CN110011808A - Method and system and servomechanism with guard digit stamped signature mechanism - Google Patents
Method and system and servomechanism with guard digit stamped signature mechanism Download PDFInfo
- Publication number
- CN110011808A CN110011808A CN201910248780.4A CN201910248780A CN110011808A CN 110011808 A CN110011808 A CN 110011808A CN 201910248780 A CN201910248780 A CN 201910248780A CN 110011808 A CN110011808 A CN 110011808A
- Authority
- CN
- China
- Prior art keywords
- random code
- private key
- numerical digit
- servomechanism
- stored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Abstract
A method of with guard digit stamped signature mechanism; comprising servomechanism when receiving the stamped signature request from client terminal device; using being stored in the random code inventory of servomechanism not labeled random code one of them; and generated according to the second part of the used random code and the numerical digit private key data for being stored in the servomechanism and transmit stamped signature and replied, so that the client terminal device generates private key when receiving the stamped signature and replying to carry out numerical digit stamped signature to target data;Wherein, the private key be by the client terminal device determine the random code used in the servomechanism be matched with store in the random code inventory of the client terminal device not labeled random code one of them when, generated using the second part of the numerical digit private key data and the first part for the numerical digit private key data for being stored in the client terminal device.
Description
Technical field
This disclosure relates to which a kind of method and system and servomechanism of guard digit stamped signature mechanism, especially a kind of using random
The method and system and servomechanism of the guard digit stamped signature mechanism of code.
Background technique
In the program of some numerical digit stamped signatures (Digital Signature, DS), transmission end calculates information by hash
Method obtains a Hash Value (hash value) after calculating, and the private key of transmission end is recycled to become a numerical digit to Hash Value encryption
Stamped signature.Then, then numerical digit stamped signature is attached to behind information and is sent out together.After receiving end receives information, transmission is utilized
The public key at end decrypts numerical digit stamped signature to obtain the Hash Value of transmission end, due to confirmed the pairing relationship of public key and private key, and energy
Determine received information " non-repudiation ".Then, receiving end calculates Hash Value with the calculation of same hash, and compares
Two Hash Values can determine " integrality " of the information if identical.
The memory element for being stored with the entity of electronic certificate private key can be supplied to client by enterprise, in this way, client can be with
Numerical digit stamped signature is carried out to information through the private key in the memory element.The memory element can be disk, Portable disk, USB
Token or IC card.In some cases, the transport of memory element can consume a longer time, for example, enterprise and client be located at it is different
Country.
Summary of the invention
The disclosure provides a kind of method of guard digit stamped signature mechanism, includes: providing the first part of numerical digit private key data
To client terminal device;Servomechanism is when receiving the stamped signature request from the client terminal device, sequentially using being stored in the servo
Used random code one of them is not labeled as in the random code inventory of device to the numerical digit private key number for being stored in the servomechanism
According to second part encryption, and using current time as encoding generation time, and according to used random code, encrypted
The second part of the numerical digit private key data and the coding generation time calculate Hash Value (Hash Value), and according to being made
The random code, the second part of the encrypted numerical digit private key data, the coding generation time and the Hash Value generate volume
Code, and the stamped signature reply comprising the coding is sent out.The client terminal device is when receiving stamped signature reply, according to the coding
Calculate random code, the second part of the numerical digit private key data of the encryption, the coding generation time used in the servomechanism
And the Hash Value, and the second part of the numerical digit private key data of random code, the encryption according to used in the servomechanism, the volume
Code generation time is calculated with reference to Hash Value, and is stored in the visitor determining the random code used in the servomechanism and being matched with
It is not labeled as used random code one of them in the random code inventory of family end device, and determines this with reference to Hash Value phase
When being same as the Hash Value, and determining current time within effective time according to the coding generation time, the servomechanism institute is utilized
The random code used decrypts the second part of the numerical digit private key data, and according to the second part of the numerical digit private key data with
The first part for being stored in the numerical digit private key data of the client terminal device generates private key to carry out numerical digit stamped signature to target data.
The method, wherein the servomechanism is stored in the servomechanism random code inventory in use and is not labeled as
When the random code one of them used, it will also be stored in the random code used in the servomechanism and be labeled as having used;The visitor
Family end device random code used in determine be matched with the random code inventory for being stored in the client terminal device not by
When labeled as used random code one of them, matched random code of the client terminal device will be also stored in labeled as
It uses.
The method also includes: the servomechanism and the client terminal device one of them are stored in the servomechanism determining
And the quantity for being not labeled as used random code of the one of them of the client terminal device be less than predetermined value when, transmission with
Machine code is requested to random code generation device, so that the random code generation device will be in response to random caused by random code request
Code list synchronization is sent to the servomechanism and the client terminal device;And the servomechanism and the client terminal device are being received from this
When the random code inventory of random code generation device, the received random code inventory of storage institute, and will be to receive the random code clear
Stored random code is labeled as having used before list.
The disclosure provides a kind of system with guard digit stamped signature mechanism, includes: client terminal device and servomechanism.The visitor
Family end device is stored with the first part of random code inventory and numerical digit private key data, and assembles to transmit stamped signature request.The servo
Device is stored with the second part of random code inventory and numerical digit private key data, assemble with the client terminal device data connection, and
When receiving the stamped signature request from the client terminal device, using current time as coding generation time, sequentially using storage
The servomechanism random code inventory and labeled random code one of them the second part of the numerical digit private key data is added
It is close, and according to the used random code, the second part of the encrypted numerical digit private key data and coding generation time fortune
It calculates Hash Value (Hash Value), and according to the used random code, second of the encrypted numerical digit private key data
Point, the coding generation time and the Hash Value generate coding, the stamped signature reply comprising the coding is sent out.The client terminal device
It also assembles to receive the stamped signature and reply, and according to the coding, calculates the number of the random code used in the servomechanism, the encryption
Second part, the coding generation time and Hash Value of position private key data, and the random code according to used in the servomechanism,
The second part of the numerical digit private key data of the encryption, the coding generation time are calculated with reference to Hash Value.The client terminal device is also
It assembles to be stored in the random code inventory of the client terminal device determining the random code used in the servomechanism and be matched with
In be not labeled as used random code one of them, and determine this and be identical to the Hash Value with reference to Hash Value, and according to
When the coding generation time determines current time within effective time, using the random code used in the servomechanism to the number
The second part decryption of position private key data, and according to the second part of the numerical digit private key data and the first of the numerical digit private key data
Part generates private key to carry out numerical digit stamped signature to target data.
The system, wherein the servomechanism also assembles be not labeled as having used using being stored in the servomechanism
Random code one of them when, also by the used random code for being stored in the servomechanism labeled as having used;The client
End device, which also assembles to be matched with come the random code used in determining, is stored in being not labeled as the client terminal device
When the random code used, also the matched random code for being stored in the client terminal device is labeled as having used.
The system also includes random code generation device, connects with the servomechanism and the client terminal device one of them data
It connects, group is used in the random code request for receiving the one of them from the servomechanism and the client terminal device, is generated
Random code inventory, and by generated random code synchronous driving to the servomechanism and the client terminal device;The servomechanism and the visitor
The one of them of family end device also assembles determining the one of them for being stored in the servomechanism and the client terminal device
The quantity for being not labeled as used random code be less than predetermined value when, transmit the random code request to the random code generate dress
It sets;When the servomechanism and the client terminal device also assemble to receive the random code inventory from the random code generation device, deposit
The received random code inventory of storage institute, and stored random code will be labeled as having used before receiving the random code inventory.
The disclosure provides a kind of servomechanism, includes communication module, storage unit and processing unit.The storage unit assembles
To store the second part of random code inventory and numerical digit private key data.The processing unit data connection communication module and the storage
Unit assembles and receives the stamped signature request from client terminal device by the communication module, and uses and be stored in the servomechanism
Not labeled random code one of them in random code inventory, and according at least to the used random code and be stored in this and watch
The second part for taking the numerical digit private key data of device generates stamped signature and replys, and transmits the stamped signature by the communication module and reply, so that
The client terminal device generates private key when receiving the stamped signature and replying to carry out numerical digit stamped signature to target data.The private key be by
The client terminal device is stored in the random code of the client terminal device determining the random code used in the servomechanism and be matched with
In inventory not labeled random code one of them when, using the numerical digit private key data second part and be stored in the client
The first part of the numerical digit private key data of end device and generate.
The servomechanism, wherein the processing unit using be stored in the storage unit random code inventory in not by
When the random code one of them of label, the used random code for being stored in the storage unit is also marked;The private key be by
The client terminal device is matched in the random code inventory for being stored in the client terminal device not determining the random code used
When labeled random code one of them, label is stored in matched random code of the client terminal device, and utilizes the numerical digit
The first part of the second part of private key data and the numerical digit private key data for being stored in the client terminal device and generate.
The servomechanism, wherein the processing unit assembles to be stored in the not labeled of the storage unit determining
It when the quantity of random code is less than predetermined value, requests by communication module transmission random code to random code generation device, so that should
Random code generation device will request generated random code list synchronization to be sent to the servomechanism and the visitor in response to the random code
Family end device;The processing unit assembles come to receive the random code from the random code generation device by the communication module clear
Dan Shi, the received random code inventory of storage institute, and mark the stored random code before receiving the random code inventory.
The servomechanism, wherein processing unit is assembled when generating stamped signature reply, is produced current time as coding
The raw time encrypts according to second part of the selected random code to the numerical digit private key data, according to the selected random code, adds
The second part of the numerical digit private key data of close mistake and the coding generation time calculate Hash Value (Hash Value), and according to
The used random code, the second part of the encrypted numerical digit private key data, the coding generation time and the Hash Value produce
A raw coding, it includes the coding which, which replys,;The private key is to receive by the client terminal device from the server-side
When the stamped signature is replied, according to the coding, calculate the selected random code, the encryption numerical digit private key data second part,
The coding generation time and the Hash Value, and according to the used random code, second of the numerical digit private key data of the encryption
Point, the coding generation time calculates one with reference to Hash Value, and is stored in the visitor determining the selected random code and being matched with
The random code one of them not being labeled in the random code inventory of family end device, and determine this and be identical to reference to Hash Value
The Hash Value, and when determining current time within an effective time according to the coding generation time, using it is used should be with
Machine code decrypts the second part of the numerical digit private key data, and using the second part of the numerical digit private key data and is stored in the visitor
The first part of the numerical digit private key data of family end device and generate.
The disclosure provides a kind of method of guard digit stamped signature mechanism, includes: providing the first part of numerical digit private key data
To far end device;Receive the stamped signature request from the far end device;Worked as using the random code inventory for being stored in local end device
In not labeled random code one of them;According at least to the used random code and it is stored in the numerical digit of the local end device
The second part of private key data generates stamped signature and replys;And stamped signature reply is transmitted, so that the far end device is receiving the stamped signature
Private key is generated when reply to carry out numerical digit stamped signature to target data.The private key is to determine the local side by the far end device
The random code used in device be matched in the random code inventory for being stored in the far end device not labeled random code its
When middle one, second part using the numerical digit private key data be stored in first of numerical digit private key data of the far end device
Divide and generates.
The method, wherein using be stored in the local end device the random code inventory in be not labeled with
When machine code one of them, the used random code for being stored in the local end device is also marked;The private key is by the distal end
Device determine the random code used be matched in the random code inventory for being stored in the far end device it is not labeled
When random code one of them, label is stored in matched random code of the far end device, and utilizes the numerical digit private key data
The first part of second part and the numerical digit private key data for being stored in the far end device and generate.
The method, wherein be less than in the quantity for determining the not labeled random code for being stored in the local end device
When predetermined value, transmission random code is requested to random code generation device, so that the random code generation device will be in response to the random code
Random code list synchronization caused by requesting is sent to the local end device and the far end device;The local end device is receiving
When the random code inventory from the random code generation device, the received random code inventory of storage institute, and mark receive should
Stored random code before random code inventory.
The method, wherein when generating stamped signature reply, using the selected random code to the numerical digit private key data
Second part encryption, using current time as coding generation time, according to the selected random code, the encrypted numerical digit private key
The second part of data and the coding generation time calculate Hash Value (Hash Value), and this is random according to used
Code, the second part of the encrypted numerical digit private key data, the coding generation time and the Hash Value generate coding, the stamped signature
Replying includes the coding;The private key be by the far end device when receiving the stamped signature from the server-side and replying, according to
The coding calculates the selected random code, the second part of the numerical digit private key data of the encryption, the coding generation time and is somebody's turn to do
Hash Value, and transported according to the used random code, the second part of the numerical digit private key data of the encryption, the coding generation time
It calculates and refers to Hash Value, and be stored in the random code inventory of the far end device determining the selected random code and being matched with and work as
In not labeled random code one of them, and determine this and be identical to the Hash Value with reference to Hash Value, and produced according to the coding
When the raw time determines current time within effective time, using the random code used in the local end device to numerical digit private
The second part of key data is decrypted, and utilizes the second part of the numerical digit private key data and the numerical digit private for being stored in the far end device
The first part of key data and generate.
From the above, which is previously stored with first of a numerical digit private key data
Point, and private key can be generated using the second part of the numerical digit private key data from servomechanism (or the local end device) to carry out
Stamped signature, in this way, do not need to give private key to client using the memory element of entity, without spend transport entity memory element when
Between;In addition, the client terminal device (or the far end device) must not only obtain the number from the servomechanism (or the local end device)
The second part of position private key data, it is necessary to which being stored with not to be labeled and be matched with the servomechanism (or the local end device) is made
The random code could execute numerical digit stamped signature, in this way, can lifting system safety.
Detailed description of the invention
Fig. 1 shows the component block diagram of an embodiment with protection data stamped signature mechanism system for the disclosure;
Fig. 2 shows the flow charts of an embodiment with protection data stamped signature mechanism method for the disclosure;And
Fig. 3 shows the flow chart of another embodiment with protection data stamped signature mechanism method of the disclosure.
Main element symbol description
Specific embodiment
The disclosure that the following detailed description will be further explained with reference to the above drawings.
Being described below will be with reference to attached drawing present disclosure is described more fully with.It is the exemplary of the disclosure shown in attached drawing
Embodiment.However, the disclosure can be implemented in many different forms, and does not answer and described be construed as limited to illustrate herein
Exemplary embodiment.These exemplary embodiments are provided it are to keep the disclosure thoroughly and complete, and by the model of the disclosure
It encloses and is fully conveyed to those skilled in the art.Similar appended drawing reference indicates same or similar component.
Terms used herein are only used for the purpose of description certain exemplary embodiments, and are not intended to limit the disclosure.Such as
Used herein, unless the context clearly indicates otherwise, otherwise singular " one ", "one" and " described " are intended to also wrap
Include plural form.In addition, as used herein, " include " and or " include " or " comprising " and/or " comprising " or " having "
And/or " having ", integer, step, operation, component and/or component, but do not preclude the presence or addition of one or more of the other spy
Sign, region, integer, step, operation, component, component and/or its group.
Unless otherwise defined, otherwise all terms (including technical and scientific term) used herein have and the disclosure
The normally understood identical meaning of those of ordinary skill in the art.In addition, unless being explicitly defined in text, such as in general words
Those terms defined in allusion quotation answer described be interpreted as having and its meaning in the relevant technologies and present disclosure is consistent
Meaning, and will not be interpreted idealization or meaning too formal.
The following contents will be described exemplary embodiment in conjunction with attached drawing.Same or similar component will be endowed identical
Or similar appended drawing reference indicates or similar technical terms.
Fig. 1 shows the system 100 with guard digit stamped signature mechanism according to some embodiments of the present disclosure, has and protects
The system 100 for protecting numerical digit stamped signature mechanism includes a random code generation device 1, a servomechanism 2, a time servomechanism 3 and a client
End device 4.
In the present embodiment, random code generator 1, servomechanism 2 and time servomechanism 3 are respectively mutually indepedent and mutual
The servomechanism of connection, and client terminal device 4 can be connected to by communication network 5.5 communication network of communication network may include
Wired and wireless medium at least one of them.Communication network 5 can be used to realize the transmission side that one or more is made an appointment
Formula, transmission mode may include but be not limited to SMS (Short Message Service) (Short Message Service, SMS), Email
(electronic mail) and block chain (block chain).In other state sample implementations, random code generator 1, servomechanism
2 and time servomechanism 3 can also make the module of respectively different function and be placed in same servomechanism.
The random code generation device 1 assemble with the servomechanism 2 and 4 data connection of client terminal device, and receiving
When from the request of a random code of the servomechanism 2 and 4 one of them of client terminal device, a random code inventory is generated, and by institute
The random code list synchronization of generation is sent to the servomechanism 2 and the client terminal device 4.In the present embodiment, which generates
It is the status for being uniquely corresponding to a client that device 1, which requests the generated random code inventory in response to the random code,.In this implementation
In example, which may include one or more random codes (Random Code) being randomly generated.In the present embodiment
In, the random code can be arranged according to particular order.The random code respectively can be a PIN code.Random code generation device
1 can be set in a servomechanism.In other state sample implementations, random code generation device 1 be can be set in the client terminal device 4
In.
The servomechanism 2 includes a communication module 21, a storage unit 22 and a processing unit 23.
The storage unit 22 of the servomechanism 2 can be the electronic module comprising one or more hardwares, software or firmware,
And electronic data can be stored.Storage unit 22 assembles to store a random code inventory L2And the second part of numerical digit private key data
P2.In the present embodiment, random code inventory L2It is received from the random code generation device 1, and is uniquely corresponding to the client,
It and include one or more random code R being randomly generated2.The random code R2A part be not labeled, the random code R2's
Another part has been labeled.In the present embodiment, random code R2Labeled mode, which can be, to be marked as having used.In this reality
Apply the second part P of numerical digit private key data in example2It can be a part for being uniquely corresponding to the private key of the client.
Processing unit 23 can be the electronic module comprising one or more hardwares, software or firmware, such as a centre
Reason device (CPU) is processor (MCU).Processing unit 23 is assembled by the communication module 21 and the random code generation device
1, the client terminal device 4 and 3 data connection of time servomechanism.
The time servomechanism 3, which assembles, carrys out generation time stamp.The time servomechanism 3 can be one and be connected to communication network
5 servomechanism.The processing unit 23 of servomechanism 2 can obtain time stab through time servomechanism 3 by communication module 21.
The processing unit 23 of the servomechanism 2 assembles to be stored in being not labeled as the storage unit 22 determining
Used random code R2Quantity less than a predetermined value when, by the communication module 21 transmit a random code request to this with
Machine code generation device 1, so that the random code generation device 1 will request a generated random code inventory same in response to the random code
Step is sent to the servomechanism 2 and the client terminal device 4, which receives by the communication module 21 from should be with
When the random code inventory of machine code generation device 1, the received random code inventory of storage institute, and mark and receiving the random code inventory
Stored random code (such as random code R before2) it is to have used.
The processing unit 23 of the servomechanism 2 assembles to receive the stamped signature request from the client terminal device 4, sequentially makes
With being stored in the servomechanism 2 and be not labeled as the used random code R2One of them will be stored in the servomechanism 2
Used random code R2Labeled as having used.The processing unit 23 assembles to generate a stamped signature in response to stamped signature request
It replys and sends out stamped signature reply.In the present embodiment, which can reply the stamped signature and be sent to the visitor
Family end device 4, in other state sample implementations, stamped signature reply can be transferred into other electronics for being different from the client terminal device 4
Device, such as belong to third-party electronic device.In the present embodiment, when generating stamped signature and replying, with it is used should be with
Machine code R2Second part P of the one of them to the numerical digit private key data2Encryption, and present time should be obtained from the time servomechanism 3
For a coding generation time.The processing unit 23, which assembles, to be come according to used random code R2, the encrypted numerical digit private key
The second part P of data2And the coding generation time calculates a Hash Value (Hash Value), and according to it is used should be with
The second part P of machine code, the encrypted numerical digit private key data2, the coding generation time and the Hash Value generate a coding, and
Reply the stamped signature comprising the coding.In other state sample implementations, the system time of servomechanism 2 may also act as coding and generate
Time.
In the present embodiment, which includes a communication module 41, a storage unit 42 and a processing unit
43.In other state sample implementations, which includes that can further include the random code generation device 1.Client terminal device
4 can be computer, smart phone, tablet computer, POS machine or other mobile devices.
The storage unit 42 can be the electronic module comprising one or more hardwares, software or firmware, and can store electricity
Subdata.The storage unit 42 assembles to store a random code inventory R4And the first part P of numerical digit private key data4.In this implementation
In example, random code inventory L4It is received from the random code generation device 1, and includes one or more random codes being randomly generated
R4, in the present embodiment, random code inventory L4It is uniquely corresponding to the client and is identical to random code inventory L2.The random code
R4A part be not labeled, the random code R4Another part be labeled.In the present embodiment, random code R4It is labeled
Mode can be and be marked as having used.In the present embodiment, the second part P of numerical digit private key data4And the numerical digit private key
The first part P of data2A private key for being uniquely corresponding to the client can be collectively constituted, in other words, the of numerical digit private key data
Two part P4It can be the first part P for being different from the numerical digit private key data for the private key for being uniquely corresponding to the client2It is another
Part.
In the present embodiment, the first part P of the numerical digit private key data2It can be and the client is sent to by the servomechanism 2
End device 4.In other embodiments, client dress can be sent to by other electronic devices for being different from the servomechanism 2
4 are set, such as belongs to third-party electronic device.
43 data connection of the processing unit communication module 41 and the storage unit 42.The processing unit 43 may include fortune
Calculate module 431 and stamped signature module 432.The computing module 431 and stamped signature module 432 respectively may include one or more hardwares,
The electronic module of software or firmware.The computing module 431 and stamped signature module 432 can be the same hardware.
The computing module 431 of the processing unit 43 assembles to be stored in not marked for the storage unit 42 determining
It is denoted as used random code R2Quantity less than a predetermined value when, transmission one random code request to the random code generation device 1,
And it receives from the random code generation device 1 by the communication module 41 in response to should be with caused by random code request
When machine code inventory, store the random code inventory, will before receiving the random code inventory stored random code (such as random code
R4) be labeled as having used.
The computing module 431 of the processing unit 43 also assembles to transmit a stamped signature by the communication module 41 and request to this
Servomechanism 2.The computing module 431 of the processing unit 43 also assembles to receive by the communication module 41 from the servo
When the stamped signature of device 2 is replied, according to the coding, random code R used in the servomechanism 2 is calculated2, the numerical digit of the encryption it is private
The second part P of key data2, the coding generation time and the Hash Value, and the random code R according to used in the servomechanism 22、
The second part P of the numerical digit private key data of the encryption2, the coding generation time calculate one with reference to Hash Value.
The computing module 431 of the processing unit 43 also assembles determining the random code used in the servomechanism 2
R2Be matched be stored in the storage unit 42 be not labeled as used random code R4One of them, and determine the reference
Hash Value is identical to the Hash Value, and when determining current time within an effective time according to the coding generation time, utilizes
Random code R used in the servomechanism 22To the second part P of the numerical digit private key data2Decryption.The stamped signature of the processing unit 43
Module 432 and second part P according to the numerical digit private key data2With the first part P of the numerical digit private key data4Generate a private key
To carry out numerical digit stamped signature to a target data.The time interval that effective time can calculate backward for coding generation time, can also
To be the period of designated date.For example, in a situation, coding generation time is 3 days 15: 30 April in 2019
Point, effective time be on the same day 15 points 40 minutes, in this case, effective time be encode generation time calculate backward 10
Minute.
It is worth noting that by determining that this is identical to the Hash Value with reference to Hash Value, can be confirmed coding generation time,
Random code R used in the servomechanism 21And the second part P of the numerical digit private key data of the encryption1It is complete and is not altered
Change.By the timeliness for confirming that the current time can ensure that data within an effective time.
In the present embodiment, the computing module 431 of the processing unit 43 also assembles to be made determining the servomechanism 2
Random code R2Be matched be stored in the storage unit 42 be not labeled as used random code R4When, it will be stored in
The matched random code R of the storage unit 424Labeled as having used.
It is worth noting that through by used random code R2And random code R4Labeled as having used, once it is previously used
Random code R2It outflows and is comprised in the stamped signature emitted by puppet a reply, which is receiving the pseudo- label emitted
When Zhang Huifu, numerical digit stamped signature can not be also executed, in this way, can lifting system safety.
It is worth noting that in the present embodiment servomechanism 2 using be stored in the servomechanism 2 random code inventory L2 and
Not labeled random code R2It is to use in order, and the client terminal device 4 is also to compare to be stored in order when one of them
The not labeled random code R of the storage unit 424It is to be matched with the random code used in the servomechanism 2 with the presence or absence of one
R2, and all random code R of entire random code inventory L4 need not be compared4, in this way, calculation resources can be saved effectively.Other real
It applies in aspect, servomechanism 2 is using the random code inventory L2 for being stored in the servomechanism 2 and labeled random code R2Wherein one
When person, it can be and randomly use.
In other state sample implementations, stamped signature reply can be stored in the servomechanism 2 according to used in the servomechanism 2
And it is not labeled as used random code R2The second part P of one of them and numerical digit private key data1It generates.The then processing
The computing module 431 of unit 43 is being sentenced when receiving the stamped signature reply from the servomechanism 2 by the communication module 41
Make random code R used in the servomechanism 22Be matched be stored in the storage unit 42 be not labeled as it is used with
Machine code R4It, can be directly according to the second part P of the numerical digit private key data when one of them2With the number for being stored in the storage device 42
The first part P of position private key data4The private key is generated, the stamped signature module 432 of the processing unit 43 is using the private key to a target
Data carry out numerical digit stamped signature.
In other state sample implementations, which, which replys, can pass through the transmission of block chain.It is client terminal device 4, servomechanism 2, random
Code generation device 1 can be address or node on block chain, address or node i.e. its public key code name, send the address or section to
Point, i.e., only possessing the address or node private key could read.Servomechanism 2 can be by coding that the stamped signature is replied with client public affairs
Key encryption and write-in block chain, and notify client.Client terminal device 4 to block chain obtains the coding of stamped signature reply and with client
End private key decrypts the coding of stamped signature reply.
2nd shows the flow chart of an embodiment of the method with guard digit stamped signature mechanism according to the disclosure.
Firstly, such as program S201, the first part that servomechanism (such as servomechanism 2) provides numerical digit private key data (such as is counted
The first part P of position private key data4) to client terminal device (such as client terminal device 4).
Such as program S202, client terminal device stores the first part of the numerical digit private key data.
Such as program S203, client terminal device transmits stamped signature request.
Such as program S204, servomechanism receives stamped signature request.
Such as program S205, servomechanism is sequentially using a random code inventory (such as the random code inventory for being stored in the servomechanism
L2) in be not labeled as used random code (such as random code R2) one of them is to the numerical digit private key for being stored in the servomechanism
Second part (such as the second part P of numerical digit private key data of data2) encryption.
Such as program S206, servomechanism will be stored in the random code used in the servomechanism and be labeled as having used.
Such as program S207, servomechanism is using current time as a coding generation time.
Such as program S208, second of servomechanism random code used in, the encrypted numerical digit private key data
Divide and the coding generation time calculates a Hash Value (Hash Value).
Such as program S209, second of servomechanism random code used in, the encrypted numerical digit private key data
Divide, the coding generation time and the Hash Value generate a coding.
Such as program S210, servomechanism sends out a stamped signature reply comprising the coding.
Such as program S211, client terminal device receives stamped signature reply.
Such as program S212, client terminal device according to the encoding operation go out the servomechanism used in the random code, the encryption
Numerical digit private key data second part, the coding generation time and the Hash Value.
Such as program S213, the numerical digit private key number of client terminal device random code, the encryption according to used in the servomechanism
According to second part, the coding generation time calculate one with reference to Hash Value.
Such as program S214, client terminal device determines whether the random code used in the servomechanism is matched with and is stored in the visitor
A random code inventory (such as the random code inventory L of family end device4) in be not labeled as used random code (such as random code
R4) one of them, and whether this is identical to the Hash Value with reference to Hash Value, and determines current time according to the coding generation time
Whether within an effective time.
If result be it is yes, also that is, client terminal device determines the random code used in the servomechanism is matched with and is stored in
It is not labeled as used random code one of them in one random code inventory of the client terminal device, and determines this with reference to miscellaneous
Value of gathering is identical to the Hash Value, and determines current time within an effective time according to the coding generation time, and process carries out
To program S215.If the result is negative, process is carried out to program S216, and process terminates.
In the present embodiment, in Yu Chengxu S215, which will be stored in the matched of the client terminal device should
Random code is labeled as having used.
In program S217, client terminal device is using the random code used in the servomechanism to the of the numerical digit private key data
The decryption of two parts.
In program S218, the client terminal device is according to the second part of the numerical digit private key data and is stored in the client
First part (such as the first part P of numerical digit private key data of the numerical digit private key data of device4) private key is generated to a mesh
It marks data and carries out numerical digit stamped signature.
3rd shows the process of another embodiment of the method with guard digit stamped signature mechanism according to the disclosure
Figure.The present embodiment can be executed by establishing one mutually communicated local end device with a far end device.Local side dress
It sets and can be a servomechanism (such as servomechanism 2), or other electronic devices.The far end device can be a client dress
It sets (client terminal device 4), or other electronic devices.
Firstly, local end device (such as servomechanism 2) provides first part's (example of numerical digit private key data such as program S301
Such as the first part P of numerical digit private key data4) to far end device (such as client terminal device 4).
Such as program S302, far end device stores first part (such as the of numerical digit private key data of the numerical digit private key data
A part of P4)。
Such as program S303, far end device transmits stamped signature request.
Such as program S304, local end device receives stamped signature request.
Such as program S305, local end device uses a random code inventory (such as the random code for being stored in the local end device
Inventory L2) in be not labeled as used random code (such as random code R2) one of them.
Such as program S306, local end device will be stored in the random code used in the local end device and be labeled as having made
With.
Such as program S307, local end device random code used in and the numerical digit for being stored in the local end device
The second part of private key data generates a stamped signature and replys.
Such as program S308, local end device sends out stamped signature reply.
Such as program S309, far end device receives stamped signature reply.
Such as program S310, far end device determines whether the random code used in the local end device is matched with and is stored in this
A random code inventory (such as the random code inventory L of far end device4) in be not labeled as used random code (such as random code
R4) one of them.
If result be it is yes, also that is, far end device, which determines the random code used in the local end device, is matched with storage
It is not labeled as used random code one of them in a random code inventory of the far end device, process is carried out to program
S311.If the result is negative, process is carried out to program S313, and process terminates.
In the present embodiment, in Yu Chengxu S311, the far end device by be stored in the far end device matched this is random
Code labeling is to have used.
In program S312, the far end device is according to the second part of the numerical digit private key data and is stored in the far end device
First part (such as the first part P of numerical digit private key data of numerical digit private key data4) private key is generated to a target data
Carry out numerical digit stamped signature.
In conclusion the client terminal device 4 (or far end device) is previously stored with the first part of a numerical digit private key data
P4, and the second part P of the numerical digit private key data from servomechanism 2 (or local end device) can be utilized2And private key is generated to carry out
Stamped signature, in this way, do not need to give private key to client using the memory element of entity, without spend transport entity memory element when
Between;In addition, the client terminal device 4 (or far end device) must not only obtain the numerical digit from the servomechanism 2 (or local end device)
The second part P of private key data2, it is necessary to it is stored with labeled and is matched with the servomechanism 2 (or local end device) and is made
Random code R2Random code R4Numerical digit stamped signature could be executed, in this way, can lifting system safety.
The foregoing is merely illustratives, rather than are restricted person.Any spirit and scope without departing from the disclosure, and to it
The equivalent modifications or change of progress are intended to be limited solely by rear attached claim.
Only as described above, the only preferred embodiment of the disclosure, when cannot be limited with this disclosure implementation model
It encloses, i.e., all still belongs to this public affairs according to simple equivalent changes and modifications made by disclosure claim and open description generally
It opens in the range of patent covers.In addition any embodiment of the disclosure or claim are not necessary to reach whole disclosed by the disclosure
Purpose or advantage or feature.It is used in addition, abstract part and title are intended merely to auxiliary patent document search, is not used to limit
The interest field of the disclosure.
Claims (14)
1. a kind of method with guard digit stamped signature mechanism, which is characterized in that the method includes:
The first part of numerical digit private key data is provided to client terminal device;
Servomechanism is when receiving the stamped signature request from the client terminal device, sequentially using the random code for being stored in the servomechanism
Used random code one of them is not labeled as in inventory to second of the numerical digit private key data for being stored in the servomechanism
Divide encryption, and using current time as coding generation time, and according to the used random code, the encrypted numerical digit private key
The second part of data and the coding generation time calculate Hash Value (Hash Value);
Servomechanism random code used in, the second part of the encrypted numerical digit private key data, the coding generate
Time and the Hash Value generate coding, and the stamped signature reply comprising the coding is sent out;
Wherein, when which receives the stamped signature and replys, according to the encoding operation go out the servomechanism used in this is random
Code, the encryption numerical digit private key data second part, the coding generation time and the Hash Value, and made according to the servomechanism
The random code, the second part of the numerical digit private key data of the encryption, the coding generation time are calculated with reference to Hash Value;
Wherein, which is stored in the client terminal device determining the random code used in the servomechanism and be matched with
Random code inventory in be not labeled as used random code one of them, and determine this to be identical to this miscellaneous with reference to Hash Value
When gathering value, and determining current time within effective time according to the coding generation time, using should used in the servomechanism
Random code decrypts the second part of the numerical digit private key data, and according to the second part of the numerical digit private key data and is stored in this
The first part of the numerical digit private key data of client terminal device generates private key to carry out numerical digit stamped signature to target data.
2. the method as described in claim 1, which is characterized in that
The servomechanism is stored in the servomechanism random code inventory in use and is not labeled as used random code wherein one
When person, it will also be stored in the random code used in the servomechanism and be labeled as having used;
Client terminal device random code used in determine be matched be stored in the client terminal device the random code it is clear
When being not labeled as used random code one of them of list, will also be stored in matched random code of the client terminal device
Labeled as having used.
3. the method as described in claim 1, which is characterized in that also include:
The servomechanism and the client terminal device one of them determine be stored in the servomechanism and the client terminal device this its
When the quantity for being not labeled as used random code of middle one is less than predetermined value, transmission random code requests to random code to generate
Device is watched so that the random code generation device will request generated random code list synchronization to be sent to this in response to the random code
Take device and the client terminal device;And
The servomechanism and the client terminal device store institute when receiving the random code inventory from the random code generation device
The received random code inventory, and stored random code will be labeled as having used before receiving the random code inventory.
4. a kind of system with guard digit stamped signature mechanism, which is characterized in that the system includes:
Client terminal device, is stored with the first part of random code inventory and numerical digit private key data, and assembles to transmit stamped signature request;
Servomechanism is stored with the second part of random code inventory and numerical digit private key data, assembles and the client terminal device data
Connection, and when receiving the stamped signature request from the client terminal device, using current time as coding generation time, sequentially
Using the random code inventory for being stored in the servomechanism and labeled random code one of them to the numerical digit private key data the
Two Partial encryptions, and produced according to the used random code, the second part of the encrypted numerical digit private key data and coding
Raw temporal calculation goes out a Hash Value (Hash Value), and according to the used random code, the encrypted numerical digit private key number
According to second part, the coding generation time and the Hash Value generate coding, the stamped signature reply comprising the coding is sent out;
Wherein, which also assembles to receive the stamped signature and reply, and according to the coding, calculates the servomechanism and used
The random code, the encryption numerical digit private key data second part, the coding generation time and the Hash Value, and watched according to this
It takes the random code used in device, the second part of the numerical digit private key data of the encryption, the coding generation time and calculates reference
Hash Value;
Wherein, which also assembles to be stored in the visitor determining the random code used in the servomechanism and be matched with
It is not labeled as used random code one of them in the random code inventory of family end device, and determines this with reference to Hash Value
When being identical to the Hash Value, and determining current time within effective time according to the coding generation time, the servomechanism is utilized
The used random code decrypts the second part of the numerical digit private key data, and according to the second part of the numerical digit private key data
Private key is generated with the first part of the numerical digit private key data to carry out numerical digit stamped signature to target data.
5. system as claimed in claim 4, which is characterized in that
The servomechanism also assembles to store in the servomechanism when being not labeled as used random code one of them in use,
Also the used random code for being stored in the servomechanism is labeled as having used;
The client terminal device, which also assembles to be matched with come the random code used in determining, is stored in the client terminal device not
When being marked as used random code, also the matched random code for being stored in the client terminal device is labeled as having used.
6. system as claimed in claim 4, which is characterized in that include also random code generation device, with the servomechanism and the visitor
Family end device one of them data connection, group, which is used in, to be received from this of the servomechanism and the client terminal device wherein one
When the random code request of person, random code inventory is generated, and by generated random code synchronous driving to the servomechanism and the client
End device;
Wherein, the one of them of the servomechanism and the client terminal device also assemble come determine be stored in the servomechanism and should
When the quantity for being not labeled as used random code of the one of them of client terminal device is less than predetermined value, it is random to transmit this
Code is requested to the random code generation device;
Wherein, the servomechanism and the client terminal device also assemble to receive the random code inventory from the random code generation device
When, the received random code inventory of storage institute, and stored random code will be labeled as before receiving the random code inventory
It uses.
7. a kind of servomechanism, which is characterized in that the servomechanism includes:
Communication module;
Storage unit assembles to store the second part of a random code inventory and numerical digit private key data;And
Processing unit, the data connection communication module and the storage unit are assembled and are received by the communication module from client
The stamped signature of end device is requested, the random code one of them not being labeled in the middle using the random code inventory for being stored in the servomechanism,
And label are generated according at least to the second part of the used random code and the numerical digit private key data for being stored in the storage unit
Zhang Huifu, and transmit the stamped signature by the communication module and reply, so that client terminal device production when receiving the stamped signature and replying
Raw private key is to carry out numerical digit stamped signature to target data;
Wherein, which is to be stored in by the client terminal device determining the random code used in the servomechanism and be matched with
In the random code inventory of the client terminal device not labeled random code one of them when, utilize the of the numerical digit private key data
The first part of two parts and the numerical digit private key data for being stored in the client terminal device and generate.
8. servomechanism as claimed in claim 7, which is characterized in that
Wherein, the random code which is not labeled in using the random code inventory for being stored in the storage unit is wherein
When one, the used random code for being stored in the storage unit is also marked:
Wherein, the private key be by the client terminal device determine the random code used be matched be stored in the client dress
When the random code one of them not being labeled in the random code inventory set, label is stored in the matched of the client terminal device should
Random code, and utilize the second part of the numerical digit private key data and the first of the numerical digit private key data for being stored in the client terminal device
Partially generate.
9. servomechanism as claimed in claim 7, which is characterized in that
The processing unit assembles predetermined to be less than in the quantity for determining the not labeled random code for being stored in the storage unit
It when value, requests by communication module transmission random code to random code generation device, so that the random code generation device will be responded
Random code list synchronization caused by requesting in the random code is sent to the servomechanism and the client terminal device;And
The processing unit assembles come when receiving the random code inventory from the random code generation device by the communication module,
The received random code inventory of storage institute, and mark the stored random code before receiving the random code inventory.
10. servomechanism as claimed in claim 7, which is characterized in that
The processing unit is assembled when generating stamped signature reply,
Using current time as coding generation time,
It is encrypted according to second part of the selected random code to the numerical digit private key data,
It is calculated according to the selected random code, the second part of the encrypted numerical digit private key data and the coding generation time
Hash Value (Hash Value), and
According to the used random code, the second part of the encrypted numerical digit private key data, the coding generation time and it is somebody's turn to do
Hash Value generates a coding, and it includes the coding which, which replys,;
Wherein, which is by the client terminal device when receiving the stamped signature reply from the server-side, according to the volume
Code, calculate the selected random code, the encryption numerical digit private key data second part, the coding generation time and the hash
Value, and calculated according to the used random code, the second part of the numerical digit private key data of the encryption, the coding generation time
One refers to Hash Value, and is stored in the random code inventory of the client terminal device determining the selected random code and being matched with and works as
In not labeled random code one of them, and determine this and be identical to the Hash Value with reference to Hash Value, and produced according to the coding
When the raw time determines current time within effective time, using the used random code to the second of the numerical digit private key data
Part is decrypted, and utilizes the of the second part of the numerical digit private key data and the numerical digit private key data for being stored in the client terminal device
A part and generate.
11. a kind of method with guard digit stamped signature mechanism, which is characterized in that the method includes:
The first part of numerical digit private key data is provided to far end device;
Receive the numerical digit stamped signature request from the far end device;
The random code one of them not being labeled in the middle using the random code inventory for being stored in local end device, and according at least to institute
The random code that uses and the second part for being stored in the numerical digit private key data generate stamped signature and reply;And
Transmit the stamped signature reply so that the client terminal device receive the stamped signature reply when generate private key with to target data into
Line number position stamped signature;
Wherein, the private key be by the client terminal device determine the random code used be matched be stored in the client dress
In the random code inventory set not labeled random code one of them when, second part using the numerical digit private key data with deposit
It is stored in the first part of the numerical digit private key data of the client terminal device and generates.
12. method as claimed in claim 11, which is characterized in that
Wherein, the random code one of them not being labeled in using the random code inventory for being stored in the local end device
When, also mark the used random code for being stored in the local end device;
Wherein, which is to be stored in the far end device determining the random code used and be matched with by the far end device
In one random code inventory not labeled random code one of them when, label is stored in the far end device matched, and this is random
Code, and using the first part of the second part of the numerical digit private key data and the numerical digit private key data for being stored in the far end device and
It generates.
13. method as claimed in claim 11, which is characterized in that
It stores determining when the quantity of the not labeled random code of the local end device is less than predetermined value, transmits random code
Request is to random code generation device, so that the random code generation device will request generated random code clear in response to the random code
Single synchronous driving is to the local end device and the far end device;And
For the local end device when receiving the random code inventory from the random code generation device, storage institute is received should be with
Machine code inventory, and mark the stored random code before receiving the random code inventory.
14. method as claimed in claim 11, which is characterized in that
Wherein, when generating stamped signature reply,
It is encrypted using second part of the selected random code to the numerical digit private key data,
Using current time as coding generation time,
It is calculated according to the selected random code, the second part of the encrypted numerical digit private key data and the coding generation time
Hash Value (Hash Value), and
According to the used random code, the second part of the encrypted numerical digit private key data, the coding generation time and it is somebody's turn to do
Hash Value generates coding, and it includes the coding which, which replys,;
Wherein, the private key be by the far end device when receiving the stamped signature from the server-side and replying, according to the coding,
Second part, the coding generation time and Hash Value of the numerical digit private key data of the random code, the encryption selected by calculating,
And ginseng is calculated according to the used random code, the second part of the numerical digit private key data of the encryption, the coding generation time
Examine Hash Value, and determine the selected random code be matched in the random code inventory for being stored in the far end device not by
The random code one of them of label, and determine this and be identical to the Hash Value with reference to Hash Value, and according to the coding generation time
When determining current time within effective time, using the random code used in the local end device to the numerical digit private key data
Second part decryption, and utilize the second part of the numerical digit private key data and the numerical digit private key data for being stored in the far end device
First part and generate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910248780.4A CN110011808B (en) | 2019-03-29 | 2019-03-29 | Method and system with mechanism for protecting digital signature and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910248780.4A CN110011808B (en) | 2019-03-29 | 2019-03-29 | Method and system with mechanism for protecting digital signature and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110011808A true CN110011808A (en) | 2019-07-12 |
CN110011808B CN110011808B (en) | 2021-10-15 |
Family
ID=67168854
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910248780.4A Active CN110011808B (en) | 2019-03-29 | 2019-03-29 | Method and system with mechanism for protecting digital signature and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110011808B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113688360A (en) * | 2020-05-18 | 2021-11-23 | 天逸财金科技服务股份有限公司 | Distributed digital signature processing method and system thereof |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW427087B (en) * | 1999-05-14 | 2001-03-21 | Qic Systems Corp | Full domain key recovering system |
US6681214B1 (en) * | 1999-06-29 | 2004-01-20 | Assure Systems, Inc. | Secure system for printing authenticating digital signatures |
CN101488214A (en) * | 2008-01-15 | 2009-07-22 | 中国科学院软件研究所 | Method for expanding anti-fake digital watermark and electronic seal information content |
TW201310958A (en) * | 2011-08-25 | 2013-03-01 | Mxtran Inc | Method and storage device for protecting digital content |
CN104052601A (en) * | 2013-12-30 | 2014-09-17 | 国家电网公司 | Secret key isolation signcryption method |
TWI555370B (en) * | 2015-06-18 | 2016-10-21 | Univ Chaoyang Technology | Digital signature method |
CN106899413A (en) * | 2017-04-07 | 2017-06-27 | 深圳奥联信息安全技术有限公司 | Digital signature authentication method and system |
-
2019
- 2019-03-29 CN CN201910248780.4A patent/CN110011808B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW427087B (en) * | 1999-05-14 | 2001-03-21 | Qic Systems Corp | Full domain key recovering system |
US6681214B1 (en) * | 1999-06-29 | 2004-01-20 | Assure Systems, Inc. | Secure system for printing authenticating digital signatures |
CN101488214A (en) * | 2008-01-15 | 2009-07-22 | 中国科学院软件研究所 | Method for expanding anti-fake digital watermark and electronic seal information content |
TW201310958A (en) * | 2011-08-25 | 2013-03-01 | Mxtran Inc | Method and storage device for protecting digital content |
CN104052601A (en) * | 2013-12-30 | 2014-09-17 | 国家电网公司 | Secret key isolation signcryption method |
TWI555370B (en) * | 2015-06-18 | 2016-10-21 | Univ Chaoyang Technology | Digital signature method |
CN106899413A (en) * | 2017-04-07 | 2017-06-27 | 深圳奥联信息安全技术有限公司 | Digital signature authentication method and system |
Non-Patent Citations (1)
Title |
---|
黄敏等: "基于数字签名和数字水印技术的电子签章算法研究", 《河北工业科技》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113688360A (en) * | 2020-05-18 | 2021-11-23 | 天逸财金科技服务股份有限公司 | Distributed digital signature processing method and system thereof |
CN113688360B (en) * | 2020-05-18 | 2024-02-09 | 天逸财金科技服务股份有限公司 | Distributed digital signature processing method and system thereof |
Also Published As
Publication number | Publication date |
---|---|
CN110011808B (en) | 2021-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190034923A1 (en) | Secure and confidential custodial transaction system, method and device using zero-knowledge protocol | |
EP2695354B1 (en) | Method and system for authenticating entities by means of terminals | |
US20050203966A1 (en) | Opinion registering application for a universal pervasive transaction framework | |
CN107077670A (en) | Transaction message is sent | |
CN105453483A (en) | Image based key derivation function | |
CN105096134A (en) | Security scheme for authenticating digital entities and aggregate object origins | |
CN111523891A (en) | Block chain based information encryption method, device, equipment and storage medium | |
CN112073440B (en) | Internet of things information recording method and system | |
CN112804218B (en) | Block chain-based data processing method, device, equipment and storage medium | |
CN114329527A (en) | Intersection data acquisition method, equipment and system | |
CN104463647A (en) | Electronic invoice-based electronic posting method and system and electronic invoice client | |
CN114124502B (en) | Message transmission method, device, equipment and medium | |
CN114389889B (en) | File full life cycle management method and device based on block chain technology | |
JP2014011762A (en) | Information processing apparatus, terminal device, information processing system, method for information processing, and computer program | |
CN110634072B (en) | Block chain transaction system based on multi-signature and hardware encryption | |
CN100542087C (en) | Be used to verify the method and apparatus of the marketable securities that transmit as digital massage | |
CN103368918A (en) | Method, device and system for dynamic password authentication | |
US11943210B2 (en) | System and method for distributed, keyless electronic transactions with authentication | |
CN109726578A (en) | A kind of anti-fake solution of novel dynamic two-dimension code | |
CN110011808A (en) | Method and system and servomechanism with guard digit stamped signature mechanism | |
US7581108B1 (en) | Method and system for generating time-based identifiers | |
KR102457915B1 (en) | Electronic vote system using smart contract of blockchain and method thereof | |
TWI695293B (en) | Method, system and server for protection mechanism of digital signature certificate | |
CN104868994A (en) | Collaboration secret key management method, device and system | |
WO2014053172A1 (en) | Method and system for securely authenticating entities |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |