CN110569672A - efficient credible electronic signature system and method based on mobile equipment - Google Patents

efficient credible electronic signature system and method based on mobile equipment Download PDF

Info

Publication number
CN110569672A
CN110569672A CN201910706230.2A CN201910706230A CN110569672A CN 110569672 A CN110569672 A CN 110569672A CN 201910706230 A CN201910706230 A CN 201910706230A CN 110569672 A CN110569672 A CN 110569672A
Authority
CN
China
Prior art keywords
signature
document
module
contract
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910706230.2A
Other languages
Chinese (zh)
Inventor
唐正荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Huluwa Network Group Co Ltd
Original Assignee
Zhejiang Huluwa Network Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Huluwa Network Group Co Ltd filed Critical Zhejiang Huluwa Network Group Co Ltd
Priority to CN201910706230.2A priority Critical patent/CN110569672A/en
Publication of CN110569672A publication Critical patent/CN110569672A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention relates to a high-efficiency credible electronic signature system and method based on mobile equipment. The system comprises a mobile terminal and a server, wherein the mobile terminal comprises a real-name authentication module, a ca certificate application module and a signature module, the server comprises a to-be-signed document input module, a to-be-signed generation module, an electronic contract generation module and a data conversion module, the to-be-signed document input module is used as an entrance for inputting contract documents, and contract contents and a confirmation contract are displayed in the module; the module for generating the signature is used for signing the document, and generating signature data to be synthesized with the document; the electronic contract generating module is arranged in the server-side background system, and the server-side background system synthesizes the signature data and the contract document to generate the electronic contract with the signature; and the data conversion module converts the data to be signed into an encrypted character string through an encryption algorithm and transmits the encrypted character string to the mobile terminal. The invention improves the use efficiency while ensuring the credibility of the signature.

Description

Efficient credible electronic signature system and method based on mobile equipment
Technical Field
The invention relates to the field of electronic signatures, in particular to a high-efficiency credible electronic signature system and method based on mobile equipment.
background
the electronic signature is a signature which is obtained by converting a handwritten signature or a seal into an electronic form through a cryptographic technique, is data which is contained in an electronic form in a data message, is attached to the data for identifying the identity of a signer and indicating that the signer approves the content of the electronic signature, and is actually an electronic code.
In recent years, with the increasing maturity and development of the mobile internet terminal market, terminal users load various applications on their intelligent terminals, and various operations of the mobile terminals are more efficient and faster.
In the mobile internet era, under the condition that society is to be developed digitally, electronic signatures are regarded as a key step of enterprise informatization, and the popularization of electronic signatures faces two major problems: efficiency and legitimacy.
In a first aspect: in the traditional technology, when a signature is required to be carried out on a piece of data, both parties or multiple parties of the signature need to carry out the signature on a server platform, so that in case that one party cannot sign the piece of data in time, low efficiency is caused, various operation processes of the society, the government and various enterprises on the upstream and downstream are caused, and manpower and material resources are wasted;
In a second aspect: most enterprises or users who just touch the electronic signature can doubtful the legal effectiveness of the electronic signature, and the electronic signature is a picture on the surface and does not have any effectiveness. However, as can be seen from the definition of the electronic signature, technical means are required to be used for showing and explaining the validity of the electronic signature to the user;
Therefore, for the above two problems, how to quickly complete signing on the mobile device and ensure legal validity of the signature is a problem existing in the prior art.
disclosure of Invention
aiming at the problems in the prior art, the invention provides a high-efficiency credible electronic signature system and method based on mobile equipment, which can convert common hand-drawn signatures or signature pictures into electronic signatures with legal effectiveness and improve the efficiency of the traditional office form.
the efficient credible electronic signature system based on the mobile equipment is characterized by comprising a mobile terminal and a server, wherein the mobile terminal comprises a real-name authentication module, a ca certificate application module and a signature module, the server comprises a to-be-signed document input module, a to-be-signed generation module, an electronic contract generation module and a data conversion module, the to-be-signed document input module is used as an entrance for inputting contract documents, and contract contents and confirmation contracts are displayed in the module; the module for generating the signature is used for signing the document, and generating signature data to be synthesized with the document; the electronic contract generating module is arranged in the server-side background system, and the server-side background system synthesizes the signature data and the contract document to generate the electronic contract with the signature; and the data conversion module converts the data to be signed into an encrypted character string through an encryption algorithm and transmits the encrypted character string to the mobile terminal.
The mobile terminal sends the user information to the real-name authentication module, the real-name authentication module completes real-name authentication and transmits the information to the server-side background system, and the background system generates a key pair and a ca certificate according to the real-name authentication information, namely, the ca certificate is issued to the requesting user. The mobile terminal identity authentication mode comprises three-element identity authentication of an identity card, four-element identity authentication of a bank card, real name authentication of a public security department, face recognition, iris authentication and the like.
the server displays the contract through a web page, the format of the contract document can be word document, Excel document, picture, webpage and text document, the server also comprises a document calculation module, and after the contract is confirmed, the document calculation module converts the contract text in the format into the document in PDF format.
the real-name authentication module is accessed to a bank system, a credit investigation system or a public security system and is used for carrying out real-name authentication on the identity information input by the user.
The ca certificate application module is arranged in the mobile terminal background system, and after the real certificate passes through, the module generates a key pair and applies for a ca certificate.
A high-efficiency credible electronic signature method based on mobile equipment is characterized in that
Step 1: the mobile terminal acquires user identity information, issues a ca certificate after performing real-name authentication on the user identity information by using the identity information of a signer, and generates a key pair to be stored in the certificate;
Step 2, the server side receives a signature request initiated by a signer, inputs a contract document, displays the contract document and confirms the document content;
Step 3, calculating the uploaded document data through an abstract algorithm after the contract is confirmed to generate ciphertext data to be signed, and transmitting the ciphertext data to the mobile terminal;
step 4, the mobile terminal initiates a request of digital signature, and analyzes corresponding data content by using a digest algorithm and an asymmetric encryption algorithm;
And 5, processing and synthesizing the ca certificate and the signature picture to form the digital signature with legal effect, wherein the synthesis is to call a signfield method to determine a signing area, and the condition for determining the signing area is that four parameters are needed, namely x and y coordinates of the lower left corner of the electronic signature and x and y coordinates of the upper right corner of the electronic signature. Calling a method setenderningmode to place the set signature picture and a ca certificate obtained by the authentication application into the determined signing area, and then synthesizing an electronic signature with the ca certificate;
and 6, signing the electronic signature synthesized with the ca certificate into a contract document and transmitting the contract document to a server.
The signing process of the step 6 is as follows:
(1) Determining four parameters of a signature area, namely x and y coordinates of the lower left corner of the electronic signature and x and y coordinates of the upper right corner of the electronic signature;
(2) the user can set the display style of the electronic signature according to the self requirement;
(3) After all the operations are set, the contract of the electronic signature and the document is completed by using a signature algorithm signDetached, namely, the electronic signature is signed on the contract document.
the invention has the beneficial effects that: the real-name authentication operation of the mobile equipment is to directly transmit user information to a real-name authentication system at the mobile equipment end, the user information, the key pair and the ca certificate are stored in the mobile equipment used by the user, and the ca certificate is issued in real time, so that the validity of the user identity is ensured, the leakage of the key pair and the tampering of the ca certificate are prevented, and the credibility of the signature is ensured.
in addition, the real-name authentication module of the mobile equipment is accessed to a nationwide safe authentication system, and the authentication modes comprise three authentication modes of an identity card, four authentication modes of a bank card, face recognition, iris authentication and the like, so that the selection of a user is facilitated while the signature is credible, and the use efficiency is improved.
after finishing signing for the first time or acquiring document data to be signed, the server side converts the data into ciphertext for transmission by using an encryption algorithm and a digest algorithm. The encryption algorithm ensures the corresponding relation of the public key and the private key and avoids the phenomenon of roof impersonation. The encryption algorithm and the digest algorithm are added together to form a digital signature with legal effectiveness, and both the encryption algorithm and the digest algorithm represent the credibility of the electronic signature.
Drawings
FIG. 1 is a block diagram of a high-efficiency trusted electronic signature system based on a mobile device according to the present invention;
FIG. 2 is a block diagram of a mobile device-based high-efficiency trusted electronic signature system according to the present invention;
fig. 3 is a flow chart of the operation steps of the efficient trusted electronic signature system based on the mobile device according to the present invention.
Detailed Description
in order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be described in detail and completely with reference to the accompanying drawings. The mobile device in the present invention is not limited to the device mentioned in the invention, and other additional mobile devices are also included, so that operations and technologies related to the field are all within the protection scope of the present invention without innovations.
The invention is described in detail below with reference to the attached drawing figures:
as shown in fig. 1 and fig. 2, the efficient trusted electronic signature system based on mobile devices of the present invention includes a mobile terminal 101 and a server 102, where the mobile terminal includes a real-name authentication module 201, a ca certificate application module 202 and a signature module 203, and the server includes a to-be-signed document input module 204, a to-be-signed generation module 206, an electronic contract generation module 207 and a data conversion module 208, where the to-be-signed document input module is used as an entry for inputting contract documents, and contract contents and confirmation contracts are displayed in the module; the module for generating the signature is used for signing the document, and generating signature data to be synthesized with the document; the electronic contract generating module is arranged in the server-side background system, and the server-side background system synthesizes the signature data and the contract document to generate the electronic contract with the signature; and the data conversion module converts the data to be signed into an encrypted character string through an encryption algorithm and transmits the encrypted character string to the mobile terminal.
The server displays the contract through a web page, the format of the contract document can be word document, Excel document, picture, webpage and text document, the server also comprises a document calculation module 205, and after the contract is confirmed, the document calculation module converts the contract text in the format into the document in PDF format.
The real-name authentication operation of the mobile terminal is to directly transmit user information to a real-name authentication system of the mobile equipment terminal, the user information, the key pair and the ca certificate are stored in the mobile equipment used by the user, and the ca certificate is issued in real time, so that the validity of the user identity is ensured, the leakage of the key pair and the falsification of the ca certificate are prevented, and the credibility of the signature is ensured.
In addition, the real-name authentication module of the mobile equipment is accessed to a nationwide safe authentication system, and the authentication modes comprise three authentication modes of an identity card, four authentication modes of a bank card, face recognition, iris authentication and the like, so that the selection of a user is facilitated while the signature is ensured to be credible, and the use efficiency is improved.
In the above embodiment, after the server finishes signing for the first time or acquires document data to be signed, the server needs to use an encryption algorithm and a digest algorithm to convert the data into a ciphertext for transmission. The encryption algorithm is an asymmetric encryption algorithm, which requires two keys: public keys (public keys for short) and private keys (private keys for short). The public key and the private key are a pair, and if data is encrypted by the public key, the data can be decrypted only by the corresponding private key. This algorithm is called asymmetric encryption algorithm because two different keys are used for encryption and decryption.
The basic process of realizing confidential information exchange by the asymmetric encryption algorithm is as follows: the first party generates a pair of secret keys and discloses the public keys, and other roles (the second party) needing to send information to the first party encrypt the confidential information by using the secret keys (the public keys of the first party) and then send the encrypted confidential information to the first party; the first party decrypts the encrypted information by using the private key of the first party. The method is characterized in that when the party A wants to reply to the party B, the opposite is true, the public key of the party B is used for encrypting data, and similarly, the party B uses the private key of the party B for decrypting. The encryption algorithm ensures the corresponding relation of the public key and the private key and avoids the phenomenon of roof impersonation.
Digest algorithm the main feature of the message digest algorithm is that no key is required for the encryption process, and the encrypted data cannot be decrypted, and currently, only the CRC32 algorithm is used for the reverse decryption, and only the same plaintext data is input and the same message digest algorithm is used to obtain the same ciphertext.
The message digest algorithm has no key management and distribution problem, and is suitable for use in distributed network. Since the encryption calculation is quite heavy, the algorithm of the past is usually only used for encryption under the condition of limited data quantity, for example, the password of a computer is encrypted by using an irreversible encryption algorithm. In recent years, with the rapid improvement of computer performance, the encryption speed is no longer a limitation to the development of such encryption technology, and thus the field of application of message digest algorithms is increasing. The abstract algorithm ensures that the document data is transmitted in a ciphertext mode in the transmission process, the document data is not easy to be falsified, and the integrity and the authenticity of the document data are ensured.
The encryption algorithm and the digest algorithm are added together to form a digital signature with legal effectiveness, and both the encryption algorithm and the digest algorithm represent the credibility of the electronic signature.
Fig. 3 shows a signature method of the present invention, which comprises the following steps:
step 1, mobile equipment acquires user identity information, issues a ca certificate after real-name authentication of the user identity information by using the identity information of a signer, and generates a key pair to be stored in the certificate;
Step 2, the server side receives a signature request initiated by a signer, inputs a contract document, displays the contract document and confirms the document content;
Step 3, calculating the uploaded document data through an abstract algorithm after the contract is confirmed to generate ciphertext data to be signed, and transmitting the ciphertext data to the mobile terminal;
Step 4, the mobile terminal initiates a request of digital signature, and analyzes corresponding data content by using a digest algorithm and an asymmetric encryption algorithm;
and 5, processing the ca certificate and the timestamp technology simultaneously with the signature picture to form the digital signature with legal effect, wherein the synthesis comprises the step of calling a signfield method to determine a signing area, and the condition for determining the signing area is that four parameters are needed, namely x and y coordinates of the lower left corner of the electronic signature and x and y coordinates of the upper right corner of the electronic signature. Calling a method setenderningmode to place the set signature picture and a ca certificate obtained by the authentication application into the determined signing area, and then synthesizing an electronic signature with the ca certificate; and signing the electronic signature synthesized with the ca certificate into a contract document and transmitting the contract document to a server.
after the server finishes a signing process or sends a file of data to be signed, the file needs to be transmitted to the mobile terminal again.
Firstly, a digest algorithm (hash function) is used for converting a data plaintext to be signed into a string of 256-bit hash character string, then the digest value is encrypted by a private key of a symmetric encryption algorithm of a signal source, a receiver firstly digests the received plaintext by the same digest algorithm to form an 'quasi-signature body', then the quasi-signature body is compared with a 'signature body' decrypted by a public key of the signal source, if the two are identical, the message is considered to be complete, the sign is that the file can be signed, otherwise, the file is prompted to be tampered and not to be signed.
there are many kinds of digest algorithms, and the digest algorithm is characterized in that the length of a calculated message digest is always fixed regardless of the length of an input message. For example, a message digested with the MD5 algorithm has 128 bits of currency, a message digested with the SHA-1 algorithm has a final 160-bit output, and variations of SHA-1 can produce message digests of 192 bits and 256 bits. It is generally accepted that the longer the final output of the digest, the more secure the digest algorithm is, thus ensuring the complete trustworthiness of the document after the last signing.
Opening the document with the digital signature in a platform corresponding to the server, displaying the electronic signature, and clicking an electronic signature area to display detailed information of the electronic signature, including an owner of the signature and detailed information of a timestamp; in popular terms, the traditional signature is used in the past, and whether the stamped seal pattern is consistent with the original seal or not is judged mainly through visual comparison, so that the authenticity of the signature is determined. After the electronic signature technology is used, the signature/signature picture is converted into a tamper-proof data telegraph text with a time stamp technology, and the two signing parties can easily verify the identity and signature of each signing party on the internet at any time.
Acquiring identity information of a user, acquiring a signature of the user, issuing a ca certificate, and processing the ca certificate and a signature picture through cryptographic technology to form an electronic signature with legal effect; all operations are completed at the mobile terminal, the receiver can open the data with the signature of the server initiator at any idle time and then return the data to the server after signing is completed at the mobile terminal, so that the data signing time is greatly saved, and the office efficiency is improved.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media having computer-usable program code embodied in the medium.

Claims (7)

1. A high-efficiency credible electronic signature system based on mobile equipment is characterized by comprising a mobile terminal and a server terminal, wherein the mobile terminal comprises a real-name authentication module, a ca certificate application module and a signature module, the server terminal comprises a document input module to be signed, a module for generating a signature, a module for generating an electronic contract and a data conversion module, the document input module to be signed is used as an inlet for inputting a contract document, and contract contents and a confirmation contract are displayed on the module; the module for generating the signature is used for signing the document, and generating signature data to be synthesized with the document; the electronic contract generating module is arranged in the server-side background system, and the server-side background system synthesizes the signature data and the contract document to generate the electronic contract with the signature; and the data conversion module converts the data to be signed into an encrypted character string through an encryption algorithm and transmits the encrypted character string to the mobile terminal.
2. The system according to claim 1, wherein the server displays the contract through a web page, the contract document can be input in a format selected from the group consisting of a word document, an Excel document, a picture, a web page, and a text document, and the server further comprises a document calculation module, and after the contract is confirmed, the document calculation module converts the contract text in the format into a document in a PDF format.
3. The system according to claim 2, wherein the real-name authentication module is an access banking system, a credit investigation system or a public security system, and is configured to perform real-name authentication on the identity information input by the user.
4. The system according to claim 3, wherein the ca certificate application module is built in the mobile terminal background system, and after passing the real authentication name, the module generates a key pair and applies for a ca certificate.
5. The system according to claim 1, wherein the mobile terminal comprises a smart phone, a tablet computer, a PDA, or a hand-drawn signature panel.
6. A high-efficiency credible electronic signature method based on mobile equipment is characterized in that
step 1: the mobile terminal acquires user identity information, issues a ca certificate after performing real-name authentication on the user identity information by using the identity information of a signer, and generates a key pair to be stored in the certificate;
Step 2, the server side receives a signature request initiated by a signer, inputs a contract document, displays the contract document and confirms the document content;
step 3, calculating the uploaded document data through an abstract algorithm after the contract is confirmed to generate ciphertext data to be signed, and transmitting the ciphertext data to the mobile terminal;
Step 4, the mobile terminal initiates a request of digital signature, and analyzes corresponding data content by using a digest algorithm and an asymmetric encryption algorithm;
and 5, processing and synthesizing the ca certificate and the signature picture to form the digital signature with legal effect, wherein the synthesis is to call a signfield method to determine a signing area, and the condition for determining the signing area is that four parameters are needed, namely x and y coordinates of the lower left corner of the electronic signature and x and y coordinates of the upper right corner of the electronic signature. Calling a method setenderningmode to place the set signature picture and a ca certificate obtained by the authentication application into the determined signing area, and then synthesizing an electronic signature with the ca certificate; and signing the electronic signature synthesized with the ca certificate into a contract document and transmitting the contract document to a server.
7. The efficient trusted electronic signature method based on mobile device as claimed in claim 6, wherein said signing process of step 5 is as follows:
(1) Determining four parameters of a signature area, namely x and y coordinates of the lower left corner of the electronic signature and x and y coordinates of the upper right corner of the electronic signature;
(2) The user can set the display style of the electronic signature according to the self requirement;
(3) After all the operations are set, the contract of the electronic signature and the document is completed by using a signature algorithm signDetached, namely, the electronic signature is signed on the contract document.
CN201910706230.2A 2019-08-01 2019-08-01 efficient credible electronic signature system and method based on mobile equipment Pending CN110569672A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910706230.2A CN110569672A (en) 2019-08-01 2019-08-01 efficient credible electronic signature system and method based on mobile equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910706230.2A CN110569672A (en) 2019-08-01 2019-08-01 efficient credible electronic signature system and method based on mobile equipment

Publications (1)

Publication Number Publication Date
CN110569672A true CN110569672A (en) 2019-12-13

Family

ID=68773979

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910706230.2A Pending CN110569672A (en) 2019-08-01 2019-08-01 efficient credible electronic signature system and method based on mobile equipment

Country Status (1)

Country Link
CN (1) CN110569672A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177801A (en) * 2019-12-31 2020-05-19 航天信息股份有限公司 Signature method and device of electronic document, storage medium and electronic equipment
CN111222172A (en) * 2019-12-25 2020-06-02 航天信息股份有限公司 Electronic signature method and system for mobile terminal based on face real-name authentication protection
CN111898558A (en) * 2020-08-03 2020-11-06 西南大学 Multi-signature protection and identification method for multi-dimensional encryption and hiding sequence
CN112580111A (en) * 2020-12-28 2021-03-30 杭州天谷信息科技有限公司 Electronic signature method and system with signing time

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105323062A (en) * 2014-06-03 2016-02-10 北京收付宝科技有限公司 Mobile terminal digital certificate electronic signature method
CN107122645A (en) * 2017-04-20 2017-09-01 深圳法大大网络科技有限公司 Electronic contract signature system and method based on mobile terminal and Quick Response Code
CN108900303A (en) * 2018-09-25 2018-11-27 甘肃万维信息技术有限责任公司 A method of it signs electronically online
CN108932413A (en) * 2017-05-22 2018-12-04 腾讯科技(北京)有限公司 A kind of digital signature generation method, device and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105323062A (en) * 2014-06-03 2016-02-10 北京收付宝科技有限公司 Mobile terminal digital certificate electronic signature method
CN107122645A (en) * 2017-04-20 2017-09-01 深圳法大大网络科技有限公司 Electronic contract signature system and method based on mobile terminal and Quick Response Code
CN108932413A (en) * 2017-05-22 2018-12-04 腾讯科技(北京)有限公司 A kind of digital signature generation method, device and storage medium
CN108900303A (en) * 2018-09-25 2018-11-27 甘肃万维信息技术有限责任公司 A method of it signs electronically online

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111222172A (en) * 2019-12-25 2020-06-02 航天信息股份有限公司 Electronic signature method and system for mobile terminal based on face real-name authentication protection
CN111177801A (en) * 2019-12-31 2020-05-19 航天信息股份有限公司 Signature method and device of electronic document, storage medium and electronic equipment
CN111177801B (en) * 2019-12-31 2023-01-10 航天信息股份有限公司 Signature method and device of electronic document, storage medium and electronic equipment
CN111898558A (en) * 2020-08-03 2020-11-06 西南大学 Multi-signature protection and identification method for multi-dimensional encryption and hiding sequence
CN111898558B (en) * 2020-08-03 2022-03-15 西南大学 Multi-signature protection and identification method for multi-dimensional encryption and hiding sequence
CN112580111A (en) * 2020-12-28 2021-03-30 杭州天谷信息科技有限公司 Electronic signature method and system with signing time

Similar Documents

Publication Publication Date Title
US8122255B2 (en) Methods and systems for digital authentication using digitally signed images
CN110569672A (en) efficient credible electronic signature system and method based on mobile equipment
CN109583219A (en) A kind of data signature, encryption and preservation method, apparatus and equipment
US20050039016A1 (en) Method for using trusted, hardware-based identity credentials in runtime package signature to secure mobile communications and high-value transaction execution
CN112487778A (en) Multi-user online signing system and method
CN109614802B (en) Anti-quantum-computation signature method and signature system
CN112232814B (en) Encryption and decryption methods of payment key, payment authentication method and terminal equipment
CN112801663B (en) Blockchain certification method, device, system, equipment and medium
CN109600228B (en) Anti-quantum-computation signature method and system based on public key pool
CN109889495B (en) Quantum computation resistant electronic seal method and system based on multiple asymmetric key pools
CN110826109A (en) Penetrating signature method suitable for PDF document
CN113438088A (en) Social network credit monitoring method and device based on block chain distributed identity
US11070378B1 (en) Signcrypted biometric electronic signature tokens
CN116226289A (en) Electronic certificate management method, device, equipment and storage medium based on blockchain
CN109586918B (en) Anti-quantum-computation signature method and signature system based on symmetric key pool
CN104899737A (en) Fingerprint IRLRD characteristic encryption method, and mobile payment system and method based on encryption method
CN114268447B (en) File transmission method and device, electronic equipment and computer readable medium
CN113434882A (en) Communication protection method and device of application program, computer equipment and storage medium
CN112529537A (en) Patent licensing method, device, equipment and storage medium based on block chain
CN111681141A (en) File authentication method, file authentication device and terminal equipment
CN109586917B (en) Anti-quantum-computation signature method and system based on asymmetric key pool
CN115085934A (en) Contract management method based on block chain and combined key and related equipment
Sangeetha et al. Development of novel blockchain technology for certificate management system using cognitive image steganography techniques
Penubadi et al. Sustainable electronic document security: a comprehensive framework integrating encryption, digital signature and watermarking algorithms
Saquib et al. Secure solution: One time mobile originated PKI

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191213