CN107665314B - The trusted processes method and device signed on the electronic document - Google Patents

The trusted processes method and device signed on the electronic document Download PDF

Info

Publication number
CN107665314B
CN107665314B CN201710873368.2A CN201710873368A CN107665314B CN 107665314 B CN107665314 B CN 107665314B CN 201710873368 A CN201710873368 A CN 201710873368A CN 107665314 B CN107665314 B CN 107665314B
Authority
CN
China
Prior art keywords
signature
image
attribute
electronic document
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710873368.2A
Other languages
Chinese (zh)
Other versions
CN107665314A (en
Inventor
付伟
唐清文
杨鹏武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING GFA E-COMMERCE SECURITY CA CO LTD
Original Assignee
BEIJING GFA E-COMMERCE SECURITY CA CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING GFA E-COMMERCE SECURITY CA CO LTD filed Critical BEIJING GFA E-COMMERCE SECURITY CA CO LTD
Priority to CN201710873368.2A priority Critical patent/CN107665314B/en
Publication of CN107665314A publication Critical patent/CN107665314A/en
Application granted granted Critical
Publication of CN107665314B publication Critical patent/CN107665314B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Document Processing Apparatus (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses the trusted processes method and devices that one kind is signed on the electronic document, and wherein method includes: the attribute information for obtaining electronic document to be signed, and attribute information is uniquely corresponding with electronic document;Attribute image is generated according to attribute information, attribute image is uniquely corresponding with attribute information;User is obtained in the electronic signature in electronic document signature region;Electronic signature is synthesized into signature image with attribute image;Signature image is inserted into electronic document.The trusted processes method and device provided by the invention signed on the electronic document, it can be ensured that document to be signed and the unique correspondence of hand-written electric handwriting signature, the inseparability of electronic document and hand-written electric handwriting signature to be signed.User's content of signing can be obtained by set technological means and content of signing is synthesized in other electronic documents by solving malicious user on traditional technology, to forge the risk of user's signature, improve the safety of electronic signature.

Description

The trusted processes method and device signed on the electronic document
Technical field
The present invention relates to information security fields, more particularly to a kind of trusted processes method signed on the electronic document and dress It sets.
Background technique
With information-based fast development, applied with no paper at all in every profession and trades such as government, telecommunications, finance, insurance, logistics Rapid proliferation, application.The management mode that tradition is based on " paper " is substituted by with no paper mode, efficiency is greatly improved, drops Low cost.With no paper management mode user confirm link usually using physical equipments such as handwriting pad, mobile terminals, by with Family carries out handwriting, affirming conduct of the identity user to transaction on the physical devices.
Since the user's signature person's handwriting on traditionally on paper file and the paper document being signed are inseparable one and have Machine is whole, also means that user's signature person's handwriting is individually present without departing from paper document is signed.Therefore in judicial evidence collection The behavior of user can be confirmed by identification user's notes in the process.
And common technological means is the user's signature of electronic document usually by industry in no paper application currently on the market The handwriting signature of business system acquisition user, and user's signature person's handwriting is synthesized in electronic document.The drawbacks of prior art is, The user's signature person's handwriting of operation system acquisition is usually electronically information such as existing coordinate dot matrix, trace graphics, these Information is individually present in the form of electronic.Malicious user is available by certain technological means to be to these electronic forms The user's signature person's handwriting of carrier, and the handwriting signature that will acquire is synthesized in electronic document, to forge user's signature.
Existing realization technology major drawbacks are that the content of user's handwriting and signed electronic document is not inherent Relevance, while also just not having specific aim and timeliness, safety risks brought to information system, when there is dispute It can not tell truth from falsehood, the security performance for causing electronic signature is poor.
Summary of the invention
The present invention provides a kind of trusted processes method and device signed on the electronic document, improves the peace of electronic signature Full performance.
The present invention provides a kind of trusted processes method signed on the electronic document, comprising:
The attribute information of electronic document to be signed is obtained, the attribute information and the electronic document are uniquely corresponding;
Attribute image is generated according to the attribute information, the attribute image and the attribute information are uniquely corresponding;
User is obtained in the electronic signature in the electronic document signature region;
The electronic signature is synthesized into signature image with the attribute image;
The signature image is inserted into the electronic document.
In an embodiment of the present invention, the attribute information includes one or more superposition below: the electronics text Content, number of words, number of pages, coding mode, page info, processing time, processing place and the processing user of shelves.
It is in an embodiment of the present invention, described that attribute image is generated according to the attribute information, comprising:
The hashed value of the attribute information is obtained by hashing algorithm;
The hashed value is encrypted to obtain cryptographic hashes;
The cryptographic hashes are obtained into mask code matrix by encoding operation;
Mask code matrix progress visualization processing is obtained into the attribute image.
It is in an embodiment of the present invention, described that the hashed value is encrypted to obtain cryptographic hashes, comprising:
Encrypted to obtain the cryptographic hashes to the hashed value by private key, other users by with the private key Verifying is decrypted to the cryptographic hashes in corresponding public key;Alternatively,
The hashed value is encrypted by unique password to obtain the cryptographic hashes.
In an embodiment of the present invention, described that the electronic signature is synthesized into signature image with the attribute image, it wraps It includes:
By the attribute image tiles to the specific region of the electronic document;
The attribute image of the electronic signature in the signature region and the specific region is synthesized into signature image.
In an embodiment of the present invention, the specific region and the signature region are the same area on the electronic document Domain.
In an embodiment of the present invention, described that the electronic signature is synthesized into signature image with the attribute image, it wraps It includes:
The attribute image is added into the stroke of the electronic signature and obtains the signature image, i.e., the described signature image In electronic signature in include the signature image.
It is in an embodiment of the present invention, described that the signature image is inserted into after the electronic document, further includes:
The testing attribute information of test document is obtained, the testing attribute information and the test document are uniquely corresponding;
Testing attribute image is generated according to the testing attribute information, the testing attribute image and the testing attribute are believed Breath is unique corresponding;
Verifying is compared with the signature image in the testing attribute image, the test document if being verified The electronic document of the as described user's signature.
The present invention provides a kind of electronic signature device, comprising:
Attribute obtains module, and the attribute obtains the attribute information that module is used to obtain electronic document to be signed, the category Property information and the electronic document are uniquely corresponding;
Image generation module, described image generation module are used to generate attribute image, the category according to the attribute information Property image and the attribute information are uniquely corresponding;
Signature obtains module, and the signature obtains module for obtaining user in the electronics in the electronic document signature region Signature;
Signature processing module, the signature processing module are used to the electronic signature synthesizing label with the attribute image Name image;
The signature processing module is also used to the signature image being inserted into the electronic document.
In an embodiment of the present invention, the signature processing module is specifically used for,
The hashed value of the attribute information is obtained by hashing algorithm;
The hashed value is encrypted to obtain cryptographic hashes;
The cryptographic hashes are obtained into mask code matrix by encoding operation;
Mask code matrix progress visualization processing is obtained into the attribute image.
The present invention provides a kind of trusted processes method and device signed on the electronic document, and wherein method includes: to obtain The attribute information of electronic document to be signed, attribute information are uniquely corresponding with electronic document;Attribute image is generated according to attribute information, Attribute image is uniquely corresponding with attribute information;User is obtained in the electronic signature in electronic document signature region;Will electronic signature with Attribute image synthesizes signature image;Signature image is inserted into electronic document.It is provided by the invention on the electronic document to sign Trusted processes method and device, electronic document to be signed is unique corresponding with electronic signature, realize the electronic signature person's handwriting of user With the reliable association of electronic document content to be signed so that user's electronic handwritten signature be provided with specific aim and actual effect.Its In, the electronic signature of user and the attribute information of electronic document are an entirety, increase electronic document and electronic signature person's handwriting Separating difficulty, user it is hand-written electronic signature person's handwriting once departing from signature electronic document content it is just meaningless, thus effectively Improve the security performance of electronic signature.And it may insure document to be signed and the unique correspondence of hand-written electric handwriting signature, The inseparability of electronic document and hand-written electric handwriting signature to be signed.Solving malicious user on traditional technology can pass through Set technological means obtains user's content of signing and content of signing is synthesized in other electronic documents, to forge user's label The risk of name, improves the safety of electronic signature.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art To obtain other drawings based on these drawings.
Fig. 1 is the flow diagram for the trusted processes embodiment of the method one that the present invention signs on the electronic document;
Fig. 2 is the flow diagram for the trusted processes embodiment of the method two that the present invention signs on the electronic document;
Fig. 3 is the signature schematic diagram for the trusted processes embodiment of the method three that the present invention signs on the electronic document;
Fig. 4 is the flow diagram for the trusted processes embodiment of the method four that the present invention signs on the electronic document;
Fig. 5 is the structural schematic diagram for the trusted processes Installation practice one that the present invention signs on the electronic document.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Based on the embodiments of the present invention, those of ordinary skill in the art are obtained without making creative work The every other embodiment obtained, shall fall within the protection scope of the present invention.
Description and claims of this specification and term " first ", " second ", " third ", " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so that the embodiment of the present invention described herein for example can be to remove Sequence other than those of illustrating or describe herein is implemented.In addition, term " includes " and " having " and theirs is any Deformation, it is intended that cover it is non-exclusive include, for example, containing the process, method of a series of steps or units, system, production Product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include be not clearly listed or for this A little process, methods, the other step or units of product or equipment inherently.
Technical solution of the present invention is described in detail with specifically embodiment below.These specific implementations below Example can be combined with each other, and the same or similar concept or process may be repeated no more in some embodiments.
Fig. 1 is the flow diagram for the trusted processes embodiment of the method one that the present invention signs on the electronic document.This implementation Executing subject can be any electronic equipment for having electronic signature functionality and relevant device, such as mobile phone, computer or notebook Computer etc..
As shown in Figure 1, the trusted processes method that the present embodiment is signed on the electronic document includes the following steps:
S101: the attribute information of electronic document to be signed is obtained.
Wherein, attribute information is uniquely corresponding with electronic document, and electronic document can be the electronic equipment of any electronic form Readable document.For example, attribute information may include one or more superposition below: the content of electronic document, number of words, page Number, coding mode, page info, processing time, processing place and processing user, wherein the processing of electronic document includes pair again Creation, modification and the completion of electronic document.Attribute information has uniqueness, and the attribute information of each electronic document is different from, The electronic document to be signed and other documents can be distinguished by attribute information.Meanwhile when attribute information is multinomial, optionally Stacked system has numbers pile up or operation superposition etc., it is not limited here.
S102: attribute image is generated according to attribute information.
Wherein, attribute image is uniquely corresponding with attribute information.Attribute information is subjected to visualization processing in S102, is obtained The attribute image of visual pattern.Such as: attribute image can be the visual form such as matrix or two dimensional code, attribute image When being matrix, matrix can be made of letter and/or number.
Optionally, Fig. 2 is the flow diagram for the trusted processes embodiment of the method two that the present invention signs on the electronic document.
On the basis of above-mentioned embodiment shown in FIG. 1, S102 specifically comprises the following steps: embodiment as shown in Figure 2
S1021: the hashed value of attribute information is obtained by hashing algorithm.
Wherein, hashing algorithm include message digest algorithm the 5th edition (Message Digest Algorithm, referred to as: MD5), Secure Hash Algorithm (Secure Hash Algorithm, abbreviation SHA) 1, SHA256 or SM3 (Senior Middle 3, referred to as: SM3) etc..Attribute information obtains the hashed value of attribute information after the calculating of hashing algorithm, the hashed value and attribute Information is unique corresponding relation.
S1022: hashed value is encrypted to obtain cryptographic hashes.
Wherein, the mode of encryption can be obtained according to the demand of business scenario by diversified forms.It is wherein encrypted Cryptographic hashes and original hash value are that only one-to-one correspondence, malicious user can not be obtained in the case where not knowing cipher mode It takes and generates cryptographic hashes.It is encrypted, can be further improved in electricity by the attribute information to electronic document The security performance of electronic signature on subdocument, electronic signature are not easy maliciously to be obtained, and if adding after acquisition without corresponding Close processing mode also can not obtain or palm off the verification information of electronic signature.
For example, a kind of possible implementation of encryption are as follows: encrypted to obtain encryption to hashed value by private key and dissipated Verifying is decrypted to cryptographic hashes by public key corresponding with private key in train value, other users.Wherein, private key is for signature Use when user signs encrypts hashed value by private key, is handled again encrypted hashed value.It is verifying When signature, other third party users for possessing public key can be decrypted or be verified to hashed value by public key.
Alternatively, the alternatively possible implementation of encryption are as follows: carried out at encryption by unique password to hashed value Reason obtains cryptographic hashes.
S1023: cryptographic hashes are obtained into mask code matrix by encoding operation.
Specifically, by S1022 to cryptographic hashes carry out encoding operation and obtain mask code matrix.Wherein mask code matrix For the expression of the matrix form of cryptographic hashes, mask code matrix can be the letter and/or number that two-dimensional coordinate matrix form is shown Word.
S1024: mask code matrix progress visualization processing is obtained into attribute image.
Specifically, the mask code matrix in S1023 is subjected to visual processing and obtains the attribute image comprising mask code matrix. For example, converting the signature region figure of corresponding size with electronic document for the mask code matrix of two-dimensional coordinate matrix form Piece.
S103: user is obtained in the electronic signature in electronic document signature region.
Wherein, user's read electronic documents and the signature region of electronic document by electronic signature obtain equipment carry out electricity Son signature, the person's handwriting of user's input is obtained in S103, person's handwriting is stored as to the electronic signature of graphic form.
S104: electronic signature is synthesized into signature image with attribute image.
Wherein, in S104, the attribute image by the electronic signature of user and electronic document to be signed is needed to integrate, The signature image of an entirety is synthesized, so that it is difficult to the separation of electronic document and electronic signature person's handwriting to increase malicious user Degree, and make the hand-written electronic signature person's handwriting of user once conveniently nonsensical departing from electronic document content to be signed.
Such as: a kind of possible implementation of S104 is, by the specific region of attribute image tiles to electronic document;It will The electronic signature in signature region and the attribute image of specific region synthesize signature image.Wherein, attribute image tiles are to specific Index, which is adaptively adjusted, to be shown to size of attribute image and/or clarity etc. according to the size of specific region when region.
Wherein optionally, specific region and signature region are the different zones on electronic document.It specific region can be in electricity At the margin of subdocument, header or footer, to reduce the influence after attribute image tiles to specific region to electronic document content.
Alternatively, specific region and signature region are the same area on electronic document.Fig. 3 be the present invention on the electronic document The signature schematic diagram of the trusted processes embodiment of the method three of signature.In example signature as shown in Figure 3, attribute image is two-dimemsional number The mask code matrix of word matrix form, attribute image are tiled in the signature region of electronic document, i.e., in figure after " signer " Region.Electronic signature person's handwriting in figure is located on the attribute image that signature region is tiled.To which handwriting signature and electronics is literary The attribute image of shelves merges into an entirety, substantially increases malicious user and obtains user's electronics from the electronic document in figure The difficulty of handwriting signature.
Alternatively, the alternatively possible implementation of S104 is, attribute image is added into the stroke of electronic signature and obtains It include signature image in signature image, i.e. electronic signature in signature image.This mode makes the stroke of signature by attributed graph Picture is constituted, such as attribute image can according to need the form for cutting or being adjusted to one-dimensional matrix, be expressed by attribute image The person's handwriting to sign electronically out only need to from first to last sequential read out all properties image according to the person's handwriting of electronic signature in verifying, Complete attribute image can be obtained.To which in the case where not influencing the identification of normal person's handwriting, joined inside person's handwriting can The attribute image for verifying electronic signature, is also not take up other spaces of electronic document, safely and efficiently improves electronic signature Security performance.
S105: signature image is inserted into electronic document.
Wherein, the signature image obtained in S104 is inserted into electronic document, completes the electronic signature to electronic document.Its In, signature image insertion electronic document can be understood as being embedded in the form of picture on the signature region in electronic document.
The trusted processes method provided in an embodiment of the present invention signed on the electronic document, comprising: obtain electronics to be signed The attribute information of document, attribute information are uniquely corresponding with electronic document;According to attribute information generate attribute image, attribute image with Attribute information uniquely corresponds to;User is obtained in the electronic signature in electronic document signature region;Electronic signature is closed with attribute image As signature image;Signature image is inserted into electronic document.It is provided in an embodiment of the present invention sign on the electronic document it is credible Processing method, electronic document to be signed is unique corresponding with electronic signature, realize the electronic signature person's handwriting of user and to be signed The reliable association of electronic document content, so that user's electronic handwritten signature is provided with specific aim and actual effect.Wherein, the electricity of user The attribute information of son signature and electronic document is an entirety, increases the separating difficulty of electronic document and the person's handwriting that signs electronically, The hand-written electronic signature person's handwriting of user is once conveniently nonsensical departing from the electronic document content of signature, to effectively increase electricity The security performance of son signature, and may insure document to be signed and the unique correspondence of hand-written electric handwriting signature, electricity to be signed The inseparability of subdocument and hand-written electric handwriting signature.Solving malicious user on traditional technology can be by set skill Art means obtain user's content of signing and content of signing are synthesized in other electronic documents, to forge the wind of user's signature Danger, improves the safety of electronic signature.
Fig. 4 is the flow diagram for the trusted processes embodiment of the method four that the present invention signs on the electronic document.Such as Fig. 4 institute The embodiment shown is the verifying process of electronic signature, is included the following steps:
S401: obtaining the testing attribute information of test document, and testing attribute information is uniquely corresponding with test document.
Specifically, when needing to verify the electronic signature on a certain electronic document, first in S401 obtain to The method and original of the attribute information of test document, acquisition methods and principle with the attribute information for obtaining document to be signed in S101 Reason, repeats no more.
S402: testing attribute image is generated according to testing attribute information, testing attribute image and testing attribute information are unique It is corresponding.
Specifically, testing attribute image, method and the same S102 of principle are generated according to testing attribute information in S402, no It repeats again.
S403: verifying being compared with signature image by testing attribute image, and test document is to use if being verified The electronic document of family signature.
In S403, verifying is compared with the signature image in test document in attribute image obtained in S402, if Attribute image is identical as the attribute image in signature image, then illustrate the electronic signature be strictly user in document to be tested into Row signature, it signs electronically authentic and valid;If attribute image is different from the attribute image in signature image, illustrate to sign electronically For not instead of user's label in the electronic document to be tested, label are transferred to this electronic document to be tested in other documents In, electronic signature is invalid.
Fig. 5 is the structural schematic diagram for the trusted processes Installation practice one that the present invention signs on the electronic document.Such as Fig. 5 institute Show, the trusted processes device that the present embodiment is signed on the electronic document includes: that attribute obtains module 501, image generation module 502, signature obtains module 503 and signature processing module 504.Wherein, attribute obtains module 501 for obtaining electronics text to be signed The attribute information of shelves, attribute information are uniquely corresponding with electronic document;Image generation module 502, which is used to be generated according to attribute information, to be belonged to Property image, attribute image are uniquely corresponding with attribute information;Signature obtains module 503 for obtaining user in electronic document signature area The electronic signature in domain;Signature processing module 504 is used to sign electronically and attribute image synthesizes signature image;Signature processing mould Block 504 is also used to signature image being inserted into electronic document.
The trusted processes device provided in this embodiment signed on the electronic document is for executing shown in Fig. 1 in electronic document The trusted processes method of upper signature, technical characteristic having the same and technical effect, details are not described herein.
Optionally, in the above-described embodiments, attribute information includes one or more superposition below: electronic document it is interior Appearance, number of words, number of pages, coding mode, page info, processing time, processing place and processing user.
Optionally, in the above-described embodiments, described image generation module 502 is specifically used for,
The hashed value of attribute information is obtained by hashing algorithm;
Hashed value is encrypted to obtain cryptographic hashes;
Cryptographic hashes are obtained into mask code matrix by encoding operation;
Mask code matrix progress visualization processing is obtained into attribute image.
The trusted processes device provided in this embodiment signed on the electronic document is for executing shown in Fig. 2 in electronic document The trusted processes method of upper signature, technical characteristic having the same and technical effect, details are not described herein.
Optionally, in the above-described embodiments, image generation module 502 is specifically used for encrypting hashed value by private key Cryptographic hashes are obtained, verifying is decrypted to cryptographic hashes by public key corresponding with private key in other users;Alternatively,
Hashed value is encrypted by unique password to obtain cryptographic hashes.
Optionally, in the above-described embodiments, signature processing module 504 is specifically used for attribute image tiles to electronic document Specific region;
The attribute image of the electronic signature in region of signing and specific region is synthesized into signature image.
Wherein optionally, specific region and signature region are the same area on electronic document.
Optionally, in the above-described embodiments, signature processing module 504 is specifically used for being added into the stroke of electronic signature and belong to Property image obtain signature image, i.e., include signature image in the electronic signature in signature image.
The trusted processes device provided in this embodiment signed on the electronic document be used for execute in above-described embodiment The trusted processes method signed on electronic document, technical characteristic having the same and technical effect, details are not described herein.
In addition, also providing a kind of computer readable storage medium in an embodiment of the present invention, it is stored thereon with computer Program, it is documented in realization the various embodiments described above to sign on the electronic document when the computer program is executed by processor Trusted processes method.
A kind of front end processor, including processor and memory are also provided in one embodiment of the invention, memory is at storage Manage the executable instruction of device, processor be configured to execute via the executable instruction is executed it is above-mentioned it is each it is described in documented by The trusted processes method signed on the electronic document.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer readable storage medium.The journey When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned include: ROM, RAM, magnetic disk or The various media that can store program code such as person's CD.Finally, it should be noted that the above various embodiments is only to illustrate this hair Bright technical solution, rather than its limitations.Although present invention has been described in detail with reference to the aforementioned embodiments, this field Those of ordinary skill it is understood that it is still possible to modify the technical solutions described in the foregoing embodiments, or Equivalent substitution of some or all of the technical features;And these are modified or replaceed, and do not make corresponding technical solution Essence depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (8)

1. the trusted processes method that one kind is signed on the electronic document characterized by comprising
The attribute information of electronic document to be signed is obtained, the attribute information and the electronic document are uniquely corresponding;
Attribute image is generated according to the attribute information, the attribute image and the attribute information are uniquely corresponding;
User is obtained in the electronic signature in the signature region of electronic document;
The electronic signature is synthesized into signature image with the attribute image;
The signature image is inserted into the electronic document;
It is wherein, described that attribute image is generated according to the attribute information, comprising:
The hashed value of the attribute information is obtained by hashing algorithm;
The hashed value is encrypted to obtain cryptographic hashes;
The cryptographic hashes are obtained into mask code matrix by encoding operation;
Mask code matrix progress visualization processing is obtained into the attribute image.
2. the method according to claim 1, wherein
The attribute information includes one or more superposition below: the content of the electronic document, number of words, number of pages, coding Mode, page info, processing time, processing place and processing user.
3. the method according to claim 1, wherein the described hashed value is encrypted is encrypted Hashed value, comprising:
The hashed value is encrypted by private key to obtain the cryptographic hashes, other users pass through corresponding with the private key Public key verifying is decrypted to the cryptographic hashes;Alternatively,
The hashed value is encrypted by unique password to obtain the cryptographic hashes.
4. the method according to claim 1, wherein described synthesize the electronic signature with the attribute image For signature image, comprising:
By the attribute image tiles to the specific region of the electronic document;
The attribute image of the electronic signature in the signature region and the specific region is synthesized into signature image.
5. according to the method described in claim 4, it is characterized in that,
The specific region and the signature region are the same area on the electronic document.
6. the method according to claim 1, wherein described synthesize the electronic signature with the attribute image For signature image, comprising:
The attribute image is added into the stroke of the electronic signature and obtains the signature image, i.e., in the described signature image It include the signature image in electronic signature.
7. the method according to claim 1, wherein it is described by the signature image be inserted into the electronic document it Afterwards, further includes:
The testing attribute information of test document is obtained, the testing attribute information and the test document are uniquely corresponding;
Testing attribute image is generated according to the testing attribute information, the testing attribute image and the testing attribute information are only One is corresponding;
Verifying is compared with the signature image in the testing attribute image, the test document is if being verified The electronic document of the user's signature.
8. the trusted processes device that one kind is signed on the electronic document characterized by comprising
Attribute obtains module, and the attribute obtains the attribute information that module is used to obtain electronic document to be signed, the attribute letter It ceases uniquely corresponding with the electronic document;
Image generation module, described image generation module are used to generate attribute image, the attributed graph according to the attribute information As uniquely corresponding with the attribute information;
Signature obtains module, and the signature obtains module and is used to obtain user in the electronic signature in the signature region of electronic document;
Signature processing module, the signature processing module are used to the electronic signature synthesizing signature map with the attribute image Picture;
The signature processing module is also used to the signature image being inserted into the electronic document;
Wherein, the signature processing module is specifically used for:
The hashed value of the attribute information is obtained by hashing algorithm;
The hashed value is encrypted to obtain cryptographic hashes;
The cryptographic hashes are obtained into mask code matrix by encoding operation;
Mask code matrix progress visualization processing is obtained into the attribute image.
CN201710873368.2A 2017-09-25 2017-09-25 The trusted processes method and device signed on the electronic document Active CN107665314B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710873368.2A CN107665314B (en) 2017-09-25 2017-09-25 The trusted processes method and device signed on the electronic document

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710873368.2A CN107665314B (en) 2017-09-25 2017-09-25 The trusted processes method and device signed on the electronic document

Publications (2)

Publication Number Publication Date
CN107665314A CN107665314A (en) 2018-02-06
CN107665314B true CN107665314B (en) 2019-11-08

Family

ID=61097112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710873368.2A Active CN107665314B (en) 2017-09-25 2017-09-25 The trusted processes method and device signed on the electronic document

Country Status (1)

Country Link
CN (1) CN107665314B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109190339A (en) * 2018-09-13 2019-01-11 中国农业银行股份有限公司 A kind of webpage digital watermarking image generates, identification, Method of printing and device
CN109359474A (en) * 2018-10-08 2019-02-19 北京点聚信息技术有限公司 A method of it being incorporated into fingerprint in a document and is encrypted
CN110705970A (en) * 2019-10-15 2020-01-17 中国联合网络通信集团有限公司 Remote signature method and device
CN111756787A (en) * 2019-11-15 2020-10-09 北京京东尚科信息技术有限公司 Online signature method and device, electronic equipment and computer readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002101522A3 (en) * 2001-06-12 2003-10-30 Ibm Method of authenticating a plurality of files linked to a text document
CN1521656A (en) * 2003-02-10 2004-08-18 吴建明 Novel electronic signature stamp technique
CN1859092A (en) * 2005-04-30 2006-11-08 刘瑞祯 Cell phone seal verifying method and its system
CN101369889A (en) * 2007-08-13 2009-02-18 深圳兆日技术有限公司 System and method for electronic endorsement of document
CN101427242A (en) * 2006-04-28 2009-05-06 微软公司 Secure signatures
CN101743559A (en) * 2007-07-12 2010-06-16 富士通株式会社 Information processing apparatus, information processing method, and information processing program
CN103177364A (en) * 2011-12-26 2013-06-26 中国银联股份有限公司 Transaction processing method based on electronic signature
CN105760722A (en) * 2016-03-23 2016-07-13 北京签玺科技有限公司 Watermark embedding electronic signature generation method and platform

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002101522A3 (en) * 2001-06-12 2003-10-30 Ibm Method of authenticating a plurality of files linked to a text document
CN1521656A (en) * 2003-02-10 2004-08-18 吴建明 Novel electronic signature stamp technique
CN1859092A (en) * 2005-04-30 2006-11-08 刘瑞祯 Cell phone seal verifying method and its system
CN101427242A (en) * 2006-04-28 2009-05-06 微软公司 Secure signatures
CN101743559A (en) * 2007-07-12 2010-06-16 富士通株式会社 Information processing apparatus, information processing method, and information processing program
CN101369889A (en) * 2007-08-13 2009-02-18 深圳兆日技术有限公司 System and method for electronic endorsement of document
CN103177364A (en) * 2011-12-26 2013-06-26 中国银联股份有限公司 Transaction processing method based on electronic signature
CN105760722A (en) * 2016-03-23 2016-07-13 北京签玺科技有限公司 Watermark embedding electronic signature generation method and platform

Also Published As

Publication number Publication date
CN107665314A (en) 2018-02-06

Similar Documents

Publication Publication Date Title
CN107665314B (en) The trusted processes method and device signed on the electronic document
CN105471575B (en) Information encryption and decryption method and device
CN104618107B (en) digital signature method and system
CN111835511A (en) Data security transmission method and device, computer equipment and storage medium
EP3134994B1 (en) Method of obfuscating data
WO2017045594A1 (en) Anti-counterfeit method
CN107209821A (en) For the method and authentication method being digitally signed to e-file
CN106330459A (en) Electronic keyword signature method
CN103646375B (en) The identifiable method of photo primitiveness that intelligent mobile terminal is taken pictures
CN102779263A (en) Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature
CN105976005A (en) Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device
Chavan et al. Signature based authentication using contrast enhanced hierarchical visual cryptography
CN112347508A (en) Block chain data sharing encryption and decryption method and system
Ali et al. A secure and efficient multi-factor authentication algorithm for mobile money applications
CN102117476B (en) Signature watermark system used for CAD (Computer-Aided Design) documents
CN110598433B (en) Block chain-based anti-fake information processing method and device
CN109214146A (en) The endorsement method of application software, sign test method and apparatus
CN107104788B (en) Terminal and non-repudiation encryption signature method and device thereof
CN103997504A (en) Identity authentication system and method
CN107947939A (en) Support the PDF endorsement methods and system of SM3 cryptographic Hash algorithm and SM2 Digital Signature Algorithms
CN200983153Y (en) Encryption signature handwriting plate with key
Shawkat et al. Optimization-based pseudo random key generation for fast encryption scheme
CN102571341B (en) A kind of Verification System based on dynamic image and authentication method
CN111949996A (en) Generation method, encryption method, system, device and medium of security private key
Simkin et al. Ubic: Bridging the gap between digital cryptography and the physical world

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant