CN109829329B - Method and device for decrypting electronic signature document, storage medium and electronic equipment - Google Patents

Method and device for decrypting electronic signature document, storage medium and electronic equipment Download PDF

Info

Publication number
CN109829329B
CN109829329B CN201811626395.0A CN201811626395A CN109829329B CN 109829329 B CN109829329 B CN 109829329B CN 201811626395 A CN201811626395 A CN 201811626395A CN 109829329 B CN109829329 B CN 109829329B
Authority
CN
China
Prior art keywords
document
client
signature
decryption
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811626395.0A
Other languages
Chinese (zh)
Other versions
CN109829329A (en
Inventor
何巍
王申
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201811626395.0A priority Critical patent/CN109829329B/en
Publication of CN109829329A publication Critical patent/CN109829329A/en
Application granted granted Critical
Publication of CN109829329B publication Critical patent/CN109829329B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The disclosure relates to a method, a device, a storage medium and an electronic device for decrypting an electronic signature document, wherein the method comprises the steps of obtaining a target document to be decrypted from a server; when receiving a signature decryption instruction, sending a signature decryption request to the server; after receiving a secret key acquisition request sent by the server, sending a password secret key of an external storage medium input by a client to the server, wherein the password secret key is used for the server to acquire the authority of accessing the external storage medium through the password secret key so as to carry out identity authentication on the user identity of the client; receiving the authentication result of the identity authentication sent by the server; and when the verification result is that the identity verification passes, determining to carry out signature decryption operation. The utility model provides a can automize and realize the strategy of electronic signature declassification, can improve the reliability and the treatment effeciency of the declassification operation of electronic signature document to can reduce the cost of labor.

Description

Method and device for decrypting electronic signature document, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of electronic signature technologies, and in particular, to a method and an apparatus for decrypting an electronic signature document, a storage medium, and an electronic device.
Background
The electronic signature is an expression form of the electronic signature, the electronic signature operation is converted into a visual effect which is the same as the paper document stamping operation by using an image processing technology, and meanwhile, the authenticity and the integrity of electronic information and the non-repudiation of a signer are guaranteed by using the electronic signature technology. For a confidential or sensitive document, besides protecting the authenticity of the document by using an electronic signature, generally ensuring the privacy of the document, and performing identity verification and access right limitation on a user accessing and acquiring the confidential document; for the documents allowed to be disclosed after being confidential, a common decryption processing mode is to artificially change the authority of a user to access the decrypted documents or store the decrypted confidential documents in other places which can be acquired by the public or target people, and a worker who performs decryption needs to specially record decryption time and set access authority. However, the manual decryption operation has problems of low reliability, low processing efficiency and high labor cost.
Disclosure of Invention
The invention aims to provide a method, a device, a storage medium and electronic equipment for decryption of an electronic signature document, which are used for solving the problems of low reliability, low processing efficiency and high labor cost of the existing decryption operation in a manual mode.
In order to achieve the above object, in a first aspect of the present disclosure, there is provided a method for decrypting an electronic signature document, applied to a client, the method including:
acquiring a target document to be decrypted from a server;
when receiving a signature decryption instruction, sending a signature decryption request to the server;
after receiving a secret key acquisition request sent by the server, sending a password secret key of an external storage medium input by a client to the server, wherein the password secret key is used for the server to acquire the authority of accessing the external storage medium through the password secret key so as to carry out identity authentication on the user identity of the client according to a client certificate and a signer certificate acquired from the external storage medium;
receiving a verification result of the identity verification sent by the server;
and when the verification result is that the identity verification passes, determining to carry out signature decryption operation.
Optionally, the client is provided with a seal control, and the method further includes:
when the signature and decryption operation is determined, acquiring first signature information from the external storage medium through the seal control, wherein the first signature information comprises first seal image parameters and a preset image conversion algorithm;
determining a second seal image parameter according to the preset image conversion algorithm and the first seal image parameter through the seal control;
and displaying the decrypted signature image through the seal control according to the second seal image parameter information.
Optionally, the method further comprises:
when the signature decryption operation is completed, updating the decryption state in the first signature information and the time for signature decryption through the seal control so as to obtain updated second signature information;
generating a signature and decryption document according to the target document and the second signature information;
and sending a document updating request containing the signature and decryption document to the server, wherein the document updating request is used for updating the target document to the signature and decryption document by the server and setting document information of the signature and decryption document, and the document information comprises at least one of the decryption state, the decryption time, the seal image parameters and the printing authority.
Optionally, after receiving a key obtaining request sent by the server, the method sends a password key of an external storage medium input by a client to the server, and is used for the server to obtain an authority to access the external storage medium through the password key, so as to perform identity verification on a user identity of the client according to a client certificate and a signer certificate obtained from the external storage medium, and includes:
receiving the secret key acquisition request sent by the server, wherein the secret key acquisition request is used for indicating a password secret key needing to be input into the external storage medium;
an input window for displaying the password key;
acquiring password key information input in the input window;
and sending the password key information to the server, wherein the server acquires the authority for accessing the external storage medium through the password key, so as to perform identity verification on the user identity of the client according to the client certificate and the signer certificate acquired from the external storage medium.
In a second aspect of the present disclosure, there is provided a method for decrypting an electronic signature document, applied to a server, the method including:
after receiving a request sent by a client for acquiring a target document to be decrypted, sending the target document to the client;
when a signature decryption request sent by the client is received, sending a secret key acquisition request to the client;
receiving the password key sent by the client;
acquiring a client certificate and a signer certificate from the external storage medium according to the password key;
performing identity verification on the user identity of the client according to the client certificate and the signer certificate;
and sending the verification result of the identity verification to the client for the client to determine whether to carry out signature decryption operation.
Optionally, the authenticating the user identity of the client according to the client certificate and the signer certificate includes:
when the client information in the client certificate is matched with the client information in the document list in the server and the signer information in the signer certificate is matched with the signer information in the document list, determining that the user identity of the client passes the authentication;
and when the client information in the client certificate is not matched with the client information in the document list in the server and/or the signer information in the signer certificate is not matched with the signer information in the document list, determining that the user identity authentication of the client fails.
Optionally, the method further comprises:
receiving a document updating request which is sent by a client and contains a signature and decryption document, wherein the signature and decryption document is a document generated by the client according to a target document and second signature information, and the second signature information is obtained after the client updates the decryption state in the first signature information and the time of signature and decryption through a seal control;
and updating the target document into the signature decryption document according to the document updating request, and setting document information of the signature decryption document, wherein the document information comprises at least one of the decryption state, the decryption time, the seal image parameters and the printing authority.
