CN112465502A - Method for deploying digital time stamp offline - Google Patents
Method for deploying digital time stamp offline Download PDFInfo
- Publication number
- CN112465502A CN112465502A CN202011258019.8A CN202011258019A CN112465502A CN 112465502 A CN112465502 A CN 112465502A CN 202011258019 A CN202011258019 A CN 202011258019A CN 112465502 A CN112465502 A CN 112465502A
- Authority
- CN
- China
- Prior art keywords
- timestamp
- message
- time
- specifications
- microsoft
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000012545 processing Methods 0.000 claims abstract description 13
- 241000282326 Felis catus Species 0.000 claims description 5
- 238000012360 testing method Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000004590 computer program Methods 0.000 description 3
- 102100039215 Guanine nucleotide-binding protein G(t) subunit alpha-3 Human genes 0.000 description 2
- 101000888145 Homo sapiens Guanine nucleotide-binding protein G(t) subunit alpha-3 Proteins 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- WVULKSPCQVQLCU-BUXLTGKBSA-N glycodeoxycholic acid Chemical compound C([C@H]1CC2)[C@H](O)CC[C@]1(C)[C@@H]1[C@@H]2[C@@H]2CC[C@H]([C@@H](CCC(=O)NCC(O)=O)C)[C@@]2(C)[C@@H](O)C1 WVULKSPCQVQLCU-BUXLTGKBSA-N 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 101000759879 Homo sapiens Tetraspanin-10 Proteins 0.000 description 1
- 102100024990 Tetraspanin-10 Human genes 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000013522 software testing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to an off-line time stamp deploying method, which is used for carrying out time stamp service on an electronic document and comprises the following steps: s1, receiving a timestamp request message conforming to one or more timestamp specifications; s2, judging one or more timestamp specifications followed by the timestamp request carried by the message; s3, processing the message according to one or more timestamp specifications followed by the timestamp request; s4, identifying the message according to one or more timestamp specifications followed by the timestamp request; s5, signing the message according to one or more timestamp specifications by using the self-carrying signature time of the message; s6, generating and returning a return message with one or more timestamp specifications. The method has the advantages that the time stamps with any date and time can be deployed, various time stamp specifications are supported, and software development and test use are facilitated.
Description
[ technical field ] A method for producing a semiconductor device
The invention relates to the technical field of information security, in particular to a method for deploying a digital timestamp offline.
[ background of the invention ]
Public Key Infrastructure (PKI) is a technology and specification that follows a standard and provides a set of secure infrastructure platform for the development of electronic commerce by using public Key encryption technology, and users can perform secure communication by using services provided by the PKI platform. A timestamp is a complete, trusted, verifiable, non-tamperable electronic certificate that can represent that data has existed at a particular point in time. According to the international electronic timestamp standard specification RFC3161, the essence of the trusted timestamp service is to bind the Hash value of the user electronic data with an authoritative time source, and then generate an unforgeable timestamp file through a digital signature of a timestamp service center. Base64 is one of the most common encoding methods for transmitting 8-Bit byte codes on a network, and Base64 is a method for representing binary data based on 64 printable characters. The timestamp may provide accurate time proof for any electronic file (e.g., Windows PE file, Microsoft document file) and may verify that the contents of the file have been modified by a person (including the author of the file) since the timestamp. The time stamp issued by the CA organization which acquires the electronic authentication service license issued by the ministry of industry and informatization and the electronic authentication service use password license issued by the national password administration in China has legal effectiveness. Microsoft authentication relies on digital certificates and is based on specifications that have been used successfully in the industry for some time, including public key encryption standard (PKCS) #7 (encryption key specification), PKCS #10 (certificate request format), x.509 (certificate specification), and Secure Hash Algorithm (SHA) and MD5 hash algorithms.
Currently, there are DigiCert/Symantec/VeriSign/Thawte/Geotrust, Entrust, Sectigo/COMODO, Globalsign, Starfield/GoDaddy, Certum, QuoVadis, SwissSign, Google, etc., which are the dominant overseas vendors that provide public digital timestamp services globally, and CNNIC, CFCA, SHECA, GDCA, WoSign/WoTrus, etc. Fig. 2 is a diagram illustrating steps of providing digital time stamp service by a CA agency, and as shown in fig. 2, the steps of providing digital time stamp service by the CA agency mainly include: and the user sends a timestamp request message with the calculated hash value to the timestamp server, the timestamp server acquires time data from the trusted time source, and the timestamp server returns the message with the timestamp to the user. From the technical perspective, an overseas manufacturer 1 lacks a root certificate of a timestamp certificate chain deployed in a file to be timestamp because the root certificate of the overseas manufacturer is pre-embedded in an operating system; 2. the revoke server (CRL/OCSP) is deployed outdoors, so that the response speed is slow, and the Google PKI service cannot be accessed; from a non-technical perspective, vendors can actively interrupt service at any time for various reasons, causing a system that relies on PKI to crash. Domestic manufacturers, CNNIC, CFCA, and SHECA do not provide free timestamp service, WoSign/WoTrus provide digicrt timestamp service, GDCA provides free timestamp service to the public, but only supports RFC3161 protocol, does not support Microsoft authienticode specification, does not support Microsoft Office document signature, and is inconvenient in view of that the domestic current mainstream PC system is still Microsoft Windows and does not support Microsoft authienticode specification.
In addition, current manufacturers providing timestamp services globally deploy timestamps online without exception, and for an enterprise, since an intranet cannot access the internet, the enterprises cannot enjoy the timestamp services provided by the manufacturers, and cannot timestamp electronic documents produced during work, so that local/offline timestamp services are urgently needed. Moreover, due to software development and test requirements, a file to be signed sometimes needs to have accurate signature date and time requirements, and the date of a document signed by the traditional timestamp service is the date and time on a time service server, so that the required date and time signature can be realized after manual adjustment, and the operation is complicated and inaccurate.
The present invention improves upon the method of deploying digital timestamps.
[ summary of the invention ]
The invention aims to provide a method for deploying a digital timestamp offline, which can deploy a timestamp with any date and time, supports various timestamp specifications and is convenient for software development and test.
In order to achieve the above object, the technical solution adopted by the present invention is a method for deploying timestamps offline, which is used for performing timestamp service on electronic documents, and comprises the following steps:
s1, receiving a timestamp request message conforming to one or more timestamp specifications;
s2, judging one or more timestamp specifications followed by the timestamp request carried by the message;
s3, processing the message according to one or more timestamp specifications followed by the timestamp request;
s4, identifying the message according to one or more timestamp specifications followed by the timestamp request;
s5, signing the message according to one or more timestamp specifications by using the self-carrying signature time of the message;
s6, generating and returning a return message with one or more timestamp specifications.
Preferably, the step S5 is the following steps:
s51, judging whether one or more timestamp specifications followed by the message timestamp request are self-signed or not
Time;
s52, if the message timestamp request follows one or more timestamp specifications without signature time, reading the time of the time service server;
and S53, using the self-carried signature time of the message or the time service server time to sign the message according to one or more timestamp specifications.
Preferably, the method for deploying timestamps offline further comprises the following steps:
and S0, the user sends a timestamp request message of one or more timestamp specifications and specifying the timestamp date and time.
Preferably, the specification of the timestamp request carried by the message in the step S2 is according to Microsoft audiode specification or RFC3161 protocol, the steps S3, S4 and S5 perform single signature processing on the message according to Microsoft audiode specification or RFC3161 protocol, and the step S6 generates and returns a return message with a single signature timestamp.
Preferably, the specifications of the timestamp requests carried by the messages in the step S2 are Microsoft audiode specification and RFC3161 protocol, the steps S3, S4 and S5 respectively perform double-signature processing on the messages according to Microsoft audiode specification and RFC3161 protocol, and the step S6 generates and returns the return messages with the double-signature timestamps.
Preferably, the method for deploying timestamps offline further comprises the following steps:
s0, the user sends a timestamp request message of specified date and time stamp according to Microsoft Autotheticode specification and/or RFC3161 protocol.
Preferably, in the case that the timestamp request carried by the message complies with Microsoft Autonticode specification, the step S3 performs BASE64 transcoding processing on the message.
Preferably, the message formats include, but are not limited to doc, xls, ppt, pdf, cab, exe, dll, ocx, sys, msi, vbs, stl, cat, xap format files.
Preferably, the files include, but are not limited to, Windows PE files, Microsoft document files.
The invention has the following beneficial effects: 1) the expense for enterprises and other organizations to purchase the EPKI (Enterprise Public Key infrastructure) service from the Internet CA mechanism is reduced, and the deployment cost is reduced; 2) under the condition of network disconnection, the deployment of the self-owned CA timestamp service is supported; 3) the deployment of the time stamp with any required date and time is supported, so that software developers can conveniently write software programs meeting the requirements of the specified time stamp; 4) the software testing personnel can conveniently deploy the time stamp with any required date and time to test the response of the software program to the time stamp; 5) document signing, code signing and time stamping are performed on format files including, but not limited to, doc, xls, ppt, pdf, cab, exe, dll, ocx, sys, msi, vbs, stl, cat, xap and the like by supporting all document editing software and code signing software strictly following Microsoft AutoInticode specifications and RFC3161 protocol.
[ description of the drawings ]
FIG. 1 is a flow chart of a method of deploying timestamps offline.
Fig. 2 is a diagram of steps taken by a CA agency to provide digital time stamping services.
FIG. 3 is a diagram of a method of offline time stamp deployment providing digital time stamp service steps.
[ detailed description ] embodiments
The invention is further described with reference to the following examples and with reference to the accompanying drawings.
In the present invention, a server is a computer or apparatus that provides and manages network resources on a network, and a terminal may refer to various types of devices including, but not limited to, wireless phones, cellular phones, laptop computers, multimedia wireless devices, wireless communication Personal Computer (PC) cards, Personal Digital Assistants (PDAs), external or internal modems, and the like. A client device, i.e., a terminal, can be any data device that communicates with a server over a wireless channel and/or over a wired channel, e.g., fiber optic or coaxial cables. A terminal can have a variety of names such as mobile station, mobile device, mobile unit, mobile phone, remote station, remote terminal, remote unit, user device, user equipment, handheld device, etc. Different terminals may be incorporated into one system. Terminals may be mobile or stationary and may be dispersed throughout a communication network.
Example 1
The present embodiment implements a method for deploying timestamps offline.
FIG. 1 is a flow chart of a method for deploying timestamps offline. As shown in fig. 1, the method for deploying timestamps offline in accordance with the present embodiment is used for performing timestamp service on electronic documents, and includes the following steps:
s1, receiving a timestamp request message conforming to one or more timestamp specifications;
s2, judging one or more timestamp specifications followed by the timestamp request carried by the message;
s3, processing the message according to one or more timestamp specifications followed by the timestamp request;
s4, identifying the message according to one or more timestamp specifications followed by the timestamp request;
s5, signing the message according to one or more timestamp specifications by using the self-carrying signature time of the message;
s6, generating and returning a return message with one or more timestamp specifications.
Preferably, the step S5 is the following steps:
s51, judging whether one or more timestamp specifications followed by the message timestamp request carry signature time;
s52, if the message timestamp request follows one or more timestamp specifications without signature time, reading the time of the time service server;
and S53, using the self-carried signature time of the message or the time service server time to sign the message according to one or more timestamp specifications.
Preferably, the method for deploying timestamps offline further comprises the following steps:
and S0, the user sends a timestamp request message of one or more timestamp specifications and specifying the timestamp date and time.
Preferably, the specification of the timestamp request carried by the message in the step S2 is according to Microsoft audiode specification or RFC3161 protocol, the steps S3, S4 and S5 perform single signature processing on the message according to Microsoft audiode specification or RFC3161 protocol, and the step S6 generates and returns a return message with a single signature timestamp.
Preferably, the specifications of the timestamp requests carried by the messages in the step S2 are Microsoft audiode specification and RFC3161 protocol, the steps S3, S4 and S5 respectively perform double-signature processing on the messages according to Microsoft audiode specification and RFC3161 protocol, and the step S6 generates and returns the return messages with the double-signature timestamps.
Preferably, the method for deploying timestamps offline further comprises the following steps:
s0, the user sends a timestamp request message of specified date and time stamp according to Microsoft Autotheticode specification and/or RFC3161 protocol.
Preferably, in the case that the timestamp request carried by the message complies with Microsoft Autonticode specification, the step S3 performs BASE64 transcoding processing on the message.
Preferably, the message formats include, but are not limited to doc, xls, ppt, pdf, cab, exe, dll, ocx, sys, msi, vbs, stl, cat, xap format files.
Preferably, the files include, but are not limited to, Windows PE files, Microsoft document files.
Example 2
The present embodiment implements a method for deploying timestamps offline. This embodiment is specifically implemented on the basis of embodiment 1.
FIG. 3 is a diagram of steps in a method for offline deployment of timestamps to provide digital timestamp services. As shown in fig. 3, the method for deploying timestamps offline to provide digital timestamp service in this embodiment mainly includes the following steps: and the user sends a timestamp request message of the calculated hash value to the timestamp server, the timestamp server finishes acquiring time data, and then the timestamp server directly returns the message of the timestamp to the user.
The offline timestamp deployment method in this embodiment follows Microsoft Autonticode specification and RFC3161 protocol, and can be implemented when deployed in a timestamp server: 1. deploying digital timestamps offline (while supporting Microsoft Autonticode specification and RFC3161 protocol); 2. a user is supported to send a date and time message of a designated stamp to an offline timestamp server; 3. support for multiple levels of timestamp certificate chains; 4. document signing, code signing and time stamping are performed on format files including, but not limited to, doc, xls, ppt, pdf, cab, exe, dll, ocx, sys, msi, vbs, stl, cat, xap and the like by supporting all document editing software and code signing software strictly following Microsoft AutoInticode specifications and RFC3161 protocol.
The method for deploying the time stamp offline in the embodiment comprises the following steps:
step 1: receiving a timestamp request message initiated by a user;
step 2: judging whether the timestamp request carried by the message conforms to Microsoft Autonticode specification or RFC3161 protocol;
step 2.1: if the Microsoft Autothenticode specification is followed:
step 2.1.1: transcoding the message BASE 64;
step 2.1.2: add object identifier, call 1.2.840.113549.1.7.1{ iso (1) member-body (2) us (840) rsadsi (113549) pkcs (1) pkcs-7(7) id-data (1) };
step 2.1.3: judging whether the message in the step 1 carries the signature date and time or not, and adding the time into a 2.1.2 message;
step 2.1.3.1: if the signature time is not carried, reading the time of the time service server;
step 2.1.3.2: if the self-carried signature time is available, using the signature time carried by the message in the step 1;
step 2.1.4: generating a timestamp return message, including information: encrypting the message obtained in the step 2.1.3 and a public key corresponding to the private key by using a private key of a timestamp digital certificate loaded by a timestamp server;
step 2.2: if the RFC3161 protocol is followed:
step 2.2.1: adding an object identifier to the message, and calling 1.2.840.113549.1.7.1{ iso (1) member-body (2) us (840) rsadsi (113549) pkcs (1) pkcs-7(7) id-data (1) };
step 2.2.2: judging whether the message in the step 1 carries the signature date and time or not, and adding the time into the 2.2.1 message;
step 2.2.2.1: if the signature time is not carried, reading the time of the time service server;
step 2.2.2.2: if the self-carried signature time is available, using the signature time carried by the message in the step 1;
step 2.2.3: generating a time stamp token, adding an object identifier to the message obtained in the step 2.2.2, and calling 1.3.6.1.4.1.13762.3{ iso (1) identified-organization (3) dod (6) internet (1) private (4) enterprise (1) tsa policy (13762.3) };
step 2.2.4: generating a timestamp return message, including information: and (3) encrypting the message obtained in the step (2.2.3) and a public key corresponding to the private key by using a private key of the timestamp digital certificate loaded by the timestamp server.
The computer program for implementing the offline timestamp deployment method of the embodiment is installed and deployed in a timestamp server, and transmits timestamp data through an 80 port, so that the program cannot be normally used if the 80 port is not opened. The 80-port is opened, and the digital time stamp service provided by the computer program of the method for deploying the time stamp offline can be started normally. The following is an example of improving the digital timestamp service by the offline timestamp deployment method according to this embodiment.
Example 1: the single signature is deployed on the Windows PE file, a Microsoft Autothenticode standard timestamp is added, and the date and time are taken from the date and time of the time service server.
Example 2: and (4) deploying a single signature for the Windows PE file, adding an RFC3161 protocol time stamp, wherein the date and time is taken from the date and time of the time service server.
Example 3: the method comprises the steps of deploying double signatures for Windows PE files, and adding Microsoft Autothenticaode specification and RFC3161 protocol time stamps, wherein the date and time are taken from the date and time of a time service server.
Example 4: a single signature is deployed for Windows PE files, a Microsoft Autothenticode standard timestamp is added, and the date and time are manually specified 2021, 2, 3 days, 18:20:40(UTC + 8).
Example 5: a single signature is deployed on the Windows PE file, an RFC3161 protocol time stamp is added, and the date and time manually specify 8, 20 and 0:00:00(UTC +8) in 2020.
Example 6: the method comprises the steps of deploying double signatures for Windows PE files, and adding Microsoft Autothenticaode specification and RFC3161 protocol time stamps at the same time, wherein the date and time of the Microsoft Autothenticaode specification time stamps are manually specified to be 30 days 6 months 2021, 12:34:56(UTC +8), and the date and time of the RFC3161 protocol time stamps are taken from the date and time of a time service server.
Example 7: the VBA code of the Microsoft Office Excel document (based on the Microsoft Excel2016 operation) is signed with a Microsoft Autothenticaode standard timestamp, and the date and time is taken from the time service server date and time.
Example 8: the PDF file is subjected to document signing (based on Foxit Phantom PDF 9.2 operation), and RFC3161 protocol time stamp is adopted, and date and time of the time stamp are manually specified to be 22:22:22(UTC +8) in 8-month and 30-day 2020.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a computer readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and additions can be made without departing from the principle of the present invention, and these should also be considered as the protection scope of the present invention.
Claims (9)
1. A method for off-line time stamp deployment for time stamping services for electronic documents, comprising the steps of:
s1, receiving a timestamp request message conforming to one or more timestamp specifications;
s2, judging one or more timestamp specifications followed by the timestamp request carried by the message;
s3, processing the message according to one or more timestamp specifications followed by the timestamp request;
s4, identifying the message according to one or more timestamp specifications followed by the timestamp request;
s5, signing the message according to one or more timestamp specifications by using the self-carrying signature time of the message;
s6, generating and returning a return message with one or more timestamp specifications.
2. The method for deploying timestamps off-line as claimed in claim 1, wherein said step S5 is further comprising the steps of:
s51, judging whether one or more timestamp specifications followed by the message timestamp request carry signature time;
s52, if the one or more timestamp specifications to which the message timestamp request conforms are not self-signed times,
reading time of a time service server;
and S53, using the self-carried signature time of the message or the time service server time to sign the message according to one or more timestamp specifications.
3. The method of offline deployment of timestamps according to claim 2, further comprising the steps of:
and S0, the user sends a timestamp request message of one or more timestamp specifications and specifying the timestamp date and time.
4. The method of claim 2, wherein the deployment of the timestamp is performed off-line by: the specification that the timestamp request carried by the message in the step S2 conforms to is that the message conforms to Microsoft audiode specification or conforms to RFC3161 protocol, the steps S3, S4 and S5 perform single-signature processing on the message according to the Microsoft audiode specification or the RFC3161 protocol, and the step S6 generates and returns a return message with a single-signature timestamp.
5. The method of claim 2, wherein the deployment of the timestamp is performed off-line by: the specification that the timestamp request carried by the message in the step S2 conforms to the Microsoft audiode specification and conforms to the RFC3161 protocol, the steps S3, S4 and S5 respectively perform double signature processing on the message according to the Microsoft audiode specification and the RFC3161 protocol, and the step S6 generates and returns a return message with a double signature timestamp.
6. The method of offline deployment of timestamps according to claim 5, further comprising the steps of:
s0, the user sends a timestamp request message of specified date and time stamp according to Microsoft Autotheticode specification and/or RFC3161 protocol.
7. A method of deploying timestamps as claimed in claim 4 or claim 5, offline in which: in the case that the timestamp request carried by the packet complies with the Microsoft internet specification, the step S3 performs BASE64 transcoding processing on the packet.
8. The method of claim 1, wherein the deployment of the timestamp is performed off-line by: the message formats include, but are not limited to doc, xls, ppt, pdf, cab, exe, dll, ocx, sys, msi, vbs, stl, cat, and xap format files.
9. The method of claim 8, wherein the deployment of the timestamp is performed off-line by: the files include, but are not limited to, Windows PE files, Microsoft document files.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011258019.8A CN112465502A (en) | 2020-11-11 | 2020-11-11 | Method for deploying digital time stamp offline |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011258019.8A CN112465502A (en) | 2020-11-11 | 2020-11-11 | Method for deploying digital time stamp offline |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112465502A true CN112465502A (en) | 2021-03-09 |
Family
ID=74825530
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011258019.8A Pending CN112465502A (en) | 2020-11-11 | 2020-11-11 | Method for deploying digital time stamp offline |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112465502A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116451261A (en) * | 2023-06-16 | 2023-07-18 | 南京朗赢信息技术有限公司 | Method for carrying out RSA and SM2 double standard signature and verification on PDF document |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080250247A1 (en) * | 2007-02-13 | 2008-10-09 | Airbus France | Authentication method for an electronic document and verification method of a document thus authenticated |
CN102647461A (en) * | 2012-03-29 | 2012-08-22 | 奇智软件(北京)有限公司 | Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol) |
CN106953730A (en) * | 2016-01-07 | 2017-07-14 | 上海格尔软件股份有限公司 | The safety method of the Windows code signatures containing timestamp is realized under physical isolation network environment |
CN111698093A (en) * | 2020-06-11 | 2020-09-22 | 江苏海洋大学 | Digital time stamp issuing and verifying method based on PKI system |
-
2020
- 2020-11-11 CN CN202011258019.8A patent/CN112465502A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080250247A1 (en) * | 2007-02-13 | 2008-10-09 | Airbus France | Authentication method for an electronic document and verification method of a document thus authenticated |
CN102647461A (en) * | 2012-03-29 | 2012-08-22 | 奇智软件(北京)有限公司 | Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol) |
CN106953730A (en) * | 2016-01-07 | 2017-07-14 | 上海格尔软件股份有限公司 | The safety method of the Windows code signatures containing timestamp is realized under physical isolation network environment |
CN111698093A (en) * | 2020-06-11 | 2020-09-22 | 江苏海洋大学 | Digital time stamp issuing and verifying method based on PKI system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116451261A (en) * | 2023-06-16 | 2023-07-18 | 南京朗赢信息技术有限公司 | Method for carrying out RSA and SM2 double standard signature and verification on PDF document |
CN116451261B (en) * | 2023-06-16 | 2023-10-13 | 南京朗赢信息技术有限公司 | Method for carrying out RSA and SM2 double standard signature and verification on PDF document |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1217850B1 (en) | Method for permitting debugging and testing of software on an mobile communication device in a secure environment | |
EP3484125B1 (en) | Method and device for scheduling interface of hybrid cloud | |
US9059978B2 (en) | System and methods for remote maintenance in an electronic network with multiple clients | |
EP1680884B1 (en) | Methods and apparatus for providing application credentials | |
US9313214B2 (en) | Enhanced security using service provider authentication | |
US20110029769A1 (en) | Method for using trusted, hardware identity credentials in runtime package signature to secure mobile communications and high value transaction execution | |
US20070136361A1 (en) | Method and apparatus for providing XML signature service in wireless environment | |
CN111355726B (en) | Identity authorization login method and device, electronic equipment and storage medium | |
US20100082982A1 (en) | Service control system and service control method | |
CN109981287B (en) | Code signing method and storage medium thereof | |
CN112199721A (en) | Authentication information processing method, device, equipment and storage medium | |
US20140059341A1 (en) | Creating and accessing encrypted web based content in hybrid applications | |
CN112465502A (en) | Method for deploying digital time stamp offline | |
US8520840B2 (en) | System, method and computer product for PKI (public key infrastructure) enabled data transactions in wireless devices connected to the internet | |
US20040133783A1 (en) | Method for non repudiation using cryptographic signatures in small devices | |
CN115567271A (en) | Authentication method and device, page skip method and device, electronic equipment and medium | |
CN109005105B (en) | Method and device for generating mail with recorded sender position information and storage medium | |
CN113761566A (en) | Data processing method and device | |
JP2005020651A (en) | Validating method of time stamp informastion | |
CN115221562A (en) | Browser file signature method and device and computer readable storage medium | |
CN116012182A (en) | Tax office data preprocessing method and device | |
CN116226932A (en) | Service data verification method and device, computer medium and electronic equipment | |
CN114398617A (en) | Single sign-on method and device, electronic equipment and storage medium | |
CN117171033A (en) | Interface testing method, device, terminal equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |