CN109756344A - The digital signature and its verification method and device of a kind of document - Google Patents

The digital signature and its verification method and device of a kind of document Download PDF

Info

Publication number
CN109756344A
CN109756344A CN201910154519.8A CN201910154519A CN109756344A CN 109756344 A CN109756344 A CN 109756344A CN 201910154519 A CN201910154519 A CN 201910154519A CN 109756344 A CN109756344 A CN 109756344A
Authority
CN
China
Prior art keywords
digital signature
document
program
signature
independent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910154519.8A
Other languages
Chinese (zh)
Other versions
CN109756344B (en
Inventor
马礼伟
杨斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guanglianda Digital Technology Guangzhou Co ltd
Original Assignee
Glodon Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Glodon Polytron Technologies Inc filed Critical Glodon Polytron Technologies Inc
Priority to CN201910154519.8A priority Critical patent/CN109756344B/en
Publication of CN109756344A publication Critical patent/CN109756344A/en
Application granted granted Critical
Publication of CN109756344B publication Critical patent/CN109756344B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The digital signature and its verification method and device, the endorsement method of a kind of document include: to be digitally signed using independent digital signature program to document;The digital signature is appended to document tail portion and forms new document;Judge whether to need to sign again, when needing to sign again, then repeat the above steps for the new document.The verification method includes: to read digital signature information and the remaining document content in addition to the digital signature information from the document tail portion signed using independent digital signature program;The digital signature information of the reading is verified using independent digital signature program;When judging that there is also other digital signature for the remaining document content, and needing further verifying, above-mentioned steps are executed to the remaining document content.The digital signature and its verification method and device of the application avoids the compatibling problem that existing digital signature is generated when reading different documentation releases, while can repeatedly be signed to document.

Description

The digital signature and its verification method and device of a kind of document
Technical field
The application belongs to field of information security technology, the in particular to digital signature and its verification method and dress of a kind of document It sets.
Background technique
Digital signature is exactly others the number of segment word string that can not forge that the sender of only information could generate, this section Numeric string is also the valid certificates that information authenticity is sent to the sender of information simultaneously.Digital signature is primarily to number According to safety, prevent from being tampered, but data you see.
Digital signature can be used in digital engineering drawing auditing flow.Designing institute has designed drawing, counts to drawing Word signature, is sent to check of drawings unit.After check of drawings unit audits electronic drawing, it is digitally signed, is sent to designing unit.? During this, digital signature can be used for identification, it is ensured that the validity of drawing and prevent from being tampered.
Document digital signature generally comprises two committed steps: (1) using SHA- general with SHA algorithm and RSA Algorithm 256 algorithms carry out hash processing to information, obtain hash value, the characteristic of SHA be cannot be restored from eap-message digest information with Two different message will not generate same eap-message digest;(2) (non-right to hash value progress encrypting and decrypting using RSA Algorithm Claim Encryption Algorithm), asymmetric arithmetic is divided into public key and private key, public key be it is disclosed, private key is secrecy.Generally using private key into Row encryption, public key is decrypted, accordingly even when attacker has public key that can not also decrypt.
Currently, the digital signature of document is generally combined closely with creating the software of document.Such as dwg drawing digital signature, Generally carry out secondary development using the API that AutoCAD is provided, realization is written signing messages in dwg document, i.e., encryption information with Graphical information in dwg mixes.In addition, reading original document using API, need to parse the data content inside document, Therefore there is a problem of that API version is needed with documentation release compatibility: general software, the program and API of early version are not opened newly The document that version program generates allows to open the API that can also have the case where loss of data, therefore special-purpose software is used to provide (such as AutoCAD ARX API) carries out document signature, and the document for needing the software for different editions to generate develops different versions This encryption and decryption program.
Summary of the invention
This application provides a kind of digital signature of document and its verification methods and device, avoid existing digital signature The compatibling problem generated when reading different documentation releases, while can repeatedly be signed to document.
A kind of digital signature method of document provided by the present application, includes the following steps:
(1) document is digitally signed using independent digital signature program;
(2) digital signature is appended to document tail portion and forms new document;
(3) judge whether to need to sign again, when needing to sign again, then repeat above-mentioned step for the new document Suddenly (1) and (2).
The step (1) specifically: hash first is generated using HASH algorithm to document using independent digital signature program Value generates the digital signature using the private key of user and the hashed value as the input of rivest, shamir, adelman.
The step (3) specifically: judge whether to need to reuse independence to the new document formed in the step (2) Digital signature program be digitally signed, if necessary to digital signature again, then repeated for the new document Step (1) and (2) are stated, if you do not need to digital signature again, process terminate.
Present invention also provides a kind of digital signature authentication methods of document, comprising steps of
(1) digital signature information is read from the document tail portion signed using independent digital signature program and remove the number Remaining document content outside word signing messages;
(2) digital signature information of the reading is verified using independent digital signature program;
(3) when judging that there is also other digital signature for the remaining document content, and needing further verifying, to described surplus Remaining document content executes step (1)-(2).
The step (2) specifically: generate the original hash value of the remaining document content using HASH algorithm, and use Public key and the digital signature information compare the original hash value and institute using asymmetric decipherment algorithm calculating target hashed value Target hashed value is stated, if as the two, document is invalid digital signature or table if the two is different by verifying Show that document is tampered with.
The step (3) specifically: judge in the remaining document content with the presence or absence of other digital signature, if described Other digital signature are not present in remaining document content, then whole process terminates;If it is described residue document content in there is also Other digital signature are needing then also needing to judge whether to need to verify other digital signature to other number label When name is verified, the step (1)-(2) are continued to execute using the remaining document content as the new document signed, such as Fruit does not need to verify other digital signature, then whole process terminates.
Present invention also provides a kind of digital signature devices of document, including signature blocks, generation module and judgment module.
The signature blocks, for being digitally signed using independent digital signature program to document;
The generation module forms new document for the digital signature to be appended to document tail portion;
The judgment module judges whether to need to sign again, when needing to sign again, then sequentially carries out the signature The function of module and generation module.
The signature blocks, are specifically used for: first being generated to document using HASH algorithm using independent digital signature program Hashed value generates the digital signature using the private key of user and the hashed value as the input of rivest, shamir, adelman.
The judgment module is specifically used for: judging whether that the new document for forming the generation module is needed to reuse solely Vertical digital signature program is digitally signed, if necessary to digital signature again, then for described in the new document execution The function of signature blocks and generation module, if you do not need to digital signature again, process terminate.
Present invention also provides a kind of digital signature authentication devices of document, which is characterized in that including read module, verifying Module and judgment module.
The read module, for reading digital signature from the document tail portion signed using independent digital signature program Information and the remaining document content in addition to the digital signature information;
The authentication module, for being tested using independent digital signature program the digital signature information of the reading Card;
The judgment module, for judging the remaining document content, there is also other digital signature, and need further When verifying, the function of the signature blocks and generation module is sequentially carried out to the remaining document content.
The authentication module is specifically used for: the original hash value of the remaining document content is generated using HASH algorithm, and Target hashed value is calculated using asymmetric decipherment algorithm using public key and the digital signature information, compares the original hash value With the target hashed value, if document is by verifying as the two, if the two is different, be invalid digital signature or Person indicates that document is tampered with.
The judgment module is specifically used for: judges in the remaining document content with the presence or absence of other digital signature, if Other digital signature are not present in the residue document content, then whole process terminates;If in the residue document content also There are other digital signature, then also needing to judge whether to need to verify other digital signature, are needing to count other Word signature is when being verified, using the remaining document content as the new document signed continue to execute the signature blocks with The function of generation module, if you do not need to verifying to other digital signature, then whole process terminates.
Present invention also provides a kind of electronic equipment, which is characterized in that the electronic equipment includes: storage device;One Or multiple processors;The storage device is for storing one or more programs, when one or more of programs are by described one When a or multiple processors execute, so that one or more of processors realize the above method.
Present invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, when the calculating Machine program is performed, and realizes the above method.
Compared with the prior art, a kind of digital signature of document provided herein and its verification method and device, are adopted With independent of design documentation software or program execute digital signature, avoid read different documentation releases generate it is simultaneous Appearance problem;And in the tail portion supplement information of the original document that need to sign, i.e., digital signature is attached to the original document that need to sign Tail portion, and it is added to document tail portion simultaneously using multiple digital signature, realize the multiple digital signature of document.In addition, the number is signed Name program has certain versatility, is suitble to the project files such as two dimension drawing, threedimensional model.
Detailed description of the invention
Understand for the ease of those of ordinary skill in the art and implement the application, with reference to the accompanying drawing to the technology of the application Scheme is clearly and completely described, it is clear that described embodiments are only a part of embodiments of the present application, rather than complete The embodiment in portion.Based on the embodiment in the application, those of ordinary skill in the art are without creative efforts Every other embodiment obtained, shall fall in the protection scope of this application.
Fig. 1 is a kind of flow chart of the digital signature method of document of the application.
Fig. 2 is the digital signature procedure schematic diagram of the application.
Fig. 3 is the multiple digital signature result schematic diagram of the application.
Fig. 4 is a kind of flow chart of the digital signature authentication method of document of the application.
Fig. 5 is the digital signature authentication process schematic of the application.
Fig. 6 is a kind of module composition schematic diagram of the digital signature device of document of the application.
Fig. 7 is a kind of module composition schematic diagram of the digital signature authentication device of document of the application.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the application, not For limiting the application.
It in the prior art, can only be with AutoCAD plug-in unit when using the signature procedure of the API such as AutoCAD ARX API Mode executes, and is unable to independent operating, causes during being digitally signed, and reads different documentation releases and produces compatibility Problem.The application is using the specific software for not depending on production document, using unrelated with documentation release, independent program to document Signature, and in the tail portion supplement information of the original document that need to sign, i.e., digital signature is attached to the tail of the original document that need to sign Portion, and it is added to document tail portion simultaneously using multiple digital signature, realize the multiple digital signature of document.
Embodiment one
Referring to Fig. 1, the embodiment of the present application one provides a kind of digital signature method of document, includes the following steps:
(1) document is digitally signed using independent digital signature program, the independent program is independent of life It is the program unrelated with documentation release at the specific software of document.
Fig. 2 is the schematic diagram being digitally signed to document.Hashed value first is generated using HASH algorithm to original document, with The input generation digital signature of the private key of user and the hashed value as rivest, shamir, adelman
(2) digital signature is appended to document tail portion and forms new document.
After digital signature, believed using independent digital signature program in the additional digital signature in document tail portion Breath, such as the digital signature 1 in Fig. 3, and save as new document.
(3) judge whether the new document needs to sign again, when needing to sign again, be then directed to the new text Shelves repeat the above steps (1) and (2).
Judge whether to need to reuse independent digital signature program to the new document formed in step (2) to carry out number Signature, for example after check of drawings unit passes through drawing examination, need to sign again, then above-mentioned steps are repeated for new document (1) and the process of (2) digital signature 2-N, is generated, and the digital signature of generation is successively attached to document tail portion.If be not required to It to reuse independent digital signature program to the new document formed in step (2) to be digitally signed, then whole flow process Terminate.
Embodiment two
Referring to fig. 4, the embodiment of the present application two provides a kind of digital signature authentication method of document, includes the following steps:
(1) digital signature information is read from the document tail portion signed using independent digital signature program and remove the number Remaining document content outside word signing messages.
(2) digital signature information of the reading is verified using independent digital signature program.
Digital signature information is being read from the document tail portion signed using independent digital signature program and removes the number After remaining document content outside word signing messages, verification process generates remaining document content referring to Fig. 5, using HASH algorithm Original hash value, and target is calculated using asymmetric decipherment algorithm using the public key of user and the digital signature information and is hashed Value compares original hash value and target hashed value, is then invalid number label otherwise if as the two, document is by verifying Name either document is tampered with.
(3) judge that there is also other digital signature for the remaining document content, and need other described numbers of further verifying When word is signed, step (1)-(2) are executed to the remaining document content.
After the digital signature in step (2) is verified, judge in the remaining document content with the presence or absence of other numbers Word signature, if other digital signature are not present in the residue document content, whole process terminates, if the remaining text There is also other digital signature in shelves content, then also needing to judge whether to need to verify other digital signature, are needing When being verified, step (1)-(2) are continued to execute using the remaining document content as the new document signed, if not It needs to verify other digital signature, then whole process terminates.
Embodiment three
Referring to Fig. 6, the embodiment of the present application three provides a kind of digital signature device of document, including signature blocks, generation Module and judgment module:
The signature blocks, it is described independent for being digitally signed using independent digital signature program to document Program is the program unrelated with documentation release independent of the specific software for generating document.
The signature blocks, first to original document using HASH algorithm generate hashed value, with the private key of user and it is described dissipate Train value generates digital signature as the input of rivest, shamir, adelman.
The generation module forms new document for the digital signature to be appended to document tail portion.
The generation module, after digital signature, using independent digital signature program in the additional institute in document tail portion The digital signature 1 in digital signature information, such as Fig. 3 is stated, and saves as new document.
The judgment module judges whether to need to sign to the new document again, if you need to sign again, then sequentially hold The function of the row signature blocks and generation module.
The judgment module, it is independent for judging whether to need the new document formed to the generation module to reuse After digital signature program is digitally signed, for example check of drawings unit passes through drawing examination, when needing to sign again, then for new Document repeat the function of above-mentioned signature blocks and generation module, generate digital signature 2-N, and by the digital signature of generation Successively it is attached to document tail portion.If you do not need to the new document formed to the generation module reuses independent digital signature Program is digitally signed, then whole flow process terminates.
Example IV
Referring to Fig. 7, the embodiment of the present application four provides a kind of digital signature authentication device of document, including read module, Authentication module and judgment module.
The read module, for reading digital signature from the document tail portion signed using independent digital signature program Information and the remaining document content in addition to the digital signature information.
The authentication module, for being tested using independent digital signature program the digital signature information of the reading Card.
The authentication module is believed reading digital signature from the document tail portion signed using independent digital signature program After breath and the remaining document content in addition to the digital signature information, the original of remaining document content is generated using HASH algorithm and is dissipated Train value, and target hashed value, comparison are calculated using asymmetric decipherment algorithm using the public key of user and the digital signature information Original hash value and target hashed value, if document is by verifying as the two, otherwise, then be invalid digital signature or It is that document is tampered with.
The judgment module judges that there is also other digital signature in the remaining document content, and needs further to test When demonstrate,proving other described digital signature, the function of the read module and authentication module is sequentially carried out to the remaining document content.
The judgment module, for judging in the remaining document content with the presence or absence of other digital signature, if described In remaining document content be not present other digital signature, then whole process terminates, if it is described residue document content in there is also Other digital signature, then also need to judge whether to need to verify other digital signature, it, will when being verified The residue document content continues to execute the function of the read module and authentication module as the new document signed, if It does not need to verify other digital signature, then whole process terminates.
In addition, the embodiment of the present application also discloses a kind of electronic equipment comprising storage device and one or more processing Device, storage device is for storing one or more programs, when one or more of programs are by one or more of processors It executes, so that one or more of processors realize the method such as embodiment one and three.
The embodiment of the present application also discloses a kind of computer readable storage medium, is stored thereon with computer program, works as institute It states computer program to be performed, realizes the method such as embodiment one and three.
The flow chart and block diagram in the drawings show the method, apparatus and computer journey according to multiple embodiments of the application The architecture, function and operation in the cards of sequence product.In this regard, each box in flow chart and block diagram can generation A part of one unit of table, module, section or code, can for realizing the computer of logic function comprising one or more It executes instruction.It should also be noted that in some implementations as replacements, function marked in the box can also be attached to be different from The sequence marked in figure occurs.It is also noted that the combination of each box or box in block diagram and flow chart, Ke Yiyong The dedicated hardware based system of defined function or movement is executed to realize, or can be referred to specialized hardware and computer The combination of order is realized.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or equipment for including a series of elements not only includes those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or equipment institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including institute State in the process, method, article or equipment of element that there is also other identical elements.
The application is not limited to the combination of the hardware and software of any particular form.In conclusion the above is only the application Preferred embodiment, be not intended to limit the protection scope of the application.Within the spirit and principles of this application, made Any modification, equivalent substitution, improvement and etc., should be included within the scope of protection of this application.

Claims (14)

1. a kind of digital signature method of document, which comprises the steps of:
(1) document is digitally signed using independent digital signature program;
(2) digital signature is appended to document tail portion and forms new document;
(3) judge whether the new document needs to sign again, when needing to sign again, be then directed to the new document weight The multiple step (1) and (2).
2. a kind of digital signature method of document as described in claim 1, which is characterized in that the step (1) specifically:
Using independent digital signature program first to document using HASH algorithm generate hashed value, with the private key of user and it is described dissipate Train value generates the digital signature as the input of rivest, shamir, adelman.
3. a kind of digital signature method of document as claimed in claim 1 or 2, which is characterized in that the step (3) is specific Are as follows:
Judge whether to need to reuse independent digital signature program to the new document formed in the step (2) to carry out number Signature then repeats the step (1) and (2) for the new document, if be not required to if necessary to digital signature again Digital signature, process to terminate again.
4. a kind of digital signature authentication method of document, which comprises the steps of:
(1) it reads digital signature information from the document tail portion signed using independent digital signature program and removes the number and sign Remaining document content outside name information;
(2) digital signature information of the reading is verified using independent digital signature program;
(3) judge that there is also other digital signature for the remaining document content, and need other described number label of further verifying When name, step (1)-(2) are executed to the remaining document content.
5. a kind of digital signature authentication method of document as claimed in claim 4, which is characterized in that the step (2) is specific Are as follows:
The original hash value of the remaining document content is generated using HASH algorithm, and uses public key and the digital signature information Target hashed value is calculated using asymmetric decipherment algorithm, the original hash value and the target hashed value are compared, if the two one Sample, then document is by verifying, is that invalid digital signature or expression document are tampered with if the two is different.
6. a kind of digital signature authentication method of document as described in claim 4 or 5, which is characterized in that step (3) tool Body are as follows:
Judge with the presence or absence of other digital signature in the remaining document content, if it is not present in the residue document content His digital signature, then whole process terminates;If also needed in the residue document content there is also other digital signature Judge whether to need to verify other digital signature, when needing to verify other digital signature, by the residue Document content continues to execute the step (1)-(2) as the new document signed, if you do not need to other digital signature It is verified, then whole process terminates.
7. a kind of digital signature device of document, which is characterized in that including signature blocks, generation module and judgment module:
The signature blocks, for being digitally signed using independent digital signature program to document;
The generation module forms new document for the digital signature to be appended to document tail portion;
The judgment module judges whether to need to sign to the new document again, when needing to sign again, then executes institute State the function of signature blocks and generation module.
8. a kind of digital signature device of document as claimed in claim 7, which is characterized in that the signature blocks are specific to use In:
Using independent digital signature program first to document using HASH algorithm generate hashed value, with the private key of user and it is described dissipate Train value generates the digital signature as the input of rivest, shamir, adelman.
9. a kind of digital signature device of document as claimed in claim 7 or 8, which is characterized in that the judgment module is specific For:
Judge whether that needing the new document formed to the generation module to reuse independent digital signature program carries out number Signature then executes the function of the signature blocks and generation module if necessary to digital signature again for the new document, If you do not need to digital signature, process terminate again.
10. a kind of digital signature authentication device of document, which is characterized in that including read module, authentication module and judgment module:
The read module, for reading digital signature information from the document tail portion signed using independent digital signature program With the remaining document content in addition to the digital signature information;
The authentication module, for being verified using independent digital signature program to the digital signature information of the reading;
The judgment module, for judging the remaining document content, there is also other digital signature, and need further verifying When other described digital signature, the function of the signature blocks and generation module is executed to the remaining document content.
11. a kind of digital signature authentication device of document as claimed in claim 10, which is characterized in that the authentication module tool Body is used for:
The original hash value of the remaining document content is generated using HASH algorithm, and uses public key and the digital signature information Target hashed value is calculated using asymmetric decipherment algorithm, the original hash value and the target hashed value are compared, if the two one Sample, then document is by verifying, is that invalid digital signature or expression document are tampered with if the two is different.
12. a kind of digital signature authentication device of document as described in claim 10 or 11, which is characterized in that the judgement mould Block is specifically used for:
Judge with the presence or absence of other digital signature in the remaining document content, if it is not present in the residue document content His digital signature, then whole process terminates;If also needed in the residue document content there is also other digital signature Judge whether to need to verify other digital signature, when needing to verify other digital signature, by the residue Document content continues to execute the function of the signature blocks and generation module as the new document signed, if you do not need to right Other digital signature are verified, then whole process terminates.
13. a kind of electronic equipment, which is characterized in that the electronic equipment includes:
Storage device;
One or more processors;
The storage device is for storing one or more programs, when one or more of programs are by one or more of places When managing device execution, so that one or more of processors realize the method as described in one of claim 1-6.
14. a kind of computer readable storage medium, is stored thereon with computer program, when the computer program is performed, Realize the method as described in one of claim 1-6.
CN201910154519.8A 2019-03-01 2019-03-01 Digital signature of document and verification method and device thereof Active CN109756344B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910154519.8A CN109756344B (en) 2019-03-01 2019-03-01 Digital signature of document and verification method and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910154519.8A CN109756344B (en) 2019-03-01 2019-03-01 Digital signature of document and verification method and device thereof

Publications (2)

Publication Number Publication Date
CN109756344A true CN109756344A (en) 2019-05-14
CN109756344B CN109756344B (en) 2022-06-10

Family

ID=66407968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910154519.8A Active CN109756344B (en) 2019-03-01 2019-03-01 Digital signature of document and verification method and device thereof

Country Status (1)

Country Link
CN (1) CN109756344B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111523140A (en) * 2020-04-23 2020-08-11 周婷 Signature document encryption method and device, signature document training method, storage medium and equipment
CN112183052A (en) * 2020-09-29 2021-01-05 百度(中国)有限公司 Document repetition degree detection method, device, equipment and medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0218603D0 (en) * 2002-08-09 2002-09-18 Optisign Ltd Portable signature device, system and method for signing a document and/or verifying the document's authenticity
US6986132B1 (en) * 2000-04-28 2006-01-10 Sun Microsytems, Inc. Remote incremental program binary compatibility verification using API definitions
CN101241569A (en) * 2008-03-07 2008-08-13 北京华大恒泰科技有限责任公司 Electronic signature method and device and system
CN101276440A (en) * 2007-03-26 2008-10-01 北京书生国际信息技术有限公司 Method for realizing electric stamp
CN101702150A (en) * 2009-12-02 2010-05-05 江西金格网络科技有限责任公司 Method for protecting, verifying and repealing content of PDF document page
CN102148687A (en) * 2011-05-09 2011-08-10 北京数码大方科技有限公司 Signature method and device in information management system
CN102467585A (en) * 2010-11-05 2012-05-23 江西金格网络科技有限责任公司 Electronic signature, verification and revocation method of DWG document
CN105049213A (en) * 2015-07-27 2015-11-11 小米科技有限责任公司 File signature method and device
CN105320900A (en) * 2014-07-24 2016-02-10 方正国际软件(北京)有限公司 PDF digital signature method and system and PDF digital signature verification method and system
CN106599321A (en) * 2016-12-30 2017-04-26 上海绿建信息科技有限公司 DWG file annotation and signature generation and analysis plug-in, and use method thereof

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6986132B1 (en) * 2000-04-28 2006-01-10 Sun Microsytems, Inc. Remote incremental program binary compatibility verification using API definitions
GB0218603D0 (en) * 2002-08-09 2002-09-18 Optisign Ltd Portable signature device, system and method for signing a document and/or verifying the document's authenticity
CN101276440A (en) * 2007-03-26 2008-10-01 北京书生国际信息技术有限公司 Method for realizing electric stamp
CN101241569A (en) * 2008-03-07 2008-08-13 北京华大恒泰科技有限责任公司 Electronic signature method and device and system
CN101702150A (en) * 2009-12-02 2010-05-05 江西金格网络科技有限责任公司 Method for protecting, verifying and repealing content of PDF document page
CN102467585A (en) * 2010-11-05 2012-05-23 江西金格网络科技有限责任公司 Electronic signature, verification and revocation method of DWG document
CN102148687A (en) * 2011-05-09 2011-08-10 北京数码大方科技有限公司 Signature method and device in information management system
CN105320900A (en) * 2014-07-24 2016-02-10 方正国际软件(北京)有限公司 PDF digital signature method and system and PDF digital signature verification method and system
CN105049213A (en) * 2015-07-27 2015-11-11 小米科技有限责任公司 File signature method and device
CN106599321A (en) * 2016-12-30 2017-04-26 上海绿建信息科技有限公司 DWG file annotation and signature generation and analysis plug-in, and use method thereof

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111523140A (en) * 2020-04-23 2020-08-11 周婷 Signature document encryption method and device, signature document training method, storage medium and equipment
CN111523140B (en) * 2020-04-23 2024-02-23 国网浙江省电力有限公司物资分公司 Encryption method, encryption device, training method, storage medium and storage device for signature document
CN112183052A (en) * 2020-09-29 2021-01-05 百度(中国)有限公司 Document repetition degree detection method, device, equipment and medium
CN112183052B (en) * 2020-09-29 2024-03-05 百度(中国)有限公司 Document repetition degree detection method, device, equipment and medium

Also Published As

Publication number Publication date
CN109756344B (en) 2022-06-10

Similar Documents

Publication Publication Date Title
CN100521601C (en) System and method for updating keys used for public key cryptography
CN101369889B (en) Method for electronic endorsement of document
CN109657426A (en) A kind of data source tracing method based on digital signature and digital watermarking
CN103366132B (en) Equipment and method for encryption data
US7000110B1 (en) One-way function generation method, one-way function value generation device, proving device, authentication method, and authentication device
CN106228076B (en) A kind of picture validation code guard method and system based on SGX
CN105468940B (en) Method for protecting software and device
CN108462686A (en) Acquisition methods, device, terminal device and the storage medium of dynamic key
CN112347508A (en) Block chain data sharing encryption and decryption method and system
CN111723387A (en) Block chain-based data decryption method and device
CN105184181B (en) File encryption method, file decryption method and file encryption device
CN110490008A (en) Safety device and safety chip
CN103067170A (en) Encrypting file system, encrypting method and deciphering method based on EXT2 file system
CN109660338A (en) Anti- quantum calculation digital signature method and anti-quantum calculation digital signature system based on pool of symmetric keys
CN109474589B (en) Ethernet-based privacy protection transmission method
CN106101150A (en) The method and system of AES
Abd El-Wahed et al. Efficiency and security of some image encryption algorithms
RU2012130527A (en) METHOD OF EXECUTION AND SYSTEM OF UNIVERSAL ELECTRONIC CARD AND SMART CARD
CN109756344A (en) The digital signature and its verification method and device of a kind of document
CN107124277A (en) A kind of hard copy control system based on national commercial cipher algorithm
US10572635B2 (en) Automatic correction of cryptographic application program interfaces
CN107947939A (en) Support the PDF endorsement methods and system of SM3 cryptographic Hash algorithm and SM2 Digital Signature Algorithms
CN107665314A (en) The trusted processes method and device signed on the electronic document
CN114553532A (en) Data secure transmission method and device, electronic equipment and storage medium
JPH10240128A (en) Ciphering device, cryptographic key generation method and method of managing cryptographic key, and prime number generation device and method therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230602

Address after: 510440 room a505-375, floor 5, supporting service building, No. 8, Kesheng Road, Guangzhou private science and Technology Park, No. 1633, Beitai Road, Baiyun District, Guangzhou, Guangdong Province

Patentee after: Guanglianda digital technology (Guangzhou) Co.,Ltd.

Address before: 100193 Guanglianda Information Building, Building 13, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: GLODON Co.,Ltd.