In a third aspect of the present disclosure, an apparatus for decrypting an electronic signature document is provided, applied to a client, the apparatus including:
the first acquisition module is used for acquiring a target document to be decrypted from a server;
the first sending module is used for sending a signature decryption request to the server when receiving a signature decryption instruction;
the second sending module is used for sending a password secret key of an external storage medium input by a client to the server after receiving a secret key obtaining request sent by the server, and is used for obtaining the authority of accessing the external storage medium by the server through the password secret key so as to carry out identity verification on the user identity of the client according to a client certificate and a signer certificate obtained from the external storage medium;
the first receiving module is used for receiving the authentication result of the identity authentication sent by the server;
and the first determining module is used for determining to carry out signature decryption operation when the authentication result is that the identity authentication passes.
Optionally, the client is provided with a seal control, and the apparatus further includes:
the second acquisition module is used for acquiring first signature information from the external storage medium through the seal control when signature and decryption operations are determined to be performed, wherein the first signature information comprises first seal image parameters and a preset image conversion algorithm;
the second determining module is used for determining second seal image parameters according to the preset image conversion algorithm and the first seal image parameters through the seal control;
and the display module is used for displaying the decrypted signature image through the seal control according to the second seal image parameter information.
Optionally, the apparatus further comprises:
the first updating module is used for updating the decryption state in the first signature information and the decryption time of the signature through the seal control when the signature decryption operation is finished so as to obtain updated second signature information;
the generating module is used for generating a signed and decrypted document according to the target document and the second signing information;
a third sending module, configured to send a document update request including the signature and decryption document to the server, where the document update request is used for the server to update the target document to the signature and decryption document and to set document information of the signature and decryption document, and the document information includes at least one of the decryption state, decryption time, stamp image parameters, and printing authority.
Optionally, the second sending module includes:
the receiving submodule is used for receiving the secret key obtaining request sent by the server, and the secret key obtaining request is used for indicating that a password secret key of the external storage medium needs to be input;
the display submodule is used for displaying an input window of the password key;
the obtaining submodule is used for obtaining password key information input in the input window;
and the sending submodule is used for sending the password secret key information to the server, and is used for acquiring the authority of accessing the external storage medium through the password secret key by the server so as to carry out identity verification on the user identity of the client according to the client certificate and the signer certificate acquired from the external storage medium.
In a fourth aspect of the present disclosure, there is provided an apparatus for decrypting an electronic signature document, applied to a server, the apparatus comprising:
the second receiving module is used for sending the target document to the client after receiving a request for obtaining the target document to be decrypted, which is sent by the client;
the fourth sending module is used for sending a secret key obtaining request to the client when receiving a signature decryption request sent by the client;
a third receiving module, configured to receive the password key sent by the client;
the third acquisition module is used for acquiring a client certificate and a signer certificate from the external storage medium according to the password secret key;
the verification module is used for verifying the identity of the user of the client according to the client certificate and the signer certificate;
and the fifth sending module is used for sending the verification result of the identity verification to the client, and is used for the client to determine whether to carry out signature and decryption operation.
Optionally, the verification module includes:
the first verification submodule is used for determining that the user identity verification of the client passes when the client information in the client certificate is matched with the client information in the document list in the server and the signer information in the signer certificate is matched with the signer information in the document list;
and the second verification sub-module is used for determining that the user identity verification of the client fails when the client information in the client certificate is not matched with the client information in the document list in the server and/or the signer information in the signer certificate is not matched with the signer information in the document list.
Optionally, the apparatus further comprises:
the fourth receiving module is used for receiving a document updating request which is sent by a client and contains a signature and decryption document, wherein the signature and decryption document is a document generated by the client according to a target document and second signature information, and the second signature information is obtained after the client updates the decryption state in the first signature information and the time for signature and decryption through a seal control;
and the second updating module is used for updating the target document into the signed and decrypted document according to the document updating request and setting document information of the signed and decrypted document, wherein the document information comprises at least one of the decryption state, the decryption time, the seal image parameters and the printing authority.
In a fifth aspect of the present disclosure, a computer-readable storage medium is provided, on which a computer program is stored, which when executed by a processor, performs the steps of the method of the first or second aspect described above.
In a sixth aspect of the present disclosure, there is provided an electronic apparatus comprising:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to implement the steps of the method of the first or second aspect.
According to the technical scheme, the target document to be decrypted is obtained from the server; when receiving a signature decryption instruction, sending a signature decryption request to the server; after receiving a secret key acquisition request sent by the server, sending a password secret key of an external storage medium input by a client to the server, wherein the password secret key is used for the server to acquire the authority of accessing the external storage medium through the password secret key so as to carry out identity authentication on the user identity of the client according to a client certificate and a signer certificate acquired from the external storage medium; receiving a verification result of the identity verification sent by the server; and when the verification result is that the identity verification passes, determining to carry out signature decryption operation. The utility model provides a can automize and realize the strategy of electronic signature declassification, can improve the reliability and the treatment effeciency of the declassification operation of electronic signature document to can reduce the cost of labor.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure without limiting the disclosure. In the drawings:
FIG. 1 is a flowchart of a method for decrypting an electronic signature document according to an exemplary embodiment of the present disclosure;
FIG. 2 is a flow diagram illustrating a method for decrypting an electronic signature document according to the embodiment shown in FIG. 1;
FIG. 3 is a flow diagram illustrating a method for decrypting an electronic signature document according to the embodiment shown in FIG. 2;
FIG. 4 is a flow diagram illustrating another method for decrypting an electronic signature document according to the embodiment shown in FIG. 1;
FIG. 5 is a flowchart of a method for decrypting an electronic signature document according to another exemplary embodiment of the present disclosure;
FIG. 6 is a flow diagram illustrating a method for decrypting an electronic signature document according to the embodiment shown in FIG. 5;
FIG. 7 is a flow diagram illustrating another method for decrypting an electronic signature document according to the embodiment shown in FIG. 5;
FIG. 8 is a block diagram of an apparatus for decrypting an electronic signature document according to yet another exemplary embodiment of the present disclosure;
FIG. 9 is a block diagram of an apparatus for decrypting an electronic signature document according to the embodiment shown in FIG. 8;
FIG. 10 is a block diagram of an apparatus for decrypting an electronic signature document according to the embodiment shown in FIG. 9;
FIG. 11 is a block diagram illustrating another apparatus for decrypting an electronically signed document according to the embodiment shown in FIG. 8;
FIG. 12 is a block diagram of an apparatus for decrypting an electronic signature document according to yet another exemplary embodiment of the present disclosure;
FIG. 13 is a block diagram of an apparatus for decrypting an electronic signature document according to the embodiment shown in FIG. 12;
FIG. 14 is a block diagram of an alternative apparatus for decrypting an electronically signed document shown in the embodiment of FIG. 12;
FIG. 15 is a block diagram illustrating an electronic device 1500 in accordance with an exemplary embodiment;
fig. 16 is a block diagram illustrating an electronic device 1600 in accordance with an example embodiment.
Detailed Description
The following detailed description of specific embodiments of the present disclosure is provided in connection with the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present disclosure, are given by way of illustration and explanation only, not limitation.
FIG. 1 is a flowchart of a method for decrypting an electronic signature document according to an exemplary embodiment of the present disclosure; referring to fig. 1, a method for decrypting an electronic signature document is applied to a client, and the method comprises the following steps:
step 101, a target document to be decrypted is obtained from a server.
The server may be a confidential document server, from which the target document to be decrypted is downloaded, and the target document may be transmitted in clear text or in an encrypted manner. The target document may be a confidential or sensitive document.
And 102, when receiving the signature decryption instruction, sending a signature decryption request to the server.
Illustratively, the client user triggers a signature security instruction through a preset operation (for example, clicking a signature security button or opening the target document in a preset signature security window), and sends a signature security request to the confidential document server after receiving the signature security instruction.
Step 103, after receiving the key obtaining request sent by the server, sending a password key of the external storage medium input by the client to the server, where the password key is used for the server to obtain the right to access the external storage medium, so as to perform identity verification on the user identity of the client according to the client certificate and the signer certificate obtained from the external storage medium.
Illustratively, when the server receives the signing and decryption request, the identity of the decryption signer (the current user of the current client) needs to be verified, so a key obtaining request (the key obtaining request may be a window for inputting a password key) is sent to the client, when the user receives the key obtaining request, the external storage medium is inserted into the local computer and a corresponding password key is input, and the server can access the external storage medium through the password key after receiving the password key. The external storage medium may be a USB-Key (USB Key), an IC (Integrated Circuit) card, a fiscal disc or a fiscal disc. The external storage medium stores the client certificate, signer certificate, seal image parameter information, seal ID and the like, and the client certificate stores a public key of the client and related information of the client; the signer certificate stores the public key of the signer and the related identity information of the signer. The server compares signer information recorded on a white bar of a document in the server with identity information in the client certificate and the signer certificate to determine whether the user is the signer, wherein the signer can be a user who is marked and preset on the server in advance or a user who is marked and encrypted for the target document.
Step 104, receiving the authentication result of the identity authentication sent by the server.
Illustratively, the user's identity information is verified when it is determined that the information in the document white bar on the server matches the identity information in the signer certificate and the client certificate in the external storage medium.
And 105, when the verification result is that the identity verification passes, determining to perform signature decryption operation.
For example, the signature decryption operation may include making a preset mark on the target document (for example, changing the color or shape of the signature, or adding a decryption seal), so that a user who acquires the target document may acquire that the document is in a decrypted state, may enjoy greater processing rights of the target document (may print, forward, copy, etc.), may also acquire an operator who performs decryption on the document, the time of the decryption operation, the ID of the decryption signature, etc.
According to the technical scheme, the target document to be decrypted is obtained from the server; when receiving a signature decryption instruction, sending a signature decryption request to the server; after receiving a secret key acquisition request sent by the server, sending a password secret key of an external storage medium input by a client to the server, wherein the password secret key is used for the server to acquire the authority of accessing the external storage medium through the password secret key so as to carry out identity authentication on the user identity of the client according to a client certificate and a signer certificate acquired from the external storage medium; receiving the authentication result of the identity authentication sent by the server; and when the verification result is that the identity verification passes, determining to carry out signature decryption operation. The utility model provides a can automize and realize the strategy of electronic signature declassification, can improve the reliability and the treatment effeciency of the declassification operation of electronic signature document to can reduce the cost of labor.
FIG. 2 is a flow diagram illustrating a method for decrypting an electronic signature document according to the embodiment shown in FIG. 1; referring to fig. 2, the client is provided with a seal control, and the method further includes:
and 106, when the signature and decryption operation is determined, acquiring first signature information from the external storage medium through the seal control, wherein the first signature information comprises first seal image parameters and a preset image conversion algorithm.
Illustratively, the external storage medium may be a USB-Key, in which signature information is stored when the target document is signed before decryption; the first signature information can comprise parameter information such as seal type, seal ID, seal image Base64 code, signature time and the like; the first seal image parameter can be at least one of seal gray scale parameter, shape parameter or size parameter; the preset image conversion algorithm may be an algorithm for converting the gray scale of the original stamp image, or an algorithm for converting the shape of the original stamp image.
Step 107, determining a second seal image parameter according to the preset image conversion algorithm and the first seal image parameter through the seal control;
illustratively, the RGB bitmap image of the stamp is obtained by decoding the encoded character string of the stamp image Base64 obtained from the USB-Key, and the Gray level value of each pixel of the converted stamp is calculated by using an image Gray level conversion algorithm Gray ═ R × 0.299+ G × 0.587+ B × 0.114 (or other conversion algorithms), so as to obtain a Gray level image of the converted stamp, and the Gray level image is displayed again in the stamp control. The first seal image parameter is a seal image parameter before decryption, and the second seal image parameter is a seal image parameter converted by a preset image conversion algorithm; the stamp image parameter may be at least one of a stamp grayscale parameter, a shape parameter, or a size parameter.
And 108, displaying the decrypted signature image through the seal control according to the second seal image parameter information.
Illustratively, the seal control is a preset program installed on the client, and the signature information can be read, edited and displayed through the seal control.
FIG. 3 is a flow diagram illustrating a method for decrypting an electronic signature document according to the embodiment shown in FIG. 2; referring to fig. 3, the method further comprises:
step 109, when the signature decryption operation is completed, the decryption state in the first signature information and the time for the signature decryption are updated through the seal control, so as to obtain updated second signature information.
Illustratively, when the instruction for completing the signature decryption operation is acquired, the seal control changes the decryption state (decrypted or not decrypted) in the first signature information and records the time for decrypting the signature. Or displaying the first signature information data table through a preset operation (clicking the decrypted stamp image by a right key) under the action of the stamp control, and manually inputting the current decryption state and decryption time of the target document in the table.
Step 110, generating a signed and decrypted document according to the target document and the second signature information.
Illustratively, the second seal image and the second signature information can be displayed within the signature-sealed document by synthesizing the target document and the second signature information into the signature-sealed document containing the second signature information. The second seal information may not be displayed on the page of the target document, and may be displayed after a preset operation (double-click on the second seal image).
Step 111, sending a document update request containing the signature and decryption document to the server, for updating the target document to the signature and decryption document and setting document information of the signature and decryption document, where the document information includes at least one of the decryption status, decryption time, stamp image parameters and printing authority.
Illustratively, when the server receives a document update request containing the signed and decrypted document, the target document is replaced with the signed and decrypted document, and the decryption state, decryption time, stamp image parameters, and printing authority in the document information of the signed and decrypted document are set.
FIG. 4 is a flow diagram illustrating another method for decrypting an electronic signature document according to the embodiment shown in FIG. 1; referring to fig. 4, the step 103, after receiving the key obtaining request sent by the server, of sending a password key of the external storage medium input by the client to the server, where the step is used for the server to obtain the right to access the external storage medium through the password key, so as to perform identity verification on the user identity of the client according to the client certificate and the signer certificate obtained from the external storage medium, and may include the following steps:
step 1031, receiving the key obtaining request sent by the server, where the key obtaining request is used to indicate that a password key of the external storage medium needs to be input.
Step 1032, displaying an input window of the password key;
step 1033, obtaining password key information input in the input window;
step 1034, sending the password key information to the server, where the server obtains the authority to access the external storage medium through the password key, so as to perform identity verification on the user identity of the client according to the client certificate and signer certificate obtained from the external storage medium.
According to the technical scheme, when signature and decryption operation is determined, first signature information is obtained from the external storage medium through the seal control, and the first signature information comprises first seal image parameters and a preset image conversion algorithm; determining a second seal image parameter according to the preset image conversion algorithm and the first seal image parameter through the seal control; and displaying the decrypted signature image through the seal control according to the second seal image parameter information. When the signature decryption operation is completed, updating the decryption state in the first signature information and the time for decrypting the signature through the seal control so as to obtain updated second signature information; generating a signature and decryption document according to the target document and the second signature information; and sending a document updating request containing the signature and decryption document to the server, wherein the document updating request is used for updating the target document to the signature and decryption document by the server and setting document information of the signature and decryption document, and the document information comprises at least one of the decryption state, the decryption time, the seal image parameters and the printing authority. The method can make a proper identification for the decrypted document in the signing and decrypting process of the electronic document, can record the key attribute of the decrypting operation, can conveniently and effectively complete the decrypting process of the electronic signing document, can improve the reliability and the processing efficiency of the decrypting operation of the electronic signing document, and can reduce the labor cost.
FIG. 5 is a flowchart of a method for decrypting an electronic signature document according to another exemplary embodiment of the present disclosure; referring to fig. 5, a method for decrypting an electronic signature document is applied to a server, and the method comprises the following steps:
step 501, after receiving a request sent by a client to obtain a target document to be decrypted, sending the target document to the client.
Illustratively, a user triggers an instruction for acquiring a target document to be decrypted through a preset operation (clicking a preset key or inputting the name of the target document), and the server sends the target document to the client in a plaintext or encrypted manner after receiving the request; the server may be a confidential document server or a server that stores confidential or sensitive documents; the target document may be a confidential or sensitive topic-like document.
Step 502, when receiving a signature decryption request sent by the client, sending a key acquisition request to the client.
For example, after receiving the target document, the client triggers a signature decryption request through a preset operation (after clicking a Key for opening the target document, a signature decryption button is clicked, or after clicking the target document, a right click button changes a decryption state, or a preset signature decryption window opens the target document), after receiving the signature decryption request, the server needs to verify the identity of the user of the client, the authentication certificates of the client and the user are stored in a storage medium (a USB-Key, an IC card, a fiscal disc or a fiscal disc, etc.) in the hand of the user, and the server needs to take a password Key set by the user for the storage medium to obtain the right to access the storage medium, so a Key obtaining request needs to be sent to the client.
Step 503, receiving the password key sent by the client.
For example, the key obtaining request may be presented on a browser of the client in the form of an input box, and the user inputs a corresponding password key in the output box and then sends the password key to the server.
Step 504, a client certificate and a signer certificate are obtained from the external storage medium according to the password secret key.
Exemplarily, the server obtains the access right of the external storage medium after receiving the password key, the external storage medium stores the client certificate, the signer certificate and the seal related information, and the client certificate stores the public key of the client and the related information of the client; the signer certificate stores the public key of the signer and the related identity information of the signer.
And 505, performing identity verification on the user identity of the client according to the client certificate and the signer certificate.
For example, it may be determined whether the issuing authority, the valid period, the user name, and the like of the certificate are valid by verifying the validity of the client certificate and the signer certificate, for example; the server may also determine whether the user is the signer himself or herself by comparing the signer information recorded on the white bar of the document in the server with the identity information in the client certificate and the signer certificate, where the signer may be a user who has been marked in advance on the server or a user who has been signed and encrypted for the target document.
Step 506, sending the verification result of the identity verification to the client for the client to determine whether to perform signature decryption operation.
Exemplarily, when the authentication result is that the identity authentication passes, determining to perform a signature decryption operation; and when the verification result is that the identity verification fails, determining not to carry out signature decryption operation. The signature decryption operation may include making a preset mark on the target document (for example, changing the color or shape of the signature, or adding a decryption seal), so that a user who acquires the target document may acquire that the document is in a decrypted state, may enjoy greater processing rights (printing, forwarding, copying, etc.) of the target document, or may acquire an operator who performs decryption on the document, the time of the decryption operation, the ID of the decryption signature, etc.
According to the technical scheme, after a request for acquiring the target document to be decrypted, which is sent by a client, is received, the target document is sent to the client; when a signature decryption request sent by the client is received, sending a secret key acquisition request to the client; receiving the password key sent by the client; acquiring a client certificate and a signer certificate from the external storage medium according to the password secret key; carrying out identity verification on the user identity of the client according to the client certificate and the signer certificate; and sending the verification result of the identity verification to the client for the client to determine whether to carry out signature decryption operation. The utility model provides a can automize and realize the strategy of electronic signature declassification, can improve the reliability and the treatment effeciency of the declassification operation of electronic signature document to can reduce the cost of labor.
FIG. 6 is a flow diagram illustrating a method for decrypting an electronic signature document according to the embodiment shown in FIG. 5; referring to fig. 6, the step of authenticating the user identity of the client according to the client certificate and the signer certificate in step 505 may include the following steps:
in step 5051, when the client information in the client certificate matches the client information in the document list in the server, and the signer information in the signer certificate matches the signer information in the document list, it is determined that the user identity of the client passes verification.
Illustratively, a document white bar is stored in the server, the document white bar records related information of a client and a signature user having operation authority on related files, and when the client information read by the server from an external storage medium in the user hand and the information of the signer are the same as the related information recorded in the white bar or are one of the user and the client recorded in the white bar, the identity authentication of the user of the client is determined to be passed.
In step 5052, when the client information in the client certificate does not match the client information in the document list in the server, and/or the signer information in the signer certificate does not match the signer information in the document list, it is determined that the user authentication of the client fails.
For example, when any one of the client information and the signer information read by the server from the external storage medium in the user hand is not identical to the related information recorded in the white bar or is not one of the user and the client recorded in the white bar, it is determined that the authentication of the user of the client fails.
FIG. 7 is a flow diagram illustrating another method for decrypting an electronic signature document according to the embodiment shown in FIG. 5; referring to fig. 7, the method may further include the steps of:
step 507, receiving a document updating request containing a signature and decryption document sent by a client, wherein the signature and decryption document is a document generated by the client according to a target document and second signature information, and the second signature information is obtained after the client updates the decryption state in the first signature information and the time for signature and decryption through a seal control.
Illustratively, when the signature decryption operation is completed, the decryption state in the first signature information and the time of the signature decryption are updated through the seal control so as to obtain updated second signature information. In one embodiment, when the instruction for completing the signature decryption operation is obtained, the seal control changes the decryption state (decrypted or not decrypted) in the first signature information, and records the time for decrypting the signature; in another embodiment, the first signature information data table may be displayed through a preset operation (right click on the decrypted stamp image) under the action of the stamp control, and the current decryption state and decryption time of the target document may be manually input in the table. And after the second signature information is obtained, synthesizing a signature and decryption document containing the second signature information by the target document and the second signature information, and displaying the second seal image and the second signature information in the signature and decryption document. The second seal information may not be displayed on the page of the target document, and may be displayed after a preset operation (double-click on the second seal image).
Step 508, according to the document updating request, updating the target document to the signature decryption document, and setting document information of the signature decryption document, wherein the document information includes at least one of the decryption status, the decryption time, the seal image parameters and the printing authority.
Illustratively, when the server receives a document update request containing the signed and decrypted document, the target document is replaced with the signed and decrypted document, and the decryption state, decryption time, stamp image parameters, and printing authority in the document information of the signed and decrypted document are set.
According to the technical scheme, a document updating request containing a signature and decryption document sent by a client is received, the signature and decryption document is a document generated by the client according to a target document and second signature information, and the second signature information is obtained after the client updates the decryption state in the first signature information and the time for signature and decryption through a seal control; and updating the target document into the signature decryption document according to the document updating request, and setting document information of the signature decryption document, wherein the document information comprises at least one of the decryption state, the decryption time, the seal image parameters and the printing authority. The method can make a proper identification for the decrypted document in the signing and decrypting process of the electronic document, can record the key attribute of the decrypting operation, can conveniently and effectively complete the decrypting process of the electronic signing document, can improve the reliability and the processing efficiency of the decrypting operation of the electronic signing document, and can reduce the labor cost.
FIG. 8 is a block diagram of an apparatus for decrypting an electronic signature document according to yet another exemplary embodiment of the present disclosure; referring to fig. 8, an apparatus for decrypting an electronic signature document is applied to a client, the apparatus 800 includes:
a first obtaining module 801, configured to obtain a target document to be decrypted from a server;
a first sending module 802, configured to send a signature decryption request to the server when receiving a signature decryption instruction;
a second sending module 803, configured to send, after receiving the key obtaining request sent by the server, a password key of the external storage medium input by the client to the server, where the password key is used for the server to obtain an authority to access the external storage medium, so as to perform identity verification on the user identity of the client according to a client certificate and a signer certificate obtained from the external storage medium;
a first receiving module 804, configured to receive a verification result of the identity verification sent by the server;
the first determining module 805 is configured to determine to perform a signature decryption operation when the authentication result is that the identity authentication passes.
According to the technical scheme, the target document to be decrypted is obtained from the server through the first obtaining module; the first sending module is used for sending a signature decryption request to the server when receiving a signature decryption instruction; after receiving a key acquisition request sent by the server through a second sending module, sending a password key of an external storage medium input by a client to the server, wherein the password key is used for the server to acquire the authority of accessing the external storage medium through the password key so as to carry out identity authentication on the user identity of the client according to a client certificate and a signer certificate acquired from the external storage medium; receiving the authentication result of the identity authentication sent by the server through a first receiving module; and when the authentication result is that the identity authentication passes, determining to carry out signature decryption operation through a first determination module. The utility model provides a can automize and realize the strategy of electronic signature declassification, can improve the reliability and the treatment effeciency of the declassification operation of electronic signature document to can reduce the cost of labor.
FIG. 9 is a block diagram of an apparatus for decrypting an electronic signature document according to the embodiment shown in FIG. 8; referring to fig. 9, the client is provided with a stamp control, and the apparatus 800 further includes:
a second obtaining module 806, configured to obtain, when it is determined to perform a signature decryption operation, first signature information from the external storage medium through the seal control, where the first signature information includes a first seal image parameter and a preset image conversion algorithm;
a second determining module 807, configured to determine a second stamp image parameter according to the preset image conversion algorithm and the first stamp image parameter through the stamp control;
and the display module 808 is configured to display the decrypted signature image through the seal control according to the second seal image parameter information.
FIG. 10 is a block diagram of an apparatus for decrypting an electronic signature document according to the embodiment shown in FIG. 9; referring to fig. 10, the apparatus 800 may further include:
the first updating module 809 is configured to update the decryption status in the first signature information and the decryption time of the signature through the seal control when the signature decryption operation is completed, so as to obtain updated second signature information;
a generating module 810, configured to generate a signed and decrypted document according to the target document and the second signing information;
the third sending module 811 is configured to send a document update request including the sealed and unencrypted document to the server, and is configured to update the target document to the sealed and unencrypted document and set document information of the sealed and unencrypted document, where the document information includes at least one of the encrypted state, the encrypted time, the seal image parameter, and the printing authority.
FIG. 11 is a block diagram illustrating another apparatus for decrypting an electronically signed document according to the embodiment shown in FIG. 8; referring to fig. 11, the second sending module 803 may include:
the receiving submodule 8031 is configured to receive the key obtaining request sent by the server, where the key obtaining request is used to indicate that a password key of the external storage medium needs to be input;
a display submodule 8032, configured to display an input window of the password key;
an obtaining submodule 8033, configured to obtain password key information input in the input window;
the sending submodule 8034 is configured to send the password key information to the server, where the server obtains the right to access the external storage medium through the password key, so as to perform authentication on the user identity of the client according to the client certificate and the signer certificate obtained from the external storage medium.
According to the technical scheme, when signature and decryption operation is determined to be carried out through the second acquisition module, first signature information is acquired from the external storage medium through the seal control, and the first signature information comprises first seal image parameters and a preset image conversion algorithm; determining a second seal image parameter through a second determination module according to the preset image conversion algorithm and the first seal image parameter through the seal control; and displaying the decrypted signature image through the seal control according to the parameter information of the second seal image through a display module. When the signature decryption operation is completed through the first updating module, the decryption state in the first signature information and the time for signature decryption are updated through the seal control, so that updated second signature information is obtained; generating a signed and decrypted document according to the target document and the second signature information through a generating module; and sending a document updating request containing the signature and decryption document to the server through a third sending module, wherein the document updating request is used for updating the target document to the signature and decryption document and setting document information of the signature and decryption document, and the document information comprises at least one of the decryption state, the decryption time, the seal image parameters and the printing authority. The method can make a proper identification for the decrypted document in the signing and decrypting process of the electronic document, can record the key attribute of the decrypting operation, can conveniently and effectively complete the decrypting process of the electronic signing document, can improve the reliability and the processing efficiency of the decrypting operation of the electronic signing document, and can reduce the labor cost.
FIG. 12 is a block diagram of an apparatus for decrypting an electronic signature document according to yet another exemplary embodiment of the present disclosure; referring to fig. 12, an apparatus for decrypting an electronic signature document is applied to a server, the apparatus 1200 includes:
a second receiving module 1201, configured to send a target document to be decrypted to a client after receiving a request sent by the client to obtain the target document;
a fourth sending module 1202, configured to send a key obtaining request to the client when receiving a signature decryption request sent by the client;
a third receiving module 1203, configured to receive the password key sent by the client;
a third obtaining module 1204, configured to obtain a client certificate and a signer certificate from the external storage medium according to the password key;
the verification module 1205 is configured to perform identity verification on the user identity of the client according to the client certificate and the signer certificate;
a fifth sending module 1206, configured to send the verification result of the authentication to the client, where the client determines whether to perform a signature decryption operation.
According to the technical scheme, after a request for acquiring the target document to be decrypted, which is sent by a client, is received through a second receiving module, the target document is sent to the client; when a signature decryption request sent by the client is received through a fourth sending module, a secret key obtaining request is sent to the client; receiving the password key sent by the client through a third receiving module; acquiring a client certificate and a signer certificate from the external storage medium through a third acquisition module according to the password secret key; the verification module carries out identity verification on the user identity of the client according to the client certificate and the signer certificate; and the fifth sending module sends the verification result of the identity verification to the client for the client to determine whether to carry out signature decryption operation. The utility model provides a can automize and realize the strategy of electronic signature declassification, can improve the reliability and the treatment effeciency of the declassification operation of electronic signature document to can reduce the cost of labor.
FIG. 13 is a block diagram of an apparatus for decrypting an electronic signature document according to the embodiment shown in FIG. 12; referring to FIG. 13, the verification module 1205 includes:
a first verification sub-module 12051, configured to determine that the user identity of the client passes verification when the client information in the client certificate matches the client information in the document list in the server, and the signer information in the signer certificate matches the signer information in the document list;
the second verification sub-module 12052 is configured to determine that the user identity of the client fails when the client information in the client certificate does not match the client information in the document list in the server, and/or the signer information in the signer certificate does not match the signer information in the document list.
FIG. 14 is a block diagram illustrating another apparatus for decrypting an electronically signed document according to the embodiment shown in FIG. 13; referring to fig. 14, the apparatus 1200 further includes:
a fourth receiving module 1207, configured to receive a document update request including a signature and decryption document sent by a client, where the signature and decryption document is a document generated by the client according to a target document and second signature information, and the second signature information is obtained after the client updates a decryption state in the first signature information and time of the signature and decryption through a seal control;
the second updating module 1208 is configured to update the target document to the signed and decrypted document according to the document updating request, and set document information of the signed and decrypted document, where the document information includes at least one of the decryption status, the decryption time, the stamp image parameter, and the printing permission.
According to the technical scheme, a document updating request containing a signature and decryption document sent by a client is received through a fourth receiving module, the signature and decryption document is a document generated by the client according to a target document and second signature information, and the second signature information is obtained after the client updates the decryption state in the first signature information and the time of signature and decryption through a seal control; and updating the target document into the signed and decrypted document through a second updating module according to the document updating request, and setting document information of the signed and decrypted document, wherein the document information comprises at least one of the decryption state, the decryption time, the seal image parameters and the printing authority. The method and the device can make a proper identification for the decrypted document in the signing and decrypting process of the electronic document, can record the key attribute of the decrypting operation, can quickly and effectively complete the decrypting process of the electronic signing document, can improve the reliability and the processing efficiency of the decrypting operation of the electronic signing document, and can reduce the labor cost.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
FIG. 15 is a block diagram illustrating an electronic device 1500 in accordance with an example embodiment. As shown in fig. 15, the electronic device 1500 may include: a processor 1501, a memory 1502. The electronic device 1500 may also include one or more of a multimedia component 1503, an input/output (I/O) interface 1504, and a communications component 1505.
The processor 1501 is configured to control the overall operation of the electronic device 1500, so as to complete all or part of the steps in the above-mentioned method for decrypting an electronic signature document. The memory 1502 is used to store various types of data to support operation at the electronic device 1500, such as instructions for any application or method operating on the electronic device 1500, as well as application-related data, such as contact data, messaging, pictures, audio, video, and the like. The Memory 1502 may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk, or optical disk. The multimedia component 1503 may include a screen and an audio component. Wherein the screen may be, for example, a touch screen and the audio component is used for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may further be stored in the memory 1502 or transmitted via the communication component 1505. The audio assembly also includes at least one speaker for outputting audio signals. The I/O interface 1504 provides an interface between the processor 1501 and other interface modules, such as a keyboard, mouse, buttons, and the like. These buttons may be virtual buttons or physical buttons. The communication component 1505 is used for wired or wireless communication between the electronic device 1500 and other devices. Wireless Communication, such as Wi-Fi, bluetooth, Near Field Communication (NFC), 2G, 3G, or 4G, or a combination of one or more of them, so that the corresponding Communication component 1505 may include: Wi-Fi module, bluetooth module, NFC module.
In an exemplary embodiment, the electronic Device 1500 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic components for performing the above-described method for electronic signature document decryption.
In another exemplary embodiment, a computer readable storage medium comprising program instructions which, when executed by a processor, implement the steps of the above-described method of electronic signature document decryption is also provided. For example, the computer readable storage medium may be the memory 1502 described above that includes program instructions executable by the processor 1501 of the electronic device 1500 to perform the method for decrypting an electronic signature document described above.
Fig. 16 is a block diagram illustrating an electronic device 1600 in accordance with an example embodiment. For example, the electronic device 1600 may be provided as a server. Referring to fig. 16, electronic device 1600 includes a processor 1622, which may be one or more in number, and a memory 1632 for storing computer programs that are executable by processor 1622. The computer program stored in memory 1632 may include one or more modules that each correspond to a set of instructions. Further, the processor 1622 may be configured to execute the computer program to perform the above-described method of electronic signature document decryption.
Additionally, electronic device 1600 may also include a power component 1626 that may be configured to perform power management for electronic device 1600, and a communication component 1650 that may be configured to enable communication, e.g., wired or wireless communication, for electronic device 1600. The electronic device 1600 may also include input/output (I/O) interfaces 1658. The electronic device 1600 may operate based on an operating system stored in the memory 1632, such as Windows Server, Mac OS XTM, UnixTM, Linux, etc.
In another exemplary embodiment, a computer readable storage medium comprising program instructions which, when executed by a processor, implement the steps of the above-described method of electronic signature document decryption is also provided. For example, the computer readable storage medium may be the memory 1632 described above that includes program instructions that are executable by the processor 1622 of the electronic device 1600 to perform the method for decrypting an electronic signature document described above.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (16)

1. A method for decrypting an electronic signature document, which is applied to a client side, is characterized by comprising the following steps:
acquiring a target document to be decrypted from a server;
when receiving a signature decryption instruction, sending a signature decryption request to the server;
after receiving a secret key acquisition request sent by the server, sending a password secret key of an external storage medium input by a client to the server, wherein the password secret key is used for the server to acquire the authority of accessing the external storage medium through the password secret key so as to carry out identity authentication on the user identity of the client according to a client certificate and a signer certificate acquired from the external storage medium;
receiving a verification result of the identity verification sent by the server;
and when the verification result is that the identity verification passes, determining to perform signature decryption operation, wherein the signature decryption operation comprises making a preset mark on the target document to represent that the target document is in a decryption state.
2. The method of claim 1, wherein the client is provided with a stamp control, the method further comprising:
when the signature and decryption operation is determined, acquiring first signature information from the external storage medium through the seal control, wherein the first signature information comprises first seal image parameters and a preset image conversion algorithm;
determining a second seal image parameter according to the preset image conversion algorithm and the first seal image parameter through the seal control;
and displaying the decrypted signature image through the seal control according to the second seal image parameter information.
3. The method of claim 2, further comprising:
when the signature decryption operation is completed, updating the decryption state in the first signature information and the time for signature decryption through the seal control so as to obtain updated second signature information;
generating a signature and decryption document according to the target document and the second signature information;
and sending a document updating request containing the signature and decryption document to the server, wherein the document updating request is used for updating the target document to the signature and decryption document by the server and setting document information of the signature and decryption document, and the document information comprises at least one of the decryption state, the decryption time, the seal image parameters and the printing authority.
4. The method according to claim 1, wherein after receiving a key obtaining request sent by the server, sending a password key of an external storage medium input through a client to the server, where the password key is used for the server to obtain an authority to access the external storage medium through the password key, so as to authenticate a user identity of the client according to a client certificate and a signer certificate obtained from the external storage medium, the method includes:
receiving the secret key acquisition request sent by the server, wherein the secret key acquisition request is used for indicating a password secret key needing to be input into the external storage medium;
an input window for displaying the password key;
acquiring password key information input in the input window;
and sending the password key information to the server, wherein the server acquires the authority for accessing the external storage medium through the password key, so as to perform identity verification on the user identity of the client according to the client certificate and the signer certificate acquired from the external storage medium.
5. A method for decrypting an electronic signature document, which is applied to a server, comprises the following steps:
after receiving a request sent by a client for acquiring a target document to be decrypted, sending the target document to the client;
when a signature decryption request sent by the client is received, sending a secret key acquisition request to the client;
receiving a password secret key sent by the client;
acquiring a client certificate and a signer certificate from an external storage medium according to the password key;
performing identity verification on the user identity of the client according to the client certificate and the signer certificate;
and sending the verification result of the identity verification to the client for the client to determine whether to perform signature decryption operation, wherein the signature decryption operation comprises making a preset mark on the target document to represent that the target document is in a decryption state.
6. The method of claim 5, wherein the authenticating the user identity of the client from the client certificate and the signer certificate comprises:
when the client information in the client certificate is matched with the client information in the document list in the server and the signer information in the signer certificate is matched with the signer information in the document list, determining that the user identity of the client passes the authentication;
and when the client information in the client certificate is not matched with the client information in the document list in the server and/or the signer information in the signer certificate is not matched with the signer information in the document list, determining that the user identity authentication of the client fails.
7. The method of claim 5, further comprising:
receiving a document updating request which is sent by a client and contains a signature and decryption document, wherein the signature and decryption document is a document generated by the client according to a target document and second signature information, and the second signature information is obtained after the client updates the decryption state in the first signature information and the time of signature and decryption through a seal control;
and updating the target document into the signature decryption document according to the document updating request, and setting document information of the signature decryption document, wherein the document information comprises at least one of the decryption state, the decryption time, the seal image parameters and the printing authority.
8. An apparatus for decrypting an electronically signed document, applied to a client, the apparatus comprising:
the first acquisition module is used for acquiring a target document to be decrypted from a server;
the first sending module is used for sending a signature decryption request to the server when receiving a signature decryption instruction;
the second sending module is used for sending a password secret key of an external storage medium input by a client to the server after receiving a secret key obtaining request sent by the server, and is used for obtaining the authority of accessing the external storage medium by the server through the password secret key so as to carry out identity verification on the user identity of the client according to a client certificate and a signer certificate obtained from the external storage medium;
the first receiving module is used for receiving the authentication result of the identity authentication sent by the server;
and the first determining module is used for determining to carry out signature decryption operation when the authentication result is that the identity authentication passes, wherein the signature decryption operation comprises making a preset mark on the target document so as to represent that the target document is in a decryption state.
9. The apparatus of claim 8, wherein the client is provided with a stamp control, the apparatus further comprising:
the second acquisition module is used for acquiring first signature information from the external storage medium through the seal control when signature and decryption operations are determined to be performed, wherein the first signature information comprises first seal image parameters and a preset image conversion algorithm;
the second determining module is used for determining second seal image parameters according to the preset image conversion algorithm and the first seal image parameters through the seal control;
and the display module is used for displaying the decrypted signature image through the seal control according to the second seal image parameter information.
10. The apparatus of claim 9, further comprising:
the first updating module is used for updating the decryption state in the first signature information and the decryption time of the signature through the seal control when the signature decryption operation is finished so as to obtain updated second signature information;
the generating module is used for generating a signed and decrypted document according to the target document and the second signing information;
a third sending module, configured to send a document update request including the signature and decryption document to the server, where the document update request is used for the server to update the target document to the signature and decryption document and to set document information of the signature and decryption document, and the document information includes at least one of the decryption state, decryption time, stamp image parameters, and printing authority.
11. The apparatus of claim 8, wherein the second sending module comprises:
the receiving submodule is used for receiving the secret key obtaining request sent by the server, and the secret key obtaining request is used for indicating that a password secret key of the external storage medium needs to be input;
the display submodule is used for displaying an input window of the password key;
the obtaining submodule is used for obtaining password key information input in the input window;
and the sending submodule is used for sending the password secret key information to the server, and is used for acquiring the authority of accessing the external storage medium through the password secret key by the server so as to carry out identity verification on the user identity of the client according to the client certificate and the signer certificate acquired from the external storage medium.
12. An apparatus for decrypting an electronically signed document, the apparatus being adapted to be used by a server, the apparatus comprising:
the second receiving module is used for sending the target document to the client after receiving a request for obtaining the target document to be decrypted, which is sent by the client;
the fourth sending module is used for sending a secret key obtaining request to the client when receiving a signature decryption request sent by the client;
a third receiving module, configured to receive a password key sent by the client;
the third acquisition module is used for acquiring a client certificate and a signer certificate from an external storage medium according to the password secret key;
the verification module is used for verifying the identity of the user of the client according to the client certificate and the signer certificate;
and a fifth sending module, configured to send a verification result of the identity verification to the client, where the verification result is used for the client to determine whether to perform a signature decryption operation, and the signature decryption operation includes making a preset mark on the target document to represent that the target document is in a decryption state.
13. The apparatus of claim 12, wherein the authentication module comprises:
the first verification submodule is used for determining that the user identity verification of the client passes when the client information in the client certificate is matched with the client information in the document list in the server and the signer information in the signer certificate is matched with the signer information in the document list;
and the second verification sub-module is used for determining that the user identity verification of the client fails when the client information in the client certificate is not matched with the client information in the document list in the server and/or the signer information in the signer certificate is not matched with the signer information in the document list.
14. The apparatus of claim 12, further comprising:
the fourth receiving module is used for receiving a document updating request which is sent by a client and contains a signature and decryption document, wherein the signature and decryption document is a document generated by the client according to a target document and second signature information, and the second signature information is obtained after the client updates the decryption state in the first signature information and the time for signature and decryption through a seal control;
and the second updating module is used for updating the target document into the signed and decrypted document according to the document updating request and setting document information of the signed and decrypted document, wherein the document information comprises at least one of the decryption state, the decryption time, the seal image parameters and the printing authority.
15. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 4; alternatively, the program is adapted to carry out the steps of the method of any of claims 5-7 when executed by a processor.
16. An electronic device, comprising:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to carry out the steps of the method of any one of claims 1 to 4; or for executing the computer program in the memory to carry out the steps of the method of any of claims 5-7.
CN201811626395.0A 2018-12-28 2018-12-28 Method and device for decrypting electronic signature document, storage medium and electronic equipment Active CN109829329B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811626395.0A CN109829329B (en) 2018-12-28 2018-12-28 Method and device for decrypting electronic signature document, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811626395.0A CN109829329B (en) 2018-12-28 2018-12-28 Method and device for decrypting electronic signature document, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN109829329A CN109829329A (en) 2019-05-31
CN109829329B true CN109829329B (en) 2021-09-14

Family

ID=66861293

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811626395.0A Active CN109829329B (en) 2018-12-28 2018-12-28 Method and device for decrypting electronic signature document, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN109829329B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112446677B (en) * 2019-09-05 2023-04-07 中移(苏州)软件技术有限公司 Electronic signature method, device, equipment and storage medium
CN111274579B (en) * 2020-01-15 2022-07-01 湖北工程学院 Enterprise document encryption protection system based on computer
CN114676451B (en) * 2020-12-24 2024-06-18 航天信息股份有限公司 Electronic document signing method and device, storage medium and electronic equipment
CN113139211A (en) * 2021-04-19 2021-07-20 广州腾盈信息技术有限公司 Electronic signature method and system based on dynamic password

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420300B (en) * 2008-05-28 2013-05-29 北京易恒信认证科技有限公司 Double factor combined public key generating and authenticating method
CN101894238B (en) * 2010-08-09 2012-07-04 中国人民解放军海军工程大学 Double authentication-based word document electronic seal system and method
CN101984626B (en) * 2010-11-11 2013-10-23 北京海泰方圆科技有限公司 Method and system for safely exchanging files
CN105847261B (en) * 2016-03-29 2019-01-29 江苏翔晟信息技术股份有限公司 A kind of electronic signature method based on the wireless encryption and decryption of bluetooth
CN106972924B (en) * 2017-03-23 2020-06-23 联想(北京)有限公司 Method and device for encryption, decryption, electronic signature and verification signature
CN107508685B (en) * 2017-10-13 2021-03-16 吉林工程技术师范学院 Method for implementing application electronic signature service system in cloud computing environment

Also Published As

Publication number Publication date
CN109829329A (en) 2019-05-31

Similar Documents

Publication Publication Date Title
CN109829329B (en) Method and device for decrypting electronic signature document, storage medium and electronic equipment
US5781635A (en) Method and apparatus for improved digital message transaction model
KR100910378B1 (en) System and method for issuing electronically accredited certificate using encrypted image
CN109726571B (en) Electronic signature method and device for document, storage medium and electronic equipment
CN109922027B (en) Credible identity authentication method, terminal and storage medium
JP2016515235A5 (en)
CN101145906A (en) Method and system for authenticating legality of receiving terminal in unidirectional network
WO2021218166A1 (en) Contract signing method and apparatus, device and computer-readable storage medium
CN109495268B (en) Two-dimensional code authentication method and device and computer readable storage medium
CN106656505A (en) Mobile terminal electronic signature system based on event certificate and mobile terminal electronic signature method thereof
CN114780923B (en) Electronic seal management and control method and system
JPH06224896A (en) Electronic document processing system and preparing method for digital signature
KR20200002501A (en) Method for certificating node of public blockchain, apparatus and system for executing the method
KR101715816B1 (en) Apparatus for securing information using accessibility method thereof
CN106656955A (en) Communication method and system and user terminal
WO2018033017A1 (en) Terminal state conversion method and system for credit granting
JP2008136117A (en) Encryption method and decryption method
JP3724071B2 (en) Electronic signature method
Setiawan et al. Design of secure electronic disposition applications by applying blowfish, SHA-512, and RSA digital signature algorithms to government institution
KR20210107681A (en) Circuit chip and its operation method
CN115378609A (en) Electronic certificate display method, verification method, terminal and server
JP2008035019A (en) Digital signature device
KR101933090B1 (en) System and method for providing electronic signature service
CN116204903A (en) Financial data security management method and device, electronic equipment and storage medium
CN115767138A (en) Video data processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant