CN112465502A - Method for deploying digital time stamp offline - Google Patents

Method for deploying digital time stamp offline Download PDF

Info

Publication number
CN112465502A
CN112465502A CN202011258019.8A CN202011258019A CN112465502A CN 112465502 A CN112465502 A CN 112465502A CN 202011258019 A CN202011258019 A CN 202011258019A CN 112465502 A CN112465502 A CN 112465502A
Authority
CN
China
Prior art keywords
timestamp
message
time
specifications
microsoft
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011258019.8A
Other languages
Chinese (zh)
Inventor
罗韫昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China Shanghai Branch
Original Assignee
Agricultural Bank of China Shanghai Branch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China Shanghai Branch filed Critical Agricultural Bank of China Shanghai Branch
Priority to CN202011258019.8A priority Critical patent/CN112465502A/en
Publication of CN112465502A publication Critical patent/CN112465502A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to an off-line time stamp deploying method, which is used for carrying out time stamp service on an electronic document and comprises the following steps: s1, receiving a timestamp request message conforming to one or more timestamp specifications; s2, judging one or more timestamp specifications followed by the timestamp request carried by the message; s3, processing the message according to one or more timestamp specifications followed by the timestamp request; s4, identifying the message according to one or more timestamp specifications followed by the timestamp request; s5, signing the message according to one or more timestamp specifications by using the self-carrying signature time of the message; s6, generating and returning a return message with one or more timestamp specifications. The method has the advantages that the time stamps with any date and time can be deployed, various time stamp specifications are supported, and software development and test use are facilitated.

Description

Method for deploying digital time stamp offline
[ technical field ] A method for producing a semiconductor device
The invention relates to the technical field of information security, in particular to a method for deploying a digital timestamp offline.
[ background of the invention ]
Public Key Infrastructure (PKI) is a technology and specification that follows a standard and provides a set of secure infrastructure platform for the development of electronic commerce by using public Key encryption technology, and users can perform secure communication by using services provided by the PKI platform. A timestamp is a complete, trusted, verifiable, non-tamperable electronic certificate that can represent that data has existed at a particular point in time. According to the international electronic timestamp standard specification RFC3161, the essence of the trusted timestamp service is to bind the Hash value of the user electronic data with an authoritative time source, and then generate an unforgeable timestamp file through a digital signature of a timestamp service center. Base64 is one of the most common encoding methods for transmitting 8-Bit byte codes on a network, and Base64 is a method for representing binary data based on 64 printable characters. The timestamp may provide accurate time proof for any electronic file (e.g., Windows PE file, Microsoft document file) and may verify that the contents of the file have been modified by a person (including the author of the file) since the timestamp. The time stamp issued by the CA organization which acquires the electronic authentication service license issued by the ministry of industry and informatization and the electronic authentication service use password license issued by the national password administration in China has legal effectiveness. Microsoft authentication relies on digital certificates and is based on specifications that have been used successfully in the industry for some time, including public key encryption standard (PKCS) #7 (encryption key specification), PKCS #10 (certificate request format), x.509 (certificate specification), and Secure Hash Algorithm (SHA) and MD5 hash algorithms.
Currently, there are DigiCert/Symantec/VeriSign/Thawte/Geotrust, Entrust, Sectigo/COMODO, Globalsign, Starfield/GoDaddy, Certum, QuoVadis, SwissSign, Google, etc., which are the dominant overseas vendors that provide public digital timestamp services globally, and CNNIC, CFCA, SHECA, GDCA, WoSign/WoTrus, etc. Fig. 2 is a diagram illustrating steps of providing digital time stamp service by a CA agency, and as shown in fig. 2, the steps of providing digital time stamp service by the CA agency mainly include: and the user sends a timestamp request message with the calculated hash value to the timestamp server, the timestamp server acquires time data from the trusted time source, and the timestamp server returns the message with the timestamp to the user. From the technical perspective, an overseas manufacturer 1 lacks a root certificate of a timestamp certificate chain deployed in a file to be timestamp because the root certificate of the overseas manufacturer is pre-embedded in an operating system; 2. the revoke server (CRL/OCSP) is deployed outdoors, so that the response speed is slow, and the Google PKI service cannot be accessed; from a non-technical perspective, vendors can actively interrupt service at any time for various reasons, causing a system that relies on PKI to crash. Domestic manufacturers, CNNIC, CFCA, and SHECA do not provide free timestamp service, WoSign/WoTrus provide digicrt timestamp service, GDCA provides free timestamp service to the public, but only supports RFC3161 protocol, does not support Microsoft authienticode specification, does not support Microsoft Office document signature, and is inconvenient in view of that the domestic current mainstream PC system is still Microsoft Windows and does not support Microsoft authienticode specification.
In addition, current manufacturers providing timestamp services globally deploy timestamps online without exception, and for an enterprise, since an intranet cannot access the internet, the enterprises cannot enjoy the timestamp services provided by the manufacturers, and cannot timestamp electronic documents produced during work, so that local/offline timestamp services are urgently needed. Moreover, due to software development and test requirements, a file to be signed sometimes needs to have accurate signature date and time requirements, and the date of a document signed by the traditional timestamp service is the date and time on a time service server, so that the required date and time signature can be realized after manual adjustment, and the operation is complicated and inaccurate.
The present invention improves upon the method of deploying digital timestamps.
[ summary of the invention ]
The invention aims to provide a method for deploying a digital timestamp offline, which can deploy a timestamp with any date and time, supports various timestamp specifications and is convenient for software development and test.
In order to achieve the above object, the technical solution adopted by the present invention is a method for deploying timestamps offline, which is used for performing timestamp service on electronic documents, and comprises the following steps:
s1, receiving a timestamp request message conforming to one or more timestamp specifications;
s2, judging one or more timestamp specifications followed by the timestamp request carried by the message;
s3, processing the message according to one or more timestamp specifications followed by the timestamp request;
s4, identifying the message according to one or more timestamp specifications followed by the timestamp request;
s5, signing the message according to one or more timestamp specifications by using the self-carrying signature time of the message;
s6, generating and returning a return message with one or more timestamp specifications.
Preferably, the step S5 is the following steps:
s51, judging whether one or more timestamp specifications followed by the message timestamp request are self-signed or not
Time;
s52, if the message timestamp request follows one or more timestamp specifications without signature time, reading the time of the time service server;
and S53, using the self-carried signature time of the message or the time service server time to sign the message according to one or more timestamp specifications.
Preferably, the method for deploying timestamps offline further comprises the following steps:
and S0, the user sends a timestamp request message of one or more timestamp specifications and specifying the timestamp date and time.
Preferably, the specification of the timestamp request carried by the message in the step S2 is according to Microsoft audiode specification or RFC3161 protocol, the steps S3, S4 and S5 perform single signature processing on the message according to Microsoft audiode specification or RFC3161 protocol, and the step S6 generates and returns a return message with a single signature timestamp.
Preferably, the specifications of the timestamp requests carried by the messages in the step S2 are Microsoft audiode specification and RFC3161 protocol, the steps S3, S4 and S5 respectively perform double-signature processing on the messages according to Microsoft audiode specification and RFC3161 protocol, and the step S6 generates and returns the return messages with the double-signature timestamps.
Preferably, the method for deploying timestamps offline further comprises the following steps:
s0, the user sends a timestamp request message of specified date and time stamp according to Microsoft Autotheticode specification and/or RFC3161 protocol.
Preferably, in the case that the timestamp request carried by the message complies with Microsoft Autonticode specification, the step S3 performs BASE64 transcoding processing on the message.
Preferably, the message formats include, but are not limited to doc, xls, ppt, pdf, cab, exe, dll, ocx, sys, msi, vbs, stl, cat, xap format files.
Preferably, the files include, but are not limited to, Windows PE files, Microsoft document files.
The invention has the following beneficial effects: 1) the expense for enterprises and other organizations to purchase the EPKI (Enterprise Public Key infrastructure) service from the Internet CA mechanism is reduced, and the deployment cost is reduced; 2) under the condition of network disconnection, the deployment of the self-owned CA timestamp service is supported; 3) the deployment of the time stamp with any required date and time is supported, so that software developers can conveniently write software programs meeting the requirements of the specified time stamp; 4) the software testing personnel can conveniently deploy the time stamp with any required date and time to test the response of the software program to the time stamp; 5) document signing, code signing and time stamping are performed on format files including, but not limited to, doc, xls, ppt, pdf, cab, exe, dll, ocx, sys, msi, vbs, stl, cat, xap and the like by supporting all document editing software and code signing software strictly following Microsoft AutoInticode specifications and RFC3161 protocol.
[ description of the drawings ]
FIG. 1 is a flow chart of a method of deploying timestamps offline.
Fig. 2 is a diagram of steps taken by a CA agency to provide digital time stamping services.
FIG. 3 is a diagram of a method of offline time stamp deployment providing digital time stamp service steps.
[ detailed description ] embodiments
The invention is further described with reference to the following examples and with reference to the accompanying drawings.
In the present invention, a server is a computer or apparatus that provides and manages network resources on a network, and a terminal may refer to various types of devices including, but not limited to, wireless phones, cellular phones, laptop computers, multimedia wireless devices, wireless communication Personal Computer (PC) cards, Personal Digital Assistants (PDAs), external or internal modems, and the like. A client device, i.e., a terminal, can be any data device that communicates with a server over a wireless channel and/or over a wired channel, e.g., fiber optic or coaxial cables. A terminal can have a variety of names such as mobile station, mobile device, mobile unit, mobile phone, remote station, remote terminal, remote unit, user device, user equipment, handheld device, etc. Different terminals may be incorporated into one system. Terminals may be mobile or stationary and may be dispersed throughout a communication network.
Example 1
The present embodiment implements a method for deploying timestamps offline.
FIG. 1 is a flow chart of a method for deploying timestamps offline. As shown in fig. 1, the method for deploying timestamps offline in accordance with the present embodiment is used for performing timestamp service on electronic documents, and includes the following steps:
s1, receiving a timestamp request message conforming to one or more timestamp specifications;
s2, judging one or more timestamp specifications followed by the timestamp request carried by the message;
s3, processing the message according to one or more timestamp specifications followed by the timestamp request;
s4, identifying the message according to one or more timestamp specifications followed by the timestamp request;
s5, signing the message according to one or more timestamp specifications by using the self-carrying signature time of the message;
s6, generating and returning a return message with one or more timestamp specifications.
Preferably, the step S5 is the following steps:
s51, judging whether one or more timestamp specifications followed by the message timestamp request carry signature time;
s52, if the message timestamp request follows one or more timestamp specifications without signature time, reading the time of the time service server;
and S53, using the self-carried signature time of the message or the time service server time to sign the message according to one or more timestamp specifications.
Preferably, the method for deploying timestamps offline further comprises the following steps:
and S0, the user sends a timestamp request message of one or more timestamp specifications and specifying the timestamp date and time.
Preferably, the specification of the timestamp request carried by the message in the step S2 is according to Microsoft audiode specification or RFC3161 protocol, the steps S3, S4 and S5 perform single signature processing on the message according to Microsoft audiode specification or RFC3161 protocol, and the step S6 generates and returns a return message with a single signature timestamp.
Preferably, the specifications of the timestamp requests carried by the messages in the step S2 are Microsoft audiode specification and RFC3161 protocol, the steps S3, S4 and S5 respectively perform double-signature processing on the messages according to Microsoft audiode specification and RFC3161 protocol, and the step S6 generates and returns the return messages with the double-signature timestamps.
Preferably, the method for deploying timestamps offline further comprises the following steps:
s0, the user sends a timestamp request message of specified date and time stamp according to Microsoft Autotheticode specification and/or RFC3161 protocol.
Preferably, in the case that the timestamp request carried by the message complies with Microsoft Autonticode specification, the step S3 performs BASE64 transcoding processing on the message.
Preferably, the message formats include, but are not limited to doc, xls, ppt, pdf, cab, exe, dll, ocx, sys, msi, vbs, stl, cat, xap format files.
Preferably, the files include, but are not limited to, Windows PE files, Microsoft document files.
Example 2
The present embodiment implements a method for deploying timestamps offline. This embodiment is specifically implemented on the basis of embodiment 1.
FIG. 3 is a diagram of steps in a method for offline deployment of timestamps to provide digital timestamp services. As shown in fig. 3, the method for deploying timestamps offline to provide digital timestamp service in this embodiment mainly includes the following steps: and the user sends a timestamp request message of the calculated hash value to the timestamp server, the timestamp server finishes acquiring time data, and then the timestamp server directly returns the message of the timestamp to the user.
The offline timestamp deployment method in this embodiment follows Microsoft Autonticode specification and RFC3161 protocol, and can be implemented when deployed in a timestamp server: 1. deploying digital timestamps offline (while supporting Microsoft Autonticode specification and RFC3161 protocol); 2. a user is supported to send a date and time message of a designated stamp to an offline timestamp server; 3. support for multiple levels of timestamp certificate chains; 4. document signing, code signing and time stamping are performed on format files including, but not limited to, doc, xls, ppt, pdf, cab, exe, dll, ocx, sys, msi, vbs, stl, cat, xap and the like by supporting all document editing software and code signing software strictly following Microsoft AutoInticode specifications and RFC3161 protocol.
The method for deploying the time stamp offline in the embodiment comprises the following steps:
step 1: receiving a timestamp request message initiated by a user;
step 2: judging whether the timestamp request carried by the message conforms to Microsoft Autonticode specification or RFC3161 protocol;
step 2.1: if the Microsoft Autothenticode specification is followed:
step 2.1.1: transcoding the message BASE 64;
step 2.1.2: add object identifier, call 1.2.840.113549.1.7.1{ iso (1) member-body (2) us (840) rsadsi (113549) pkcs (1) pkcs-7(7) id-data (1) };
step 2.1.3: judging whether the message in the step 1 carries the signature date and time or not, and adding the time into a 2.1.2 message;
step 2.1.3.1: if the signature time is not carried, reading the time of the time service server;
step 2.1.3.2: if the self-carried signature time is available, using the signature time carried by the message in the step 1;
step 2.1.4: generating a timestamp return message, including information: encrypting the message obtained in the step 2.1.3 and a public key corresponding to the private key by using a private key of a timestamp digital certificate loaded by a timestamp server;
step 2.2: if the RFC3161 protocol is followed:
step 2.2.1: adding an object identifier to the message, and calling 1.2.840.113549.1.7.1{ iso (1) member-body (2) us (840) rsadsi (113549) pkcs (1) pkcs-7(7) id-data (1) };
step 2.2.2: judging whether the message in the step 1 carries the signature date and time or not, and adding the time into the 2.2.1 message;
step 2.2.2.1: if the signature time is not carried, reading the time of the time service server;
step 2.2.2.2: if the self-carried signature time is available, using the signature time carried by the message in the step 1;
step 2.2.3: generating a time stamp token, adding an object identifier to the message obtained in the step 2.2.2, and calling 1.3.6.1.4.1.13762.3{ iso (1) identified-organization (3) dod (6) internet (1) private (4) enterprise (1) tsa policy (13762.3) };
step 2.2.4: generating a timestamp return message, including information: and (3) encrypting the message obtained in the step (2.2.3) and a public key corresponding to the private key by using a private key of the timestamp digital certificate loaded by the timestamp server.
The computer program for implementing the offline timestamp deployment method of the embodiment is installed and deployed in a timestamp server, and transmits timestamp data through an 80 port, so that the program cannot be normally used if the 80 port is not opened. The 80-port is opened, and the digital time stamp service provided by the computer program of the method for deploying the time stamp offline can be started normally. The following is an example of improving the digital timestamp service by the offline timestamp deployment method according to this embodiment.
Example 1: the single signature is deployed on the Windows PE file, a Microsoft Autothenticode standard timestamp is added, and the date and time are taken from the date and time of the time service server.
Example 2: and (4) deploying a single signature for the Windows PE file, adding an RFC3161 protocol time stamp, wherein the date and time is taken from the date and time of the time service server.
Example 3: the method comprises the steps of deploying double signatures for Windows PE files, and adding Microsoft Autothenticaode specification and RFC3161 protocol time stamps, wherein the date and time are taken from the date and time of a time service server.
Example 4: a single signature is deployed for Windows PE files, a Microsoft Autothenticode standard timestamp is added, and the date and time are manually specified 2021, 2, 3 days, 18:20:40(UTC + 8).
Example 5: a single signature is deployed on the Windows PE file, an RFC3161 protocol time stamp is added, and the date and time manually specify 8, 20 and 0:00:00(UTC +8) in 2020.
Example 6: the method comprises the steps of deploying double signatures for Windows PE files, and adding Microsoft Autothenticaode specification and RFC3161 protocol time stamps at the same time, wherein the date and time of the Microsoft Autothenticaode specification time stamps are manually specified to be 30 days 6 months 2021, 12:34:56(UTC +8), and the date and time of the RFC3161 protocol time stamps are taken from the date and time of a time service server.
Example 7: the VBA code of the Microsoft Office Excel document (based on the Microsoft Excel2016 operation) is signed with a Microsoft Autothenticaode standard timestamp, and the date and time is taken from the time service server date and time.
Example 8: the PDF file is subjected to document signing (based on Foxit Phantom PDF 9.2 operation), and RFC3161 protocol time stamp is adopted, and date and time of the time stamp are manually specified to be 22:22:22(UTC +8) in 8-month and 30-day 2020.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a computer readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and additions can be made without departing from the principle of the present invention, and these should also be considered as the protection scope of the present invention.

Claims (9)

1. A method for off-line time stamp deployment for time stamping services for electronic documents, comprising the steps of:
s1, receiving a timestamp request message conforming to one or more timestamp specifications;
s2, judging one or more timestamp specifications followed by the timestamp request carried by the message;
s3, processing the message according to one or more timestamp specifications followed by the timestamp request;
s4, identifying the message according to one or more timestamp specifications followed by the timestamp request;
s5, signing the message according to one or more timestamp specifications by using the self-carrying signature time of the message;
s6, generating and returning a return message with one or more timestamp specifications.
2. The method for deploying timestamps off-line as claimed in claim 1, wherein said step S5 is further comprising the steps of:
s51, judging whether one or more timestamp specifications followed by the message timestamp request carry signature time;
s52, if the one or more timestamp specifications to which the message timestamp request conforms are not self-signed times,
reading time of a time service server;
and S53, using the self-carried signature time of the message or the time service server time to sign the message according to one or more timestamp specifications.
3. The method of offline deployment of timestamps according to claim 2, further comprising the steps of:
and S0, the user sends a timestamp request message of one or more timestamp specifications and specifying the timestamp date and time.
4. The method of claim 2, wherein the deployment of the timestamp is performed off-line by: the specification that the timestamp request carried by the message in the step S2 conforms to is that the message conforms to Microsoft audiode specification or conforms to RFC3161 protocol, the steps S3, S4 and S5 perform single-signature processing on the message according to the Microsoft audiode specification or the RFC3161 protocol, and the step S6 generates and returns a return message with a single-signature timestamp.
5. The method of claim 2, wherein the deployment of the timestamp is performed off-line by: the specification that the timestamp request carried by the message in the step S2 conforms to the Microsoft audiode specification and conforms to the RFC3161 protocol, the steps S3, S4 and S5 respectively perform double signature processing on the message according to the Microsoft audiode specification and the RFC3161 protocol, and the step S6 generates and returns a return message with a double signature timestamp.
6. The method of offline deployment of timestamps according to claim 5, further comprising the steps of:
s0, the user sends a timestamp request message of specified date and time stamp according to Microsoft Autotheticode specification and/or RFC3161 protocol.
7. A method of deploying timestamps as claimed in claim 4 or claim 5, offline in which: in the case that the timestamp request carried by the packet complies with the Microsoft internet specification, the step S3 performs BASE64 transcoding processing on the packet.
8. The method of claim 1, wherein the deployment of the timestamp is performed off-line by: the message formats include, but are not limited to doc, xls, ppt, pdf, cab, exe, dll, ocx, sys, msi, vbs, stl, cat, and xap format files.
9. The method of claim 8, wherein the deployment of the timestamp is performed off-line by: the files include, but are not limited to, Windows PE files, Microsoft document files.
CN202011258019.8A 2020-11-11 2020-11-11 Method for deploying digital time stamp offline Pending CN112465502A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011258019.8A CN112465502A (en) 2020-11-11 2020-11-11 Method for deploying digital time stamp offline

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011258019.8A CN112465502A (en) 2020-11-11 2020-11-11 Method for deploying digital time stamp offline

Publications (1)

Publication Number Publication Date
CN112465502A true CN112465502A (en) 2021-03-09

Family

ID=74825530

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011258019.8A Pending CN112465502A (en) 2020-11-11 2020-11-11 Method for deploying digital time stamp offline

Country Status (1)

Country Link
CN (1) CN112465502A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116451261A (en) * 2023-06-16 2023-07-18 南京朗赢信息技术有限公司 Method for carrying out RSA and SM2 double standard signature and verification on PDF document

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080250247A1 (en) * 2007-02-13 2008-10-09 Airbus France Authentication method for an electronic document and verification method of a document thus authenticated
CN102647461A (en) * 2012-03-29 2012-08-22 奇智软件(北京)有限公司 Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol)
CN106953730A (en) * 2016-01-07 2017-07-14 上海格尔软件股份有限公司 The safety method of the Windows code signatures containing timestamp is realized under physical isolation network environment
CN111698093A (en) * 2020-06-11 2020-09-22 江苏海洋大学 Digital time stamp issuing and verifying method based on PKI system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080250247A1 (en) * 2007-02-13 2008-10-09 Airbus France Authentication method for an electronic document and verification method of a document thus authenticated
CN102647461A (en) * 2012-03-29 2012-08-22 奇智软件(北京)有限公司 Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol)
CN106953730A (en) * 2016-01-07 2017-07-14 上海格尔软件股份有限公司 The safety method of the Windows code signatures containing timestamp is realized under physical isolation network environment
CN111698093A (en) * 2020-06-11 2020-09-22 江苏海洋大学 Digital time stamp issuing and verifying method based on PKI system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116451261A (en) * 2023-06-16 2023-07-18 南京朗赢信息技术有限公司 Method for carrying out RSA and SM2 double standard signature and verification on PDF document
CN116451261B (en) * 2023-06-16 2023-10-13 南京朗赢信息技术有限公司 Method for carrying out RSA and SM2 double standard signature and verification on PDF document

Similar Documents

Publication Publication Date Title
EP1217850B1 (en) Method for permitting debugging and testing of software on an mobile communication device in a secure environment
EP3484125B1 (en) Method and device for scheduling interface of hybrid cloud
US9059978B2 (en) System and methods for remote maintenance in an electronic network with multiple clients
EP1680884B1 (en) Methods and apparatus for providing application credentials
US9313214B2 (en) Enhanced security using service provider authentication
US20110029769A1 (en) Method for using trusted, hardware identity credentials in runtime package signature to secure mobile communications and high value transaction execution
US20070136361A1 (en) Method and apparatus for providing XML signature service in wireless environment
CN111355726B (en) Identity authorization login method and device, electronic equipment and storage medium
US20100082982A1 (en) Service control system and service control method
CN109981287B (en) Code signing method and storage medium thereof
CN112199721A (en) Authentication information processing method, device, equipment and storage medium
US20140059341A1 (en) Creating and accessing encrypted web based content in hybrid applications
CN112465502A (en) Method for deploying digital time stamp offline
US8520840B2 (en) System, method and computer product for PKI (public key infrastructure) enabled data transactions in wireless devices connected to the internet
US20040133783A1 (en) Method for non repudiation using cryptographic signatures in small devices
CN115567271A (en) Authentication method and device, page skip method and device, electronic equipment and medium
CN109005105B (en) Method and device for generating mail with recorded sender position information and storage medium
CN113761566A (en) Data processing method and device
JP2005020651A (en) Validating method of time stamp informastion
CN115221562A (en) Browser file signature method and device and computer readable storage medium
CN116012182A (en) Tax office data preprocessing method and device
CN116226932A (en) Service data verification method and device, computer medium and electronic equipment
CN114398617A (en) Single sign-on method and device, electronic equipment and storage medium
CN117171033A (en) Interface testing method, device, terminal equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination