CN111193595B - Error detection method, device, equipment and storage medium for electronic signature - Google Patents

Error detection method, device, equipment and storage medium for electronic signature Download PDF

Info

Publication number
CN111193595B
CN111193595B CN201911189180.1A CN201911189180A CN111193595B CN 111193595 B CN111193595 B CN 111193595B CN 201911189180 A CN201911189180 A CN 201911189180A CN 111193595 B CN111193595 B CN 111193595B
Authority
CN
China
Prior art keywords
signature
error
detected
meta information
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911189180.1A
Other languages
Chinese (zh)
Other versions
CN111193595A (en
Inventor
田嵩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Cloud Computing Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Cloud Computing Beijing Co Ltd filed Critical Tencent Cloud Computing Beijing Co Ltd
Priority to CN201911189180.1A priority Critical patent/CN111193595B/en
Publication of CN111193595A publication Critical patent/CN111193595A/en
Application granted granted Critical
Publication of CN111193595B publication Critical patent/CN111193595B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides an error detection method, device, equipment and storage medium of an electronic signature, and relates to the technical field of Internet. The method comprises the following steps: acquiring a signature to be detected and meta information of the signature to be detected; generating a correct signature according to the meta information; if the signature to be detected is different from the correct signature, generating an error signature according to the meta information and the reference error reason; and determining the error reason of the signature to be detected by comparing the signature to be detected with the error signature. Compared with the related art, the technical scheme provided by the embodiment of the application can automatically detect whether the electronic signature generated by the user is correct or not, and automatically detect the error reason under the condition that the electronic signature is wrong, so that the error detection efficiency of the electronic signature is improved, the experience of using cloud services by the user is improved, and the threshold of using the cloud services by the user is reduced.

Description

Error detection method, device, equipment and storage medium for electronic signature
Technical Field
The embodiment of the application relates to the technical field of internet, in particular to an error detection method, device, equipment and storage medium of an electronic signature.
Background
With the rapid development of the internet, networks have become a necessary tool in the life and work of users. To ensure the security of data on the network, electronic signatures are introduced.
In the related art, when a user requests to use a cloud server, the cloud server needs to perform identity verification on the user, namely, verify an electronic signature provided by the user, so as to ensure the validity of the user. The electronic signature process is complex, and in the process of requesting to use the cloud server, the user often has the condition that the generated electronic signature is wrong and cannot pass verification. Since the electronic signature has unidirectionality, that is, it can be generated only from original information (which may also be referred to as meta information), but cannot be reversely deduced from the electronic signature to pour out the original content, it is difficult for a user to check the cause of the electronic signature error.
Disclosure of Invention
The embodiment of the application provides an error detection method, device, equipment and storage medium for an electronic signature, which can be used for solving the problem that a user is difficult to check the reason of the electronic signature error in the related technology. The technical scheme is as follows:
in one aspect, an embodiment of the present application provides a method for detecting an error of an electronic signature, where the method includes:
Acquiring a signature to be detected and meta information of the signature to be detected, wherein the meta information refers to information used for generating the signature to be detected;
generating a correct signature according to the meta information;
if the signature to be detected is different from the correct signature, generating an error signature according to the meta information and a reference error reason;
and determining the error reason of the signature to be detected by comparing the signature to be detected with the error signature.
In another aspect, an embodiment of the present application provides a method for detecting an error of an electronic signature, where the method includes:
displaying an error detection page of the electronic signature;
acquiring a signature to be detected and meta information of the signature to be detected, which are input in the error detection page, wherein the meta information refers to information used for generating the signature to be detected;
after receiving the detection instruction, displaying the detection result of the signature to be detected;
and when the detection result is that the signature is wrong, displaying the error reason of the signature to be detected.
In yet another aspect, an embodiment of the present application provides an error detection apparatus for an electronic signature, where the apparatus includes:
the detection information acquisition module is used for acquiring a signature to be detected and meta information of the signature to be detected, wherein the meta information refers to information used for generating the signature to be detected;
The correct signature generation module is used for generating a correct signature according to the meta information;
the error signature generation module is used for generating an error signature according to the meta information and the reference error reason when the signature to be detected is different from the correct signature;
and the error cause determining module is used for determining the error cause of the signature to be detected by comparing the signature to be detected with the error signature.
In yet another aspect, an embodiment of the present application provides an error detection apparatus for an electronic signature, where the apparatus includes:
the page display module is used for displaying an error detection page of the electronic signature;
the signature acquisition module is used for acquiring a to-be-detected signature and meta information of the to-be-detected signature, which are input in the error detection page, wherein the meta information refers to information used for generating the to-be-detected signature;
the result display module is used for displaying the detection result of the signature to be detected after receiving the detection instruction;
and the reason display module is used for displaying the error reason of the signature to be detected when the detection result is that the signature is wrong.
In yet another aspect, embodiments of the present application provide a computer device, where the computer device includes a processor and a memory, where at least one instruction, at least one program, a code set, or an instruction set is stored, where the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by the processor to implement the error detection method of an electronic signature as described in the above aspect.
The computer device comprises a terminal and a server.
In yet another aspect, embodiments of the present application provide a computer-readable storage medium having at least one instruction, at least one program, a set of codes, or a set of instructions stored therein, the at least one instruction, the at least one program, the set of codes, or the set of instructions loaded and executed by a processor to implement the error detection method of an electronic signature as described in the above aspects.
In yet another aspect, embodiments of the present application provide a computer program product for implementing the above-described error detection method of electronic signatures when executed by a processor.
The technical scheme provided by the embodiment of the application can comprise the following beneficial effects:
by generating an error signature according to meta information of the signature to be detected and a reference error cause in the case that the signature to be detected is different from the correct signature, the error cause of the signature to be detected is determined based on the error signature. Compared with the related art, the technical scheme provided by the embodiment of the application can automatically detect whether the electronic signature generated by the user is correct or not, and automatically detect the error reason under the condition that the electronic signature is wrong, so that the error detection efficiency of the electronic signature is improved, the experience of using cloud services by the user is improved, and the threshold of using the cloud services by the user is reduced.
Drawings
FIG. 1 is a schematic illustration of an implementation environment provided by one embodiment of the present application;
FIG. 2 is a flow chart of a method for error detection of an electronic signature provided in one embodiment of the present application;
FIG. 3 is a flow chart of a method for error detection of an electronic signature provided in another embodiment of the present application;
FIG. 4 illustrates a flow chart for generating a correct signature;
FIG. 5 illustrates a flow chart of one embodiment of the present application for determining the cause of an error in a signature to be detected;
FIG. 6 is a flow chart of a method for error detection of an electronic signature provided in another embodiment of the present application;
FIG. 7 illustrates a schematic diagram of a detection page;
FIG. 8 is a block diagram of an electronic signature error detection device provided in one embodiment of the present application;
FIG. 9 is a block diagram of an electronic signature error detection device provided in another embodiment of the present application;
FIG. 10 is a block diagram of an electronic signature error detection device provided in accordance with yet another embodiment of the present application;
FIG. 11 is a block diagram of a terminal according to one embodiment of the present application;
fig. 12 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Referring to fig. 1, a schematic diagram of an implementation environment provided in one embodiment of the present application is shown. The implementation environment may include: a terminal 10 and a cloud server 20.
The terminal 10 may be an electronic device such as a cell phone, tablet computer, PC (Personal Computer ), wearable device, etc. The terminal 10 may communicate with the cloud server 20 through a wired or wireless network.
The cloud server 20 may be a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, CDNs (Content Delivery Network, content delivery networks), and basic cloud computing services such as big data and artificial intelligence platforms.
Cloud technology (Cloud technology) refers to a hosting technology for integrating hardware, software, network and other series resources in a wide area network or a local area network to realize calculation, storage, processing and sharing of data.
The cloud technology is a generic term of network technology, information technology, integration technology, management platform technology, application technology and the like based on cloud computing business model application, can form a resource pool, and is flexible and convenient as required. Cloud computing technology will become an important support. Background services of technical networking systems require a large amount of computing, storage resources, such as video websites, picture-like websites, and more portals. Along with the high development and application of the internet industry, each article possibly has an own identification mark in the future, the identification mark needs to be transmitted to a background system for logic processing, data with different levels can be processed separately, and various industry data needs strong system rear shield support and can be realized only through cloud computing.
Wherein Cloud Computing (Cloud Computing) refers to the delivery and usage mode of IT infrastructure, meaning that required resources are obtained in an on-demand, easily scalable manner through the network; generalized cloud computing refers to the delivery and usage patterns of services, meaning that the required services are obtained in an on-demand, easily scalable manner over a network. Such services may be IT, software, internet related, or other services. Cloud Computing is a product of fusion of traditional computer and network technology developments such as Grid Computing (Grid Computing), distributed Computing (Distributed Computing), parallel Computing (Parallel Computing), utility Computing (Utility Computing), network storage (Network Storage Technologies), virtualization (Virtualization), load balancing (Load balancing), and the like.
With the development of the internet, real-time data flow and diversification of connected devices, and the promotion of demands of search services, social networks, mobile commerce, open collaboration and the like, cloud computing is rapidly developed. Unlike the previous parallel distributed computing, the generation of cloud computing will promote the revolutionary transformation of the whole internet mode and enterprise management mode in concept.
Cloud storage (cloud storage) is a new concept that extends and develops in the concept of cloud computing, and a distributed cloud storage system (hereinafter referred to as a storage system for short) refers to a storage system that integrates a large number of storage devices (storage devices are also referred to as storage nodes) of various types in a network to work cooperatively through application software or application interfaces through functions such as cluster application, grid technology, and a distributed storage file system, so as to provide data storage and service access functions for the outside.
The following describes the technical scheme of the application through several embodiments.
Referring to fig. 2, a flowchart of a method for detecting errors of an electronic signature according to an embodiment of the present application is shown. In this embodiment, the method is mainly applied to the terminal in the implementation environment shown in fig. 1 for illustration. The method may comprise the following steps:
step 201, a signature to be detected and meta information of the signature to be detected are acquired.
In the embodiment of the application, the terminal can acquire the signature to be detected and meta information of the signature to be detected so as to conveniently detect whether the signature to be detected is correct or not.
The signature to be detected refers to an electronic signature provided by a user. The meta information refers to information used for generating a signature to be detected, and may include a key identification (SecretId), a key (SecretKey), a request Method (Method), a URI (Uniform Resource Identifier ), a signature valid time, and the like.
The key identification can be distributed to the user by the cloud server and is used for identifying the identity of the user; the key is also distributed to the user by the server and used for encrypting the signature character string and the cloud server verifies the identity of the user; the key identification is paired with the key.
The request method refers to an HTTP (Hyper Text Transfer Protocol ) request method for defining a field describing how to process a specified resource; the request method may include GET, POST, PUT, DELETE, etc.; wherein the GET is used to issue a request to a particular resource; the POST is used for submitting data to the appointed resource to process the request; the PUT is used for uploading the latest content to the appointed resource position; DELETE is used to request the server to DELETE a resource. Further, HEAD, CONNECT, OPTIONS and TRACE, etc. may be included.
A URI is a string used to identify a name of an internet resource, such as an HTML (HyperText Markup Language ) document, image, video clip, program, etc., that is located by a URI.
Step 202, generating a correct signature according to the meta information.
After acquiring the meta information, the terminal can generate a correct signature according to the meta information.
The steps of the process for generating the correct signature are described in the embodiment of fig. 3 below, and are not repeated here.
In step 203, if the signature to be detected is different from the correct signature, an error signature is generated according to the meta information and the reference error cause.
After generating the correct signature, the terminal may compare the to-be-detected signature with the correct signature, and if the to-be-detected signature is different from the correct signature, it indicates that the to-be-detected signature generated by the user is incorrect. In this case, the terminal may further generate an error signature according to the meta information and the reference error cause.
In addition, if the signature to be detected is the same as the correct signature, the signature to be detected generated by the user is correct. In this case, the terminal may directly feed back this detection result to the user to prompt the user that the signature to be detected that it generates is correct.
In step 204, the error cause of the signature to be detected is determined by comparing the signature to be detected with the error signature.
After generating the error signature, the terminal may compare the signature to be detected with the error signature. Since the error signature is generated according to the meta information and the reference error cause, if the to-be-detected signature is identical to the error signature, the cause of the to-be-detected signature error is identical to the reference error cause for generating the error signature, so that the error cause of the to-be-detected signature can be determined.
In summary, according to the technical solution provided in the embodiments of the present application, when the signature to be detected is different from the correct signature, an error signature is generated according to meta information and a reference error cause of the signature to be detected, and the error cause of the signature to be detected is determined based on the error signature. Compared with the related art, the technical scheme provided by the embodiment of the application can automatically detect whether the electronic signature generated by the user is correct or not, and automatically detect the error reason under the condition that the electronic signature is wrong, so that the error detection efficiency of the electronic signature is improved, the experience of using cloud services by the user is improved, and the threshold of using the cloud services by the user is reduced.
Referring to fig. 3, a flowchart of an error detection method of an electronic signature according to another embodiment of the present application is shown. In this embodiment, the method is mainly applied to the terminal in the implementation environment shown in fig. 1 for illustration. The method may comprise the following steps:
step 301, obtaining request information of a cloud service request.
When a user requests to use a cloud server, a cloud service request (which may also be referred to as an HTTP signature request) is sent to the server, and the cloud service request is used to request use of a cloud service. After receiving the cloud service request, the cloud server performs identity verification on the user, namely, verifies the electronic signature provided by the user.
The request information comprises a signature to be detected and meta information of the signature to be detected, so that the cloud server can verify the electronic signature after receiving the cloud service request.
And step 302, analyzing the request information to obtain the signature to be detected and meta information.
Alternatively, the terminal may parse the request information according to a standard HTTP protocol to obtain the signature to be detected and meta information of the signature to be detected.
Step 303, generating a correct signature according to the meta information.
After the meta information of the signature to be detected is obtained, a correct signature may be generated.
Optionally, referring to fig. 4 in combination, the generation of the correct signature from the meta information may include the following steps:
(1) A key identification (SecretId) and a key (SecretKey) are obtained.
After acquiring the HTTP signature request, the terminal may parse the HTTP signature request according to a standard HTTP protocol, so as to obtain a key identifier and a key. The key identification and the key may be a character string consisting of numbers and letters.
For example, secretid= "AKIDc9 yimrbcfk 4C8sbmXQ8i65XXXXXXXXXX";
SecretKey="LUSE4nPK1d4tX5SHyXv6tZXXXXXXXXXX"
(2) Signature valid time (KeyTime) is generated.
The Unix timestamp StartTimestamp corresponding to the current time is obtained, and the Unix timestamp is the total number of seconds from UTC (coordinated universal time, or GMT greenwich time) 1970, 1 month, 1 day, 0 minute, 0 second (Beijing time 1970, 1 month, 1 day, 8 hours, 0 minute, 0 second). And calculating a Unix timestamp EndTimestamp corresponding to the signature expiration time according to the timestamp and the expected signature valid duration. The signature effective time is obtained by splicing, and the format is StartTimestamp; endTimestam. For example, the signature validity time may be denoted as 1557902800;1557910000.
optionally, the signature valid time may be input by the user, and correspondingly, the terminal may acquire the signature valid time input by the user.
(3) A request method is determined.
The terminal may determine the request method from the HTTP signature request described above.
For example, assume that an HTTP signature request includes: "GET/sample object (% E8%85% BE% E8% AE% AF% E4% BA% 91)? response-content-type=application%2Foctet-stream & response-cache-control=max-age%3D600 HTTP/1.1
Date:Thu,16 May 2019 06:55:53 GMT
Host:examplebucket-1250000000.cos.ap-beijing.myqcloud.com
……”;
It can be known that the request method is GET.
(4) A URI is obtained.
The terminal may obtain the URI from the HTTP signature request.
For example, assume that an HTTP signature request includes: "GET/sample object (% E8%85% BE% E8% AE% AF% E4% BA% 91)? response-content-type=application%2Foctet-stream & response-cache-control=max-age%3D600 HTTP/1.1
Date:Thu,16 May 2019 06:55:53 GMT
Host:examplebucket-1250000000.cos.ap-beijing.myqcloud.com
……”;
As can be seen, uri=response-cache-control; response-content-type.
(5) The request parameters (HttpParameters) and the request header (httppheaders) are obtained.
The request parameters and the request header refer to the request parameters and the request header of the HTTP signature request.
For example, assume that an HTTP signature request includes: "GET/sample object (% E8%85% BE% E8% AE% AF% E4% BA% 91)? response-content-type=application%2Foctet-stream & response-cache-control=max-age%3D600 HTTP/1.1
Date:Thu,16 May 2019 06:55:53 GMT
Host:examplebucket-1250000000.cos.ap-beijing.myqcloud.com
……”;
It can be known that httpparameters=response-cache-control=max-age% 3d600& response-content-type=application% 2Foctet-stream;
HttpHeaders=date=Thu%2C%2016%20May%202019%2006%3A55%3A53%20GMT&host=examplebucket-1250000000.cos.ap-beijing.myqcloud.com。
(6) A signing key (SignKey) is generated.
The signing key is generated based on the key and the signing validity time.
Illustratively, a message digest (hash value) is calculated using HMAC-SHA1 with the key as the key and the signature validity time as the message, resulting in a signature key.
(7) A request string (HttpString) is generated.
The request string is generated by combining the request method, the URI, the request parameters, and the request header in a specific manner.
(8) A signature original string (stringtosgn) is generated.
And generating a signature original text character string according to the signature valid time and the request character string.
Illustratively, the message digest is calculated using HMAC-SHA1 with the signature validity time as a key, with the request string as the new message, resulting in a signed original string. Can be expressed as: stringtosgn=sha1\nfekytime\nsha 1 (HttpString) \n.
For example, the signature valid time is: 1510109254;1510109314; the request string is: 35601c3365a361b62b980fda754318c29862d39c, the signature original string stringtosgn=sha1\n 1510109254; 1510109314/n 35601c3365a361b 620fda 754318c29862d39 c/n.
(9) An electronic signature is generated.
And calculating a message digest by using the HMAC-SHA1 and the signature original text string as a message by using the signature key as a key to generate an electronic signature. Can be expressed as: signature=HMAC-SHA 1 (SignKey, stringToSign).
For example, the signing key is: a4501294d3a835f8dab6caf5c19837dd19eef357; the signature original text character string is ha1\n1510109254; 1510109314/n 35601c3365a361b 620fda 754318c29862d39 c/n; then the electronic Signature signature=hmac-SHA 1 (a 4501294d3a835f8dab6caf5c19837dd19eef357, ha1\n1510109254;1510109314\n35601c3365a361b 62980fda 754318c29862d39 c\n) =2c 53900d3fe8d2e875db8a6af5fe7303ee1567a8.
Step 304, if the signature to be detected is different from the correct signature, at least one error cause chain is generated.
After generating the correct signature, the terminal may compare the to-be-detected signature with the correct signature, and if the to-be-detected signature is different from the correct signature, it indicates that the to-be-detected signature generated by the user is incorrect. In this case, the terminal may generate at least one error cause chain. Wherein each error cause chain includes at least one reference error cause.
The above-mentioned reference error causes are sorted according to some common error causes frequently fed back by users.
Illustratively, the reference error cause may be that the request method is capitalized; or the request parameters are not ordered according to the dictionary; it is also possible to include an underline in the request parameters; it may also be that the request header is capitalized, and so on.
Since the user may have more than one error in the process of generating the electronic signature, that is, the error cause of one electronic signature may include a plurality of, i.e., a chain of error causes. Alternatively, when the number of reference error causes is n, the number of error cause chains is 2 n -1, n is a positive integer。
For example, one chain of error causes may include the request method being capitalized and the request parameters not being ordered by dictionary; another chain of error causes may include request parameters that are not ordered by dictionary, request parameters that include underlining, and request header capitalization.
In practice, common error reasons fed back by the user can be continuously collected, so that reference error reasons can be expanded, and the detection accuracy can be further improved.
At step 305, at least one error signature is generated based on the meta information and at least one chain of error causes.
After the at least one error cause chain is obtained, at least one error signature may be generated from the at least one error cause chain and the meta information.
Alternatively, when the number of error cause chains is 2 n -1, generating at least one said error signature from the meta-information and at least one chain of error causes, may comprise: according to meta information and 2 n -1 chain of error causes, generating 2 n -1 false signature.
Step 306, comparing whether the target error signature which is the same as the signature to be detected exists in the error signatures.
After generating at least one error signature, the terminal may compare whether the target error signature identical to the signature to be detected exists in the respective error signatures
If the target error signature exists, the reference error cause included in the error cause chain for generating the target error signature is determined as the error cause of the signature to be detected in step 307.
After comparing each error signature with the signature to be detected, if the target error signature identical to the signature to be detected exists, it can be determined that the user has a reference error reason included in an error reason chain for generating the target error signature in the process of generating the signature to be detected, so that the reference error reason included in the error reason chain for generating the target error signature can be determined as the error reason of the signature to be detected.
In addition, after comparing each error signature with the signature to be detected, if the target error signature identical to the signature to be detected does not exist, the failure of detecting the error causes is indicated. In this case, the terminal may directly feed back to the user failure to detect the error cause, and prompt the user to check the error cause according to the document.
Illustratively, as shown in FIG. 5, a flow chart is illustratively shown for determining the cause of an error in a signature to be detected. The terminal can collect some common error reasons frequently fed back by the user, and arrange n reference error reasons, such as reference error reason 1, reference error reason 2, reference error reason 3, and up to reference error reason n. Based on the n reference error causes, 2 can be generated n -1 a chain of error causes; and according to meta information and 2 n -1 chain of error causes, generate 2 n -1 false signature. Then, whether the target error signature which is the same as the signature to be detected exists in each error signature can be compared, and if the target error signature exists, the reference error reasons included in the error reason chain for generating the target error signature are determined to be the error reasons of the signature to be detected; if the target error signature does not exist, the failure of detecting the error reason is indicated.
In summary, according to the technical solution provided in the embodiments of the present application, when the to-be-detected signature is different from the correct signature, at least one error signature may be generated according to the meta information and at least one error cause chain, and after comparing each error signature with the to-be-detected signature, there is a target error signature identical to the to-be-detected signature, then a reference error cause included in the error cause chain for generating the target error signature may be determined as the error cause of the to-be-detected signature. According to the technical scheme provided by the embodiment of the application, the detailed error reason of the error of the electronic signature of the user can be intelligently detected, the error detection efficiency of the electronic signature is improved, the experience of using the cloud service by the user is improved, and the threshold of using the cloud service by the user is reduced.
In addition, according to the technical scheme provided by the embodiment of the application, a user does not need to request a technician to analyze and detect, and the labor cost is reduced.
The following describes the beneficial effects of the technical solution provided in the present application from the product side.
Referring to fig. 6, a flowchart of an error detection method of an electronic signature according to another embodiment of the present application is shown. In this embodiment, the method is mainly applied to the terminal in the implementation environment shown in fig. 1 for illustration. The method may comprise the following steps:
Step 601, an error detection page of the electronic signature is displayed.
When the user needs to perform electronic signature detection, the error detection page can be displayed in the terminal. The error detection page is used for inputting a signature to be detected by a user to detect the electronic signature.
Alternatively, as shown in fig. 7, the error detection page 70 includes a request information input field 71, where the request information input field 71 is used for a user to input an electronic signature 711 to be detected and meta information 712 of the signature to be detected. The meta information about the signature to be detected has been described above and will not be described in detail here.
Optionally, the detection page 70 further includes a key input field 72, where the key input field 72 is used for the user to input the electronically signed key. The key is described in detail above and will not be described here again.
Step 602, obtaining a signature to be detected and meta information of the signature to be detected, which are input in an error detection page.
The user inputs the signature to be detected and meta information of the signature to be detected in the detection page, and correspondingly, the terminal can acquire the signature to be detected and the meta information of the signature to be detected, which are input in the detection page.
Step 603, after receiving the detection instruction, displaying a detection result of the signature to be detected.
After the signature to be detected is obtained, the terminal can detect the signature to be detected. After receiving the detection instruction, the terminal may display a detection result of the signature to be detected. The detection instruction is used for triggering detection of the signature to be detected.
Optionally, as shown in fig. 7, a detection control 73 may be included in the detection page 70, and the user may click on the detection control 73 to trigger the detection instruction. In addition, the user can trigger the detection instruction through physical keys, gestures, voices and the like. The embodiments of the present application are not limited in this regard.
In step 604, when the detection result is that the signature is wrong, an error reason of the signature to be detected is displayed.
If the signature to be detected is wrong, the terminal can display the error reason of the signature to be detected.
For example, as shown in fig. 7, the error causes of the signature to be detected may include that the Method should be converted into lowercase; headerList is not converted to lowercase; headerList is not ordered by dictionary.
In addition, if the signature to be detected is correct, the terminal can display a signature correct prompt message to prompt the user that the signature to be detected is correct.
For example, as shown in fig. 7, the terminal may display a signature correctness prompt message, such as "detect success, your signature is correct", to prompt the user that the signature to be detected is correct.
In addition, if the detection fails, the terminal may display a prompt message of the detection failure to prompt the user that the detection of the error reason fails, and prompt the user to check the error reason according to the document.
For example, as shown in fig. 7, the terminal may display a prompt message of detection failure, such as "detection failure, failing to find a signature error cause", to prompt the user that detection of the error cause fails.
In summary, according to the technical solution provided in the embodiments of the present application, the terminal displays the error reason of the signature to be detected by inputting the signature to be detected in the detection page, and after receiving the detection instruction, when the detection result is that the signature is wrong. Compared with the related art, the method requires the user to compare with the intermediate variable calculated by the electronic signature tool by himself and check the reason of the electronic signature error. According to the technical scheme provided by the embodiment of the application, when the detection result is that the signature is wrong, the error reason of the signature to be detected is directly displayed, and the accuracy of the detection result is improved.
The following are device embodiments of the present application, which may be used to perform method embodiments of the present application. For details not disclosed in the device embodiments of the present application, please refer to the method embodiments of the present application.
Referring to fig. 8, a block diagram of an electronic signature error detection device according to an embodiment of the present application is shown. The device has the function of realizing the method example, and the function can be realized by hardware or can be realized by executing corresponding software by hardware. The device may be the terminal described above or may be provided on the terminal. The apparatus 800 may include: the detection information acquisition module 810, the correct signature generation module 820, the error signature generation module 830, and the error cause determination module 840.
The detection information obtaining module 810 is configured to obtain a signature to be detected and meta information of the signature to be detected, where the meta information refers to information used for generating the signature to be detected.
A correct signature generating module 820, configured to generate a correct signature according to the meta information.
And an error signature generation module 830, configured to generate an error signature according to the meta information and a reference error cause when the signature to be detected is different from the correct signature.
An error cause determining module 840 is configured to determine an error cause of the signature to be detected by comparing the signature to be detected with the error signature.
In summary, according to the technical solution provided in the embodiments of the present application, when the signature to be detected is different from the correct signature, an error signature is generated according to meta information and a reference error cause of the signature to be detected, and the error cause of the signature to be detected is determined based on the error signature. Compared with the related art, the technical scheme provided by the embodiment of the application can automatically detect whether the electronic signature generated by the user is correct or not, and automatically detect the error reason under the condition that the electronic signature is wrong, so that the error detection efficiency of the electronic signature is improved, the experience of using cloud services by the user is improved, and the threshold of using the cloud services by the user is reduced.
In some possible designs, as shown in fig. 9, the error signature generation module 830 includes: a cause chain generation unit 831 and an error signature generation unit 832.
The reason chain generating unit 831 is configured to generate at least one error reason chain, where each error reason chain includes at least one reference error reason.
An error signature generating unit 832 is configured to generate at least one error signature according to the meta information and the at least one error cause chain.
In some possible designs, the number of reference error causes is n, and the number of error cause chains is 2 n -1, said n being a positive integer;
the error signature generation unit 832 is configured to generate a signature based on the meta information and 2 n -1 of said error cause chains, generating 2 n -1 said false signatures.
In some possible designs, the error cause determination module 840 is configured to: comparing whether the target error signature which is the same as the signature to be detected exists in each error signature; when the target error signature exists, determining a reference error reason included in an error reason chain for generating the target error signature as the error reason of the signature to be detected.
In some possible designs, the detection information acquisition module 810 is configured to: acquiring request information of a cloud service request; and analyzing the request information to obtain the signature to be detected and the meta information.
Referring to fig. 10, a block diagram of an error detection apparatus for electronic signatures according to one embodiment of the present application is shown. The device has the function of realizing the method example, and the function can be realized by hardware or can be realized by executing corresponding software by hardware. The device may be the terminal described above or may be provided on the terminal. The apparatus 1000 may include: a page display module 1010, a signature acquisition module 1020, a result display module 1030, and a cause display module 1040.
And a page display module 1010 for displaying an error detection page of the electronic signature.
The signature acquisition module 1020 is configured to acquire a signature to be detected and meta information of the signature to be detected, where the meta information is information used for generating the signature to be detected, where the meta information is input in the error detection page.
And the result display module 1030 is configured to display a detection result of the signature to be detected after receiving the detection instruction.
And the reason display module 1040 is configured to display an error reason of the signature to be detected when the detection result is that the signature is wrong.
In summary, according to the technical solution provided in the embodiments of the present application, the terminal displays the error reason of the signature to be detected by inputting the signature to be detected in the detection page, and after receiving the detection instruction, when the detection result is that the signature is wrong. Compared with the related art, the method requires the user to compare with the intermediate variable calculated by the electronic signature tool by himself and check the reason of the electronic signature error. According to the technical scheme provided by the embodiment of the application, when the detection result is that the signature is wrong, the error reason of the signature to be detected is directly displayed, and the accuracy of the detection result is improved.
It should be noted that, in the apparatus provided in the foregoing embodiment, when implementing the functions thereof, only the division of the foregoing functional modules is used as an example, in practical application, the foregoing functional allocation may be implemented by different functional modules, that is, the internal structure of the device is divided into different functional modules, so as to implement all or part of the functions described above. In addition, the apparatus and the method embodiments provided in the foregoing embodiments belong to the same concept, and specific implementation processes of the apparatus and the method embodiments are detailed in the method embodiments and are not repeated herein.
Referring to fig. 11, a block diagram of a terminal according to an embodiment of the present application is shown. Generally, the terminal 1100 includes: a processor 1101 and a memory 1102.
The processor 1101 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 1101 may be implemented in at least one hardware form of DSP (Digital Signal Processing ), FPGA (Field Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array ). The processor 1101 may also include a main processor, which is a processor for processing data in an awake state, also called a CPU (Central Processing Unit ), and a coprocessor; a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 1101 may integrate a GPU (Graphics Processing Unit, image processor) for rendering and drawing of content required to be displayed by the display screen. In some embodiments, the processor 1101 may also include an AI (Artificial Intelligence ) processor for processing computing operations related to machine learning.
Memory 1102 may include one or more computer-readable storage media, which may be non-transitory. Memory 1102 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 1102 is used to store at least one instruction, at least one program, code set, or instruction set for execution by processor 1101 to implement the error detection method of an electronic signature provided by the method embodiments herein.
In some embodiments, the terminal 1100 may further optionally include: a peripheral interface 1103 and at least one peripheral. The processor 1101, memory 1102, and peripheral interface 1103 may be connected by a bus or signal lines. The individual peripheral devices may be connected to the peripheral device interface 1103 by buses, signal lines or circuit boards. Specifically, the peripheral device may include: at least one of a communication interface 1104, a display screen 1105, audio circuitry 1106, a camera component 1107, a positioning component 1108, and a power supply 1109.
Those skilled in the art will appreciate that the structure shown in fig. 11 is not limiting and that terminal 1100 may include more or fewer components than shown, or may combine certain components, or may employ a different arrangement of components.
Referring to fig. 12, a schematic structural diagram of a server according to an embodiment of the present application is shown. Specifically, the present invention relates to a method for manufacturing a semiconductor device.
The server 1200 includes a CPU (Central Processing Unit ) 1201, a system Memory 1204 including a RAM (Random Access Memory ) 1202 and a ROM (Read Only Memory) 1203, and a system bus 1205 connecting the system Memory 1204 and the central processing unit 1201. The server 1200 also includes a basic I/O (Input/Output) system 1206, which facilitates the transfer of information between various devices within the computer, and a mass storage device 1207 for storing an operating system 1213, application programs 1214, and other program modules 1212.
The basic input/output system 1206 includes a display 1208 for displaying information and an input device 1209, such as a mouse, keyboard, etc., for user input of information. Wherein the display 1208 and the input device 1209 are coupled to the central processing unit 1201 via an input-output controller 1210 coupled to a system bus 1205. The basic input/output system 1206 may also include an input/output controller 1210 for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, the input output controller 1210 also provides output to a display screen, a printer, or other type of output device.
The mass storage device 1207 is connected to the central processing unit 1201 through a mass storage controller (not shown) connected to the system bus 1205. The mass storage device 1207 and its associated computer-readable media provide non-volatile storage for the server 1200. That is, the mass storage device 1207 may include a computer readable medium (not shown), such as a hard disk or CD-ROM (Compact Disc Read-Only Memory) drive.
The computer readable medium may include computer storage media and communication media without loss of generality. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, EPROM (Erasable Programmable Read Only Memory) erasable programmable read-only memory), flash memory or other solid state memory technology, CD-ROM, DVD or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will recognize that the computer storage medium is not limited to the one described above. The system memory 1204 and mass storage device 1207 described above may be collectively referred to as memory.
According to various embodiments of the present application, the server 1200 may also operate by being connected to a remote computer on a network, such as the Internet. I.e., the server 1200 may be connected to the network 1212 through a network interface unit 1211 coupled to the system bus 1205, or alternatively, the network interface unit 1211 may be used to connect to other types of networks or remote computer systems (not shown).
The memory also includes at least one instruction, at least one program, code set, or instruction set stored in the memory and configured to be executed by one or more processors to implement the error detection method of electronic signatures described above.
In an exemplary embodiment, a computer device is also provided. The computer device may be a terminal or a server. The computer device comprises a processor and a memory, wherein at least one instruction, at least one section of program, code set or instruction set is stored in the memory, and the at least one instruction, the at least one section of program, the code set or instruction set is loaded and executed by the processor to realize the error detection method of the electronic signature.
In an exemplary embodiment, a computer readable storage medium is also provided, in which at least one instruction, at least one program, a set of codes, or a set of instructions is stored, which when executed by a processor, implement the error detection method of an electronic signature described above.
In an exemplary embodiment, a computer program product is also provided, which, when being executed by a processor, is adapted to carry out the above-described error detection method of electronic signatures.
It should be understood that references herein to "a plurality" are to two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship.
The foregoing description of the exemplary embodiments of the present application is not intended to limit the invention to the particular embodiments disclosed, but on the contrary, the intention is to cover all modifications, equivalents, alternatives, and alternatives falling within the spirit and scope of the invention.

Claims (8)

1. An error detection method of an electronic signature, wherein the electronic signature is signature data obtained by encrypting meta information of the electronic signature, the method comprising:
acquiring a signature to be detected and meta information of the signature to be detected, wherein the meta information refers to information used for generating the signature to be detected;
generating a correct signature according to the meta information;
if the signature to be detected is different from the correct signature, generating 2 according to n reference error reasons n -1 error cause chain, each error cause chain comprising at least one reference error cause, n being a positive integer;
based on the meta information and the 2 n -1 chain of error causes, generating 2 n -1 false signature;
by comparing the signature to be detected with the 2 n -1 error signature, determining the error cause of the signature to be detected.
2. The method of claim 1, wherein the comparing the signature to be detected with the 2 is performed by comparing the signature to be detected with the 2 n -1 error signatures, determining the cause of the error of the signature to be detected, comprising:
aligning said 2 n -whether there is a target error signature of the 1 error signatures that is identical to the signature to be detected;
if the target error signature exists, determining a reference error reason included in an error reason chain for generating the target error signature as the error reason of the signature to be detected.
3. The method according to claim 1 or 2, wherein the obtaining the signature to be detected and meta information of the signature to be detected comprises:
acquiring request information of a cloud service request;
and analyzing the request information to obtain the signature to be detected and the meta information.
4. An error detection apparatus for an electronic signature, wherein the electronic signature is signature data obtained by encrypting meta information of the electronic signature, the apparatus comprising:
the detection information acquisition module is used for acquiring a signature to be detected and meta information of the signature to be detected, wherein the meta information refers to information used for generating the signature to be detected;
the correct signature generation module is used for generating a correct signature according to the meta information;
an error signature generation module for generating 2 according to n reference error reasons if the signature to be detected is different from the correct signature n -1 error cause chain, each error cause chain comprising at least one reference error cause, n being a positive integer;
the error signature generation module is further configured to generate a signature based on the meta information and the 2 n -1 chain of error causes, generating 2 n -1 false signature;
an error cause determining module for comparing the signature to be detected with the 2 n -1 error signature, determining the error cause of the signature to be detected.
5. The apparatus of claim 4, wherein the error cause determination module is configured to:
aligning said 2 n -whether there is a target error signature of the 1 error signatures that is identical to the signature to be detected;
when the target error signature exists, determining a reference error reason included in an error reason chain for generating the target error signature as the error reason of the signature to be detected.
6. The apparatus according to claim 4 or 5, wherein the detection information acquisition module is configured to:
acquiring request information of a cloud service request;
and analyzing the request information to obtain the signature to be detected and the meta information.
7. A computer device comprising a processor and a memory, wherein the memory has stored therein at least one program that is loaded and executed by the processor to implement the method of any of claims 1 to 3.
8. A computer readable storage medium, characterized in that at least one program is stored in the computer readable storage medium, which is loaded and executed by a processor to implement the method according to any one of claims 1 to 3.
CN201911189180.1A 2019-11-28 2019-11-28 Error detection method, device, equipment and storage medium for electronic signature Active CN111193595B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911189180.1A CN111193595B (en) 2019-11-28 2019-11-28 Error detection method, device, equipment and storage medium for electronic signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911189180.1A CN111193595B (en) 2019-11-28 2019-11-28 Error detection method, device, equipment and storage medium for electronic signature

Publications (2)

Publication Number Publication Date
CN111193595A CN111193595A (en) 2020-05-22
CN111193595B true CN111193595B (en) 2023-05-09

Family

ID=70710964

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911189180.1A Active CN111193595B (en) 2019-11-28 2019-11-28 Error detection method, device, equipment and storage medium for electronic signature

Country Status (1)

Country Link
CN (1) CN111193595B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9032259B1 (en) * 2012-02-29 2015-05-12 Amazon Technologies, Inc. Test prioritization techniques
CN105631272A (en) * 2016-02-02 2016-06-01 云南大学 Multi-safeguard identity authentication method
CN109005038A (en) * 2018-08-03 2018-12-14 北京达佳互联信息技术有限公司 Endorsement method, device, electronic equipment and storage medium
CN109039990A (en) * 2017-06-08 2018-12-18 腾讯科技(深圳)有限公司 The method and device of behavior verifying is carried out based on identifying code

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080115029A1 (en) * 2006-10-25 2008-05-15 International Business Machines Corporation iterative test generation and diagnostic method based on modeled and unmodeled faults
CN101299753B (en) * 2008-06-17 2012-12-05 浙江大学 Web service security control mechanism based on proxy server
US20120260304A1 (en) * 2011-02-15 2012-10-11 Webroot Inc. Methods and apparatus for agent-based malware management
CN102571357B (en) * 2012-02-24 2014-03-26 飞天诚信科技股份有限公司 Signature realization method and signature realization device
US9317357B2 (en) * 2014-03-20 2016-04-19 International Business Machines Corporation Management of microcode errors in a storage operation
CN108462580B (en) * 2017-02-22 2020-07-07 腾讯科技(深圳)有限公司 Numerical value transferring method and device
US10795750B2 (en) * 2017-06-04 2020-10-06 Apple Inc. Auto bug capture
CN107798301A (en) * 2017-10-13 2018-03-13 上海眼控科技股份有限公司 A kind of signature detection system and method for vehicle annual test
US11120198B2 (en) * 2017-12-18 2021-09-14 Paul Zawierka Method and system for generating and submitting a petition
CN110297776B (en) * 2019-07-03 2023-10-20 深圳市腾讯网域计算机网络有限公司 Detection report generation and reception methods, devices, equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9032259B1 (en) * 2012-02-29 2015-05-12 Amazon Technologies, Inc. Test prioritization techniques
CN105631272A (en) * 2016-02-02 2016-06-01 云南大学 Multi-safeguard identity authentication method
CN109039990A (en) * 2017-06-08 2018-12-18 腾讯科技(深圳)有限公司 The method and device of behavior verifying is carried out based on identifying code
CN109005038A (en) * 2018-08-03 2018-12-14 北京达佳互联信息技术有限公司 Endorsement method, device, electronic equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Machine Fault Signature Analysis;Pratesh Jayaswal ect.;《International Journal of Rotating Machinery》;全文 *
基于数据差异化分支签名的条件跳转错误检测算法;崔含泽;臧海娟;张春花;潘勇;;信息技术与信息化(第11期);全文 *
基于签名的控制流错误检测算法检测能力的验证模型;吴艳霞;顾国昌;戴葵;沈晶;刘海波;;宇航学报(第12期);全文 *

Also Published As

Publication number Publication date
CN111193595A (en) 2020-05-22

Similar Documents

Publication Publication Date Title
CN109683953B (en) Method and device for processing configuration file based on visual interface
US10740411B2 (en) Determining repeat website users via browser uniqueness tracking
CN112162965B (en) Log data processing method, device, computer equipment and storage medium
CN109614327B (en) Method and apparatus for outputting information
US20200320458A1 (en) System, method, and computer-readable medium for tracking information exchange
CN110442519B (en) Crash file processing method and device, electronic equipment and storage medium
RU2662405C2 (en) Certification documents automatic generation
US10241957B2 (en) Workload patterns for realistic load recreation in performance testing
CN112445866A (en) Data processing method and device, computer readable medium and electronic equipment
CN111507439A (en) User information checking method and system based on information code
CN112181835A (en) Automatic testing method and device, computer equipment and storage medium
CN111367531B (en) Code processing method and device
CN114564294A (en) Intelligent service arranging method and device, computer equipment and storage medium
US7962847B2 (en) Method for providing dynamic process step annotations
CN115563600A (en) Data auditing method and device, electronic equipment and storage medium
US11514240B2 (en) Techniques for document marker tracking
CN116069838A (en) Data processing method, device, computer equipment and storage medium
CN109857634A (en) Interface testing parameter verification method, apparatus, electronic equipment and storage medium
CN111193595B (en) Error detection method, device, equipment and storage medium for electronic signature
CN111400027A (en) Distributed task processing method, device and system
CN114357032A (en) Data quality monitoring method and device, electronic equipment and storage medium
CN115600038A (en) Page rendering method, device, equipment and medium
CN114615325A (en) Message pushing method and device, computer equipment and storage medium
CN110309062B (en) Use case generation method, device, electronic equipment and storage medium
CN111651259A (en) Dependency relationship-based system management method and device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant