CN107204853A - A kind of wireless digital signature method of use mobile phone - Google Patents

A kind of wireless digital signature method of use mobile phone Download PDF

Info

Publication number
CN107204853A
CN107204853A CN201710520659.3A CN201710520659A CN107204853A CN 107204853 A CN107204853 A CN 107204853A CN 201710520659 A CN201710520659 A CN 201710520659A CN 107204853 A CN107204853 A CN 107204853A
Authority
CN
China
Prior art keywords
server
mobile phone
signature
token
app
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710520659.3A
Other languages
Chinese (zh)
Inventor
方洪海
张�荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Test Information Technology Co Ltd
Original Assignee
Shanghai Test Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Test Information Technology Co Ltd filed Critical Shanghai Test Information Technology Co Ltd
Priority to CN201710520659.3A priority Critical patent/CN107204853A/en
Publication of CN107204853A publication Critical patent/CN107204853A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • H04L69/162Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously

Abstract

The invention discloses a kind of wireless digital signature method of use mobile phone, mobile phone is attached with bluetooth TOKEN or OTG TOKEN, carrying out the long of socket by APP middlewares and server is connected the file progress digital signature realized to high in the clouds.While normal document signing is met, digital certificate and the separation signed documents are realized again, are realized wireless digital and are signed documents.It is supplied to a kind of extraordinary Consumer's Experience of user and the sense of security of digital certificate stamped signature.

Description

A kind of wireless digital signature method of use mobile phone
Technical field
The present invention relates to digital signature method.
Background technology
Under the situation that current web universe develops on a large scale, Network Mobility, Internet of Things networking, terminal variation, network application The features such as popular, cloud service are increasingly highlighted, but thing followed information security issue is also all the more obvious, on the one hand each Informatization Service, virtual information service is planted to be continuously increased;On the other hand, corresponding information security technology is not but general by masses All over using.
In the application of numerous safe practices, the encryption and authentication of electronic document are an important applications, mutual Networking epoch, people transmit various electronic documents in a network, there is the possibility divulged a secret and be forged at any time, particularly some weights The electronic document wanted, such as contract, legal documents etc..It is very to carry out digital certificate signature and encryption to these important documents Important thing, although say current electronic document stamped signature technology all comparative maturities, but will by sign test server of such as signing, The special equipments such as stamped signature server, but these special encryption devices are bad is understood by masses, and also be difficult to by common big Crowd is applied, and continuing to develop with mobile phone application technology, can research and develop easily by popular understanding and with mobile phone knot The operation application technology of conjunction is just critically important.
The content of the invention
It is an object of the invention to provide a kind of wireless digital signature method of use mobile phone, journey (is applied by mobile phone A PP Sequence) digital signature is carried out to high in the clouds file, do not constrained by fixed clients.
Realizing the technical scheme of above-mentioned purpose is:
A kind of wireless digital signature method of use mobile phone, by mobile phone and bluetooth TOKEN (digital certificate) or OTG- (OTG is writing a Chinese character in simplified form for On-The-Go to TOKEN, applied to the connection between distinct device or mobile device, carries out data exchange, OTG- TOKEN, refers mainly to carry out authentication and encryption using OTG technologies) it is attached, then pass through APP middlewares and server Progress socket (two programs on network realize the exchange of data by a two-way communication connection, the one of this connection End is referred to as a socket) long connection realize digital signature carried out to the file in high in the clouds.
In the wireless digital signature method of above-mentioned use mobile phone, including:
User controls APP middlewares to be connected with the length that server carries out socket by mobile phone A PP;
User is uploaded by mobile phone A PP to be treated stamped signature document to server or treats stamped signature document inherently on the server;
Server return treat stamped signature document hash (typically translate into " hash ", or Hash, by a kind of random length Message is compressed into the function of the eap-message digest of a certain regular length by hash) value is to APP middlewares;
APP middlewares call the private key in bluetooth TOKEN or OTG-TOKEN to carry out encrypted signature to HASH values, and return Signature value is returned to server;
Server treats stamped signature document and carries out digital signature, and the document after stamped signature is back into mobile phone A PP or is stored in On server.
In the wireless digital signature method of above-mentioned use mobile phone,
After bluetooth TOKEN or OTG-TOKEN connection mobile phone, corresponding PIN code (Personal is inputted Identification Number, the personal recognition code of SIM card);
When APP middlewares return to signature value to server, secondary encryption is carried out to signature value;Signature of the server to reception Value is decrypted.
In the wireless digital signature method of above-mentioned use mobile phone, HTTP request is simulated between mobile phone A PP and server Mode communicated;Communicated between APP middlewares and server using APP socket.
The beneficial effects of the invention are as follows:The length that the present invention carries out socket by APP middlewares and server is connected and real Digital signature now is carried out to the file in high in the clouds, not constrained by fixed clients, it is easy to carry, can be whenever and wherever possible.Meeting While normal document signing, digital certificate and the separation signed documents are realized again, wireless digital is realized and signs documents.One Aspect, has broken away from the various compatibility issues of conventional client digital certificate stamped signature.On the other hand, it is to avoid traditional high in the clouds stamped signature Digital certificate not within the hand of a user, and do not need user's input cryptographic certificate, further improves user's digital certificate Security.A kind of extraordinary Consumer's Experience of user and the sense of security of digital certificate stamped signature are supplied to simultaneously, help electronics This advanced electronic signature technology of stamped signature is able to popularity, is further understood for encryption industry by ordinary populace and is provided with operation Important foundation.
Brief description of the drawings
Fig. 1 is the connection diagram between mobile phone and server in the present invention;
Fig. 2 is the simple process figure of the digital signature method of the present invention;
Fig. 3 is the particular flow sheet of the digital signature method of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the invention will be further described.
Refer to Fig. 1 to Fig. 3, the wireless digital signature method of use mobile phone of the invention, combine bluetooth TOKEN or The reading of OTG-TOKEN hardware, the transmission of digital certificate encryption technology, Electronic Signature technology, http agreements, socket communications etc. are a variety of Technology, a kind of efficiently stamped signature scheme of safety, and possess fabulous customer experience is provided for safety signature high in the clouds file Sense, at the same help client to understand, it is quick, efficiently, conveniently apply digital signature.
The digital signature method of the present invention, mainly by the way that mobile phone is connected into bluetooth TOKEN or OTG-TOKEN, passes through APP Middleware carries out the long of socket with server and is connected the file progress digital signature realized to high in the clouds.Specifically include following step Suddenly:
Step S1, user is clicked on by mobile phone A PP uploads document, and mobile phone A PP notifies APP middleware Connection Services, on the offensive The mode that HTTP request is simulated between machine APP and server is communicated, and rear APP middlewares carry out socket length with server Connection.After mobile phone connection bluetooth TOKEN or OTG-TOKEN, corresponding PIN code is inputted.
Step S2, user is uploaded by mobile phone A PP to be treated stamped signature document to server or treats stamped signature document inherently in service On device.First communicated using the mode of simulation HTTP request, the socket connections kept are then determined whether on request, are carried out Significant data is transmitted, it is ensured that the safety and stability of transmission.
Step S3, server, which is returned, treats the hash values of stamped signature document to APP middlewares.Especially in the signature big file in high in the clouds When, it is only necessary to the hash values of file are obtained, APP middlewares are passed to by socket and are digitally signed, high in the clouds is returned again to Stamped signature is carried out, the speed of big document signing is greatly accelerated.
Step S4, APP middleware calls the private key in bluetooth TOKEN or OTG-TOKEN to add HASH values progress signature It is close, and signature value is returned to server, secondary encryption now is carried out to signature value.Server is solved to the signature value of reception It is close.
Step S5, server treat stamped signature document carry out digital signature, and by the document after stamped signature be back to mobile phone A PP or Retain on the server.
Above example is used for illustrative purposes only, rather than limitation of the present invention, about the technology people of technical field Member, without departing from the spirit and scope of the present invention, can also make various conversion or modification, therefore all equivalent Technical scheme should also belong to scope of the invention, should be limited by each claim.

Claims (4)

1. a kind of wireless digital signature method of use mobile phone, it is characterised in that by mobile phone and bluetooth TOKEN or OTG- TOKEN is attached, and then carrying out the long of socket by APP middlewares and server is connected the file progress realized to high in the clouds Digital signature.
2. the wireless digital signature method of use mobile phone according to claim 1, it is characterised in that including:
User controls APP middlewares to be connected with the length that server carries out socket by mobile phone A PP;
User is uploaded by mobile phone A PP to be treated stamped signature document to server or treats stamped signature document inherently on the server;
APP middlewares call the private key in bluetooth TOKEN or OTG-TOKEN to carry out encrypted signature to HASH values, and return to label Name is worth to server;
APP middlewares call bluetooth TOKEN or OTG-TOKEN to be signed, and return to signature value to server;
Server treats stamped signature document and carries out digital signature, and the document after stamped signature is back into mobile phone A PP or service is stored in On device.
3. the wireless digital signature method of use mobile phone according to claim 2, it is characterised in that bluetooth TOKEN or After OTG-TOKEN connection mobile phones, corresponding PIN code is inputted;
When APP middlewares return to signature value to server, secondary encryption is carried out to signature value;Server enters to the signature value of reception Row decryption.
4. the wireless digital signature method of use mobile phone according to claim 2, it is characterised in that
The mode that HTTP request is simulated between mobile phone A PP and server is communicated;
Communicated between APP middlewares and server using APP socket.
CN201710520659.3A 2017-06-30 2017-06-30 A kind of wireless digital signature method of use mobile phone Pending CN107204853A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710520659.3A CN107204853A (en) 2017-06-30 2017-06-30 A kind of wireless digital signature method of use mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710520659.3A CN107204853A (en) 2017-06-30 2017-06-30 A kind of wireless digital signature method of use mobile phone

Publications (1)

Publication Number Publication Date
CN107204853A true CN107204853A (en) 2017-09-26

Family

ID=59910432

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710520659.3A Pending CN107204853A (en) 2017-06-30 2017-06-30 A kind of wireless digital signature method of use mobile phone

Country Status (1)

Country Link
CN (1) CN107204853A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786332A (en) * 2017-10-23 2018-03-09 江西金格科技股份有限公司 The method being digitally signed on the mobile apparatus based on intelligent key disk
CN109842715A (en) * 2017-11-27 2019-06-04 上海聚虹光电科技有限公司 Control of stamping method based on iris authentication
CN109919579A (en) * 2019-02-27 2019-06-21 上海棕榈电脑系统有限公司 Electronic document contracting method, device, storage medium and equipment
CN110955921A (en) * 2019-12-09 2020-04-03 中国移动通信集团江苏有限公司 Electronic signature method, device, equipment and storage medium
CN113890738A (en) * 2020-07-03 2022-01-04 中移互联网有限公司 Electronic signature method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763477A (en) * 2009-12-30 2010-06-30 北京飞天诚信科技有限公司 Signature method of intelligent secret key device
CN101800646A (en) * 2010-03-03 2010-08-11 南京优泰科技发展有限公司 Implementation method and system of electronic signature
CN102209111A (en) * 2011-05-20 2011-10-05 重庆广典传媒有限公司 Open cross-platform system for cloud computing mobile network terminal equipment
CN102291808A (en) * 2011-06-03 2011-12-21 莫雅静 Network communication method, communication equipment and middleware of communication equipment
CN103391197A (en) * 2013-07-19 2013-11-13 武汉大学 Web identity authentication method based on mobile token and NFC technology
CN105429754A (en) * 2014-09-23 2016-03-23 西部安全认证中心有限责任公司 Management method and system of national standard electronic seal
CN105847261A (en) * 2016-03-29 2016-08-10 江苏翔晟信息技术股份有限公司 Bluetooth wireless encryption and decryption-based electronic signature method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763477A (en) * 2009-12-30 2010-06-30 北京飞天诚信科技有限公司 Signature method of intelligent secret key device
CN101800646A (en) * 2010-03-03 2010-08-11 南京优泰科技发展有限公司 Implementation method and system of electronic signature
CN102209111A (en) * 2011-05-20 2011-10-05 重庆广典传媒有限公司 Open cross-platform system for cloud computing mobile network terminal equipment
CN102291808A (en) * 2011-06-03 2011-12-21 莫雅静 Network communication method, communication equipment and middleware of communication equipment
CN103391197A (en) * 2013-07-19 2013-11-13 武汉大学 Web identity authentication method based on mobile token and NFC technology
CN105429754A (en) * 2014-09-23 2016-03-23 西部安全认证中心有限责任公司 Management method and system of national standard electronic seal
CN105847261A (en) * 2016-03-29 2016-08-10 江苏翔晟信息技术股份有限公司 Bluetooth wireless encryption and decryption-based electronic signature method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786332A (en) * 2017-10-23 2018-03-09 江西金格科技股份有限公司 The method being digitally signed on the mobile apparatus based on intelligent key disk
CN109842715A (en) * 2017-11-27 2019-06-04 上海聚虹光电科技有限公司 Control of stamping method based on iris authentication
CN109919579A (en) * 2019-02-27 2019-06-21 上海棕榈电脑系统有限公司 Electronic document contracting method, device, storage medium and equipment
CN109919579B (en) * 2019-02-27 2022-02-25 上海棕榈电脑系统有限公司 Electronic document signing method, device, storage medium and equipment
CN110955921A (en) * 2019-12-09 2020-04-03 中国移动通信集团江苏有限公司 Electronic signature method, device, equipment and storage medium
CN113890738A (en) * 2020-07-03 2022-01-04 中移互联网有限公司 Electronic signature method and device

Similar Documents

Publication Publication Date Title
CN108965230B (en) Secure communication method, system and terminal equipment
CN107204853A (en) A kind of wireless digital signature method of use mobile phone
CN111130803B (en) Method, system and device for digital signature
AU2018322147A1 (en) Method and system for secure identity transmission with integrated service network and application ecosystem
CN107493264B (en) OTP activation method, mobile terminal, server, storage medium and system
CN104618334A (en) Method and system for generating and verifying dynamic two-dimensional code
CN107516196A (en) A kind of mobile-payment system and its method of mobile payment
CN107204854A (en) A kind of digital signature method based on USB TOKEN
CN105764051B (en) Authentication method, authentication device, mobile device and server
CN114553590B (en) Data transmission method and related equipment
CN108833255A (en) Communication means, system and block chain node device based on block chain
CN105897746A (en) Cross-website login method, terminal and website server
CN108155987A (en) Group message sending method, method of reseptance and its system and communicating terminal
TWI568234B (en) Anonymity authentication method for global mobility networks
CN103368831B (en) A kind of anonymous instant communicating system identified based on frequent visitor
CN102404337A (en) Data encryption method and device
CN111934873A (en) Bidding file encryption and decryption method and device
CN105228087B (en) Mobile payment encryption method based on near-field communication
CN106027560A (en) Intelligent terminal oriented security transmission method and system
CN109272314A (en) A kind of safety communicating method and system cooperateing with signature calculation based on two sides
CN113055184B (en) Data encryption and decryption method and device
CN105306577A (en) Data sharing system and method between handheld devices based on APP
CN109005187A (en) A kind of communication information guard method and device
CN102811203A (en) User identity identification method, system and user terminal in Internet
Wang et al. Research and Implementation of Hybrid Encryption System Based on SM2 and SM4 Algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170926