CN111625787B - OFD-based multi-version traceable quick signature verification method for electronic signature - Google Patents
OFD-based multi-version traceable quick signature verification method for electronic signature Download PDFInfo
- Publication number
- CN111625787B CN111625787B CN202010435389.8A CN202010435389A CN111625787B CN 111625787 B CN111625787 B CN 111625787B CN 202010435389 A CN202010435389 A CN 202010435389A CN 111625787 B CN111625787 B CN 111625787B
- Authority
- CN
- China
- Prior art keywords
- signature
- file
- abstract
- ofd
- version
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 51
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000009877 rendering Methods 0.000 claims description 11
- 238000004364 calculation method Methods 0.000 abstract description 4
- 230000008859 change Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Abstract
The invention discloses an OFD-based multi-version traceable quick signature verification method for electronic signature, which comprises the steps of analyzing an OFD file into a file structure formed by a plurality of XML files and other resource files; traversing all file object entries in the file main entry file, and judging whether the file object contains a signature according to whether each file object contains a signature list entry; for a file object containing a signature list, establishing an original text abstract comparison table; generating a difference comparison graph between signature versions according to the abstract record node differences between the existing signatures; and searching whether an original text abstract comparison table is recorded or not for all abstract nodes in each signature file, and comparing. Comparing the failed verification, and returning a reason for the failed verification to form a verification report of the file object; and verifying the electronic signature according to the standard to form a signature verification report and returning. The invention reduces the repeated calculation of the original text abstract and greatly accelerates the speed of checking the tag.
Description
Technical Field
The invention relates to the technical field of OFD format files, in particular to an electronic signature multi-version traceable quick signature verification method based on OFD.
Background
OFD (OpenFixed-layout) is a format document standard with independent intellectual property rights in China, and software products of the OFD have independent controllability, safety, technical advancement and presentation effect, and the OFD is not changed due to the change of software and hardware environments and operators, so that the OFD plays an important role in storing and exchanging electronic files. In order to replace PDF (Portable Document Format) of international standard, OFD has many characteristics of PDF, including electronic signature, that is, electronic signature, to ensure integrity of a document, authenticity and non-repudiation of a signer, so that the OFD is also more applied to fields of electronic invoices, electronic documents, files, electronic certificates, and the like.
With the popularity of OFD applications, there are problems slowly derived during use, such as:
1. how does there are a large number of electronic signatures on an OFD to speed up the signature verification?
2. Traditional OFD signature verification only informs whether the original text is tampered or not, and cannot know which parts are tampered.
3. How do changes between signatures trace back for electronic contract applications of OFD?
……
Aiming at the problems, the invention provides an OFD-based electronic signature multi-version traceable rapid signature verification method, and the invention is used for describing a depth scheme around the method.
Disclosure of Invention
The invention provides an OFD-based multi-version traceable quick signature verification method, which aims at an OFD file and an electronic signature, can speed up signature verification for a large number of electronic signatures on one OFD, inform whether an original text is tampered, know which parts are tampered, and can also trace the modification between the electronic contract traceable signatures of the OFD.
An OFD-based multi-version traceable rapid signature verification method for electronic signature comprises the following steps:
1) Receiving and temporarily storing an OFD file uploaded by a user, and analyzing the OFD into a file structure formed by a plurality of xml files and resource files, wherein the xml files comprise OFD.xml files;
2) Traversing all file object entries in the OFD.xml file, judging whether the file object pointed by the current file object entry contains a signature according to whether each file object entry contains a signature list entry, skipping over the file object which does not contain the signature, and directly verifying the next file object until all the file objects are verified;
3) For a file object containing a signature, establishing an original text abstract comparison table;
4) Traversing all signature files, generating a difference comparison chart among signature versions according to the abstract record node differences among the existing signature files, and recording the difference comparison chart into a signature verification report;
5) Searching whether the original text abstract comparison table obtained in the step 3) is recorded or not for all abstract record nodes in each signature file;
the recorded direct comparison abstract is consistent or not, the abstract is calculated for the in-package file pointed by the abstract recording node, and then the abstract is recorded in the original abstract comparison table, and then whether the comparison abstract is consistent or not is checked;
checking the next abstract record node if the comparison abstract is consistent, and recording the abstract record node which is failed in comparison (namely inconsistent comparison abstract) in the form of modified content in the label checking report;
6) And adding the signature verification result obtained by verifying the electronic signature according to the standard into the signature verification report to finish the signature verification report.
In the step 1), the resource file comprises fonts, a color space, drawing parameters, vector images and multimedia;
the OFD.xml file is a file main entry file and comprises a plurality of file object entries and corresponding file objects;
in step 2), the signature list entry corresponds to a signature list file, and points to a path where the corresponding signature list file is located;
the signature list file comprises a plurality of signature file entries, and each signature file entry points to a path where a corresponding signature file is located;
in the step 3), the original text abstract comparison table is established, so that the signature verification speed can be increased for a large number of electronic signatures on one OFD.
The original text abstract comparison table comprises a first column abstract record node, a second column abstract method and a third column abstract value, and the abstract record node, the abstract method and the abstract value of each row are in one-to-one correspondence.
The abstract recording node is an entry corresponding to a packet file protected by a signature at a certain time;
the abstract method is an abstract method specified by the signature abstract record list, and is generally the algorithm names of the abstract method such as SM3, SHA-256 and the like;
and the digest value is a result obtained by base64 encoding the file in the package pointed by the file digest node.
In step 4), a difference comparison chart among signature versions is generated according to the abstract record node differences among the existing signature files, and changes among a plurality of signature/signature versions can be traced back to the electronic document of the OFD.
Generating a difference comparison chart among signature versions according to the abstract record node differences among the existing signature files, wherein the difference comparison chart specifically comprises the following steps:
a) Generating difference content according to the types of the files in the package pointed by different abstract record nodes among the signature files;
b) Rendering the modified page content when the difference content is the page content;
c) When the difference content is the electronic signature, rendering the page content of the electronic signature, rendering the picture of the electronic seal in the electronic signature to a corresponding position, and marking by a dotted line frame;
d) And if the difference content is a picture, rendering the changed picture on the content of the page, marking the picture by a dotted line frame, finally representing the difference between all signature versions in a picture form, finishing a difference comparison picture, and recording the difference comparison picture in a signature verification report.
In step 5), the digest comparison is performed on the package file corresponding to the digest recording node in the signature file by using the original text digest comparison table, so that whether the original text is tampered or not can be informed, the tampered content of each signature version can be known, and details such as a page, multimedia content such as pictures, audios and videos on the page, and the font of a certain text on the page can be accurately obtained. The modified content forms comprise obtaining tampered content of each signature version, and the tampered content is accurate to a page, and multimedia content such as pictures, audio, video and the like on the page; the font of the text on the page, and the like.
Compared with the prior art, the invention has the following advantages:
the invention can display the content change difference between the document versions corresponding to each signature for the user, is convenient for the user to confirm the signed content better, and can effectively prevent the uninformed clause from being changed; meanwhile, the vulnerability that only knows that tampering can not determine which contents are tampered specifically is filled for the traditional OFD electronic signature verification; finally, repeated calculation of the original text abstract is reduced, and the speed of signature verification is greatly increased.
Drawings
Fig. 1 is a schematic flow chart of a multi-version traceable rapid signature verification method of an electronic signature based on OFD in the present invention;
fig. 2 is a file hierarchy organization chart of the method for resolving an OFD by using the multi-version traceable fast signature verification method of the electronic signature based on the OFD;
FIG. 3 is a schematic diagram of the main inlet structure of the OFD of the present invention;
fig. 4 is a schematic diagram of tracing each signature version difference by using the OFD-based electronic signature multi-version traceable rapid signature verification method of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
As shown in fig. 1, an OFD-based electronic signature multi-version traceable rapid signature verification method includes the following steps:
1) Receiving and temporarily storing an OFD file uploaded by a user, and analyzing the OFD into a file structure formed by a plurality of xml files and other resource files;
2) Traversing all file object entries in the main file entry file, and judging whether the current file object contains a signature according to whether each file object contains a signature list entry. The file object that does not contain the signature is skipped and the next file object is directly verified.
3) And establishing an original text abstract comparison table for the file object containing the signature.
4) And traversing all signature files, and generating a difference comparison graph among signature versions according to the abstract record node differences among the existing signatures.
5) And searching whether the original text abstract comparison table is recorded or not for all abstract nodes in each signature file, whether the recorded direct comparison abstract is consistent or not, calculating the abstract of the file pointed by the abstract node, recording the abstract to the abstract comparison table, and comparing. And recording file information pointed by the summary node which fails to be compared and representing the file information in the form of modified contents in a final signature verification report.
6) And verifying the electronic signature to form a signature verification report.
In step 1), other resource files include fonts, color spaces, rendering parameters, vector images, and multimedia. The plurality of xml files comprise OFD.xml files, wherein the OFD.xml files are file main entry files and comprise a plurality of file object entries and corresponding file objects. When the OFD file is parsed, the OFD file is parsed into a file hierarchy organization structure as shown in FIG. 2. In fig. 2, ofd.xml is the file main entry file, there is one ofd.xml file in one package and only one ofd.xml file exists, this file name should not be modified; doc_n is the folder of the nth document; document. Xml is the root node of the document; page_N is the nth Page folder; content. Xml is the description of the content on page N; pageRes.xml is the resource description on page N; res is a resource folder; publicRes. Xml is the document public resource index; docmentres.xml is the document's own resource index; image_m.png/font_m.ttf is a resource file; sign is a digital signature storage catalog; signature. Xml is a signature list file; sign_n is the nth signature/signature; signature. The seal is an electronic seal file; signedValues.dat signature value file.
In step 2), the master file entry file UML is shown in fig. 3, in which OFD is the master file entry, docBody is the file object entry, signature included in the file object entry is the signature list entry pointing to the file, and if signature is not included, this is not the case. In fig. 3, version is Version number of file format, and the value is "1.0", and is optional; the DocType is a file format subset type, the value is OFD, the file accords with the standard, the value is OFD-A, the file accords with the OFD archiving specification and is optional; docbody is a file object entry, and a plurality of Docbody can exist, so that a plurality of format documents are contained in one document, and the document is necessary to select; docInfo is document metadata information description, and is necessary; docroot is a document pointing to a document root node, and is optional; version is a version information containing a plurality of version description nodes and used for defining files generated by notes and other changes, and the version information is optional; signature is the option to point to the signature and signature structure in the document.
In step 3), the established original text digest comparison table is used for the original text digest verification in step 5), the structure of the original text digest comparison table is shown in table 1, and table 1 is the original text digest comparison table of the electronic signature multi-version traceable rapid signature verification method based on OFD. The original text abstract comparison table consists of three columns, wherein the first column is an abstract record node, the second column is an abstract method, the third column is an abstract value, the abstract record nodes, the abstract methods and the abstract values of each row are in one-to-one correspondence, the abstract calculation is carried out on the package file pointed by the abstract record node file according to the abstract method, and the abstract value is a result obtained by carrying out base64 coding on the obtained binary abstract value. Because the original text abstract comparison table is used, the abstract calculation is only needed to be carried out on the file pointed by each abstract recording node, and the signing speed can be greatly accelerated.
TABLE 1
Abstract recording node | Abstract method | Digest value |
… | … | |
… | … |
In step 4), the package files covered by each signature are different, if the difference content is the page content, the modified page content is rendered; if the difference content is the electronic signature, rendering the page content of the electronic signature, rendering the picture of the electronic seal in the electronic signature to a corresponding position, and marking by a dotted line frame; if the difference content is the picture, the changed picture is rendered on the content of the page where the picture is located, and marked by a dotted line frame. The differences between the signed versions are finally represented in the form of pictures, the representation being shown in fig. 4.
In step 5), the file pointed to by the summary node that fails the summary detection is recorded in the final signature verification report with the modified content.
In step 6), the verification electronic signature of the electronic signature verification process specifically includes:
a) Verifying the correctness of the electronic signature data format;
b) Verifying whether the signature value of the electronic signature is correct;
c) Verifying the matching of the signer certificate and the electronic seal;
d) Verifying the validity of the electronic seal;
e) Verifying the signer certificate validity;
f) Verifying validity of the signature time;
g) Verifying the original text hash;
h) The validity of the timestamp is verified.
The signature verification results for steps b) and g) in steps 5) and 6) may yield the results shown in table 2. Table 2 is a comparison table of signature verification results generated by the multi-version traceable rapid signature verification method of the electronic signature based on the OFD.
TABLE 2
The foregoing is merely a preferred embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions easily conceivable by those skilled in the art within the technical scope of the present application should be covered in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (10)
1. An OFD-based multi-version traceable rapid signature verification method for electronic signature is characterized by comprising the following steps:
1) Receiving and temporarily storing an OFD file uploaded by a user, and analyzing the OFD into a file structure formed by a plurality of xml files and resource files, wherein the xml files comprise OFD;
2) Traversing all file object entries in the OFD. Xml file, judging whether the file object pointed by the current file object entry contains a signature according to whether each file object entry contains a signature list entry, skipping over the file object which does not contain the signature, and directly verifying the next file object until all the file objects are verified;
3) For a file object containing a signature, establishing an original text abstract comparison table;
4) Traversing all signature files, generating a difference comparison chart among signature versions according to the abstract record node differences among the existing signature files, and recording the difference comparison chart into a signature verification report;
5) Searching whether the original text abstract comparison table obtained in the step 3) is recorded or not for all abstract record nodes in each signature file;
the recorded direct comparison abstract is consistent or not, the abstract is calculated for the in-package file pointed by the abstract recording node, and then the abstract is recorded in the original abstract comparison table, and then whether the comparison abstract is consistent or not is checked;
checking the next abstract record node if the abstract is consistent, checking the abstract record node if the abstract is failed, and recording the abstract record node if the abstract record node is failed in comparison, and recording the abstract record node in a label checking report in the form of modified content;
6) And adding the signature verification result obtained by verifying the electronic signature according to the standard into the signature verification report to finish the signature verification report.
2. The OFD-based multi-version traceable rapid signature verification method of electronic signature of claim 1, wherein in step 1), the resource file comprises fonts, color space, drawing parameters, vector images and multimedia.
3. The method for multi-version traceable rapid signature verification based on OFD according to claim 1, wherein in step 1), the OFD.
4. The OFD-based multi-version traceable rapid signature verification method of electronic signature as claimed in claim 1, wherein in step 2), a signature list entry corresponds to a signature list file, and points to a path along which the corresponding signature list file is located;
the signature list file comprises a plurality of signature file entries, and each signature file entry points to a path where a corresponding signature file is located.
5. The method for multi-version traceable rapid signature verification based on OFD according to claim 1, wherein in step 3), the original document digest comparison table comprises a first column digest record node, a second column digest method and a third column digest value, and the digest record node, the digest method and the digest value of each row are in one-to-one correspondence.
6. The OFD-based multi-version traceable rapid signature verification method of electronic signature of claim 5, wherein the summary record node is an entry corresponding to a certain signature-protected in-package file.
7. The OFD-based multi-version traceable rapid signature verification method of the electronic signature of claim 5, wherein the digest method is specified by a signature digest record list.
8. The OFD-based multi-version traceable rapid signature verification method of the electronic signature of claim 5, wherein the digest value is a result obtained by base64 encoding of the package file pointed by the file digest node.
9. The OFD-based multi-version traceable rapid signature verification method of electronic signature as claimed in claim 1, wherein in step 4), a difference comparison chart between signature versions is generated according to the digest record node differences between existing signature files, specifically comprising:
a) Generating difference content according to the types of the files in the package pointed by different abstract record nodes among the signature files;
b) Rendering the modified page content when the difference content is the page content;
c) When the difference content is the electronic signature, rendering the page content of the electronic signature, rendering the picture of the electronic seal in the electronic signature to a corresponding position, and marking by a dotted line frame;
d) And if the difference content is a picture, rendering the changed picture on the content of the page, marking the picture by a dotted line frame, finally representing the difference between all signature versions in a picture form, finishing a difference comparison picture, and recording the difference comparison picture in a signature verification report.
10. The OFD-based multi-version traceable rapid signature verification method of electronic signature of claim 1, wherein in step 5), the form of the modified content comprises obtaining tampered content of each signature version; the method comprises the steps of accurately obtaining a page, and pictures, audio and video multimedia contents on the page; and details of the text on the page.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010435389.8A CN111625787B (en) | 2020-05-21 | 2020-05-21 | OFD-based multi-version traceable quick signature verification method for electronic signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010435389.8A CN111625787B (en) | 2020-05-21 | 2020-05-21 | OFD-based multi-version traceable quick signature verification method for electronic signature |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111625787A CN111625787A (en) | 2020-09-04 |
CN111625787B true CN111625787B (en) | 2023-04-25 |
Family
ID=72272786
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010435389.8A Active CN111625787B (en) | 2020-05-21 | 2020-05-21 | OFD-based multi-version traceable quick signature verification method for electronic signature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111625787B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112732649B (en) * | 2020-12-21 | 2024-03-12 | 航天信息股份有限公司 | OFD document signing method, electronic equipment and medium |
CN112862425B (en) * | 2021-01-12 | 2021-11-12 | 江苏中威科技软件系统有限公司 | Device and technology for reading OFD format file life cycle information |
CN113254210A (en) * | 2021-05-31 | 2021-08-13 | 深圳高灯计算机科技有限公司 | OFD file signature verification method, system and equipment based on cloud service |
CN115455492B (en) * | 2022-09-30 | 2024-02-13 | 百望股份有限公司 | Method and device for manufacturing OFD file |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000250408A (en) * | 1999-03-01 | 2000-09-14 | Ntt Data Corp | File authentication system, system and method for signature, system and method for authentication, and recording medium |
CN101702150A (en) * | 2009-12-02 | 2010-05-05 | 江西金格网络科技有限责任公司 | Method for protecting, verifying and repealing content of PDF document page |
CN102043912A (en) * | 2009-10-15 | 2011-05-04 | 广州市百成科技有限公司 | Method for using fingerprint signature and seal |
JP2015090529A (en) * | 2013-11-05 | 2015-05-11 | 日本電信電話株式会社 | Device and method for detecting modification in excerpted documents |
CN105373933A (en) * | 2015-11-16 | 2016-03-02 | 河北华烨冀科信息技术有限责任公司 | Food circulation traceability method based on electronic inspection report |
CN110490004A (en) * | 2018-06-11 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Processing method, client, computer equipment and the medium of Electronic Signature file |
CN110826109A (en) * | 2019-10-23 | 2020-02-21 | 杭州安存网络科技有限公司 | Penetrating signature method suitable for PDF document |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2477307A (en) * | 2010-01-28 | 2011-08-03 | Adsensa Ltd | Embedding authentication data into an electronic document image |
CN103067174B (en) * | 2012-12-27 | 2015-06-17 | 飞天诚信科技股份有限公司 | Digital signature method and system completed in mobile operating system |
GB2532233A (en) * | 2014-11-12 | 2016-05-18 | Sony Corp | Transmitter and receiver and methods of transmitting and receiving |
-
2020
- 2020-05-21 CN CN202010435389.8A patent/CN111625787B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000250408A (en) * | 1999-03-01 | 2000-09-14 | Ntt Data Corp | File authentication system, system and method for signature, system and method for authentication, and recording medium |
CN102043912A (en) * | 2009-10-15 | 2011-05-04 | 广州市百成科技有限公司 | Method for using fingerprint signature and seal |
CN101702150A (en) * | 2009-12-02 | 2010-05-05 | 江西金格网络科技有限责任公司 | Method for protecting, verifying and repealing content of PDF document page |
JP2015090529A (en) * | 2013-11-05 | 2015-05-11 | 日本電信電話株式会社 | Device and method for detecting modification in excerpted documents |
CN105373933A (en) * | 2015-11-16 | 2016-03-02 | 河北华烨冀科信息技术有限责任公司 | Food circulation traceability method based on electronic inspection report |
CN110490004A (en) * | 2018-06-11 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Processing method, client, computer equipment and the medium of Electronic Signature file |
CN110826109A (en) * | 2019-10-23 | 2020-02-21 | 杭州安存网络科技有限公司 | Penetrating signature method suitable for PDF document |
Non-Patent Citations (2)
Title |
---|
冯辉 ; 陈留勇 ; 樊孝龙 ; 李海波 ; 王寒冰 ; .OFD的安全应用分析.信息技术与标准化.2017,(11),全文. * |
周明.基于国产算法的OFD版式文件电子签章系统的设计与实现.《中国优秀硕士学位论文全文数据库》.2020,全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN111625787A (en) | 2020-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111625787B (en) | OFD-based multi-version traceable quick signature verification method for electronic signature | |
CN106897348B (en) | Data storage method, data verification method, data source tracing method and equipment | |
CN110535660B (en) | Evidence obtaining service system based on block chain | |
US10361869B2 (en) | Event ledger | |
US8977860B2 (en) | Method and apparatus for tamper proof camera logs | |
US20180268504A1 (en) | Indexing Mortgage Documents via Blockchains | |
CN107391291B (en) | Block chain error-correcting method and system for modifying block chain namely block body data | |
CN109740317A (en) | A kind of digital finger-print based on block chain deposits card method and device | |
CN110532811B (en) | PDF (Portable document Format) signature method and PDF signature system | |
US20120096564A1 (en) | Data integrity protecting and verifying methods, apparatuses and systems | |
RU2003126950A (en) | PROTECTING THE OBJECT DATA STREAM HEADER | |
US20110182422A1 (en) | Document authentication data embedding method and apparatus | |
US20070204165A1 (en) | Techniques for digital signature formation and verification | |
US11184174B2 (en) | System and method for decentralized digital structured data storage, management, and authentication using blockchain | |
US20140032912A1 (en) | Trust context for document signatures | |
CN107391292B (en) | Block chain verification method and system for realizing error correction aiming at data of block body | |
US8510566B1 (en) | Authentic time-stamping for archival storage | |
CN113704794B (en) | Bid file processing method and device in electronic bidding system | |
US20080243753A1 (en) | Method and Apparatus for Archiving Media Using a Log | |
US20080243752A1 (en) | Method and Apparatus for Process Logging | |
US20220092104A1 (en) | System for automatic management and depositing of documents (images) hash in block-chain technology | |
CN114493551B (en) | Contract generation method and device, electronic equipment and storage medium | |
Igarashi et al. | Photrace: A blockchain-based traceability system for photographs on the internet | |
CN104822076A (en) | Data distribution method and device thereof | |
Milon Islam et al. | A novel approach towards tamper detection of digital holy quran generation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |