CN111178010A - Method and system for displaying digital signature, data editing method and terminal - Google Patents
Method and system for displaying digital signature, data editing method and terminal Download PDFInfo
- Publication number
- CN111178010A CN111178010A CN201911328727.1A CN201911328727A CN111178010A CN 111178010 A CN111178010 A CN 111178010A CN 201911328727 A CN201911328727 A CN 201911328727A CN 111178010 A CN111178010 A CN 111178010A
- Authority
- CN
- China
- Prior art keywords
- data
- target
- data content
- field
- character
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 230000015654 memory Effects 0.000 claims description 29
- 238000013507 mapping Methods 0.000 claims description 27
- 238000006243 chemical reaction Methods 0.000 claims description 6
- 238000004891 communication Methods 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 4
- 238000013500 data storage Methods 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 12
- 238000004590 computer program Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0006—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0033—Systems modifying transmission characteristics according to link quality, e.g. power backoff arrangements specific to the transmitter
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0036—Systems modifying transmission characteristics according to link quality, e.g. power backoff arrangements specific to the receiver
Landscapes
- Engineering & Computer Science (AREA)
- Quality & Reliability (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Document Processing Apparatus (AREA)
Abstract
The embodiment of the invention relates to the technical field of data coding, in particular to a method for displaying a digital signature. In the method, a data editing terminal can edit the service requirements of a user to obtain target data content, and then a check field blended with data field byte code characteristics and a data source number is added in each target coding character of the target data content to obtain the coded target data content. In this way, when the display terminal decodes the encoded target data content, the data content of the data field corresponding to each target encoding character and the digital signature obtained from the check field can be displayed.
Description
Technical Field
The invention relates to the technical field of data coding, in particular to a method and a system for displaying a digital signature, a data editing method and a terminal.
Background
Character encoding (Character encoding) is a technique for expressing a specific Character using a binary sequence string. The character coding technology enables information such as different letters, numbers or symbols to be stored and transmitted in a computer or a communication network by converting the information such as different letters, numbers or symbols into a binary sequence string, so that the information such as different letters, numbers or symbols can be stored and transmitted in the computer or the communication network.
There are many common character encoding systems, such as American Standard Code for Information Interchange (ASCII), Chinese Internalcode Specification (GBK), national Standard GB2312, and Unicode-oriented variable length character encoding (UTF-8)
However, when the character encoding system is used for encoding and decoding, the source of the data content of encoding and decoding cannot be determined.
Disclosure of Invention
In order to overcome at least the above-mentioned disadvantages of the prior art, an object of the present invention is to provide a method and system for displaying a digital signature, a data editing method and a terminal.
In a first aspect of the embodiments of the present invention, a method for displaying a digital signature is provided, where the method is applied to a system for displaying a digital signature, where the system for displaying a digital signature includes a data editing terminal and a display terminal, and the method includes:
the data editing terminal edits the service requirements of a user by adopting a target coding character rule to obtain target data content, wherein the target data content comprises a plurality of target coding characters, and each target coding character comprises a data field for storing the data content;
the data editing terminal adds a check field blended with data field byte code characteristics and a data source number in each target coding character to obtain coded target data content;
the data editing terminal sends the encoded target data content to the display terminal;
and the display terminal decodes the encoded target data content, and displays the data content obtained according to the data field and the digital signature which is obtained according to the check field and is used for expressing the source of the data content.
In an alternative embodiment, the display digital signature system further comprises a rule providing terminal; before the data editing terminal adopts the target coding character rule to edit the service requirement of the user, the method further comprises the following steps:
the rule providing terminal encodes a pre-stored character library, adds an identification field blended with the data source number to the character library, and obtains the target encoding character rule;
and the rule providing terminal sends the target coding character rule to the data editing terminal.
In an alternative embodiment, the data editing terminal edits the service requirement of the user by using a target encoding character rule to obtain a target data content, including:
the data editing terminal decodes the target coding character rule to obtain a character library carrying the data source number;
and the data editing terminal searches the conversion characters of the service requirements from the character library and obtains the target data content according to the conversion characters.
In an alternative embodiment, the decoding, by the display terminal, of the encoded target data content, displaying the data content obtained from the data field and the digital signature obtained from the check field for indicating the source of the data content, includes:
the display terminal judges whether a check field exists in each target code character in the coded target data content;
when a check field exists in each target code character in the coded target data content, the display terminal judges whether a mapping relation exists between the check field and the data field in each target code character;
and when the mapping relation exists between the check field and the data field in each target code character, the display terminal decodes each target code character, and displays the data content obtained according to the data field and the digital signature which is obtained according to the check field and is used for representing the source of the data content.
In an alternative embodiment, the determining, by the display terminal, whether a mapping relationship exists between a check field and a data field in each target encoding character includes:
the display terminal determines a first bit with a mapping identifier from the check field;
the display terminal determines a second bit with the mapping identifier from the data field;
the display terminal judges whether a first numerical value on the first bit is the same as a second numerical value on the second bit;
and the display terminal determines that the mapping relation is satisfied between the check byte and the data byte when the first numerical value on the first bit is the same as the second numerical value on the second bit.
In an alternative embodiment, the decoding of each target encoding character by the display terminal, displaying the data content obtained from the data field and the digital signature obtained from the check field for indicating the source of the data content, includes:
the display terminal decodes the data field in each target coding character to obtain data content for representing the service requirement;
the display terminal decodes the check field in each target code character to obtain a digital signature for representing the data content source, wherein the digital signature comprises the data field byte code characteristics and the data source number;
and the display terminal displays the data content added with the digital signature.
In a second aspect of the embodiments of the present invention, a system for displaying a digital signature is provided, including a data editing terminal and a display terminal;
the data editing terminal is used for editing the service requirements of the user by adopting a target coding character rule to obtain target data content, wherein the target data content comprises a plurality of target coding characters, and each target coding character comprises a data field for storing data;
the data editing terminal is used for adding a check field blended with data field byte code characteristics and a data source number in each target coding character to obtain coded target data content;
the data editing terminal is used for sending the encoded target data content to the display terminal;
and the display terminal is used for decoding the encoded target data content and displaying the data content obtained according to the data field and the digital signature which is obtained according to the check field and is used for representing the source of the data content.
In a third aspect of the embodiments of the present invention, there is provided a data editing terminal, including:
the system comprises an editing module, a data storage module and a data processing module, wherein the editing module is used for editing the service requirements of a user by adopting a target coding character rule to obtain target data content, and the target data content comprises a plurality of target coding characters, wherein each target coding character comprises a data field for storing data;
the encoding module is used for adding a check field blended with data field byte code characteristics and a data source number in each target encoding character to obtain encoded target data content;
and the sending module is used for sending the encoded target data content to a display terminal so as to enable the display terminal to decode the encoded target data content and display the data content obtained according to the data field and the digital signature which is obtained according to the check field and is used for representing the source of the data content.
A fourth aspect of the embodiments of the present invention provides a data editing terminal, including a processor, and a memory and a bus connected to the processor; wherein, the processor and the memory complete mutual communication through the bus; the processor is used for calling the program instructions in the memory so as to execute the data editing method.
In a fifth aspect of the embodiments of the present invention, there is provided a readable storage medium, on which a program is stored, the program, when executed by a processor, implementing the method for displaying a digital signature described above.
According to the method and the system for displaying the digital signature, the data editing method and the data editing terminal provided by the embodiment of the invention, the data editing terminal can edit the service requirements of users so as to obtain the target data content, and then a check field blended with the data field section code characteristics and the data source number is added in each target coding character of the target data content so as to obtain the coded target data content. In this way, when the display terminal decodes the encoded target data content, the data content of the data field corresponding to each target encoding character and the digital signature obtained from the check field can be displayed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a system architecture diagram of a system for displaying a digital signature according to an embodiment of the present invention.
Fig. 2 is a flowchart of a method for displaying a digital signature according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of a target encoding character according to an embodiment of the present invention.
Fig. 4 is a flowchart of a data editing method according to an embodiment of the present invention.
Fig. 5 is a block diagram of a data editing terminal according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a data editing terminal according to an embodiment of the present invention.
Icon:
100-system to display digital signatures;
1-a data editing terminal; 11-an editing module; 12-an encoding module; 13-a sending module; 141-a processor; 142-a memory; 143-bus;
2-a display terminal;
3-rules provision terminal.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a method and a system for displaying a digital signature, a data editing method and a terminal, which are used for solving the technical problem that the source of coded and decoded data content cannot be determined when a common character coding system is adopted for coding and decoding.
In order to better understand the technical solutions of the present invention, the following detailed descriptions of the technical solutions of the present invention are provided with the accompanying drawings and the specific embodiments, and it should be understood that the specific features in the embodiments and the examples of the present invention are the detailed descriptions of the technical solutions of the present invention, and are not limitations of the technical solutions of the present invention, and the technical features in the embodiments and the examples of the present invention may be combined with each other without conflict.
In data transmission, generally, a current terminal device encodes a service requirement (service data) of a user to obtain encoded data, and then sends the encoded data to a target terminal device. Correspondingly, the target terminal equipment decodes the coded data to obtain service data.
For example, service data "big data has gradually had a positive effect on people's lives" is encoded on the current terminal device, and the resulting encoded data "001001110101001" is transmitted to the target terminal device.
For another example, the target terminal device decodes the encoded data "001001110101001" to obtain the service data "big data has gradually had a positive impact on people's lives".
Through the above scenario, it can be found that, by using a common encoding and decoding method, a source of service data "big data has gradually had a positive influence on the life of people" is determined from "big data of service data" which cannot be decoded by a target terminal device has gradually had a positive influence on the life of people ", so that it is difficult to prevent and control data piracy and illegal data copying.
In detail, assuming that the current terminal device only authorizes the target terminal device to be able to obtain the service data, if the third party steals the encoded data "001001110101001" in the process that the current terminal device transmits the encoded data "001001110101001", there is no difference between the service data obtained by the third party and the service data obtained by the target terminal device. In this case, the sources of the service data obtained by the third party and the service data obtained by the target terminal device cannot be traced.
Therefore, in the method, a data editing terminal can edit a service requirement of a user to obtain a target data content, and then add a check field blended with a data field section code feature and a data source number in each target encoding character of the target data content to obtain an encoded target data content. In this way, when the display terminal decodes the encoded target data content, the data content of the data field corresponding to each target encoding character and the digital signature obtained from the check field can be displayed.
Taking the above example as an example, even if the encoded data "001001110101001" is stolen by a third party, when the third party is decoding the encoded data "001001110101001" to obtain the business data "big data has gradually had a positive influence on the life of people", the business data "big data has gradually had a positive influence on the life of people" carries a digital signature indicating the data source. For example, the digital signature may be a device identification number of the current terminal device or the like. This allows the digital signature to determine that the third party has the act of illegally obtaining the encoded data "001001110101001".
In detail, please refer to fig. 1 in conjunction with the figure, which is a system architecture diagram of a system 100 for displaying digital signatures according to an embodiment of the present invention. As can be seen from fig. 1, the system 100 for displaying a digital signature includes a data editing terminal 1, a display terminal 2, and a rule providing terminal 3.
In the present embodiment, the data editing terminal 1, the display terminal 2, and the rule providing terminal 3 are each configured with a character encoder SCharset.
In the present embodiment, the data editing terminal 1, the display terminal 2, and the rule providing terminal 3 may be electronic devices such as a computer, a PAD, a mobile phone, and the like, and are not limited herein. The data editing terminal 1 can communicate with a plurality of display terminals 2, and similarly, the rule providing terminal 3 can communicate with a plurality of data editing terminals 1.
In the present embodiment, the rule providing terminal 3 may be understood as a Data Provider (Data Provider), and the Data editing terminal 1 may be understood as a consumer (Customer).
It is understood that the system 100 for displaying digital signatures shown in fig. 1 provides a set of codec schemes, which can tag the service data with a data signature, thereby ensuring the determination and tracing of the data source of the service data.
Referring to fig. 2, a flowchart of a method for displaying a digital signature according to an embodiment of the invention is shown, where the method is applied to the system 100 for displaying a digital signature in fig. 1, and the method may include the following steps:
and step S21, the data editing terminal edits the service requirement of the user by adopting the target coding character rule to obtain the target data content.
Step S22, the data editing terminal adds a check field with data field code characteristics and data source number blended into each target code character to obtain the coded target data content.
And step S23, the data editing terminal sends the encoded target data content to the display terminal.
And step S24, the display terminal decodes the encoded target data content, and displays the data content obtained according to the data field and the digital signature for indicating the source of the data content obtained according to the check field.
In step S21, the target data content includes a plurality of target code characters, each target code character including a data field storing data content.
In step S21, the service requirement of the user may be text information, voice information or video information that the user wants to deliver, for example, the service requirement may be text information. In detail, the text information may be a paper T.
In detail, the data editing terminal 1 edits the thesis T by using a target encoding character rule to obtain target data content. In this embodiment, the target data content may be a binary sequence string. The binary sequence string includes a plurality of target code characters, each target code character including a data field storing data content. Referring to fig. 3, for example, one of the target code characters includes data fields X1 and X2 for storing data content and a field X3 for identifying the target code character.
In detail, in step S22, the data editing terminal 1 may add check fields C1 and C2 into the target encoding character, in which the data field byte code characteristics and the data source number are merged. In the present embodiment, the field C1, the field C2, and the field X3 can be understood as check fields.
In step S22, the data source number is acquired by a unique data source coding service center that is uniformly managed and distributed by a root domain name authority similar to the DNS.
The data editing terminal 1 can obtain the encoded target data content through step S22.
In step S24, the data content displayed by the display terminal 2 may be a paper T, and further, the display terminal 2 displays a digital signature indicating the source of the paper T. For example, the digital signature may be a digital number or a character signature.
In step S24, the digital signature may be added to the paper T in the form of a watermark, so that even if the encoded target data content is stolen by a third party, the paper T will carry the digital signature when the third party decodes the encoded target data content and displays the paper T. Through the digital signature carried in the paper T, the data source of the paper T can be determined and traced.
It can be understood that, through the steps S21-S24, the data editing terminal 1 can edit the service requirement of the user to obtain the target data content, and then add the check field with the data field section code feature and the data source number into each target encoding character of the target data content to obtain the encoded target data content. In this way, when the display terminal 2 decodes the encoded target data content, the data content of the data field corresponding to each target encoding character and the digital signature obtained from the check field can be displayed.
In specific implementation, the data editing terminal 1 edits the service requirement of the user by using the target encoding character rule, and in some cases, the source of the target encoding character rule also needs to be traced. To this end, in an alternative embodiment, before step S21, the method may further include the following:
and step S11, the rule providing terminal codes a pre-stored character library, and adds an identification field blended with the data source number to the character library to obtain the target coded character rule.
And step S12, the rule providing terminal sends the target code character rule to the data editing terminal.
In step S11, the character library may be a character library corresponding to the GBK encoding scheme.
It is understood that, through the steps S11-S12, the data editing terminal 1 can obtain the character library carrying the data source number after decoding the obtained target encoding character rule. In this way, the rule providing terminal 3 can verify the validity of the source of the character library in the data editing terminal 1 based on the data source number.
For example, the rule providing terminal 3 only sends the target encoding character rule to the data editing terminal 1, and if it is found that the character library adopted by the third party during encoding carries the data source number, it may be determined that the character library of the third party is illegally acquired.
Through the above, the source of the character library can be determined and traced.
In an alternative embodiment, in step S21, the data editing terminal 1 edits the service requirement of the user by using the target encoding character rule to obtain the target data content, which may specifically include the following contents:
and S211, decoding the target coding character rule by the data editing terminal to obtain a character library carrying the data source number.
Step S212, the data editing terminal searches the conversion characters of the service requirement from the character library, and obtains the target data content according to the conversion characters.
In step S211, the character library carries the data source number, so that the source of the character library can be determined by tracing back the data source number.
In particular implementation, the display terminal 2 does not need to decode all encoded target data content in order to improve the efficiency of determining the source of the data content. In detail, if the encoded target data content does not have the check byte, it may be considered that the encoded target data content is not encoded by the encoding method, and the source of the data content cannot be traced since the encoded target data content does not carry the corresponding digital signature. For this purpose, in step S24, the display terminal decodes the encoded target data content, and displays the data content obtained from the data field and the digital signature indicating the source of the data content obtained from the check field, which may specifically include the following:
step S241, the display terminal determines whether a check field exists in each target code character in the encoded target data content.
Step S242, when a check field exists in each target code character in the encoded target data content, the display terminal determines whether a mapping relationship exists between the check field and the data field in each target code character.
And step S243, when the mapping relation exists between the check field and the data field in each target code character, the display terminal decodes each target code character, and displays the data content obtained according to the data field and the digital signature which is obtained according to the check field and is used for representing the source of the data content.
It can be understood that, before decoding the encoded target data content, the display terminal 2 may determine whether a check field exists in each target code character in the target data content, and further determine whether a mapping relationship exists between the check field and the data field in each target code character, and when a check field exists in each target code character in the encoded target data content and the mapping relationship exists between the check field and the data field in each target code character, the display terminal 2 may decode each target code character, and further display the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content.
In this way, by the determination in steps S241 to S242, it is possible to avoid the display terminal 2 decoding all encoded target data contents when tracing back the data source, thereby reducing the resource consumption of the display terminal 2.
In an alternative embodiment, in step S242, the display terminal determines whether a mapping relationship exists between a check field and a data field in each target code character, which may specifically include the following:
step S2421, the display terminal determines that the first bit of the mapping identifier exists from the check field.
Step S2422, the display terminal determines that the second bit of the mapping identifier exists from the data field.
Step S2423, the display terminal determines whether the first value on the first bit is the same as the second value on the second bit.
Step S2424, when the first value on the first bit is the same as the second value on the second bit, the display terminal determines that the mapping relationship between the check byte and the data byte is satisfied.
In detail, referring to fig. 3 in conjunction, values on bits in the data fields X1 and X2 may be mapped to corresponding bits in the check fields C1, C2, and X3. When checking the mapping relationship, a first value on a first bit of the mapping identifier is determined from the high order bits of the check fields C1, C2 and X3, and then a second value on a second bit is determined from the data fields X1 and X2 according to the mapping identifier. Further, when the first value and the second value are the same, it may be determined that the mapping relationship is satisfied between the check byte and the data byte.
For example, the first bits of the check fields C1, C2, and X3 are each the last of the eight bits in each field. The first value of the first bit of the check field C1 is "0", the first value of the first bit of the check field C2 is "1", and the first value of the first bit of the check field X3 is "1".
In detail, the second value mapped with the first value "0" of the first bit of the check field C1 is the value "0" on the second bit (fifth bit) of the data field X1, the second value mapped with the first value "1" of the first bit of the check field C2 is the value "1" on the second bit (eighth bit) of the data field X2, and the second value mapped with the first value "1" of the first bit of the check field X3 is the value "1" on the second bit (fifth bit) of the data field X2.
It can be understood that by judging whether a mapping relationship exists between the check field and the data field in each target encoding character, the display terminal 2 can be prevented from decoding all encoded target data contents when tracing back the data source, and the resource consumption of the display terminal 2 is reduced.
In detail, when tracing back the data source, the display terminal 2 will decode the target character code only when the encoded target data content satisfies the check field detection condition and the mapping relationship determination condition. And if the encoded target data content does not meet the check field detection condition and the mapping relation determination condition at the same time, the coded target data content is characterized in that no digital signature exists after decoding. In this case, the display terminal 2 may not need to decode the encoded target data content. Thus, the resource consumption of the display terminal 2 is reduced.
It is understood that the manner of decoding each target code character by the display terminal 2 is similar, and for convenience of description, the present embodiment will be described with reference to one of the target code characters.
In an alternative embodiment, in step S243, the display terminal decodes each target encoding character, and displays the data content obtained from the data field and the digital signature obtained from the check field for indicating the source of the data content, which may specifically include the following:
and step S2431, the display terminal decodes the data field in each target code character to obtain the data content for representing the service requirement.
And step S2432, the display terminal decodes the check field in each target code character to obtain a digital signature for representing the data content source.
And step S2433, the display terminal displays the data content added with the digital signature.
In step S2432, the data field byte code feature and the data source number are included in the digital signature.
It is understood that through steps S2431 to S2433, the display terminal 2 can display the digital signature together when displaying the data content. In this way, the source of the data content can be traced through the digital signature.
On the basis of the above, please refer to fig. 4, which is a flowchart of a data editing method according to an embodiment of the present invention, the digital signature processing method is applied to the data editing terminal 1 in fig. 1, and the method may include the following steps:
step S31, editing the service requirement of the user by adopting the target code character rule to obtain the target data content, wherein the target data content comprises a plurality of target code characters.
Step S32, add check fields with data field byte code characteristics and data source numbers into each target code character to obtain the coded target data content.
And step S33, sending the encoded target data content to a display terminal, so that the display terminal decodes the encoded target data content, and displays the data content obtained according to the data field and the digital signature obtained according to the check field and used for indicating the source of the data content.
In step S31, each target encoding character includes a data field storing data.
It is understood that, since the implementation principle of the step S31-step S33 is similar to that of the step S21-step S24 in fig. 2, no further description is made here.
On the basis of the above, the embodiment of the present invention provides a data editing terminal 1.
In detail, fig. 5 is a block diagram of a data editing terminal 1 according to an embodiment of the present invention, where the data editing terminal 1 includes:
the editing module 11 is configured to edit a service requirement of a user by using a target code character rule to obtain a target data content, where the target data content includes a plurality of target code characters, and each target code character includes a data field for storing data.
And the encoding module 12 is configured to add a check field into each target encoding character, where the check field includes a data field byte code feature and a data source number, to obtain encoded target data content.
And the sending module 13 is configured to send the encoded target data content to a display terminal, so that the display terminal decodes the encoded target data content, and displays the data content obtained according to the data field and the digital signature obtained according to the check field and used for indicating the source of the data content.
Optionally, the data editing terminal 1 includes a processor and a memory, the editing module 11, the encoding module 12, the sending module 13, and the like are all stored in the memory as program units, and the processor executes the program units stored in the memory to implement corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more than one, and the data sources of the data contents displayed on different display terminals are determined by adjusting the kernel parameters.
An embodiment of the present invention provides a readable storage medium on which a program is stored, which, when executed by a processor, implements the data editing method.
The embodiment of the invention provides a processor, which is used for running a program, wherein the data editing method is executed when the program runs.
In the embodiment of the present invention, as shown in fig. 6, the data editing terminal 1 includes at least one processor 141, and at least one memory 142 and a bus connected to the processor 141; the processor 141 and the memory 142 complete communication with each other through the bus 143; processor 141 is configured to call program instructions in memory 142 to perform the above-described method for displaying a digital signature.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, systems and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing data editing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing data editing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, the data editing terminal includes one or more processors (CPUs), memories, and buses. The data editing terminal may further include an input/output interface, a network interface, and the like.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip. The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetically stored data editing terminals, or any other non-transmission medium that can be used to store information that can be accessed by a computer data editing terminal. As defined herein, computer readable media does not include transitory computer readable media such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or data-editing terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or data-editing terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or data compilation terminal that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
In summary, according to the above-mentioned solutions provided by the embodiments of the present invention, when the display terminal decodes the encoded target data content, the data content of the data field according to each target encoding character and the digital signature obtained from the check field can be displayed, and since the digital signature is used for indicating the source of the data content, the source of the data content can be determined.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (10)
1. A method for displaying a digital signature is applied to a digital signature display system, the digital signature display system comprises a data editing terminal and a display terminal, and the method comprises the following steps:
the data editing terminal edits the service requirements of a user by adopting a target coding character rule to obtain target data content, wherein the target data content comprises a plurality of target coding characters, and each target coding character comprises a data field for storing the data content;
the data editing terminal adds a check field blended with data field byte code characteristics and a data source number in each target coding character to obtain coded target data content;
the data editing terminal sends the encoded target data content to the display terminal;
and the display terminal decodes the encoded target data content, and displays the data content obtained according to the data field and the digital signature which is obtained according to the check field and is used for expressing the source of the data content.
2. The method of claim 1, wherein the display digital signature system further comprises a rule providing terminal; before the data editing terminal adopts the target coding character rule to edit the service requirement of the user, the method further comprises the following steps:
the rule providing terminal encodes a pre-stored character library, adds an identification field blended with the data source number to the character library, and obtains the target encoding character rule;
and the rule providing terminal sends the target coding character rule to the data editing terminal.
3. The method according to claim 2, wherein the data editing terminal edits the service requirement of the user by using the target encoding character rule to obtain the target data content, and the method comprises:
the data editing terminal decodes the target coding character rule to obtain a character library carrying the data source number;
and the data editing terminal searches the conversion characters of the service requirements from the character library and obtains the target data content according to the conversion characters.
4. The method according to any one of claims 1 to 3, wherein the decoding of the encoded target data content by the display terminal, displaying the data content obtained from the data field and the digital signature indicating the source of the data content obtained from the check field, comprises:
the display terminal judges whether a check field exists in each target code character in the coded target data content;
when a check field exists in each target code character in the coded target data content, the display terminal judges whether a mapping relation exists between the check field and the data field in each target code character;
and when the mapping relation exists between the check field and the data field in each target code character, the display terminal decodes each target code character, and displays the data content obtained according to the data field and the digital signature which is obtained according to the check field and is used for representing the source of the data content.
5. The method according to claim 4, wherein the determining, by the display terminal, whether a mapping relationship exists between the check field and the data field in each target code character comprises:
the display terminal determines a first bit with a mapping identifier from the check field;
the display terminal determines a second bit with the mapping identifier from the data field;
the display terminal judges whether a first numerical value on the first bit is the same as a second numerical value on the second bit;
and the display terminal determines that the mapping relation is satisfied between the check byte and the data byte when the first numerical value on the first bit is the same as the second numerical value on the second bit.
6. The method of claim 4, wherein the displaying terminal decodes each target encoding character, displays the data content obtained from the data field and the digital signature obtained from the check field for indicating the source of the data content, and comprises:
the display terminal decodes the data field in each target coding character to obtain data content for representing the service requirement;
the display terminal decodes the check field in each target code character to obtain a digital signature for representing the data content source, wherein the digital signature comprises the data field byte code characteristics and the data source number;
and the display terminal displays the data content added with the digital signature.
7. A system for displaying digital signature is characterized by comprising a data editing terminal and a display terminal;
the data editing terminal is used for editing the service requirements of the user by adopting a target coding character rule to obtain target data content, wherein the target data content comprises a plurality of target coding characters, and each target coding character comprises a data field for storing data;
the data editing terminal is used for adding a check field blended with data field byte code characteristics and a data source number in each target coding character to obtain coded target data content;
the data editing terminal is used for sending the encoded target data content to the display terminal;
and the display terminal is used for decoding the encoded target data content and displaying the data content obtained according to the data field and the digital signature which is obtained according to the check field and is used for representing the source of the data content.
8. A data editing method is characterized by being applied to a data editing terminal, and the method comprises the following steps:
editing the service requirement of a user by adopting a target coding character rule to obtain target data content, wherein the target data content comprises a plurality of target coding characters, and each target coding character comprises a data field for storing data;
adding a check field which is fused with data field byte code characteristics and a data source number into each target code character to obtain coded target data content;
and sending the encoded target data content to a display terminal so that the display terminal decodes the encoded target data content and displays the data content obtained according to the data field and the digital signature which is obtained according to the check field and is used for representing the source of the data content.
9. A data editing terminal, comprising:
the system comprises an editing module, a data storage module and a data processing module, wherein the editing module is used for editing the service requirements of a user by adopting a target coding character rule to obtain target data content, and the target data content comprises a plurality of target coding characters, wherein each target coding character comprises a data field for storing data;
the encoding module is used for adding a check field blended with data field byte code characteristics and a data source number in each target encoding character to obtain encoded target data content;
and the sending module is used for sending the encoded target data content to a display terminal so as to enable the display terminal to decode the encoded target data content and display the data content obtained according to the data field and the digital signature which is obtained according to the check field and is used for representing the source of the data content.
10. A data editing terminal is characterized by comprising a processor, a memory and a bus, wherein the memory and the bus are connected with the processor; wherein, the processor and the memory complete mutual communication through the bus; the processor is configured to call program instructions in the memory to perform the data editing method of claim 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911328727.1A CN111178010B (en) | 2019-12-20 | 2019-12-20 | Method and system for displaying digital signature, data editing method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911328727.1A CN111178010B (en) | 2019-12-20 | 2019-12-20 | Method and system for displaying digital signature, data editing method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111178010A true CN111178010A (en) | 2020-05-19 |
CN111178010B CN111178010B (en) | 2024-02-09 |
Family
ID=70650348
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911328727.1A Active CN111178010B (en) | 2019-12-20 | 2019-12-20 | Method and system for displaying digital signature, data editing method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111178010B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113343639A (en) * | 2021-05-19 | 2021-09-03 | 网易(杭州)网络有限公司 | Product identification code image generation and information query method based on product identification code image |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5883956A (en) * | 1996-03-28 | 1999-03-16 | National Semiconductor Corporation | Dynamic configuration of a secure processing unit for operations in various environments |
US20020010682A1 (en) * | 2000-07-20 | 2002-01-24 | Johnson Rodney D. | Information archival and retrieval system for internetworked computers |
US20020138736A1 (en) * | 2001-01-22 | 2002-09-26 | Marc Morin | Method and system for digitally signing MPEG streams |
EP1334472A2 (en) * | 2000-11-07 | 2003-08-13 | Unisys Corporation | Self-authentication of value documents using digital signatures |
US6785815B1 (en) * | 1999-06-08 | 2004-08-31 | Intertrust Technologies Corp. | Methods and systems for encoding and protecting data using digital signature and watermarking techniques |
EP1509828A2 (en) * | 2002-05-10 | 2005-03-02 | Fraunhofer-Gesellschaft Zur Förderung Der Angewandten Forschung E.V. | Method and device for producing coded data, for decoding coded data and for producing re-signed data |
CN1777040A (en) * | 2005-12-14 | 2006-05-24 | 北京北大方正电子有限公司 | Variable length structural information coding and decoding method |
CN1926493A (en) * | 2004-04-08 | 2007-03-07 | 国际商业机器公司 | Method and system for linking certificates to signed files |
WO2007028407A1 (en) * | 2005-09-06 | 2007-03-15 | Nero Ag | Method for signing a data package and signing apparatus |
CN101133418A (en) * | 2004-10-12 | 2008-02-27 | 阿诺托股份公司 | Method and a system for secure management of information from an electronic pen |
CN101977319A (en) * | 2010-11-03 | 2011-02-16 | 上海交通大学 | Method for generating and authenticating hidden video tags based on video characteristics and digital signatures |
CN103310160A (en) * | 2013-06-20 | 2013-09-18 | 北京神州绿盟信息安全科技股份有限公司 | Method, system and device for preventing webpage from being tampered with |
CN103413227A (en) * | 2013-08-02 | 2013-11-27 | 四川航天系统工程研究所 | Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof |
US20130346755A1 (en) * | 2012-06-21 | 2013-12-26 | Microsoft Corporation | Homomorphic Signatures and Network Coding Signatures |
US20140047468A1 (en) * | 2012-08-13 | 2014-02-13 | Christen Nielsen | Methods and apparatus to communicate audience measurement information |
CN104424579A (en) * | 2013-08-27 | 2015-03-18 | 成都天钥科技有限公司 | Security traceability management system |
CN109104723A (en) * | 2018-07-13 | 2018-12-28 | Oppo(重庆)智能科技有限公司 | A kind of network name display methods and relevant device |
-
2019
- 2019-12-20 CN CN201911328727.1A patent/CN111178010B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5883956A (en) * | 1996-03-28 | 1999-03-16 | National Semiconductor Corporation | Dynamic configuration of a secure processing unit for operations in various environments |
US6785815B1 (en) * | 1999-06-08 | 2004-08-31 | Intertrust Technologies Corp. | Methods and systems for encoding and protecting data using digital signature and watermarking techniques |
US20020010682A1 (en) * | 2000-07-20 | 2002-01-24 | Johnson Rodney D. | Information archival and retrieval system for internetworked computers |
EP1334472A2 (en) * | 2000-11-07 | 2003-08-13 | Unisys Corporation | Self-authentication of value documents using digital signatures |
US20020138736A1 (en) * | 2001-01-22 | 2002-09-26 | Marc Morin | Method and system for digitally signing MPEG streams |
EP1509828A2 (en) * | 2002-05-10 | 2005-03-02 | Fraunhofer-Gesellschaft Zur Förderung Der Angewandten Forschung E.V. | Method and device for producing coded data, for decoding coded data and for producing re-signed data |
CN1926493A (en) * | 2004-04-08 | 2007-03-07 | 国际商业机器公司 | Method and system for linking certificates to signed files |
CN101133418A (en) * | 2004-10-12 | 2008-02-27 | 阿诺托股份公司 | Method and a system for secure management of information from an electronic pen |
WO2007028407A1 (en) * | 2005-09-06 | 2007-03-15 | Nero Ag | Method for signing a data package and signing apparatus |
CN1777040A (en) * | 2005-12-14 | 2006-05-24 | 北京北大方正电子有限公司 | Variable length structural information coding and decoding method |
CN101977319A (en) * | 2010-11-03 | 2011-02-16 | 上海交通大学 | Method for generating and authenticating hidden video tags based on video characteristics and digital signatures |
US20130346755A1 (en) * | 2012-06-21 | 2013-12-26 | Microsoft Corporation | Homomorphic Signatures and Network Coding Signatures |
US20140047468A1 (en) * | 2012-08-13 | 2014-02-13 | Christen Nielsen | Methods and apparatus to communicate audience measurement information |
CN103310160A (en) * | 2013-06-20 | 2013-09-18 | 北京神州绿盟信息安全科技股份有限公司 | Method, system and device for preventing webpage from being tampered with |
CN103413227A (en) * | 2013-08-02 | 2013-11-27 | 四川航天系统工程研究所 | Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof |
CN104424579A (en) * | 2013-08-27 | 2015-03-18 | 成都天钥科技有限公司 | Security traceability management system |
CN109104723A (en) * | 2018-07-13 | 2018-12-28 | Oppo(重庆)智能科技有限公司 | A kind of network name display methods and relevant device |
Non-Patent Citations (4)
Title |
---|
SANGEETA D. JADHAV: "digital color image watermarking by means of blind source seperation", 《2009 INTERNATIONAL CONFERENCE ON CONTROL ,AUTOMATION , COMMUNICATION AND ENERGY CONSERVATION》 * |
曹望;尤志强;: "基于数字证书的通用权限管理的设计与实现", no. 09 * |
樊彦博: "基于PKI和数字水印的电子签章系统的研究与实现" * |
高华强: "关于信息隐藏于隐信道技术的应用研究", 《中国优秀硕士论文全文数据库信息科技辑》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113343639A (en) * | 2021-05-19 | 2021-09-03 | 网易(杭州)网络有限公司 | Product identification code image generation and information query method based on product identification code image |
CN113343639B (en) * | 2021-05-19 | 2023-10-03 | 网易(杭州)网络有限公司 | Product identification code diagram generation and information query method based on product identification code diagram |
Also Published As
Publication number | Publication date |
---|---|
CN111178010B (en) | 2024-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113095749A (en) | Logistics information transmission method, system and device based on block chain | |
US10587409B2 (en) | Authorization token including fine grain entitlements | |
CN107919943B (en) | Method and device for coding and decoding binary data | |
CN112287372B (en) | Method and apparatus for protecting clipboard privacy | |
CN111191255B (en) | Information encryption processing method, server, terminal, device and storage medium | |
JP6816028B2 (en) | Page jump based on text hiding | |
CN106878367B (en) | Method and device for realizing asynchronous call of service interface | |
CN113254408B (en) | Invisible mark adding method, device, medium and electronic equipment | |
CN101702641A (en) | Coding method and network server | |
CN110362547A (en) | Coding, parsing, storage method and the device of journal file | |
US20180219964A1 (en) | Method and system to convert globally unique identifiers to electronic data interchange document identifiers | |
CN114020272A (en) | Serialized encoding and decoding methods and devices and electronic equipment | |
CN104426657A (en) | Service authentication method and system, server | |
CN111178010B (en) | Method and system for displaying digital signature, data editing method and terminal | |
CN111865616B (en) | Method and device for generating key pair based on ECDSA algorithm | |
CN106161021A (en) | Private data sending method and device, private data method of reseptance and device | |
CN107204961B (en) | Method and device for processing character to be escape in interface message | |
CN108734149B (en) | Text data scanning method and device | |
CN107222453B (en) | file transmission method and device | |
CN108985109B (en) | Data storage method and device | |
CN111324645A (en) | Data processing method and device for block chain | |
CN112100666B (en) | Text credit giving method, credit giving text checking method and system | |
CN105530166B (en) | The method and apparatus communicated with literature author | |
CN114510636A (en) | Product data query method and device based on identification analysis and storage medium | |
CN108537559B (en) | Anti-counterfeiting method and system free of remote service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |