CN111552983A - Electronic signature method based on single chip microcomputer - Google Patents

Electronic signature method based on single chip microcomputer Download PDF

Info

Publication number
CN111552983A
CN111552983A CN202010351615.4A CN202010351615A CN111552983A CN 111552983 A CN111552983 A CN 111552983A CN 202010351615 A CN202010351615 A CN 202010351615A CN 111552983 A CN111552983 A CN 111552983A
Authority
CN
China
Prior art keywords
electronic signature
chip microcomputer
single chip
method based
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010351615.4A
Other languages
Chinese (zh)
Other versions
CN111552983B (en
Inventor
文庆云
邹祥永
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Topwise Communication Co ltd
Original Assignee
Shenzhen Topwise Communication Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Topwise Communication Co ltd filed Critical Shenzhen Topwise Communication Co ltd
Priority to CN202010351615.4A priority Critical patent/CN111552983B/en
Publication of CN111552983A publication Critical patent/CN111552983A/en
Application granted granted Critical
Publication of CN111552983B publication Critical patent/CN111552983B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides an electronic signature method based on a single chip microcomputer, which belongs to the field of electronic information and is characterized in that the method is based on a Nucleus operating system, wherein the single chip microcomputer is arranged in the Nucleus operating system, the single chip microcomputer operates the Nucleus operating system, and an electronic signature operates in the Nucleus operating system; the model of the single chip microcomputer is an MT6261 chip. According to the method and the device, before the electronic signature is executed, the identity authentication is required to be carried out firstly, and the electronic signature can be carried out only after the electronic signature passes the authentication.

Description

Electronic signature method based on single chip microcomputer
Technical Field
The technical scheme belongs to the field of electronic information, and particularly relates to an electronic signature method.
Background
An electronic signature is data contained in electronic form in a data message that is attached to identify the identity of a signer and to indicate that the signer has recognized the content therein. In popular terms, the electronic signature is an electronic signature of an electronic document through a cryptographic technology, is not a digital image of a written signature, is similar to a handwritten signature or a seal, and can also be called an electronic seal.
The electronic signature is used in the online transaction of a card holder in consumption/pre-authorization, finishes signature on the electronic signature acquisition equipment, and replaces the existing transaction finishing mode of signing on a paper receipt. In the prior art, the electronic signature technology has the characteristics of a built-in signature board, transaction feature code and electronic signature synthesis, synthetic image compression, adoption of a compression algorithm and the like. The existing signature board also has the functions of 'confirm', 'cancel' and're-input', and the operations of submitting, canceling or re-inputting signature information and the like can be completed by a card holder after the electronic signature is completed. This feature of the prior art has led to the gradual development of electronic signature technology in the domestic acceptance market in recent years. However, the prior art electronic signature has the disadvantages of security
Disclosure of Invention
In order to solve the above problems, an object of the present invention is to provide an electronic signature method based on a single chip microcomputer with good security.
The invention also aims to provide the electronic signature method based on the single chip microcomputer, which is simple to operate.
In order to achieve the above object, the present invention has the following technical means.
The invention provides an electronic signature method based on a single chip microcomputer, which is characterized in that the method is based on a Nucleus operating system, wherein the single chip microcomputer is arranged in the Nucleus operating system, the single chip microcomputer operates the Nucleus operating system, and an electronic signature operates in the Nucleus operating system; the model of the single chip microcomputer is an MT6261 chip.
The method comprises the following specific steps:
step 1: after the Nucleus operating system is started, carrying out identity authentication, entering a step 2 if the authentication is successful, and entering the step 1 again if the authentication is failed;
step 2: entering an electronic signature interface;
and step 3: touch control is carried out on the interface of the electronic signature, and the interface of the electronic signature displays graphs or characters generated after touch control;
and 4, step 4: confirming the graphs or characters generated after touch control, and if the graphs or characters generated by touch control are confirmed to be correct, entering the step 5, and if the graphs or characters generated by touch control are confirmed to be incorrect, entering the step 2;
and 5: capturing a screen of the graph or the character generated after touch control;
step 6: and compressing the picture obtained by screen capture, and uploading the compressed file. Uploading the compressed file is realized through the prior art such as WIFI and GPRS. Through the authentication in the step 1, the authentication is required to be performed before the electronic signature is executed, and the electronic signature can be performed only after the electronic signature passes the authentication.
Further, in step 1, the identity is verified by setting a security chip. The security chip is specifically MH 1902.
Further, the generated instruction is sent to the security chip, and the security chip verifies the instruction, so that identity verification is achieved.
Furthermore, the security chip comprises a secret key storage function and a hardware encryption and decryption function, an RSA private key is introduced into an SRAM area of the security chip, the RSA public key is used for encrypting the client information and the feature code, and the encrypted data is sent to the security chip through a serial port. The RSA private key is imported through the security chip, the data obtained by encrypting the client information and the feature code by using the RSA public key is sent to the security chip, the security chip decrypts the data through the RSA private key to obtain the client information and the feature, the client information and the feature are sent to the Nucleus operating system, and the Nucleus operating system performs identity judgment.
Further, in step 6, the picture is backed up and stored before being compressed, and the backed-up picture is deleted after the file after the picture is compressed is uploaded.
Further, in step 3, specifically, the interface of the electronic signature includes a touch panel and an LCD, and after the touch input is performed on the touch panel, the graph or text generated by the touch is displayed on the LCD.
Further, the touch panel is used for touch input of graphics or characters, the touch panel sends coordinates of touch points to the buffer cache queue, the Nucleus operating system obtains the coordinates from the buffer cache queue, then functions of the graphics or the characters are called, and tracks are displayed on the LCD.
Further, in step 5, a buffer of the LCD screen is intercepted, and the buffer data is binarized. For example, when the resolution of the screen is 128 × 64, the size of the resulting data is (128 × 64/8).
Further, in step 6, the binarized data is backed up and stored, and compressed to generate data in a jbig format, the backed-up binarized data is successfully deleted on the data in the jbig format, and the jbig data is the final electronic signature data.
Compared with the prior art, the method has the advantages that the identity authentication is required to be carried out before the electronic signature is executed, the electronic signature can be carried out after the electronic signature passes, and by adopting the process, the obtained electronic signature data is safer and the source is more reliable.
Drawings
Fig. 1 is a schematic diagram of the work of a nucleous operating system of the electronic signature method based on the single chip microcomputer.
Fig. 2 is a flow chart of the electronic signature method based on the single chip microcomputer.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In order to achieve the above object, the present invention has the following technical means.
The invention provides an electronic signature method based on a single chip microcomputer, which is characterized in that the method is based on a Nucleus operating system, wherein the single chip microcomputer is arranged in the Nucleus operating system, the single chip microcomputer operates the Nucleus operating system, and an electronic signature operates in the Nucleus operating system; the model of the single chip microcomputer is an MT6261 chip.
The method comprises the following specific steps:
step 1: after the Nucleus operating system is started, carrying out identity authentication, entering a step 2 if the authentication is successful, and entering the step 1 again if the authentication is failed;
step 2: entering an electronic signature interface;
and step 3: touch control is carried out on the interface of the electronic signature, and the interface of the electronic signature displays graphs or characters generated after touch control;
and 4, step 4: confirming the graphs or characters generated after touch control, and if the graphs or characters generated by touch control are confirmed to be correct, entering the step 5, and if the graphs or characters generated by touch control are confirmed to be incorrect, entering the step 2;
and 5: capturing a screen of the graph or the character generated after touch control;
step 6: and compressing the picture obtained by screen capture, and uploading the compressed file.
In this embodiment, the authentication of the identity is implemented by setting a security chip in step 1.
In this embodiment, the instruction is generated and sent to the security chip, and the security chip verifies the instruction, thereby implementing the identity verification.
In this embodiment, the security chip includes a secret key storage function and a hardware encryption/decryption function, an RSA private key is introduced into an SRAM area of the security chip, the client information and the feature code are encrypted using the RSA public key, and the encrypted data is sent to the security chip through a serial port.
In this embodiment, in step 6, the picture is backed up and stored before being compressed, and the backed-up picture is deleted after the file after the picture is compressed is uploaded.
In this embodiment, in step 3, specifically, the interface of the electronic signature includes a touch panel and an LCD, and after the touch panel performs touch input, the graph or text generated by touch is displayed on the LCD.
In this embodiment, a graphic or a text is touch-input on the touch panel, the touch panel sends the coordinates of the touch point to the buffer cache queue, the nucleous operating system fetches the coordinates from the buffer cache queue, and then calls the function of the graphic or the text to display the track on the LCD.
In this embodiment, in step 5, the buffer of the LCD screen is clipped, and the buffer data is binarized.
In this embodiment, in step 6, the binarized data is backed up and stored, and compressed to generate data in the jbig format, and the backed-up binarized data is successfully deleted on the data in the jbig format, where the jbig data is the final electronic signature data.
Compared with the prior art, the method has the advantages that the identity authentication is required to be carried out before the electronic signature is executed, the electronic signature can be carried out after the electronic signature passes, and by adopting the process, the obtained electronic signature data is safer and the source is more reliable.
The present invention is not limited to the above preferred embodiments, and any modifications, equivalent substitutions and improvements made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. The electronic signature method based on the single chip microcomputer is characterized in that the method is based on a Nucleus operating system, the single chip microcomputer is arranged in the Nucleus operating system, the single chip microcomputer operates the Nucleus operating system, and the electronic signature operates in the Nucleus operating system;
the method comprises the following specific steps:
step 1: after the Nucleus operating system is started, carrying out identity authentication, entering a step 2 if the authentication is successful, and entering the step 1 again if the authentication is failed;
step 2: entering an electronic signature interface;
and step 3: touch control is carried out on the interface of the electronic signature, and the interface of the electronic signature displays graphs or characters generated after touch control;
and 4, step 4: confirming the graphs or characters generated after touch control, and if the graphs or characters generated by touch control are confirmed to be correct, entering the step 5, and if the graphs or characters generated by touch control are confirmed to be incorrect, entering the step 2;
and 5: capturing a screen of the graph or the character generated after touch control;
step 6: and compressing the picture obtained by screen capture, and uploading the compressed file.
2. The electronic signature method based on the single chip microcomputer as claimed in claim 1, wherein the verification of the identity is realized by setting a security chip in step 1.
3. The electronic signature method based on the single chip microcomputer as claimed in claim 2, wherein the command is generated and sent to the security chip, and the security chip verifies the command to further realize the identity verification.
4. The electronic signature method based on the single chip microcomputer as claimed in claim 2, wherein the secure chip comprises a storage key and a hardware encryption and decryption function, an RSA private key is introduced into an SRAM area of the secure chip, an RSA public key is used for encrypting the client information and the feature code, and the encrypted data is sent to the secure chip through a serial port.
5. The electronic signature method based on the single chip microcomputer as claimed in claim 1, wherein in step 6, the picture is backed up and stored before being compressed, and the backed-up picture is deleted after the file after the picture is compressed is uploaded.
6. The electronic signature method based on the single chip microcomputer as claimed in claim 1, wherein in step 3, the electronic signature interface comprises a touch panel and an LCD, and after touch input is performed on the touch panel, a graph or a character generated by touch is displayed on the LCD.
7. The electronic signature method based on the single chip microcomputer as claimed in claim 6, wherein a touch panel is used for touch input of graphics or characters, the touch panel sends coordinates of touch points to a buffer cache queue, the system fetches the coordinates from the buffer cache queue, and then calls a function of the graphics or the characters to display a track on an LCD.
8. The electronic signature method based on the single chip microcomputer as claimed in claim 7, wherein in step 5, the buffer of the LCD screen is intercepted and the buffer data is binarized.
9. The electronic signature method based on the single chip microcomputer as claimed in claim 8, wherein in step 6, the binarized data is backed up and stored, and compressed to generate data in jbig format, the backed up binarized data is successfully deleted on the data in jbig format, and the jbig data is the final electronic signature data.
CN202010351615.4A 2020-04-28 2020-04-28 Electronic signature method based on single chip microcomputer Active CN111552983B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010351615.4A CN111552983B (en) 2020-04-28 2020-04-28 Electronic signature method based on single chip microcomputer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010351615.4A CN111552983B (en) 2020-04-28 2020-04-28 Electronic signature method based on single chip microcomputer

Publications (2)

Publication Number Publication Date
CN111552983A true CN111552983A (en) 2020-08-18
CN111552983B CN111552983B (en) 2023-12-15

Family

ID=72005972

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010351615.4A Active CN111552983B (en) 2020-04-28 2020-04-28 Electronic signature method based on single chip microcomputer

Country Status (1)

Country Link
CN (1) CN111552983B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177364A (en) * 2011-12-26 2013-06-26 中国银联股份有限公司 Transaction processing method based on electronic signature
CN104462910A (en) * 2013-09-13 2015-03-25 天津力诺科技发展有限公司 Safety electronic signature device
CN104484942A (en) * 2014-12-15 2015-04-01 江苏国光信息产业股份有限公司 Client interaction terminal and counter transaction method thereof
CN205283564U (en) * 2015-12-25 2016-06-01 北京握奇智能科技有限公司 Electronic signature device
CN108038449A (en) * 2017-12-14 2018-05-15 广东德生科技股份有限公司 A kind of with no paper electric endorsement method and system
CN108900929A (en) * 2018-08-08 2018-11-27 北京奇安信科技有限公司 A kind of image watermark signature processing method and processing device
CN109245893A (en) * 2017-07-10 2019-01-18 浙江华信区块链科技服务有限公司 A kind of identity building and endorsement method for substituting U-shield
CN109951460A (en) * 2019-03-07 2019-06-28 成都麦动信息技术有限公司 Safety information system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080018396A (en) * 2006-08-24 2008-02-28 한국문화콘텐츠진흥원 Computer-readable medium for recording mobile application and personal computer application for displaying display information of mobile communications terminal in external display device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177364A (en) * 2011-12-26 2013-06-26 中国银联股份有限公司 Transaction processing method based on electronic signature
CN104462910A (en) * 2013-09-13 2015-03-25 天津力诺科技发展有限公司 Safety electronic signature device
CN104484942A (en) * 2014-12-15 2015-04-01 江苏国光信息产业股份有限公司 Client interaction terminal and counter transaction method thereof
CN205283564U (en) * 2015-12-25 2016-06-01 北京握奇智能科技有限公司 Electronic signature device
CN109245893A (en) * 2017-07-10 2019-01-18 浙江华信区块链科技服务有限公司 A kind of identity building and endorsement method for substituting U-shield
CN108038449A (en) * 2017-12-14 2018-05-15 广东德生科技股份有限公司 A kind of with no paper electric endorsement method and system
CN108900929A (en) * 2018-08-08 2018-11-27 北京奇安信科技有限公司 A kind of image watermark signature processing method and processing device
CN109951460A (en) * 2019-03-07 2019-06-28 成都麦动信息技术有限公司 Safety information system

Also Published As

Publication number Publication date
CN111552983B (en) 2023-12-15

Similar Documents

Publication Publication Date Title
US8612769B2 (en) Electronic signature method and device
CN101241569B (en) Electronic signature method and device and system
CN102035654B (en) Identity authentication method, identity authentication equipment, server and identity authentication-based encryption method
CN103873440B (en) Application program upgrading method and system
US8621242B2 (en) Display of a verification image to confirm security
US8099769B2 (en) System and method for trusted communication
US20070016785A1 (en) System and method for digital signature and authentication
WO2018225391A1 (en) Image information verification device
JPH1011509A (en) Electronic document security system, electronic stamping security system and electronic signature security system
US20230368194A1 (en) Encryption method and decryption method for payment key, payment authentication method, and terminal device
EP3063900B1 (en) Cryptographic watermarking of content in fuel dispensing environments
WO2014012392A1 (en) Display device, authentication system comprising display device and authentication method
CN111860016A (en) Information display method and device for Near Field Communication (NFC) and electronic equipment
US10902242B2 (en) Binding data to a person's identity
JP3791785B2 (en) How to digitally sign a message
CN202677327U (en) Handwritten terminal for encrypting signatures
CN111552983B (en) Electronic signature method based on single chip microcomputer
CN111815821B (en) IC card security algorithm applied to intelligent door lock
CN114445071A (en) Payment method, payment device, computer-readable storage medium and electronic equipment
CN114510688A (en) Equipment unlocking method and device, computer readable storage medium and electronic equipment
TWI751746B (en) Electronic pen with digital signature and method executed by the same
TWM578432U (en) System for assisting a financial card holder in setting password for the first time
CN103927661A (en) Bank card system with portable electronic device as carrier
CN103619015A (en) Method, device and system for using mobile terminal to carry out information verification
CA2511780A1 (en) System and method for digital signature and authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant