CN111552983A - Electronic signature method based on single chip microcomputer - Google Patents
Electronic signature method based on single chip microcomputer Download PDFInfo
- Publication number
- CN111552983A CN111552983A CN202010351615.4A CN202010351615A CN111552983A CN 111552983 A CN111552983 A CN 111552983A CN 202010351615 A CN202010351615 A CN 202010351615A CN 111552983 A CN111552983 A CN 111552983A
- Authority
- CN
- China
- Prior art keywords
- electronic signature
- chip microcomputer
- single chip
- method based
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000012795 verification Methods 0.000 claims description 4
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention provides an electronic signature method based on a single chip microcomputer, which belongs to the field of electronic information and is characterized in that the method is based on a Nucleus operating system, wherein the single chip microcomputer is arranged in the Nucleus operating system, the single chip microcomputer operates the Nucleus operating system, and an electronic signature operates in the Nucleus operating system; the model of the single chip microcomputer is an MT6261 chip. According to the method and the device, before the electronic signature is executed, the identity authentication is required to be carried out firstly, and the electronic signature can be carried out only after the electronic signature passes the authentication.
Description
Technical Field
The technical scheme belongs to the field of electronic information, and particularly relates to an electronic signature method.
Background
An electronic signature is data contained in electronic form in a data message that is attached to identify the identity of a signer and to indicate that the signer has recognized the content therein. In popular terms, the electronic signature is an electronic signature of an electronic document through a cryptographic technology, is not a digital image of a written signature, is similar to a handwritten signature or a seal, and can also be called an electronic seal.
The electronic signature is used in the online transaction of a card holder in consumption/pre-authorization, finishes signature on the electronic signature acquisition equipment, and replaces the existing transaction finishing mode of signing on a paper receipt. In the prior art, the electronic signature technology has the characteristics of a built-in signature board, transaction feature code and electronic signature synthesis, synthetic image compression, adoption of a compression algorithm and the like. The existing signature board also has the functions of 'confirm', 'cancel' and're-input', and the operations of submitting, canceling or re-inputting signature information and the like can be completed by a card holder after the electronic signature is completed. This feature of the prior art has led to the gradual development of electronic signature technology in the domestic acceptance market in recent years. However, the prior art electronic signature has the disadvantages of security
Disclosure of Invention
In order to solve the above problems, an object of the present invention is to provide an electronic signature method based on a single chip microcomputer with good security.
The invention also aims to provide the electronic signature method based on the single chip microcomputer, which is simple to operate.
In order to achieve the above object, the present invention has the following technical means.
The invention provides an electronic signature method based on a single chip microcomputer, which is characterized in that the method is based on a Nucleus operating system, wherein the single chip microcomputer is arranged in the Nucleus operating system, the single chip microcomputer operates the Nucleus operating system, and an electronic signature operates in the Nucleus operating system; the model of the single chip microcomputer is an MT6261 chip.
The method comprises the following specific steps:
step 1: after the Nucleus operating system is started, carrying out identity authentication, entering a step 2 if the authentication is successful, and entering the step 1 again if the authentication is failed;
step 2: entering an electronic signature interface;
and step 3: touch control is carried out on the interface of the electronic signature, and the interface of the electronic signature displays graphs or characters generated after touch control;
and 4, step 4: confirming the graphs or characters generated after touch control, and if the graphs or characters generated by touch control are confirmed to be correct, entering the step 5, and if the graphs or characters generated by touch control are confirmed to be incorrect, entering the step 2;
and 5: capturing a screen of the graph or the character generated after touch control;
step 6: and compressing the picture obtained by screen capture, and uploading the compressed file. Uploading the compressed file is realized through the prior art such as WIFI and GPRS. Through the authentication in the step 1, the authentication is required to be performed before the electronic signature is executed, and the electronic signature can be performed only after the electronic signature passes the authentication.
Further, in step 1, the identity is verified by setting a security chip. The security chip is specifically MH 1902.
Further, the generated instruction is sent to the security chip, and the security chip verifies the instruction, so that identity verification is achieved.
Furthermore, the security chip comprises a secret key storage function and a hardware encryption and decryption function, an RSA private key is introduced into an SRAM area of the security chip, the RSA public key is used for encrypting the client information and the feature code, and the encrypted data is sent to the security chip through a serial port. The RSA private key is imported through the security chip, the data obtained by encrypting the client information and the feature code by using the RSA public key is sent to the security chip, the security chip decrypts the data through the RSA private key to obtain the client information and the feature, the client information and the feature are sent to the Nucleus operating system, and the Nucleus operating system performs identity judgment.
Further, in step 6, the picture is backed up and stored before being compressed, and the backed-up picture is deleted after the file after the picture is compressed is uploaded.
Further, in step 3, specifically, the interface of the electronic signature includes a touch panel and an LCD, and after the touch input is performed on the touch panel, the graph or text generated by the touch is displayed on the LCD.
Further, the touch panel is used for touch input of graphics or characters, the touch panel sends coordinates of touch points to the buffer cache queue, the Nucleus operating system obtains the coordinates from the buffer cache queue, then functions of the graphics or the characters are called, and tracks are displayed on the LCD.
Further, in step 5, a buffer of the LCD screen is intercepted, and the buffer data is binarized. For example, when the resolution of the screen is 128 × 64, the size of the resulting data is (128 × 64/8).
Further, in step 6, the binarized data is backed up and stored, and compressed to generate data in a jbig format, the backed-up binarized data is successfully deleted on the data in the jbig format, and the jbig data is the final electronic signature data.
Compared with the prior art, the method has the advantages that the identity authentication is required to be carried out before the electronic signature is executed, the electronic signature can be carried out after the electronic signature passes, and by adopting the process, the obtained electronic signature data is safer and the source is more reliable.
Drawings
Fig. 1 is a schematic diagram of the work of a nucleous operating system of the electronic signature method based on the single chip microcomputer.
Fig. 2 is a flow chart of the electronic signature method based on the single chip microcomputer.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In order to achieve the above object, the present invention has the following technical means.
The invention provides an electronic signature method based on a single chip microcomputer, which is characterized in that the method is based on a Nucleus operating system, wherein the single chip microcomputer is arranged in the Nucleus operating system, the single chip microcomputer operates the Nucleus operating system, and an electronic signature operates in the Nucleus operating system; the model of the single chip microcomputer is an MT6261 chip.
The method comprises the following specific steps:
step 1: after the Nucleus operating system is started, carrying out identity authentication, entering a step 2 if the authentication is successful, and entering the step 1 again if the authentication is failed;
step 2: entering an electronic signature interface;
and step 3: touch control is carried out on the interface of the electronic signature, and the interface of the electronic signature displays graphs or characters generated after touch control;
and 4, step 4: confirming the graphs or characters generated after touch control, and if the graphs or characters generated by touch control are confirmed to be correct, entering the step 5, and if the graphs or characters generated by touch control are confirmed to be incorrect, entering the step 2;
and 5: capturing a screen of the graph or the character generated after touch control;
step 6: and compressing the picture obtained by screen capture, and uploading the compressed file.
In this embodiment, the authentication of the identity is implemented by setting a security chip in step 1.
In this embodiment, the instruction is generated and sent to the security chip, and the security chip verifies the instruction, thereby implementing the identity verification.
In this embodiment, the security chip includes a secret key storage function and a hardware encryption/decryption function, an RSA private key is introduced into an SRAM area of the security chip, the client information and the feature code are encrypted using the RSA public key, and the encrypted data is sent to the security chip through a serial port.
In this embodiment, in step 6, the picture is backed up and stored before being compressed, and the backed-up picture is deleted after the file after the picture is compressed is uploaded.
In this embodiment, in step 3, specifically, the interface of the electronic signature includes a touch panel and an LCD, and after the touch panel performs touch input, the graph or text generated by touch is displayed on the LCD.
In this embodiment, a graphic or a text is touch-input on the touch panel, the touch panel sends the coordinates of the touch point to the buffer cache queue, the nucleous operating system fetches the coordinates from the buffer cache queue, and then calls the function of the graphic or the text to display the track on the LCD.
In this embodiment, in step 5, the buffer of the LCD screen is clipped, and the buffer data is binarized.
In this embodiment, in step 6, the binarized data is backed up and stored, and compressed to generate data in the jbig format, and the backed-up binarized data is successfully deleted on the data in the jbig format, where the jbig data is the final electronic signature data.
Compared with the prior art, the method has the advantages that the identity authentication is required to be carried out before the electronic signature is executed, the electronic signature can be carried out after the electronic signature passes, and by adopting the process, the obtained electronic signature data is safer and the source is more reliable.
The present invention is not limited to the above preferred embodiments, and any modifications, equivalent substitutions and improvements made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (9)
1. The electronic signature method based on the single chip microcomputer is characterized in that the method is based on a Nucleus operating system, the single chip microcomputer is arranged in the Nucleus operating system, the single chip microcomputer operates the Nucleus operating system, and the electronic signature operates in the Nucleus operating system;
the method comprises the following specific steps:
step 1: after the Nucleus operating system is started, carrying out identity authentication, entering a step 2 if the authentication is successful, and entering the step 1 again if the authentication is failed;
step 2: entering an electronic signature interface;
and step 3: touch control is carried out on the interface of the electronic signature, and the interface of the electronic signature displays graphs or characters generated after touch control;
and 4, step 4: confirming the graphs or characters generated after touch control, and if the graphs or characters generated by touch control are confirmed to be correct, entering the step 5, and if the graphs or characters generated by touch control are confirmed to be incorrect, entering the step 2;
and 5: capturing a screen of the graph or the character generated after touch control;
step 6: and compressing the picture obtained by screen capture, and uploading the compressed file.
2. The electronic signature method based on the single chip microcomputer as claimed in claim 1, wherein the verification of the identity is realized by setting a security chip in step 1.
3. The electronic signature method based on the single chip microcomputer as claimed in claim 2, wherein the command is generated and sent to the security chip, and the security chip verifies the command to further realize the identity verification.
4. The electronic signature method based on the single chip microcomputer as claimed in claim 2, wherein the secure chip comprises a storage key and a hardware encryption and decryption function, an RSA private key is introduced into an SRAM area of the secure chip, an RSA public key is used for encrypting the client information and the feature code, and the encrypted data is sent to the secure chip through a serial port.
5. The electronic signature method based on the single chip microcomputer as claimed in claim 1, wherein in step 6, the picture is backed up and stored before being compressed, and the backed-up picture is deleted after the file after the picture is compressed is uploaded.
6. The electronic signature method based on the single chip microcomputer as claimed in claim 1, wherein in step 3, the electronic signature interface comprises a touch panel and an LCD, and after touch input is performed on the touch panel, a graph or a character generated by touch is displayed on the LCD.
7. The electronic signature method based on the single chip microcomputer as claimed in claim 6, wherein a touch panel is used for touch input of graphics or characters, the touch panel sends coordinates of touch points to a buffer cache queue, the system fetches the coordinates from the buffer cache queue, and then calls a function of the graphics or the characters to display a track on an LCD.
8. The electronic signature method based on the single chip microcomputer as claimed in claim 7, wherein in step 5, the buffer of the LCD screen is intercepted and the buffer data is binarized.
9. The electronic signature method based on the single chip microcomputer as claimed in claim 8, wherein in step 6, the binarized data is backed up and stored, and compressed to generate data in jbig format, the backed up binarized data is successfully deleted on the data in jbig format, and the jbig data is the final electronic signature data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010351615.4A CN111552983B (en) | 2020-04-28 | 2020-04-28 | Electronic signature method based on single chip microcomputer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010351615.4A CN111552983B (en) | 2020-04-28 | 2020-04-28 | Electronic signature method based on single chip microcomputer |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111552983A true CN111552983A (en) | 2020-08-18 |
CN111552983B CN111552983B (en) | 2023-12-15 |
Family
ID=72005972
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010351615.4A Active CN111552983B (en) | 2020-04-28 | 2020-04-28 | Electronic signature method based on single chip microcomputer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111552983B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103177364A (en) * | 2011-12-26 | 2013-06-26 | 中国银联股份有限公司 | Transaction processing method based on electronic signature |
CN104462910A (en) * | 2013-09-13 | 2015-03-25 | 天津力诺科技发展有限公司 | Safety electronic signature device |
CN104484942A (en) * | 2014-12-15 | 2015-04-01 | 江苏国光信息产业股份有限公司 | Client interaction terminal and counter transaction method thereof |
CN205283564U (en) * | 2015-12-25 | 2016-06-01 | 北京握奇智能科技有限公司 | Electronic signature device |
CN108038449A (en) * | 2017-12-14 | 2018-05-15 | 广东德生科技股份有限公司 | A kind of with no paper electric endorsement method and system |
CN108900929A (en) * | 2018-08-08 | 2018-11-27 | 北京奇安信科技有限公司 | A kind of image watermark signature processing method and processing device |
CN109245893A (en) * | 2017-07-10 | 2019-01-18 | 浙江华信区块链科技服务有限公司 | A kind of identity building and endorsement method for substituting U-shield |
CN109951460A (en) * | 2019-03-07 | 2019-06-28 | 成都麦动信息技术有限公司 | Safety information system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20080018396A (en) * | 2006-08-24 | 2008-02-28 | 한국문화콘텐츠진흥원 | Computer-readable medium for recording mobile application and personal computer application for displaying display information of mobile communications terminal in external display device |
-
2020
- 2020-04-28 CN CN202010351615.4A patent/CN111552983B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103177364A (en) * | 2011-12-26 | 2013-06-26 | 中国银联股份有限公司 | Transaction processing method based on electronic signature |
CN104462910A (en) * | 2013-09-13 | 2015-03-25 | 天津力诺科技发展有限公司 | Safety electronic signature device |
CN104484942A (en) * | 2014-12-15 | 2015-04-01 | 江苏国光信息产业股份有限公司 | Client interaction terminal and counter transaction method thereof |
CN205283564U (en) * | 2015-12-25 | 2016-06-01 | 北京握奇智能科技有限公司 | Electronic signature device |
CN109245893A (en) * | 2017-07-10 | 2019-01-18 | 浙江华信区块链科技服务有限公司 | A kind of identity building and endorsement method for substituting U-shield |
CN108038449A (en) * | 2017-12-14 | 2018-05-15 | 广东德生科技股份有限公司 | A kind of with no paper electric endorsement method and system |
CN108900929A (en) * | 2018-08-08 | 2018-11-27 | 北京奇安信科技有限公司 | A kind of image watermark signature processing method and processing device |
CN109951460A (en) * | 2019-03-07 | 2019-06-28 | 成都麦动信息技术有限公司 | Safety information system |
Also Published As
Publication number | Publication date |
---|---|
CN111552983B (en) | 2023-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8612769B2 (en) | Electronic signature method and device | |
CN101241569B (en) | Electronic signature method and device and system | |
CN102035654B (en) | Identity authentication method, identity authentication equipment, server and identity authentication-based encryption method | |
CN103873440B (en) | Application program upgrading method and system | |
US8621242B2 (en) | Display of a verification image to confirm security | |
US8099769B2 (en) | System and method for trusted communication | |
US20070016785A1 (en) | System and method for digital signature and authentication | |
WO2018225391A1 (en) | Image information verification device | |
JPH1011509A (en) | Electronic document security system, electronic stamping security system and electronic signature security system | |
US20230368194A1 (en) | Encryption method and decryption method for payment key, payment authentication method, and terminal device | |
EP3063900B1 (en) | Cryptographic watermarking of content in fuel dispensing environments | |
WO2014012392A1 (en) | Display device, authentication system comprising display device and authentication method | |
CN111860016A (en) | Information display method and device for Near Field Communication (NFC) and electronic equipment | |
US10902242B2 (en) | Binding data to a person's identity | |
JP3791785B2 (en) | How to digitally sign a message | |
CN202677327U (en) | Handwritten terminal for encrypting signatures | |
CN111552983B (en) | Electronic signature method based on single chip microcomputer | |
CN111815821B (en) | IC card security algorithm applied to intelligent door lock | |
CN114445071A (en) | Payment method, payment device, computer-readable storage medium and electronic equipment | |
CN114510688A (en) | Equipment unlocking method and device, computer readable storage medium and electronic equipment | |
TWI751746B (en) | Electronic pen with digital signature and method executed by the same | |
TWM578432U (en) | System for assisting a financial card holder in setting password for the first time | |
CN103927661A (en) | Bank card system with portable electronic device as carrier | |
CN103619015A (en) | Method, device and system for using mobile terminal to carry out information verification | |
CA2511780A1 (en) | System and method for digital signature and authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |