CN107194266A - It is a kind of to verify the method whether papery license is tampered - Google Patents
It is a kind of to verify the method whether papery license is tampered Download PDFInfo
- Publication number
- CN107194266A CN107194266A CN201710333560.2A CN201710333560A CN107194266A CN 107194266 A CN107194266 A CN 107194266A CN 201710333560 A CN201710333560 A CN 201710333560A CN 107194266 A CN107194266 A CN 107194266A
- Authority
- CN
- China
- Prior art keywords
- license
- template
- papery
- tampered
- electronics
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The method whether papery license is tampered is verified the invention provides a kind of, is related to digital signature and planar bar code technology, step includes:The generation step of electronics license and the authenticity verification step of papery license.The method whether the checking papery electronics license content that the present invention is provided is tampered, solves the problem of electronic document printout is document content authenticity after paper document and validation verification.
Description
Technical field
Electric signing verification method of the present invention, it is especially a kind of to be used to verify the side whether papery license content is tampered
Method.
Background technology
At present, during electronics license use, it is necessary to by electronics license printout be papery license, but output
How document content authenticity and validity have verified that into problem it is therefore necessary to design a kind of specialized application after papery license
The method whether being tampered in verification papery license content.
The content of the invention
The technical problem to be solved in the present invention is:Lack in the prior art to the papery license of electronics license printout
Distort verification method.
In order to solve the above-mentioned technical problem, the side whether papery license content is tampered is verified the invention provides a kind of
Method, comprises the following steps:
Step 1, the generation of electronics license, is concretely comprised the following steps:
Step 1.1, it is that the electronics license of each type generates the template of its set form, each template gives unique template
Number and the formation of electronics license template is made a summary, recycle private key to form template signatures to summary encryption;
Step 1.2, select a kind of electronics license template, to template in fill in all fillers of electronics license and generate complete electricity
Sub- license file;
Step 1.3, all fillers filled in step 1.2 formation is made a summary, recycles private key to form filling to summary encryption
Item signature;
Step 1.4, by template number, template signatures, all fillers and filler signature with prescribed form formation electron number
According to, then electronic data formed into Quick Response Code, and Quick Response Code is placed on to the blank space for the electronics license file that step 1.2 is generated,
Form the electronics license with Quick Response Code;
Step 1.5, electronics license printout step 1.4 formed is papery license;
Step 2, the authenticity verification of papery license, is concretely comprised the following steps:
Step 2.1, the electronics license template formation license ATL in steps for importing 1.1;
Step 2.2, scanning papery license on Quick Response Code, from Quick Response Code preserve data in obtain template number, template signatures,
All filler and filler signatures;
Step 2.3, all fillers obtained in step 2.2 are subjected to processing and form summary H;
Step 2.4, the private key mark in the filler signature obtained in step 2.2 obtains corresponding public key, uses public key
H1 is obtained to the filler signed data decryption obtained in step 2.2;
Step 2.5, H and H1 are compared, if identical, then it represents that all fillers preserved in papery license Quick Response Code are not usurped
Correct one's mistakes, if it is not the same, then representing that all fillers preserved in papery license Quick Response Code are tampered with;
Step 2.6, corresponding electronics license template is obtained from license ATL according to the template number obtained in step 2.2,
And processing formation summary H2 is carried out to electronics license template content;
Step 2.7, according to the public key obtained in step 2.4, data are carried out to the template signatures obtained in step 2.2 using public key
Decryption, obtains H3;
Step 2.8, H2 and H3 are compared, if identical, then it represents that the electronics license template content preserved in papery license Quick Response Code
It was not tampered with, if it is not the same, then representing that the electronics license template content preserved in papery license Quick Response Code is tampered with;
Step 2.9, if step 2.5 and step 2.8 compare all same, by the electronics license template and step that are obtained in step 2.6
A new electronics license file of all filler combination producings obtained in 2.2;
Step 2.10, new electronics license file step 2.9 generated is compared with papery license document content, if phase
Together, then it represents that paper document content was not tampered with, checking paper document passes through, if it is not the same, then representing paper document
Content is tampered with, and checking paper document does not pass through.
The electronics license for being adopted as each type generates the template of its set form and gives each template unique number,
And template is obtained according to unique reference number, reduce the two-dimensional code data capacity of generation, reduce the memory capacity of electronics license, conveniently deposit
Storage;The data transfer of an electronics papery is carried out using Quick Response Code, the papery checking of papery license content is easy to implement.
As the further limits scheme of the present invention, the formation of electronics license template is made a summary in step 1.1, is specifically by electricity
All the elements in sub- license template carry out Hash operation, obtain summary info as input.
As the further limits scheme of the present invention, template label are formed to summary encryption with private key described in step 1.1
Name, specifically refers to digital signature value obtained from summary is encrypted using the signature private key in digital certificate.
As the further limits scheme of the present invention, digital certificate refers to be stored in be used to encrypt and numeral in intelligent KEY
The digital certificate of signature computing.
As the further limits scheme of the present invention, by all fillers obtained in step 2.2 in step 2.3
Reason forms summary H, is specifically, as input, to carry out Hash operation using all fillers of acquisition, obtains the H that makes a summary.
As the further limits scheme of the present invention, filler signature is formed to summary encryption using private key in step 1.3
And using public key H1 is obtained to the decryption of filler signed data in step 2.4, particular by asymmetric key algorithm, realize
The encryption of private key and the decryption of public key.
As the further limits scheme of the present invention, according in the filler signature obtained in step 2.2 in step 2.4
Private key mark obtains corresponding public key, specifically refers to the public key information extracted from the digital certificate of filler signing messages.
As the further limits scheme of the present invention, by the template and step 2.2 that are obtained in step 2.6 in step 2.9
A new electronics license file of all filler combination producings obtained, specifically refers to utilize document synthetic technology by all fillings
Item field, which is filled into, generates new file in template.
The beneficial effects of the present invention are:The electronics license for being adopted as each type generates the template of its set form simultaneously
Each template unique number is given, and template is obtained according to unique reference number, reduces the two-dimensional code data capacity of generation, reduces electronics
The memory capacity of license, convenient storage;The data transfer of an electronics papery is carried out using Quick Response Code, papery license is easy to implement
The papery checking of content.
Brief description of the drawings
Fig. 1 is flow chart of the method for the present invention;
Fig. 2 is specific execution flow chart of the invention.
Embodiment
As illustrated in fig. 1 and 2, the method that whether verification papery license content disclosed by the invention is tampered, including following step
Suddenly:
Step 1, the generation of electronics license, is concretely comprised the following steps:
Step 1.1, it is that the electronics license of each type generates the template of its set form, each template gives unique number simultaneously
Electronics license template formation summary private key is formed into signature to summary encryption;
Step 1.2, select a kind of electronics license template, to template in fill in all fillers of electronics license, such as business entity
The information such as title, the type of business, legal representative in business license, generate complete electronics license file;
Step 1.3, all fillers formation summary private key that electronics license is filled in step 1.2 is formed into label to summary encryption
Name;
Step 1.4, will be all in the signature in electronics license template unique number, step 1.1 in step 1.1, step 1.2
Electronic data is formed Quick Response Code, is placed on step by the signature in filler, step 1.3 with set form formation electronic data
The complete electronics license file blank space of 1.2 generations, forms the electronics license with Quick Response Code;
Step 1.5, the electronics license that step 1.4 is formed is printed out into paper document;
Step 2, the authenticity verification of papery license, is concretely comprised the following steps:
Step 2.1, the electronics license ATL of step 1.1 is imported into authenticity verification software;
Step 2.2, using the Quick Response Code on authenticity verification software scans papery license, preserved by processing from two-dimensional image code
The unique number of acquisition electronics license template, template signatures data, all fillers of filling, the filler label of filling in data
Name data;
Step 2.3, all fillers obtained in step 2.2 are subjected to processing and form summary H;
Step 2.4, the private key mark in the filler signature obtained in step 2.2 obtains corresponding public key, uses public key
Filler signed data decryption to being obtained in step 2.2, obtains H1;
Step 2.5, H and H1 are compared;If identical, then it represents that all fillers preserved in papery license Quick Response Code are not usurped
Correct one's mistakes;
Step 2.6, corresponding template is obtained from authenticity verification software according to the template unique number obtained in step 2.2, and
Processing is carried out to template content and forms summary H2;
Step 2.7, according to the public key obtained in step 2.4, using public key to the template signatures data solution that is obtained in step 2.2
It is close, obtain H3;
Step 2.8, H2 and H3 are compared, if identical, then it represents that the template content preserved in papery license Quick Response Code is not usurped
Correct one's mistakes;
Step 2.9, step 2.5 and step 2.8 compare by rear, by what is obtained in the template and step 2.2 that are obtained in step 2.6
The new electronics license file of all visual portions of filler combination producing;
Step 2.10, new electronics license file step 2.9 generated is compared with papery license document content;If phase
Together, then it represents that paper document content was not tampered with, checking paper document passes through.
Wherein, generate the template of its set form for the electronics license of each type in step 1.1 and give each mould
Plate unique number, and template is obtained according to unique reference number in step 2.6, methods described reduces the two dimension generated in step 1.4
Code data capacity, reduces the memory capacity of electronics license, convenient storage.
Electronics license template formation summary is referred to all the elements on electronic stencil as input in step 1.1, entered
Row Hash operation, obtains summary info.In step 1.1 with private key to summary encryption formed signature refer to use digital certificate in
Signature private key the summary info in claim 3 is encrypted obtained from digital signature value.Digital certificate refers to storage
It is used for the digital certificate of encrypted and digitally signed computing in intelligent KEY, the characteristics of not going out KEY with signature private key can be effective
Protect the safety of signature private key.
Referred to described in step 1.4 with set form formation electronic data, stored using customized peculiar set form
Required content information.Electronic data is formed into Quick Response Code described in step 1.4, the complete electronics of step 1.2 generation is placed on
The characteristics of license file blank space refers to have data storage function using Quick Response Code, electronic data is switched into Quick Response Code form and deposited
Storage.Described Quick Response Code refers to not limit form Quick Response Code with data storage function.
Using the Quick Response Code on authenticity verification software scans papery license in step 2.2, by processing from two-dimensional image code
The unique number of electronics license template, template signatures data, all fillers of filling, filling is obtained in the data of preservation to fill out
Fill a signed data to refer to utilize Quick Response Code identification technology, the content that will be stored in Quick Response Code is reduced, so as to isolate
The unique number of electronics license template, template signatures data, all fillers of filling, the filler signed data of filling.
All fillers obtained in step 2.2 are carried out into processing formation summary H in step 2.3 to refer to all of reduction
Filler carries out Hash operation, made a summary as input.
Private key mark in step 2.4 in the filler signature obtained in step 2.2 obtains corresponding public key and referred to
The public key information extracted from the digital certificate of signing messages.Using public key to the filler that is obtained in step 2.2 in step 2.4
Signed data is decrypted, and is obtained H1 and is referred to, according to asymmetric key algorithm, be encrypted using private key, uses the corresponding public affairs of the private key
Key can also be decrypted.
It is in step 2.9 that all filler combination producings obtained in the template and step 2.2 that are obtained in step 2.6 are visual
A new electronics license file of change, which refers to all filler fields are filled into template using document synthetic technology, to be generated
New file.
The using effect for the method whether verification papery license content disclosed by the invention is tampered possesses:
1st, promote the construction and development of electronics license system, dissolve business risk.The inspection papery license content that the present invention is provided
The method whether being tampered, which is utilized, is based on PKIX(Public Key Infrastructure, PKI)Technology and the 3rd
The electronic signature that square digital certificate authentication center is issued makes data and carries out reliable electronic signature to relevant informations such as document contents,
It can be used just as the evidence in persecutio, reliable technology base is provided to set up settling entanglements, confirmation of responsibility mechanism
Plinth, promotes the construction and development of electronics license system, the effective judicial guarantee is provided for the printout of electronics license.
2nd, business is brought to facilitate for broad masses, the side whether the inspection papery license content that the present invention is provided is tampered
Method, promotes cross-region, the level information sharing of trans-departmental, cross-layer and business cooperation, solve the masses in current state affairs repeatedly come and go,
The persistent ailment of paper material is submitted repeatedly, social cost and the wasting of resources is reduced, and mitigates masses' burden;Prevent false evidence, false shine to spread unchecked
Phenomenon, solve the problem of license examination work is difficult.
Claims (8)
1. a kind of verify the method whether papery license content is tampered, it is characterised in that comprises the following steps:
Step 1, the generation of electronics license, is concretely comprised the following steps:
Step 1.1, it is that the electronics license of each type generates the template of its set form, each template gives unique template
Number and the formation of electronics license template is made a summary, recycle private key to form template signatures to summary encryption;
Step 1.2, select a kind of electronics license template, to template in fill in all fillers of electronics license and generate complete electricity
Sub- license file;
Step 1.3, all fillers filled in step 1.2 formation is made a summary, recycles private key to form filling to summary encryption
Item signature;
Step 1.4, by template number, template signatures, all fillers and filler signature with prescribed form formation electron number
According to, then electronic data formed into Quick Response Code, and Quick Response Code is placed on to the blank space for the electronics license file that step 1.2 is generated,
Form the electronics license with Quick Response Code;
Step 1.5, electronics license printout step 1.4 formed is papery license;
Step 2, the authenticity verification of papery license, is concretely comprised the following steps:
Step 2.1, the electronics license template formation license ATL in steps for importing 1.1;
Step 2.2, scanning papery license on Quick Response Code, from Quick Response Code preserve data in obtain template number, template signatures,
All filler and filler signatures;
Step 2.3, all fillers obtained in step 2.2 are subjected to processing and form summary H;
Step 2.4, the private key mark in the filler signature obtained in step 2.2 obtains corresponding public key, uses public key
H1 is obtained to the filler signed data decryption obtained in step 2.2;
Step 2.5, H and H1 are compared, if identical, then it represents that all fillers preserved in papery license Quick Response Code are not usurped
Correct one's mistakes, if it is not the same, then representing that all fillers preserved in papery license Quick Response Code are tampered with;
Step 2.6, corresponding electronics license template is obtained from license ATL according to the template number obtained in step 2.2,
And processing formation summary H2 is carried out to electronics license template content;
Step 2.7, according to the public key obtained in step 2.4, data are carried out to the template signatures obtained in step 2.2 using public key
Decryption, obtains H3;
Step 2.8, H2 and H3 are compared, if identical, then it represents that the electronics license template content preserved in papery license Quick Response Code
It was not tampered with, if it is not the same, then representing that the electronics license template content preserved in papery license Quick Response Code is tampered with;
Step 2.9, if step 2.5 and step 2.8 compare all same, by the electronics license template and step that are obtained in step 2.6
A new electronics license file of all filler combination producings obtained in 2.2;
Step 2.10, new electronics license file step 2.9 generated is compared with papery license document content, if phase
Together, then it represents that paper document content was not tampered with, checking paper document passes through, if it is not the same, then representing paper document
Content is tampered with, and checking paper document does not pass through.
2. the method whether verification papery license content according to claim 1 is tampered, it is characterised in that step 1.1
It is middle that the formation of electronics license template is made a summary, it is specifically, as input, to carry out Hash fortune using all the elements in electronics license template
Calculate, obtain summary info.
3. the method whether verification papery license content according to claim 1 is tampered, it is characterised in that step 1.1
Described in private key to summary encryption form template signatures, specifically refer to using the signature private key in digital certificate to make a summary into
Digital signature value obtained from row encryption.
4. the method whether verification papery license content according to claim 3 is tampered, it is characterised in that digital certificate
Referring to be stored in is used for the digital certificate of encrypted and digitally signed computing in intelligent KEY.
5. the method whether verification papery license content according to claim 1 is tampered, it is characterised in that step 2.3
It is middle all fillers obtained in step 2.2 are subjected to processing to form summary H, it is specifically as defeated using all fillers of acquisition
Enter, carry out Hash operation, obtain the H that makes a summary.
6. the method whether verification papery license content according to claim 1 is tampered, it is characterised in that step 1.3
Middle utilization private key is formed to summary encryption and filler signed data is decrypted using public key in filler signature and step 2.4
To H1, particular by asymmetric key algorithm, the encryption of private key and the decryption of public key are realized.
7. the method whether verification papery license content according to claim 1 is tampered, it is characterised in that step 2.4
Private key mark in the middle signature according to the filler obtained in step 2.2 obtains corresponding public key, specifically refers to from filler label
The public key information extracted in the digital certificate of name information.
8. the method whether verification papery license content according to claim 1 is tampered, it is characterised in that step 2.9
It is middle by a new electronics license file of all filler combination producings obtained in the template and step 2.2 that are obtained in step 2.6,
Specifically refer to be filled into all filler fields using document synthetic technology and new file is generated in template.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710333560.2A CN107194266B (en) | 2017-05-12 | 2017-05-12 | Method for verifying whether paper certificate is tampered |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710333560.2A CN107194266B (en) | 2017-05-12 | 2017-05-12 | Method for verifying whether paper certificate is tampered |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107194266A true CN107194266A (en) | 2017-09-22 |
CN107194266B CN107194266B (en) | 2020-09-04 |
Family
ID=59872541
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710333560.2A Active CN107194266B (en) | 2017-05-12 | 2017-05-12 | Method for verifying whether paper certificate is tampered |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107194266B (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107729576A (en) * | 2017-11-28 | 2018-02-23 | 北京筑业志远软件开发有限公司 | The management method and system of archives |
CN107943769A (en) * | 2017-11-13 | 2018-04-20 | 北京书生电子技术有限公司 | The method and apparatus for providing electronics license |
CN107992463A (en) * | 2017-12-01 | 2018-05-04 | 机械工业第六设计研究院有限公司 | The method and system that a kind of E-Government is declared |
CN108170653A (en) * | 2017-12-05 | 2018-06-15 | 北京航天计量测试技术研究所 | Multi-template calibration certificate automatic generation method based on information fusion |
CN108363929A (en) * | 2018-02-09 | 2018-08-03 | 广州旭能信息科技有限公司 | System and method for generating information elimination report of storage device and preventing tampering |
CN108989337A (en) * | 2018-08-19 | 2018-12-11 | 北京元链科技有限公司 | A kind of electronics license shared platform design method based on block chain technology |
CN109192259A (en) * | 2018-08-21 | 2019-01-11 | 深圳中兴网信科技有限公司 | Electronic health record processing method, processing unit and computer readable storage medium |
CN109474439A (en) * | 2019-01-02 | 2019-03-15 | 广州市中智软件开发有限公司 | A kind of electronics license based on block chain is credible to be signed and issued, is called and application method |
CN109743330A (en) * | 2019-01-22 | 2019-05-10 | 北京邮电大学 | A kind of license method for authenticating, device, electronic equipment and storage medium |
CN109815660A (en) * | 2019-01-11 | 2019-05-28 | 公安部第三研究所 | Identification electronic certificate information obtains verifying system and method |
CN109903478A (en) * | 2019-03-15 | 2019-06-18 | 广东金赋科技股份有限公司 | Papery license self-help print method and system |
CN110135188A (en) * | 2019-04-28 | 2019-08-16 | 佛山科学技术学院 | A kind of electronics license storage method and device based on block chain |
CN110765137A (en) * | 2019-10-31 | 2020-02-07 | 百度在线网络技术(北京)有限公司 | Electronic certificate processing method, device, equipment, platform and medium |
CN111260528A (en) * | 2020-02-07 | 2020-06-09 | 赵�智 | Real estate information verification method based on asymmetric algorithm |
CN112487490A (en) * | 2019-09-11 | 2021-03-12 | 株式会社理光 | Tamper recognition method, device, and medium |
CN112989434A (en) * | 2021-03-22 | 2021-06-18 | 合肥信息工程监理咨询有限公司 | Electronic document encryption tamper-proof decryption verification method |
CN113239368A (en) * | 2021-04-02 | 2021-08-10 | 暨南大学 | QR code encryption and decryption method based on electronic signature |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101281581A (en) * | 2007-09-27 | 2008-10-08 | 北京数字证书认证中心有限公司 | Method for checking whether contents of paper file is distorted or not |
CN104021482A (en) * | 2013-03-01 | 2014-09-03 | 成都市易恒信科技有限公司 | Certificate false-proof verification method base on identification authentication technology |
CN104361293A (en) * | 2014-10-20 | 2015-02-18 | 北京数字认证股份有限公司 | Methods and devices for generating and distinguishing anti-counterfeiting paper document |
CN105447642A (en) * | 2015-11-27 | 2016-03-30 | 国网重庆市电力公司江津供电分公司 | Engineering digital photograph verification system based on two-dimension code and verification method |
CN105740928A (en) * | 2016-01-27 | 2016-07-06 | 上海尚源信息技术有限公司 | Anti-counterfeiting method for two-dimensional code picture |
CN106598930A (en) * | 2016-12-29 | 2017-04-26 | 南威软件股份有限公司 | Electronic certificate processing method based on layout file |
-
2017
- 2017-05-12 CN CN201710333560.2A patent/CN107194266B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101281581A (en) * | 2007-09-27 | 2008-10-08 | 北京数字证书认证中心有限公司 | Method for checking whether contents of paper file is distorted or not |
CN104021482A (en) * | 2013-03-01 | 2014-09-03 | 成都市易恒信科技有限公司 | Certificate false-proof verification method base on identification authentication technology |
CN104361293A (en) * | 2014-10-20 | 2015-02-18 | 北京数字认证股份有限公司 | Methods and devices for generating and distinguishing anti-counterfeiting paper document |
CN105447642A (en) * | 2015-11-27 | 2016-03-30 | 国网重庆市电力公司江津供电分公司 | Engineering digital photograph verification system based on two-dimension code and verification method |
CN105740928A (en) * | 2016-01-27 | 2016-07-06 | 上海尚源信息技术有限公司 | Anti-counterfeiting method for two-dimensional code picture |
CN106598930A (en) * | 2016-12-29 | 2017-04-26 | 南威软件股份有限公司 | Electronic certificate processing method based on layout file |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107943769A (en) * | 2017-11-13 | 2018-04-20 | 北京书生电子技术有限公司 | The method and apparatus for providing electronics license |
CN107729576A (en) * | 2017-11-28 | 2018-02-23 | 北京筑业志远软件开发有限公司 | The management method and system of archives |
CN107992463A (en) * | 2017-12-01 | 2018-05-04 | 机械工业第六设计研究院有限公司 | The method and system that a kind of E-Government is declared |
CN108170653A (en) * | 2017-12-05 | 2018-06-15 | 北京航天计量测试技术研究所 | Multi-template calibration certificate automatic generation method based on information fusion |
CN108363929A (en) * | 2018-02-09 | 2018-08-03 | 广州旭能信息科技有限公司 | System and method for generating information elimination report of storage device and preventing tampering |
CN108989337A (en) * | 2018-08-19 | 2018-12-11 | 北京元链科技有限公司 | A kind of electronics license shared platform design method based on block chain technology |
CN109192259A (en) * | 2018-08-21 | 2019-01-11 | 深圳中兴网信科技有限公司 | Electronic health record processing method, processing unit and computer readable storage medium |
CN109474439A (en) * | 2019-01-02 | 2019-03-15 | 广州市中智软件开发有限公司 | A kind of electronics license based on block chain is credible to be signed and issued, is called and application method |
CN109815660B (en) * | 2019-01-11 | 2023-05-12 | 公安部第三研究所 | Identity electronic license information acquisition and verification system and method |
CN109815660A (en) * | 2019-01-11 | 2019-05-28 | 公安部第三研究所 | Identification electronic certificate information obtains verifying system and method |
CN109743330A (en) * | 2019-01-22 | 2019-05-10 | 北京邮电大学 | A kind of license method for authenticating, device, electronic equipment and storage medium |
CN109903478A (en) * | 2019-03-15 | 2019-06-18 | 广东金赋科技股份有限公司 | Papery license self-help print method and system |
CN110135188A (en) * | 2019-04-28 | 2019-08-16 | 佛山科学技术学院 | A kind of electronics license storage method and device based on block chain |
CN112487490A (en) * | 2019-09-11 | 2021-03-12 | 株式会社理光 | Tamper recognition method, device, and medium |
CN110765137A (en) * | 2019-10-31 | 2020-02-07 | 百度在线网络技术(北京)有限公司 | Electronic certificate processing method, device, equipment, platform and medium |
CN111260528A (en) * | 2020-02-07 | 2020-06-09 | 赵�智 | Real estate information verification method based on asymmetric algorithm |
CN111260528B (en) * | 2020-02-07 | 2021-09-28 | 赵�智 | Real estate information verification method based on asymmetric algorithm |
CN112989434A (en) * | 2021-03-22 | 2021-06-18 | 合肥信息工程监理咨询有限公司 | Electronic document encryption tamper-proof decryption verification method |
CN113239368A (en) * | 2021-04-02 | 2021-08-10 | 暨南大学 | QR code encryption and decryption method based on electronic signature |
CN113239368B (en) * | 2021-04-02 | 2023-02-28 | 暨南大学 | QR code encryption and decryption method based on electronic signature |
Also Published As
Publication number | Publication date |
---|---|
CN107194266B (en) | 2020-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107194266A (en) | It is a kind of to verify the method whether papery license is tampered | |
CN107146120B (en) | Electronic invoice generation method and generation device | |
CN107566116B (en) | Method and apparatus for digital asset weight registration | |
WO2017016318A1 (en) | Credible label generation and verification method and system based on asymmetric cryptographic algorithm | |
CN107742212B (en) | Asset verification method, device and system based on block chain | |
CN102484638B (en) | Layered protection and validation of identity data delivered online via multiple intermediate clients | |
CN107171794A (en) | A kind of electronic document based on block chain and intelligent contract signs method | |
EP2529506B1 (en) | Access control | |
CN105635187B (en) | Method and device for generating electronic file with stamp and method and device for authenticating electronic file with stamp | |
CN109829269A (en) | Method, apparatus and system based on E-seal authenticating electronic documents | |
CN101183439A (en) | Electronic bill processing system and processing method | |
CN105610578A (en) | Block chain information archiving and privacy protection method | |
US20150012446A1 (en) | Method and device for digital registration of assets | |
CN102004986A (en) | Product anti-counterfeiting method based on digital signature and public key system and verifying method | |
WO2020038137A1 (en) | Two-dimensional code generation method, data processing method, apparatus, and server | |
US20090164791A1 (en) | System and method for digitally signing an electronic document | |
KR20110140122A (en) | Methods for producing products which contain certificates and keys | |
CN105678365A (en) | Two-dimensional code e-ticket generation method and system, two-dimensional code e-ticket verification method and verification terminal | |
CN104809490A (en) | Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system | |
CN103795546A (en) | Generating method and authentication method of data label and system of generating method and authentication method | |
CN111211910A (en) | Anti-quantum computation CA (certificate Authority) and certificate issuing system based on secret shared public key pool and issuing and verifying method thereof | |
CN107508685A (en) | The implementation method of applying electronic Digital signature service system in a kind of cloud computing environment | |
CN107316182A (en) | A kind of generation method of electronic contract chain of evidence and generation system | |
CN105530099A (en) | Anti-fake verification method, device and system and anti-fake certificate based on IBC (Identity-Base Cryptography) | |
CN111740841A (en) | Method and device for generating and verifying tracing code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |