107342866A (en) Electronic document verification method, equipment and system
US8112626B1 (en) Method and apparatus to provide public key authentication with low complexity devices
US20220337392A1 (en) Automatic digital media authenticator
CN110309663B (en) Privacy authentication method and system based on block chain
CN106921496A (en) A kind of digital signature method and system
US20220020020A1 (en) Methods, systems, and devices for managing digital assets
EP2913973A1 (en) Trusted NFC smart poster tag
Lee et al. CCA2 attack and modification of Huang et al.’s public key encryption with authorized equality test
CN109714175A (en) Deposit card method, evidence collecting method and deposit system
US20240243922A1 (en) Personal digital identity management system and method
CN114389810B (en) Method and device for generating certification, electronic equipment and storage medium
Wu et al. Secure public data auditing scheme for cloud storage in smart city
CN113901424A (en) Method and device for selectively disclosing digital identity attribute
Li et al. Toward both privacy and efficiency of homomorphic MACs for polynomial functions and its applications
CN107347008A (en) Electronic document verification method, equipment and system
CN109450636A (en) The integrity verification method of group data in a kind of cloud storage
Dai et al. A resource-aware approach for authenticating privacy preserving GNN queries
JP7560708B2 (en) Information processing system, information processing method, information processing program, secure computation system, secure computation method, and secure computation program
CN113904865A (en) Log transmission method and device based on asymmetric algorithm
CN113742671A (en) Online collaborative information processing method, system, electronic device and storage medium
Kusuma et al. An authenticated University file system using EdDSA
De Prisco et al. Reducing costs in HSM-based data centers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170905

RJ01 Rejection of invention patent application after publication