CN112288409B - Application method of electronic certificate entrusted among multiple roles - Google Patents

Application method of electronic certificate entrusted among multiple roles Download PDF

Info

Publication number
CN112288409B
CN112288409B CN202011271259.1A CN202011271259A CN112288409B CN 112288409 B CN112288409 B CN 112288409B CN 202011271259 A CN202011271259 A CN 202011271259A CN 112288409 B CN112288409 B CN 112288409B
Authority
CN
China
Prior art keywords
entrusting
certificate
party
entrusted
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011271259.1A
Other languages
Chinese (zh)
Other versions
CN112288409A (en
Inventor
吴志雄
黄文峰
汪翔
吴真
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linewell Software Co Ltd
Original Assignee
Linewell Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linewell Software Co Ltd filed Critical Linewell Software Co Ltd
Priority to CN202011271259.1A priority Critical patent/CN112288409B/en
Priority to PCT/CN2020/142471 priority patent/WO2022099909A1/en
Publication of CN112288409A publication Critical patent/CN112288409A/en
Application granted granted Critical
Publication of CN112288409B publication Critical patent/CN112288409B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Abstract

The invention relates to an application method of electronic certificate entrusted among multiple roles. The method constructs a trust system of the electronic certificate based on the block chain technology, and provides a certificate storage solution for 'decentralized' verification of the entrusted certificate data, autonomous management of the entrusted certificate and entrustment and authorization processes for governments, masses and enterprises in the entrustment and transaction processes. And the characteristics of decentralization, tamper resistance, traceability and the like of the block chain are utilized to ensure the chain chaining credibility of the whole processes of license management and authorized use. Meanwhile, the technology of digital signature is applied in the process of electronic license delegation, the digital signature is a section of digital string which can be generated only by a delegation party and cannot be counterfeited by others, the section of digital string is also an effective proof for the authenticity of information sent by the delegation party, a digital signature mechanism is used as one of means for guaranteeing network information safety, and the technologies of time stamp, serial number and the like play important roles of preventing spoofing, identifying, tampering, replaying, repudiation, confidentiality and the like in the whole delegation process.

Description

Application method of electronic certificate entrusted among multiple roles
Technical Field
The invention relates to an application method of electronic certificate entrusted among multiple roles.
Background
Delegation, as the name implies, is to delegate things to others or to other organizations. After the trusted identity authentication of 'real name + real person', the card holding body can authorize or delegate others to use the held electronic certificate. And the entrusting certificate is that the licensee entrusts others to use the entrusting certificate in a specific event and a specific time period. At present, entrusted action mainly occurs in various service halls on line, if A entrusts B to handle a certain thing, A needs to give the B a paper certificate and an authorization book through offline or mailing, and then the B all right replaces A to complete the transaction of the thing. When the principal of the authorized party replaces the principal of the authorized party to hold the paper certificate and the authorization book and go to the window for transaction, the paper certificate is easily lost, and the credibility of the handwritten signature cannot be guaranteed.
Due to these difficulties, the offline work materials are extremely numerous and complicated, and if the offline work materials are lost carelessly or the materials are incomplete, the people frequently run legs to work, so that the work efficiency is low.
With the rapid development of society, the demands of the masses and enterprises are increasing, and the number of offline affair handling scenes is gradually increased, and the following three affair handling scenes are generally available: individuals are entrusted to individuals, individuals are entrusted to businesses, and businesses are entrusted to individuals. And the scenario in which a business entrusts individuals is the most complex. First, a small-scale enterprise may have a small number of persons, and usually a legal representative goes to a window to handle the matters, but if the large-scale enterprise is in a large-scale enterprise, the person management is strict, for example, when the company handles the matters, the legal representative first gives the relevant data such as the reason of handling the matters and the certificate to the manager of the enterprise, and after the manager finalizes the personnel handling, the legal representative needs to write a signature on the authorization book which defines the personnel handling the matters, and then the manager gives the personnel handling the matters.
With the popularization of electronic certificates, the working habits of the masses and enterprises are greatly changed by the 'Internet + government affairs', and the existing scene is not suitable any more. On one hand, the mode of paper license and hand-written authorization book cannot ensure the security of the license, the authenticity of the signature is questioned, the manually signed document has no confidentiality, and once the document is lost, the information in the document is possibly leaked. For example, how to check the signature handwriting when a window worker takes the handwritten authorization book. How the trusting party can be sure that the certificate of the trusting party is used by the real and correct authorization. On the other hand, the link for handling the process becomes cumbersome and tedious due to layer-by-layer transmission.
Disclosure of Invention
The invention aims to provide an application method of electronic certificates entrusted among multiple roles, which can improve the working efficiency of the public and the reliability.
In order to achieve the purpose, the technical scheme of the invention is as follows: an application method of electronic certificate entrusted between multiple roles includes the following steps:
step S1, the person/enterprise adopts face-to-face code scanning entrusting or remote entrusting mode when entrusting is initiated;
step S2, if the code is face-to-face code scanning entrustment, the entrusting party selects the electronic certificate needed to be used when transacting the matters, fills in the entrusting reason, and selects the entrusting start date and end date; if the remote entrusting is carried out, the entrusting party needs to select the entrusted party firstly, fill in the information of the corresponding entrusted party, select the electronic certificate needed to be used when handling the matters, fill in the entrusting course and select the starting date and the ending date of the entrusting;
step S3, the entrusting party carries out electronic hand-written signature or selects signature handwriting, and after the entrusting is successful, an entrusting authorization book is automatically generated and checked and shown on an entrusting detail page;
step S4, if the face-to-face code scanning request is made, the requesting party generates and presents the requesting code, and the requested party scans the requesting code; if the request is a remote request, the requested party acquires the requested notification, and can choose to receive or reject the request in the request list, and then feeds back the notification of the result of the requesting party;
step S5, after successful entrusting, both entrusting parties can check the entrusted electronic certificate in an entrusting list; the consignor can actively cancel the consigned electronic certificate;
step S6, when the consignor goes to the off-line window for transaction, the consignor can scan the window staff to acquire the code through the presentation consignment code or actively scan the window presentation authorization code to associate the consignment electronic certificate in the certificate package, and complete the transaction of the items;
in step S7, the creation of the delegation book and the delegation and authorization of the electronic certificate are recorded in the blockchain chain, and the trace is able to be traced.
In an embodiment of the invention, the fields of the power of attorney can be dynamically configured according to different service scenes, and further different templates are provided for providing services for different services in different regions.
In an embodiment of the present invention, in step S7, the creating of the delegation book and the delegation and authorization of the electronic certificate are recorded as the uplink specific reference:
the consignor: the method comprises the steps that real-name authentication is required before a certificate package is used, block chain chaining and certificate storing are carried out on the result of the real-name authentication, when a consignor initiates consignment, consignment behaviors can not be repudiated, other application parties can check the consignment behaviors of the consignor through the result of the block chain chaining and confirm that the consignment behaviors exist really;
the trusted party: before using the entrusting function, the entrusted party also needs to carry out real-name authentication, the result of the real-name authentication is stored in the block chain to be used for other application parties to verify the result of the certificate storage, the behavior received/rejected by the entrusted party also stores the certificate chain, both parties generated by the entrusting behavior can confirm the entrusting behavior through the certificate storage result of the block chain, whether the entrusting party successfully entrusts the certificate or not, whether the entrusted party successfully receives the certificate or not, and can verify through the certificate storage information of the block chain, meanwhile, when the entrusted party authorizes the electronic certificate to be authorized to other people for use, the authorization behavior of the entrusted electronic certificate is chain in real time, the authorization behavior is also synchronized to the entrusting party, the entrusting party can know whether the entrusted party correctly uses the electronic certificate to transact the affairs according to the entrusting requirement or not through the certificate storage result of the block chain if the entrusted action is inconsistent with the entrusted affairs, the entrusting party can revoke the entrusting of the electronic certificate in real time;
receiving the party: when the consignee goes offline and transacts items through a window, the consignee verifies the consignee through real-name authentication information on the block chain, after the verification is passed, the consignee scans an authorization code shown by the consignee to receive an authorization electronic certificate authorized in the item transaction process, the certificate is downloaded and checked according to requirements, meanwhile, the authorization and use behaviors are stored on the block chain, and the consignee can confirm the authenticity of the authorization behaviors through reading the certificate storage result of the block chain.
Compared with the prior art, the invention has the following beneficial effects:
1. the method has the advantages that a entrusted mode and mechanism are established, offline affair handling and management requirements are met, affair handling efficiency is improved, license use safety is improved, and the difficulty of offline entrustment affair handling between the masses and the enterprise in multiple roles is solved;
2. and establishing a delegation source tracing, and promoting the generation of online delegation business based on a block chain authentication mechanism. The public entrustment and authorization actions are recorded in the uplink for the public to use.
Drawings
FIG. 1 is a schematic diagram of the manufacture of a letter of attorney according to an embodiment of the present invention.
FIG. 2 is a schematic diagram of the method for delegating sub-certificates between multiple roles according to the present invention.
Detailed Description
The technical scheme of the invention is specifically explained below with reference to the accompanying drawings.
The invention provides an application method of electronic license entrusted among multiple roles, which is concretely realized as follows:
firstly, making a consignment book as shown in figure 1;
second, entrusting management among multiple roles of the electronic certificate, as shown in fig. 2, is specifically as follows:
1. management of electronic certificates between multiple roles
(1) Personal
Firstly, an independent certificate packet is arranged for management before entrusting of an electronic certificate of an individual, so that the independence and the safety of the certificate are guaranteed, and secondly, when entrusting behaviors occur among individuals, the certificate entrusted to the individual by others and the certificate entrusted to the individual by the individual can be separately managed.
(2) Enterprise
Firstly, the electronic certificate of an enterprise is managed independently by an enterprise certificate package as a person, and the electronic certificate of the enterprise is different from the person in that the enterprise certificate package can be managed and used by a legal representative, the legal representative can also establish a manager, the manager is endowed with the authority to act instead, and the manager can not appoint the manager any more, and the other authorities are equal to the legal representative. If the administrator with the authority can directly entrust the certificate of the enterprise to the clerk to transact the business. Such a setting both fits the management model of the offline enterprise and greatly reduces the workload at the level of the legal representatives.
2. Delegation of electronic certificates between multiple roles
(1) And code scanning entrusts, namely entrusts the use of the certificate in a code outputting and code scanning mode when entrusting the double-aspect face-to-face transaction affairs.
Code scanning entrusting process:
step 1, the person/enterprise selects the face-to-face entrusting mode when entrusting.
And 2, selecting the certificate needed to be used when transacting the matters, filling the entrusting course, and selecting the starting date and the ending date of the entrusting.
And 3, the entrusting party carries out electronic hand-written signature or selects signature handwriting, and after the entrusting is successful, an entrusting authorization book is automatically generated and checked and presented on an entrusting detail page.
And 4, the client generates and presents the client code, and the client scans the client code by using a 'scanning' function of the mobile application terminal.
And 5, after success, both the entrusting parties can check the entrusted electronic certificate in the entrusting list. The consignor can actively withdraw the consigned electronic certificate.
And 6, when the consignee goes to an offline window for transaction, the consignee can scan the code through the presentation consignment code by window staff or actively scan the authorization code presented by the window to associate the consignment certificate in the certificate package, and complete the transaction of the items.
And 7, recording the consignation behavior and the authorization behavior of the manufacture of the consignment book and the certificate and recording the chain and tracing the chain.
(2) And remote delegation, namely when the user does not see the face, delegating the license for use in a remote delegation mode.
Remote delegation process:
step 1, the individual/enterprise selects a remote entrusting mode when entrusting is initiated.
And 2, selecting a certificate to be used when transacting the matters, selecting the consignor, inputting the identity information of the consignor in a manual adding mode, inputting a name, an identity card number and a mobile phone number if the consignment object is an individual, and inputting a unified social credit code and a legal representative/administrator mobile phone number if the consignment object is an enterprise.
And 3, after the consignor is selected, continuing to fill in the consignment affair, and selecting the starting date and the ending date of the consignment.
And 4, the entrusting party carries out electronic hand-written signature or selects signature handwriting, and after the entrusting is successful, an entrusting authorization book is automatically generated and checked and presented on an entrusting detail page.
And 5, after the remote entrusting is initiated, the entrusted party receives the message in a short message mode, and the user of the same mobile terminal application can acquire the entrusted notification in the message pushing of the application terminal.
Step 6, the authorized party can choose to receive or reject the authorization in the authorization list, and the authorization party receives the notification of the result no matter what result is.
And 7, after the entrusted party accepts the entrustment, the two parties can check the electronic certificate of the entrustment in an entrustment list, and if the entrustment is selected to be refused, the entrustment is not established. The consignor can also actively withdraw the consigned electronic certificate.
And 8, when the consignee goes to an offline window for transaction, the consignee can scan the code through the presentation consignment code by window staff or actively scan the authorization code presented by the window to associate the consignment certificate in the certificate package, and complete the transaction of the items.
And 9, recording the consignation behavior and the authorization behavior of the manufacture of the consignment book and the certificate and recording the chain and tracing the chain.
3. Dynamic configuration of Power of attorney
The fields of the entrustment can be dynamically configured according to different service scenes, and different templates are provided for providing services for different services in different regions. For example, if the consignment book sample in the area A needs to show the identification numbers of both consignors, the showing of the identification number fields of both consignors is dynamically configured according to the requirement, and if a certain personal item in the area A does not need to show the identification number, the independent configuration can be carried out according to the item.
4. Block chaining applications in delegated traffic
And facilitating the online entrusting business to occur based on a mechanism of block chain authentication.
The consignor: whether it is a personal user or a legal user, real-name authentication is required before using the certificate package, and the result of real-name authentication is to perform block chain storage. When the consignor initiates the consignment, the consignment action carries out evidence storing uplink, and the consignment action cannot be repudiated. And other application parties can check the entrusting behavior of the entrusting party through the verification result of the block chain to confirm that the entrusting behavior really exists.
The trusted party: before using the entrusting function, the entrusted party also needs to perform real-name authentication, and the result of the real-name authentication is stored in the block chain so as to be verified by other application parties. The behavior received/rejected by the consignor can also store the verification chain, and both parties generated by the delegation behavior can confirm the delegation behavior through the verification storage result of the block chain, and can check through the verification storage information of the block chain whether the consignor successfully delegates the verification and whether the consignor successfully receives the delegation verification. Meanwhile, when the consignor authorizes the consignment certificate to other people, the authorization behavior of the consignment certificate is linked up in real time, and the authorization behavior can also be synchronously transmitted to the consignor. The trusting party can know whether the trustee uses the certificate to transact the affair correctly according to the trusting requirement or not in real time through the certificate storing result of the block chain, and if the trustee is inconsistent with the trusting affair, the trustee can revoke the trusting of the certificate in real time.
Receiving the party: when the consignee goes offline and transacts the items through the window, the receiver verifies the consignee through the real-name authentication information on the block chain. After the verification, the receiver scans the authorization code presented by the authorized party to receive the authorized authorization certificate in the transaction process, the certificate is downloaded and checked according to the requirement, meanwhile, the authorization and use behaviors are stored on the block chain, and the authorized party can confirm the authenticity of the authorization behaviors by reading the block chain certificate storage result.
The above are preferred embodiments of the present invention, and all changes made according to the technical scheme of the present invention that produce functional effects do not exceed the scope of the technical scheme of the present invention belong to the protection scope of the present invention.

Claims (2)

1. An application method of electronic certificate entrusted among multiple roles is characterized by comprising the following steps:
step S1, the person/enterprise adopts face-to-face code scanning entrusting or remote entrusting mode when entrusting is initiated;
step S2, if the code is face-to-face code scanning entrustment, the entrusting party selects the electronic certificate needed to be used when transacting the matters, fills in the entrusting reason, and selects the entrusting start date and end date; if the remote entrusting is carried out, the entrusting party needs to select the entrusted party firstly, fill in the information of the corresponding entrusted party, select the electronic certificate needed to be used when handling the matters, fill in the entrusting course and select the starting date and the ending date of the entrusting;
step S3, the entrusting party carries out electronic hand-written signature or selects signature handwriting, and after the entrusting is successful, an entrusting authorization book is automatically generated and checked and shown on an entrusting detail page;
step S4, if the face-to-face code scanning request is made, the requesting party generates and presents the requesting code, and the requested party scans the requesting code; if the request is a remote request, the requested party acquires the requested notification, and can choose to receive or reject the request in the request list, and then feeds back the notification of the result of the requesting party;
step S5, after successful entrusting, both entrusting parties can check the entrusted electronic certificate in an entrusting list; the consignor can actively cancel the consigned electronic certificate;
step S6, when the consignor goes to the off-line window for transaction, the consignor can scan the window staff to acquire the code through the presentation consignment code or actively scan the window presentation authorization code to associate the consignment electronic certificate in the certificate package, and complete the transaction of the items;
step S7, recording the entrusting behavior and the authorization behavior of the entrusting book and the electronic certificate on the block chain, and tracking the entrusting behavior and the authorization behavior;
in step S7, the recording of the manufacturing of the delegation book and the delegation and authorization of the electronic certificate is specifically referred to as:
the consignor: the method comprises the steps that real-name authentication is required before a certificate package is used, block chain chaining and certificate storing are carried out on the result of the real-name authentication, when a consignor initiates consignment, consignment behaviors can not be repudiated, other application parties can check the consignment behaviors of the consignor through the result of the block chain chaining and confirm that the consignment behaviors exist really;
the trusted party: before using the entrusting function, the entrusted party also needs to carry out real-name authentication, the result of the real-name authentication is stored in the block chain to be used for other application parties to verify the result of the certificate storage, the behavior received/rejected by the entrusted party also stores the certificate chain, both parties generated by the entrusting behavior can confirm the entrusting behavior through the certificate storage result of the block chain, whether the entrusting party successfully entrusts the certificate or not, whether the entrusted party successfully receives the certificate or not, and can verify through the certificate storage information of the block chain, meanwhile, when the entrusted party authorizes the electronic certificate to be authorized to other people for use, the authorization behavior of the entrusted electronic certificate is chain in real time, the authorization behavior is also synchronized to the entrusting party, the entrusting party can know whether the entrusted party correctly uses the electronic certificate to transact the affairs according to the entrusting requirement or not through the certificate storage result of the block chain if the entrusted action is inconsistent with the entrusted affairs, the entrusting party can revoke the entrusting of the electronic certificate in real time;
receiving the party: when the consignee goes offline and transacts items through a window, the consignee verifies the consignee through real-name authentication information on the block chain, after the verification is passed, the consignee scans an authorization code shown by the consignee to receive an authorization electronic certificate authorized in the item transaction process, the certificate is downloaded and checked according to requirements, meanwhile, the authorization and use behaviors are stored on the block chain, and the consignee can confirm the authenticity of the authorization behaviors through reading the certificate storage result of the block chain.
2. The method as claimed in claim 1, wherein the fields of the delegation document can be dynamically configured according to different business scenarios, and different templates can be used to provide services for different businesses in different regions.
CN202011271259.1A 2020-11-13 2020-11-13 Application method of electronic certificate entrusted among multiple roles Active CN112288409B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011271259.1A CN112288409B (en) 2020-11-13 2020-11-13 Application method of electronic certificate entrusted among multiple roles
PCT/CN2020/142471 WO2022099909A1 (en) 2020-11-13 2020-12-31 Application method for delegating electronic certificate among multiple roles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011271259.1A CN112288409B (en) 2020-11-13 2020-11-13 Application method of electronic certificate entrusted among multiple roles

Publications (2)

Publication Number Publication Date
CN112288409A CN112288409A (en) 2021-01-29
CN112288409B true CN112288409B (en) 2022-04-22

Family

ID=74398533

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011271259.1A Active CN112288409B (en) 2020-11-13 2020-11-13 Application method of electronic certificate entrusted among multiple roles

Country Status (2)

Country Link
CN (1) CN112288409B (en)
WO (1) WO2022099909A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114817518B (en) * 2022-06-21 2022-09-20 广州卓腾科技有限公司 License handling method, system and medium based on big data archive identification
CN116720824B (en) * 2023-05-30 2024-02-13 南京邮电大学 Electronic license library management system and method based on blockchain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109309573A (en) * 2018-09-21 2019-02-05 福建南威软件有限公司 A kind of electronics license based on two dimensional code authorizes sharing application method
CN109829696A (en) * 2019-01-28 2019-05-31 中钞信用卡产业发展有限公司杭州区块链技术研究院 Electronics certificate administration method, apparatus, equipment and medium based on block chain
CN110958223A (en) * 2019-10-31 2020-04-03 百度在线网络技术(北京)有限公司 Delegation authorization method, device, equipment and medium based on block chain

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7703128B2 (en) * 2003-02-13 2010-04-20 Microsoft Corporation Digital identity management
HK1194608A2 (en) * 2014-01-17 2014-10-17 Digi Sign Certification Services Ltd A method of issuing, storing and using electronic certificates
CN109784847A (en) * 2018-12-29 2019-05-21 广州市中智软件开发有限公司 Entrusted agency's verification method of electronics license, system and with card terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109309573A (en) * 2018-09-21 2019-02-05 福建南威软件有限公司 A kind of electronics license based on two dimensional code authorizes sharing application method
CN109829696A (en) * 2019-01-28 2019-05-31 中钞信用卡产业发展有限公司杭州区块链技术研究院 Electronics certificate administration method, apparatus, equipment and medium based on block chain
CN110958223A (en) * 2019-10-31 2020-04-03 百度在线网络技术(北京)有限公司 Delegation authorization method, device, equipment and medium based on block chain

Also Published As

Publication number Publication date
WO2022099909A1 (en) 2022-05-19
CN112288409A (en) 2021-01-29

Similar Documents

Publication Publication Date Title
JP7187532B2 (en) System and method for concluding and delivering electronic documents
US11049349B2 (en) Computerized voting system
CN108881290B (en) Block chain based digital certificate use method, system and storage medium
US20220239499A1 (en) System and method for high trust cloud digital signing
US7117370B2 (en) System for transmitting secure data between a sender and a recipient over a computer network using a virtual envelope and method for using the same
CN1838163B (en) Universal electronic stamping system implementation method based on PKI
US20150012339A1 (en) Computerized voting system
US20130085815A1 (en) Computerized voting system
CN101022339A (en) Electronic sign stamp identifying method combined with digital centifi cate and stamp
US9391775B2 (en) Signature method and device
CN1848723A (en) Method and apparatus for providing mutual authentication between a sending unit and a recipient
MX2010011623A (en) Method and device for securing data transfers.
JPH02291043A (en) Method for performig signature and certification by digital system
US20100008481A1 (en) System and method for certifying and authenticating correspondence (ii)
CN112288409B (en) Application method of electronic certificate entrusted among multiple roles
CN111415233B (en) Bank electronic certificate inquiry function generation method based on blockchain multiparty authorization
CN105591745A (en) Method and system for performing identity authentication on user using third-party application
CN112199721A (en) Authentication information processing method, device, equipment and storage medium
US20160337136A1 (en) Method and a system for authenticating and identifying the location of a smartphone
CN1618199A (en) Method for registering and enabling PKI functionalities
US20040015699A1 (en) Identification and contact information
CA3038506A1 (en) Computerized voting system
CN107229879A (en) Electronics confirmation request automatic generation method and system based on safe Quick Response Code
CN111340462A (en) Seal anti-counterfeiting system and method
KR20000049674A (en) Method for providing and authenticating an electronic signature using a web site

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant