CN108092779A - A kind of method and device for realizing electronic signature - Google Patents
A kind of method and device for realizing electronic signature Download PDFInfo
- Publication number
- CN108092779A CN108092779A CN201810010212.6A CN201810010212A CN108092779A CN 108092779 A CN108092779 A CN 108092779A CN 201810010212 A CN201810010212 A CN 201810010212A CN 108092779 A CN108092779 A CN 108092779A
- Authority
- CN
- China
- Prior art keywords
- electronic
- electronic signature
- contract
- signature
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000012795 verification Methods 0.000 claims description 11
- 230000005611 electricity Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 30
- 238000007726 management method Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 9
- 230000006399 behavior Effects 0.000 description 8
- 230000000694 effects Effects 0.000 description 5
- 230000009471 action Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012800 visualization Methods 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 240000007711 Peperomia pellucida Species 0.000 description 1
- 235000012364 Peperomia pellucida Nutrition 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 229910052709 silver Inorganic materials 0.000 description 1
- 239000004332 silver Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
- G06Q50/188—Electronic negotiation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Collating Specific Patterns (AREA)
Abstract
The present invention provides a kind of method and device for realizing electronic signature, receives the identification information of electronic signature user, and the true identity of the electronic signature user is determined according to the identification information;After the true identity for determining the electronic signature user is errorless, the electronic contract by electronic signature user signing, and the additional electronic signature on the electronic contract are received;The electronic contract includes the handwriting picture of the electronic signature user;Storage is encrypted to the finally formed electronic contract.In this way, it can not only realize the electronic signature on line, additionally it is possible to by real-name authentication information and electronic signature, ensure the authenticity to sign documents on line, validity and can not tamper.
Description
Technical field
This application involves digital technology, more particularly to a kind of method and device for realizing electronic signature.
Background technology
With the construction and development of information technology, substantial amounts of business datum file can mutually be transferred by network, under line
Papery contract also begins to go on line and sign.
When being signed a contract on line by internet, since the related side of contract may have never seen face, Er Qiecun
In the automation process of more information system, thus can there are the risk that is not present of signing a contract under line, such as:How to sentence
In circuit network sign electronic contract whether I, how in the case where can only see electronic curtain sign electronic data,
How to learn the signature wish of other side, how to prevent signature picture by cut with distort, how digital certificate, how in electronics
Storage backup is carried out in the case of the inevitable only signature portion of contract, how to prevent from being tampered after electronic contract is stored, how prevent
People's denial, the legitimacy for how ensureing the electronic contract after signing and validity of electronic contract etc. is only signed in network.
Therefore, how to realize the electronic signature on line and how to ensure the authenticity to sign documents on line, validity and
Can not tamper etc. the problem of, the problem of just becoming current urgent need to resolve.
The content of the invention
In view of this, it is an object of the invention to provide a kind of method and device for realizing electronic signature, it is used to implement line
On electronic signature, and ensure the authenticity to sign documents on line, validity and can not tamper.
Technical solution provided by the invention is as follows:
A kind of method for realizing electronic signature, applied in electronic signature device, including:
The identification information of electronic signature user is received, determines that the electronic signature user's is true according to the identification information
Identity;
After the true identity for determining the electronic signature user is errorless, receive by electronic signature user signing
Electronic contract, and the additional electronic signature on the electronic contract;The electronic contract includes the electronic signature user's
Handwriting picture;
Storage is encrypted to the finally formed electronic contract.
Preferably, the identification information for receiving electronic signature user, the electronics label are determined according to the identification information
The about true identity of user, including:
The identification information of the electronic signature user is received, calls the electronic signature user's according to the identification information
Real-name authentication information;The real-name authentication information is the accurate information by certification;
The true identity of the electronic signature user is determined according to the real-name authentication information.
Preferably, the electronic contract received by electronic signature user signing, and on the electronic contract
Additional electronic signature, including:
The electronic contract by electronic signature user signing is received, judges the hand in the electronic contract
Whether clear and legible write signature picture;
When the handwriting picture is clear and legible, Hash calculating is carried out to the electronic contract using digital certificate,
And the additional electronic signature on the electronic contract;The hardware identification code of the digital certificate and the electronic signature device is mutually tied up
It is fixed.
Preferably, it is described storage is encrypted to the finally formed electronic contract before, further include:
The electronic contract for being attached with the electronic signature is sent in authentication server, so that the authentication service
Device verifies the handwritten signature picture and the electronic signature in the electronic contract, after verification passes through, calls high in the clouds card
Book signs the electronic contract, and the high in the clouds certificate is uniquely bound with the digital certificate.
Preferably, in the electronic contract received by electronic signature user signing, and in the electronic contract
While upper additional electronic signature, further include:
The operating time information of the electronic signature user signing electronic contract described in certification, and on the electronic contract
Addition includes the timestamp of the operating time information.
A kind of device for realizing electronic signature, including:
For receiving the identification information of electronic signature user, the electronics is determined according to the identification information for identification module
The true identity of contracted user;
Signature blocks, for after the true identity for determining the electronic signature user is errorless, receiving and passing through the electronics
The electronic contract of contracted user's signing, and the additional electronic signature on the electronic contract;The electronic contract includes described
The handwriting picture of electronic signature user;
Memory module, for storage to be encrypted to the finally formed electronic contract.
Preferably, the identification module, including:
Receiving unit, for receiving the identification information of the electronic signature user, according to being called the identification information
The real-name authentication information of electronic signature user;The real-name authentication information is the accurate information by certification;
Determination unit, for determining the true identity of the electronic signature user according to the real-name authentication information.
Preferably, the signature blocks, including:
Judging unit for receiving the electronic contract by electronic signature user signing, judges the electronics
Whether the handwriting picture in contract is clear and legible;
Signature unit, for when the handwriting picture is clear and legible, using digital certificate to the electronic contract
Carry out Hash calculating, and the additional electronic signature on the electronic contract;The digital certificate and the electronic signature device
Hardware identification code is mutually bound.
Preferably, further include:
Sending module, for it is described storage is encrypted to the finally formed electronic contract before, will be attached with
The electronic contract of the electronic signature is sent in authentication server, so that the authentication server verifies the electronics and closes
The handwritten signature picture and the electronic signature in after verification passes through, call high in the clouds certificate to the electronic contract
It is signed, and the high in the clouds certificate is uniquely bound with the digital certificate.
Preferably, further include:
Timestamp module, for receiving the electronic contract contracted by the electronic signature user described, and described
On electronic contract while additional electronic signature, the operating time letter of the electronic signature user signing electronic contract described in certification
Breath, and addition includes the timestamp of the operating time information on the electronic contract.
Compared with prior art, above-mentioned technical proposal provided by the invention has the following advantages that:
Technical solution provided by the invention receives the identification information of electronic signature user, is determined according to the identification information
The true identity of the electronic signature user;After the true identity for determining the electronic signature user is errorless, receive by institute
State the electronic contract of electronic signature user signing, and the additional electronic signature on the electronic contract;It is wrapped in the electronic contract
Include the handwriting picture of the electronic signature user;Storage is encrypted to the finally formed electronic contract.In this way, not
It can only realize the electronic signature on line, additionally it is possible to by real-name authentication information and electronic signature, ensure what is signed documents on line
Authenticity, validity and can not tamper.
Description of the drawings
It in order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention
Some embodiments, for those of ordinary skill in the art, without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 is a kind of flow diagram of the method for realization electronic signature provided in an embodiment of the present invention;
Fig. 2 is a kind of structure diagram of the device of realization electronic signature provided in an embodiment of the present invention.
Specific embodiment
Term is explained:
PKI:Public Key Infrastructure, Public Key Infrastructure, it is a kind of key for following written standards
Management platform, it can provide the cryptographic services such as encrypted and digitally signed and necessary key and certificate for all-network application
Management system;
Digital certificate:Digital certificate is a kind of key management medium of public key architecture.It is the electronics text of authority a kind of
Shelves, just as a kind of identity card in network environment, for proving the identity of a certain main body (such as organization, people, server)
And its legitimacy of public-key cryptography;Digital certificate ensure that network data using the public key technique of encrypted and digitally signed
Safety, it is solved the unauthorized access being likely to occur in Report on Network data transfer procedure, is illegally distorted, false with technical approach
Emit forgery, refusal service deny etc. safety problems, it is ensured that on the net transmit data confidentiality, access control, believable identity differentiate,
The demand for security of data integrity, resisting denying etc..
TSA:Timestamp (TSA) is the time that a believable time authority is represented with one section of identifiable complete data
Mark.Most important is not the accuracy of time in itself, but the security on date correlation time.Support undeniable sex service
A key factor be exactly the timestamp safe to use in PKI, that is to say, that time source is believable, and time value must quilt
Safely transmit;
Electronic Signature:Comprising enterprise's chapter, personal chapter, only it is a picture, is mainly used together with CA digital certificates, individually
Stamped signature do not possess legal effect.
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
All other embodiments obtained without making creative work belong to the scope of protection of the invention.
Referring to Fig. 1, a kind of flow signal of the method it illustrates realization electronic signature provided in an embodiment of the present invention
Figure, this method are applied in electronic signature device, may comprise steps of:
S101:The identification information of electronic signature user is received, the electronic signature user is determined according to the identification information
True identity;
In the embodiment of the present application, the identification information for receiving electronic signature user, determines according to the identification information
The true identity of the electronic signature user, can include:The identification information of the electronic signature user is received, according to the knowledge
Other information calls the real-name authentication information of the electronic signature user;The real-name authentication information is the accurate letter by certification
Breath;The true identity of the electronic signature user is determined according to the real-name authentication information.
The embodiment of the present application, it is necessary to use the technologies such as biometric identification information, letter of identity before electronic signature is realized
Means to electronic signature user carry out real-name authentication, can evade identity falsely use, identity theft, ensure from technology and specification level
The operation of internet electronic signing is user's operation behavior, prevents user from being denied to on-line operation behavior, shirks duty
Appoint.
In addition, during signature wish expression, biometric identification technology, disposable short message verification code etc. can also be passed through
Integrated application repeatedly confirms, it is ensured that the true identity of signatory and the truly expressed for signing wish.
S102:After the true identity for determining the electronic signature user is errorless, receives and pass through the electronic signature user
The electronic contract of signing, and the additional electronic signature on the electronic contract;The electronic contract includes the electronic signature
The handwriting picture of user;
In the embodiment of the present application, the electronic contract received by electronic signature user signing, and described
Additional electronic signature on electronic contract can include:The electronic contract by electronic signature user signing is received, is sentenced
Whether the handwriting picture in the disconnected electronic contract is clear and legible;When the handwriting picture is clear and legible,
Hash calculating, and the additional electronic signature on the electronic contract carry out the electronic contract using digital certificate;The number
Word certificate and the hardware identification code of the electronic signature device are mutually bound.
Electronic signature of the present invention i.e. digital signature (also known as public key digital signature, Electronic Signature), which is that one kind is similar, to be write
Common physical signature on paper, but the technology in public key encryption field has been used to realize, for differentiating the side of digital information
Method.A set of digital signature usually defines two kinds of complementary computings, and one is used to sign, another is used to verify.
So-called digital signature is just attached to some data in data cell, or the password made to data cell becomes
It changes.This data or conversion allow the recipient of data cell to confirm the integrality in the source of data cell and data cell
And data are protected, it prevents from being forged by people (such as recipient).It is a kind of side to sign to the message of electronic form
Method, a signature information can be transmitted in a communication network.It can be obtained based on public-key cryptosystem and Private key encryption system
Digital signature is obtained, is mainly based upon the digital signature of public-key cryptosystem.
Electronic Signature is a kind of form of expression of electronic signature, is converted into operation of electronic signature using image processing techniques
The visual effect identical with paper document stamping, while ensure the authenticity of electronic information and complete using electronic signature technology
Whole property and the non-repudiation of signer.
Signature hand writing technology on the market at present, with reference to electronic signature and Electronic Signature technology, using high in the clouds digital certificate into
Row signature realizes mobile terminal handwriting based on the HTML5 pages, and signature picture is passed to high in the clouds and is bound with high in the clouds certificate,
It registers by digital signature and handwriting picture on electronic contract, there is signature and cut with the risk distorted.
And technical solution provided by the embodiments of the present application, it by electronic signature technology, identifies signer's true identity, passes through
Cryptographic technique prevents signed data from distorting, and is signed electronically using mobile terminal digital certificate to mobile terminal handwriting picture,
Prevent signature picture by cut use and distort, using password encryption technology to data transmission procedure whole process encipherment protection, and be
Electronic signature device locally signs electronically, and need not upload to high in the clouds and sign, therefore can be to avoid being cut with usurping
The risk changed.
Moreover, the application makees in itself based on the real name identity authentication service business of PKI/CA technologies, by mobile terminal
It is used for a cryptographic hardware, the unique mark that certificate comes out with device hardware information operation is bound;And by certificate into
Row encryption storage, only current application can read calling.It not only solves the problems, such as mobile terminal electronic signature and handwritten signature, moves
Moved end certificate storage problem, while ensure that the security, non-reproduction and uniqueness of mobile terminal digital certificate so that hardware
Equipment is provided with the function identical with USBKey in itself, and compared with the scheme of various additional firmwares, realization, portion is greatly reduced
Administration, operation and maintenance cost.
In addition, it is described storage is encrypted to the finally formed electronic contract before, can also will it is additional
The electronic contract for stating electronic signature is sent in authentication server, so that the authentication server verifies the electronic contract
In the handwritten signature picture and the electronic signature, after verification passes through, call high in the clouds certificate to the electronic contract into
Row signature, and the high in the clouds certificate is uniquely bound with the digital certificate, it can so pass through digital certificate and high in the clouds
The double shield of certificate further improves security, the validity of electronic contract.
Further, in the electronic contract received by electronic signature user signing, and closed in the electronics
Ibid while additional electronic signature, the operating time letter of the electronic signature user signing electronic contract can also be authenticated
Breath, and addition includes the timestamp of the operating time information on the electronic contract, is further provided for electronic contract
The guarantee of reliability.
S103:Storage is encrypted to the finally formed electronic contract.
In conclusion the embodiment of the present application is specifically realized using following several technologies:
PKI technologies:
PKI (Public Key Infrastructure) Public Key Infrastructure provides public key encryption and digital signature service,
It is a kind of key management platform for following standard, it can be that all-network application is pellucidly provided using encrypted and digitally signed
Etc. key and certificate management necessary to cryptographic services.PKI systems are actually computer software and hardware, authoritative institution and application
The combination of system.It uses the format management public key of digital certificates, and the public key of user and the other identifier of user are believed by CA
Breath (such as title, ID card No., e-mail address) bundles, and realizes the verification to user identity;It is close by public key
Code and symmetric cryptography combine, and the automatic management of key is realized by network and computer technology, ensure the guarantor of confidential data
Close property and integrality.
By using PKI system managements key and certificate, the network environment of a safety can be established, realizes the guarantor of information
Close property, integrality, and complete identity and differentiate to ensure non repudiation.The Core Feature of PKI protects the activity that should be maintained secrecy,
I.e. all activities carried out based on network must be established in the case of secrecy.
PDF electronic signature technologies:
From the point of view of comprehensive all kinds of electronic file forms at present, PDF is not easy to change textual content, in addition PDF technologies are to electronics label
The support of name data is very good, this selects PDF as online signing basic format.PDF visualization skills based on browser
Art allows contract to be able to the good displaying on various hardware and software platforms and read.The electronic document of PDF format can print, with paper
Matter contract has man-to-man relation, and the use habit of legacy user is allowed to be continued.
Trusted timestamp:
Using the time-stamping service of mandate, accurate reliable time source is obtained and using the safe machine of high intensity high standard
System, the key operation time of user's on-line signing document is cured, and effectively prevents date and the temporal information of document signature
It is arbitrarily distorted, it is ensured that authenticity, the accuracy of time of signature information.
The high in the clouds certificate pattern of short message authentication:
It is very high in security at present by the form that the widely used USB Key of CA industries are certificate carrier, but easy
With really not so in property, the especially current mobile terminal application scenarios extremely popularized.Due to various hardware otherness with it is each
The otherness of software platform using USB Key as certificate carrier, in the case where mobile Internet develops rapidly, always can not
Meets the needs of ease for use.
The present invention can innovatively use the high in the clouds certificate pattern using short message as authentication mode, using user not from body
Mobile phone receive verification short message, as the authentication of high in the clouds certificate and the authorization of electronic signature.Due under current environment, net
The universal education of silver, Mobile banking and various payment softwares, this mode compared with can be users' receiving, security with it is easy-to-use
Property aspect achieve preferable balance.
In the case of necessary, select that certificate or other security tools and platform compatibility in USB Key support can
Select scheme.
Mobile terminal safety certificate+high in the clouds certificate twin check technology:
Hash computings and electronics are done to handwriting picture using mobile terminal secure storage certificate to mobile terminal handwriting
Signature prevents that signature picture from being distorted.
Mobile terminal certificate is uniquely bound with high in the clouds certificate, server-side signature verification picture and mobile terminal certificate information,
Carry out twin check, certification by that just high in the clouds certificate can be called to sign electronic contract, high in the clouds to mobile terminal signature value and
Mobile terminal certificate carries out twin check and mutual authentication, enhances authentication rank.
The digital certificate store of mobile terminal uses encryption technology, to key to, certificate information, issuer information etc. are every believes
Breath carry out high strength encrypting simultaneously be stored in file based database application, allow certificate information can only by with the corresponding software of database
Module is read, and can not be directly read simply by file, so as to significantly improve the security of certificate.
The digital number certificate of mobile terminal combines with its hardware carrier, when digital certificate is installed for the first time, passes through
Acquisition hardware equipment feature, such as equipment CPU number, product coding, MAC Address information, by being for conversion into unique equipment
Identification code.Then this device code with other factors is combined, generates unique symmetric key, use this data key storehouse
Encryption.Key only occurs temporarily in memory in computing, does not persist.Digital certificate subsequently each time in use,
Software module all can dynamically check running environment, the acquisition hardware equipment feature where it, and the phase of key is generated with first time
Same method, generates key again, for unlocking the encryption information of database.If relevant environment does not change, key is identical, solution
Close success, smooth opening database;If relevant environment has changed, the key used for the first time, decryption failure, nothing can not be obtained
Method reading database information.Using the above method, mobile terminal digital certificate is bound when installing first time with hardware device,
Digital certificate is allowed to be provided with the security for being similar to hardware USB Key, compared with the scheme of various additional firmwares, is also greatly decreased
Realize, deployment, operation and maintenance cost.
National cryptographic algorithm technology:
According to national relevant laws and regulations, for the popularization of the close policy of cooperation business and algorithm, by SM2 system algorithms, safety is electric
Sub- stamped signature cryptographic technique, the PDF displayings of respective algorithms are included in read module to be designed and developed.
As a result of above-mentioned technology, therefore the embodiment of the present application is when signing electronic contract, can be to real name user's
It signs wish and carries out effective certification, and can every behaviors such as signature behavior, signature wish be subjected to electronization and deposit card, formed
The network behavior data of legal sanction, and encrypted signature is carried out to the behavior outcome that the user operates on the net, it is deposited by third party
Storage signs result each platform to be helped to promote mutual trust with terminal user.The digital certificate of mobile terminal is used to mobile terminal handwriting
Hash computings and electronic signature are done to handwriting picture, the electronic contract after signature can not be tampered, one it is tampered can
It is found immediately.The digital certificate store of mobile terminal uses encryption technology, to key to, certificate information, issuer information etc. it is each
Item information carries out high strength encrypting and is stored in file based database application, allows certificate information can only be by corresponding with database
Software module is read, and can not be directly read simply by file, so as to significantly improve the security of certificate.Mobile terminal number
Word certificate is bound when installing first time with hardware device, and digital certificate is allowed to be provided with the peace for being similar to hardware USB Key
Quan Xing.It can also assert that the time during signature records using the timestamp of authority simultaneously, the law of enhancing user's signature
Validity and its time of signature can not tampers.
The application solves the problems, such as that contract signature under line is moved on to progress electronic signature on line runs into, and realizes and moves from whole
Moved end handwritten signature effect, after ensureing signatory's identity reality, signature Environmental security, signature wish truly expressed, signature
The real effectiveness of file, can not tamper and legal compliance, be summarized as at following 4 points:Solves the use signed a contract on line
The identity reality at family, operation authenticity, procedural authenticity, result trackability.
For foregoing embodiment of the method, in order to be briefly described, therefore it is all expressed as to a series of combination of actions, still
Those skilled in the art should know, the present invention and from the limitation of described sequence of movement, because according to the present invention, it is some
Step may be employed other orders or be carried out at the same time.Secondly, those skilled in the art should also know, described in the specification
Embodiment belong to preferred embodiment, involved action and module are not necessarily essential to the invention.
Corresponding with above method embodiment, the embodiment of the present invention also provides a kind of device for realizing electronic signature, can
Structure is selected as shown in Fig. 2, can include:Identification module 11, signature blocks 12 and memory module 13.
For receiving the identification information of electronic signature user, the electricity is determined according to the identification information for identification module 11
The true identity of sub- contracted user;
Preferably, the identification module 11, can include:
Receiving unit, for receiving the identification information of the electronic signature user, according to being called the identification information
The real-name authentication information of electronic signature user;The real-name authentication information is the accurate information by certification;
Determination unit, for determining the true identity of the electronic signature user according to the real-name authentication information.
Signature blocks 12, for after the true identity for determining the electronic signature user is errorless, receiving and passing through the electricity
The electronic contract of sub- contracted user's signing, and the additional electronic signature on the electronic contract;The electronic contract includes institute
State the handwriting picture of electronic signature user;
Preferably, the signature blocks 12, can include:
Judging unit for receiving the electronic contract by electronic signature user signing, judges the electronics
Whether the handwriting picture in contract is clear and legible;
Signature unit, for when the handwriting picture is clear and legible, using digital certificate to the electronic contract
Carry out Hash calculating, and the additional electronic signature on the electronic contract;The digital certificate and the electronic signature device
Hardware identification code is mutually bound.
Memory module 13, for storage to be encrypted to the finally formed electronic contract.
Preferably, can also include:
Sending module, for it is described storage is encrypted to the finally formed electronic contract before, will be attached with
The electronic contract of the electronic signature is sent in authentication server, so that the authentication server verifies the electronics and closes
The handwritten signature picture and the electronic signature in after verification passes through, call high in the clouds certificate to the electronic contract
It is signed, and the high in the clouds certificate is uniquely bound with the digital certificate.
Preferably, can also include:
Timestamp module, for receiving the electronic contract contracted by the electronic signature user described, and described
On electronic contract while additional electronic signature, the operating time letter of the electronic signature user signing electronic contract described in certification
Breath, and addition includes the timestamp of the operating time information on the electronic contract.
The device provided by the embodiments of the present application for realizing electronic signature is accomplished that the method in above method embodiment,
Implementation process and explanation for each step in the device of above-mentioned realization electronic signature etc. refer to above method embodiment
In related description, this embodiment of the present invention is no longer illustrated.
Compared with prior art, above-mentioned technical proposal provided by the invention has the following advantages that:
Technical solution provided by the invention receives the identification information of electronic signature user, is determined according to the identification information
The true identity of the electronic signature user;After the true identity for determining the electronic signature user is errorless, receive by institute
State the electronic contract of electronic signature user signing, and the additional electronic signature on the electronic contract;It is wrapped in the electronic contract
Include the handwriting picture of the electronic signature user;Storage is encrypted to the finally formed electronic contract.In this way, not
It can only realize the electronic signature on line, additionally it is possible to by real-name authentication information and electronic signature, ensure what is signed documents on line
Authenticity, validity and can not tamper.
The application uses the bottom frame that PKI/CA technical systems are applied as electronic document on-line signing, and signing flow is adopted
With reliable electronic signature, meet《Law of electronic signature》It is reliable to sign electronically to the requirement that network of relation identity is really assert
With hand-written and affix one's seal with equal legal effect, and third-party body can be provided according to the requirement of digital certificate service
Part authentication service, provides the supervision and management to operation and the supervision and management to password, whole process meets from technology and specification level
The constraint of relevant laws and regulations.
For electronic signature in the present invention based on real-name authentication services, digital certificate is the carrier of authentication result, is industry
Business system establishes real personal or enterprise identity information, the digital certificate and the authoritative machine authorized for country in a network
The identity key information that structure third party's digital authenticating center is issued.And to action process, pass through electronic signature technology, cryptography number
It is final to ensure according to integrated applications such as encryption technology, secure memory techniques, biometric identification technology, disposable short message verification codes
Behavior process can effectively become a part for evidence obtaining report.The solid card mode of electronic contract original text result in the present invention, is adopted
Preservation is formatted to document with PDF technologies, while using visualization digital signature, legal time stamp function etc., it is ensured that
The document data that signing is completed can not be tampered, resisting denying.
For contract signature business there are the problem of, design principle of the present invention follows first《Law of electronic signature》、《Contract
Method》And the requirement of relevant laws and regulations so that people, behavior under each network application scene, result obtain legal sanction.Its
It is secondary, according to operation flow and the logical course of signing a contract under line, optimizing, simplifying based on information system is carried out, is provided very good
Good online signing operating experience so that all business can be rapidly completed.
In information system, for the on-line signing for the electronic contract that the transaction between user generates, carry out with no paper ring
Signature, that is, electronic signature of guarantor realizes and carries out handwritten signature in mobile terminal solve the safe on-line signing of active user's contract,
Solve the user identity authenticity for the contract signed on line, the authenticity of electronic contract after signature, validity, can not tamper
With legal compliance, great convenience is brought for contract signature on user's line, eliminates to hurry back and forth under line and proofread face to face back and forth and use
Family true identity and its cycle of signature efficiently, fast, easily advance the development of business on line, while entire line is upper
Journey provides the guarantee of comprehensive technology and legal perspective.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight
Point explanation is all difference from other examples, and just to refer each other for identical similar part between each embodiment.
For device class embodiment, since it is basicly similar to embodiment of the method, so description is fairly simple, related part ginseng
See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, term " comprising ", "comprising" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or equipment including a series of elements not only include that
A little elements, but also including other elements that are not explicitly listed or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except also there are other identical elements in the process, method, article or apparatus that includes the element.
The foregoing description of the disclosed embodiments enables those skilled in the art to realize or use the present invention.To this
A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can
Without departing from the spirit or scope of the present invention, to realize in other embodiments.Therefore, the present invention will not be limited
The embodiments shown herein is formed on, and is to fit to consistent with the principles and novel features disclosed herein most wide
Scope.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (10)
1. a kind of method for realizing electronic signature, applied in electronic signature device, which is characterized in that including:
The identification information of electronic signature user is received, the true body of the electronic signature user is determined according to the identification information
Part;
After the true identity for determining the electronic signature user is errorless, the electronics by electronic signature user signing is received
Contract, and the additional electronic signature on the electronic contract;The electronic contract includes the hand-written of the electronic signature user
Signature picture;
Storage is encrypted to the finally formed electronic contract.
2. according to the method described in claim 1, it is characterized in that, it is described receive electronic signature user identification information, according to
The identification information determines the true identity of the electronic signature user, including:
The identification information of the electronic signature user is received, the real name of the electronic signature user is called according to the identification information
Authentication information;The real-name authentication information is the accurate information by certification;
The true identity of the electronic signature user is determined according to the real-name authentication information.
3. the according to the method described in claim 1, it is characterized in that, electricity received by electronic signature user signing
Sub- contract, and the additional electronic signature on the electronic contract, including:
The electronic contract by electronic signature user signing is received, judges the hand-written label in the electronic contract
Whether word picture is clear and legible;
When the handwriting picture is clear and legible, using digital certificate to electronic contract progress Hash calculating, and
Additional electronic signature on the electronic contract;The hardware identification code of the digital certificate and the electronic signature device is mutually bound.
4. according to the method described in claim 3, it is characterized in that, the finally formed electronic contract is added described
Before close storage, further include:
The electronic contract for being attached with the electronic signature is sent in authentication server, so that the authentication server school
The handwritten signature picture and the electronic signature in the electronic contract are tested, after verification passes through, calls high in the clouds certificate pair
The electronic contract is signed, and the high in the clouds certificate is uniquely bound with the digital certificate.
5. it according to the method described in claim 1, it is characterized in that, is received described by electronic signature user signing
Electronic contract, and while additional electronic signature on the electronic contract, further include:
The operating time information of the electronic signature user signing electronic contract described in certification, and added on the electronic contract
Include the timestamp of the operating time information.
6. a kind of device for realizing electronic signature, which is characterized in that including:
For receiving the identification information of electronic signature user, the electronic signature is determined according to the identification information for identification module
The true identity of user;
Signature blocks, for after the true identity for determining the electronic signature user is errorless, receiving and passing through the electronic signature
The electronic contract of user's signing, and the additional electronic signature on the electronic contract;The electronic contract includes the electronics
The handwriting picture of contracted user;
Memory module, for storage to be encrypted to the finally formed electronic contract.
7. device according to claim 6, which is characterized in that the identification module, including:
For receiving the identification information of the electronic signature user, the electronics is called according to the identification information for receiving unit
The real-name authentication information of contracted user;The real-name authentication information is the accurate information by certification;
Determination unit, for determining the true identity of the electronic signature user according to the real-name authentication information.
8. device according to claim 6, which is characterized in that the signature blocks, including:
Judging unit for receiving the electronic contract by electronic signature user signing, judges the electronic contract
In the handwriting picture it is whether clear and legible;
Signature unit, for when the handwriting picture is clear and legible, being carried out using digital certificate to the electronic contract
Hash is calculated, and the additional electronic signature on the electronic contract;The hardware of the digital certificate and the electronic signature device
Identification code is mutually bound.
9. device according to claim 8, which is characterized in that further include:
Sending module, for it is described storage is encrypted to the finally formed electronic contract before, will be attached with described
The electronic contract of electronic signature is sent in authentication server, so that the authentication server is verified in the electronic contract
The handwritten signature picture and the electronic signature, after verification passes through, call high in the clouds certificate to the electronic contract carry out
Signature, and the high in the clouds certificate is uniquely bound with the digital certificate.
10. device according to claim 6, which is characterized in that further include:
Timestamp module, for receiving the electronic contract contracted by the electronic signature user described, and in the electronics
On contract while additional electronic signature, the operating time information of the electronic signature user signing electronic contract described in certification,
And addition includes the timestamp of the operating time information on the electronic contract.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810010212.6A CN108092779A (en) | 2018-01-05 | 2018-01-05 | A kind of method and device for realizing electronic signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810010212.6A CN108092779A (en) | 2018-01-05 | 2018-01-05 | A kind of method and device for realizing electronic signature |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108092779A true CN108092779A (en) | 2018-05-29 |
Family
ID=62181491
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810010212.6A Pending CN108092779A (en) | 2018-01-05 | 2018-01-05 | A kind of method and device for realizing electronic signature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108092779A (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108764848A (en) * | 2018-05-31 | 2018-11-06 | 飞天诚信科技股份有限公司 | A kind of signature method and system of electronic contract |
CN109087056A (en) * | 2018-06-15 | 2018-12-25 | 平安科技(深圳)有限公司 | Electronic contract signs method, apparatus and server |
CN109255712A (en) * | 2018-10-09 | 2019-01-22 | 重庆君子签科技有限公司 | Electronic signature method, apparatus, storage medium and server |
CN109491977A (en) * | 2018-09-27 | 2019-03-19 | 北京车和家信息技术有限公司 | A kind of information of vehicles handover method, server and system |
CN109508951A (en) * | 2018-10-09 | 2019-03-22 | 重庆君子签科技有限公司 | Barcode scanning contracting method, device, storage medium and server |
CN109586919A (en) * | 2018-12-03 | 2019-04-05 | 杭州仟金顶信息科技有限公司 | A kind of online contract signs method automatically |
CN109829317A (en) * | 2018-12-14 | 2019-05-31 | 平安科技(深圳)有限公司 | A kind of method, apparatus and system generating electronic contract based on handwritten signature picture |
CN110046916A (en) * | 2019-04-09 | 2019-07-23 | 深圳市元征科技股份有限公司 | A kind of electronic signature method, apparatus, equipment and computer readable storage medium |
CN110221864A (en) * | 2019-04-24 | 2019-09-10 | 深圳法大大网络科技有限公司 | Electronic document signs method, apparatus and terminal device, storage medium |
CN110264203A (en) * | 2019-05-02 | 2019-09-20 | 谢清茹 | House rental agreement signing System and method on line |
CN110276588A (en) * | 2019-05-21 | 2019-09-24 | 平安国际智慧城市科技股份有限公司 | Electron underwriting authentication method, apparatus and computer readable storage medium |
CN110458730A (en) * | 2019-08-01 | 2019-11-15 | 中盾云链(广州)信息科技有限公司 | A kind of personal electric signing system and method based on block chain |
CN111242579A (en) * | 2020-01-14 | 2020-06-05 | 珠海市华兴软件信息服务有限公司 | Electronic contract signing method, system, device and storage medium |
CN111414629A (en) * | 2019-01-04 | 2020-07-14 | 苏州谦旺信息技术有限公司 | Electronic contract signing device |
CN112580111A (en) * | 2020-12-28 | 2021-03-30 | 杭州天谷信息科技有限公司 | Electronic signature method and system with signing time |
CN114169863A (en) * | 2021-12-07 | 2022-03-11 | 中国建设银行股份有限公司 | Signing method, signing device, electronic equipment and computer readable medium |
CN114900317A (en) * | 2022-05-16 | 2022-08-12 | 西安云犀信息科技有限公司 | Implementation mode of electronic signature |
WO2022219171A1 (en) * | 2021-04-15 | 2022-10-20 | Je Numerise Mes Formulaires.Com | Computerized method and system for signing an electronic document |
CN116366290A (en) * | 2023-02-24 | 2023-06-30 | 中邮通建设咨询有限公司 | Data transmission system based on electronic signature signing |
WO2023128908A1 (en) * | 2021-12-30 | 2023-07-06 | Cloudpeer Global Teknoloji A. S. | A mobile electronic signature system |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102291376A (en) * | 2010-06-18 | 2011-12-21 | 普天信息技术研究院有限公司 | Method and system for realizing mobile terminal-supporting electronic transaction |
CN102521731A (en) * | 2011-12-04 | 2012-06-27 | 东华大学 | Electronic contract sealing method based on barter system |
CN102867261A (en) * | 2012-08-24 | 2013-01-09 | 深圳市亚略特生物识别科技有限公司 | Fingerprint digital certificate-based electronic contract signing method |
CN103200176A (en) * | 2013-02-27 | 2013-07-10 | 中国工商银行股份有限公司 | Identification method, identification device and identification system based on bank independent communication channel |
US8635442B2 (en) * | 2009-04-28 | 2014-01-21 | Adobe Systems Incorporated | System and method for long-term digital signature verification utilizing light weight digital signatures |
CN103873255A (en) * | 2014-03-03 | 2014-06-18 | 杭州电子科技大学 | Electronic contract off-line signing method based on trusted third party |
CN103888260A (en) * | 2014-03-13 | 2014-06-25 | 北京数字认证股份有限公司 | Digital signature device corresponding to handwritten signature reliably |
CN104065484A (en) * | 2014-06-26 | 2014-09-24 | 江苏买卖网电子商务有限公司 | Electronic contract platform realizing method based on SDK message and digital signature |
CN106301782A (en) * | 2016-07-26 | 2017-01-04 | 杭州文签网络技术有限公司 | A kind of signature method and system of electronic contract |
CN106559220A (en) * | 2016-10-25 | 2017-04-05 | 中国建设银行股份有限公司 | A kind of processing method and relevant device of guaranty |
CN106656505A (en) * | 2016-11-16 | 2017-05-10 | 航天信息股份有限公司 | Mobile terminal electronic signature system based on event certificate and mobile terminal electronic signature method thereof |
-
2018
- 2018-01-05 CN CN201810010212.6A patent/CN108092779A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8635442B2 (en) * | 2009-04-28 | 2014-01-21 | Adobe Systems Incorporated | System and method for long-term digital signature verification utilizing light weight digital signatures |
CN102291376A (en) * | 2010-06-18 | 2011-12-21 | 普天信息技术研究院有限公司 | Method and system for realizing mobile terminal-supporting electronic transaction |
CN102521731A (en) * | 2011-12-04 | 2012-06-27 | 东华大学 | Electronic contract sealing method based on barter system |
CN102867261A (en) * | 2012-08-24 | 2013-01-09 | 深圳市亚略特生物识别科技有限公司 | Fingerprint digital certificate-based electronic contract signing method |
CN103200176A (en) * | 2013-02-27 | 2013-07-10 | 中国工商银行股份有限公司 | Identification method, identification device and identification system based on bank independent communication channel |
CN103873255A (en) * | 2014-03-03 | 2014-06-18 | 杭州电子科技大学 | Electronic contract off-line signing method based on trusted third party |
CN103888260A (en) * | 2014-03-13 | 2014-06-25 | 北京数字认证股份有限公司 | Digital signature device corresponding to handwritten signature reliably |
CN104065484A (en) * | 2014-06-26 | 2014-09-24 | 江苏买卖网电子商务有限公司 | Electronic contract platform realizing method based on SDK message and digital signature |
CN106301782A (en) * | 2016-07-26 | 2017-01-04 | 杭州文签网络技术有限公司 | A kind of signature method and system of electronic contract |
CN106559220A (en) * | 2016-10-25 | 2017-04-05 | 中国建设银行股份有限公司 | A kind of processing method and relevant device of guaranty |
CN106656505A (en) * | 2016-11-16 | 2017-05-10 | 航天信息股份有限公司 | Mobile terminal electronic signature system based on event certificate and mobile terminal electronic signature method thereof |
Non-Patent Citations (2)
Title |
---|
中国物流与采购联合会: "《中国物流与供应链金融发展报告 2017版》", 30 September 2017 * |
车捷: "《信息网络与高新技术法律前沿》", 31 December 2015 * |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108764848A (en) * | 2018-05-31 | 2018-11-06 | 飞天诚信科技股份有限公司 | A kind of signature method and system of electronic contract |
CN108764848B (en) * | 2018-05-31 | 2021-03-16 | 飞天诚信科技股份有限公司 | Electronic contract signing method and system |
WO2019237570A1 (en) * | 2018-06-15 | 2019-12-19 | 平安科技(深圳)有限公司 | Electronic contract signing method, device and server |
CN109087056A (en) * | 2018-06-15 | 2018-12-25 | 平安科技(深圳)有限公司 | Electronic contract signs method, apparatus and server |
CN109491977A (en) * | 2018-09-27 | 2019-03-19 | 北京车和家信息技术有限公司 | A kind of information of vehicles handover method, server and system |
CN109255712A (en) * | 2018-10-09 | 2019-01-22 | 重庆君子签科技有限公司 | Electronic signature method, apparatus, storage medium and server |
CN109508951A (en) * | 2018-10-09 | 2019-03-22 | 重庆君子签科技有限公司 | Barcode scanning contracting method, device, storage medium and server |
CN109586919A (en) * | 2018-12-03 | 2019-04-05 | 杭州仟金顶信息科技有限公司 | A kind of online contract signs method automatically |
CN109829317A (en) * | 2018-12-14 | 2019-05-31 | 平安科技(深圳)有限公司 | A kind of method, apparatus and system generating electronic contract based on handwritten signature picture |
CN111414629A (en) * | 2019-01-04 | 2020-07-14 | 苏州谦旺信息技术有限公司 | Electronic contract signing device |
CN111414629B (en) * | 2019-01-04 | 2023-11-28 | 苏州谦旺信息技术有限公司 | Electronic contract signing device |
CN110046916A (en) * | 2019-04-09 | 2019-07-23 | 深圳市元征科技股份有限公司 | A kind of electronic signature method, apparatus, equipment and computer readable storage medium |
CN110221864A (en) * | 2019-04-24 | 2019-09-10 | 深圳法大大网络科技有限公司 | Electronic document signs method, apparatus and terminal device, storage medium |
CN110264203A (en) * | 2019-05-02 | 2019-09-20 | 谢清茹 | House rental agreement signing System and method on line |
CN110276588B (en) * | 2019-05-21 | 2023-02-07 | 深圳平安智慧医健科技有限公司 | Electronic signature authentication method and device and computer readable storage medium |
CN110276588A (en) * | 2019-05-21 | 2019-09-24 | 平安国际智慧城市科技股份有限公司 | Electron underwriting authentication method, apparatus and computer readable storage medium |
CN110458730A (en) * | 2019-08-01 | 2019-11-15 | 中盾云链(广州)信息科技有限公司 | A kind of personal electric signing system and method based on block chain |
CN111242579A (en) * | 2020-01-14 | 2020-06-05 | 珠海市华兴软件信息服务有限公司 | Electronic contract signing method, system, device and storage medium |
CN112580111A (en) * | 2020-12-28 | 2021-03-30 | 杭州天谷信息科技有限公司 | Electronic signature method and system with signing time |
WO2022219171A1 (en) * | 2021-04-15 | 2022-10-20 | Je Numerise Mes Formulaires.Com | Computerized method and system for signing an electronic document |
FR3122005A1 (en) * | 2021-04-15 | 2022-10-21 | Je Numerise Mes Formulaires.Com | Method and computer system for signing an electronic document |
CN114169863A (en) * | 2021-12-07 | 2022-03-11 | 中国建设银行股份有限公司 | Signing method, signing device, electronic equipment and computer readable medium |
WO2023128908A1 (en) * | 2021-12-30 | 2023-07-06 | Cloudpeer Global Teknoloji A. S. | A mobile electronic signature system |
CN114900317A (en) * | 2022-05-16 | 2022-08-12 | 西安云犀信息科技有限公司 | Implementation mode of electronic signature |
CN116366290A (en) * | 2023-02-24 | 2023-06-30 | 中邮通建设咨询有限公司 | Data transmission system based on electronic signature signing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108092779A (en) | A kind of method and device for realizing electronic signature | |
US11743038B2 (en) | Methods and systems of providing verification of information using a centralized or distributed ledger | |
US10559049B2 (en) | Digital passport country entry stamp | |
CN101546407B (en) | Electronic commerce system and management method thereof based on digital certificate | |
CN100399737C (en) | Method of data protection | |
CN102769623B (en) | Two-factor authentication method based on digital certificate and biological identification information | |
US11531746B2 (en) | Method for electronic signing of a document by a plurality of signatories | |
JP2002164884A (en) | Proxy server, electronic signature system, electronic signature verification system, network system, electronic signature method, electronic signature verification method, recording medium and program transmission device | |
KR20120017044A (en) | System and method for personal certification using a mobile device | |
CN101183439A (en) | Electronic bill processing system and processing method | |
CN101022339A (en) | Electronic sign stamp identifying method combined with digital centifi cate and stamp | |
CN108022194A (en) | Law-enforcing recorder and its data safety processing method, server and system | |
JPS6256043A (en) | Electronic transaction system | |
CN109981287A (en) | A kind of code signature method and its storage medium | |
CN105554018A (en) | Network real name verification method | |
CN112905979A (en) | Electronic signature authorization method and device, storage medium and electronic device | |
US20120131347A1 (en) | Securing of electronic transactions | |
Liu et al. | Visually sealed and digitally signed documents | |
Agbede | Strong Electronic Identification: Survey & Scenario Planning | |
Crispo et al. | WWW security and trusted third party services | |
JP2004193684A (en) | Digital signature method in signer apparatus, digital signature method in third trusted party agency apparatus, method for discriminating genuineness of digital signature, signer apparatus, third trusted party agency apparatus, apparatus for discriminating genuineness of digital signature, digital signature program for signer apparatus, digital signature program for third trusted party agency apparatus, program for discriminating genuineness of digital signature, and program recording medium | |
Kamal et al. | A Framework for Identity Management on Mobile Devices for mGovernance Application | |
Hemalatha et al. | Risk Detection and Assessment in Digital Signature | |
Rebel et al. | Ensuring security and trust in electronic commerce | |
CN115396096A (en) | Encryption and decryption method and protection system for secret file based on national cryptographic algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180529 |