CN112560050A - Secure electronic certificate issuing method and device, terminal device and storage medium - Google Patents

Secure electronic certificate issuing method and device, terminal device and storage medium Download PDF

Info

Publication number
CN112560050A
CN112560050A CN202011352634.5A CN202011352634A CN112560050A CN 112560050 A CN112560050 A CN 112560050A CN 202011352634 A CN202011352634 A CN 202011352634A CN 112560050 A CN112560050 A CN 112560050A
Authority
CN
China
Prior art keywords
electronic certificate
seal
target information
signer
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011352634.5A
Other languages
Chinese (zh)
Other versions
CN112560050B (en
Inventor
程巍
冯超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Huibo Wending Information Technology Co Ltd
Original Assignee
Xi'an Huibo Wending Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Huibo Wending Information Technology Co Ltd filed Critical Xi'an Huibo Wending Information Technology Co Ltd
Priority to CN202011352634.5A priority Critical patent/CN112560050B/en
Publication of CN112560050A publication Critical patent/CN112560050A/en
Application granted granted Critical
Publication of CN112560050B publication Critical patent/CN112560050B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention provides a safe electronic certificate issuing method, a safe electronic certificate issuing device, a terminal device and a storage medium, wherein the method comprises the following steps: acquiring electronic certificate information, acquiring target information from the electronic certificate information according to preset requirements, sending the target information to a signer, encrypting the target information to obtain a corresponding ciphertext, storing the target information and the ciphertext into a seal, and marking the seal as a first seal; and receiving an electronic certificate issuing request, and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request. Compared with the prior art, the method and the device have the advantages that after the information of the electronic certificate is acquired, the corresponding ciphertext is calculated by adopting an encryption algorithm and is stored in the seal of the signer, when a user has a requirement for issuing the certificate, the current time parameter and the target information stored in the signer are adopted to synthesize and generate the new electronic certificate, and the current time parameter is adopted to ensure that the generated certificate seals are different, so that the uniqueness, the safety and the reliability of the electronic certificate are ensured.

Description

Secure electronic certificate issuing method and device, terminal device and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a secure electronic certificate issuing method and apparatus, an electronic device, and a storage medium.
Background
In the prior art, compared with paper files, electronic files have the characteristics of large storage capacity, space saving and convenience in transmission, and meanwhile convenience is provided for copying and tampering.
In addition, when a user goes to transact business related to the user or a company, the user needs to show a certificate with a seal so as to verify the identity of the user and record user information, but many user certificates are lost or falsified.
Disclosure of Invention
Therefore, the invention provides a safe electronic certificate issuing method, a safe electronic certificate issuing device, electronic equipment and a storage medium, and the safety of electronic certificates or certificates is improved.
In a first aspect, the present invention provides a method of secure electronic document issuance comprising:
the information of the electronic certificate is obtained,
acquiring target information from the electronic certificate information according to a preset requirement, sending the target information to a signer, wherein the signer comprises an encryption algorithm and a seal,
encrypting the target information according to an encryption algorithm in the signer to obtain a corresponding ciphertext, storing the target information and the ciphertext into the seal, and marking the seal as a first seal;
a request to issue an electronic certificate is received,
and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
Optionally, the storing the target information and the ciphertext into the seal and before marking as the first seal, further includes: and decrypting the ciphertext according to the encryption algorithm in the signer to obtain a corresponding plaintext, and correspondingly storing the target information, the ciphertext and the plaintext into the seal to mark as a second seal.
Optionally, receiving an electronic certificate issuance request,
and adding the current time parameter to the second seal to generate a new electronic certificate according to the electronic certificate issuing request.
Optionally, the method further includes: and carrying out hash on the new electronic certificate by adopting a hash algorithm to generate a hash value, and simultaneously signing the generated new electronic certificate.
Optionally, the method further includes: and uploading the hash value and the signature to a server.
Optionally, the encryption algorithm includes a symmetric encryption algorithm, an asymmetric encryption algorithm, and a hash algorithm.
In a second aspect, the invention also provides a secure electronic document issuing apparatus comprising:
an electronic certificate information acquisition module for acquiring electronic certificate information,
the target information acquisition module is used for acquiring target information from the electronic certificate information according to preset requirements and sending the target information to a signer, the signer comprises an encryption algorithm and a seal,
the encryption module is used for encrypting the target information according to the encryption algorithm in the signer to obtain a corresponding ciphertext,
the storage marking module is used for storing the target information and the ciphertext into the seal and marking the seal as a first seal;
a receiving module for receiving an electronic certificate issuance request,
and the generating module is used for adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
Optionally, before the storing the mark module, the method further includes:
a decryption module for decrypting the ciphertext according to the encryption algorithm in the signer to obtain a corresponding plaintext,
correspondingly, the storage marking module is also used for storing the target information, the ciphertext and the plaintext into the seal and marking the seal as a second seal.
In a third aspect, the present invention further provides a terminal device, including a memory, a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to:
the information of the electronic certificate is obtained,
acquiring target information from the electronic certificate information according to a preset requirement, sending the target information to a signer, wherein the signer comprises an encryption algorithm and a seal,
encrypting the target information according to the encryption algorithm in the signer to obtain a corresponding ciphertext,
storing the target information and the ciphertext into the seal, and marking the seal as a first seal;
a request to issue an electronic certificate is received,
and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
In a fourth aspect, the present invention further provides a computer-readable storage medium having stored thereon computer-executable instructions for implementing the secure electronic certificate issuing method when executed by a processor.
The invention provides a safe electronic certificate issuing method, device, equipment and storage medium. According to the method, after the information of the electronic certificate is acquired, a corresponding ciphertext is calculated by adopting an encryption algorithm and stored in a seal of a signer, when a user has a requirement for issuing the certificate, a new electronic certificate is generated by adopting the current time parameter and the target information stored in the signer in a synthesis mode, and the generated certificate seals can be ensured to be different by adopting the current time parameter, so that the uniqueness and the safety of the electronic certificate are ensured.
Further, the encryption algorithm in the signer decrypts the ciphertext into plaintext, the plaintext is stored in a seal of the signer, and when the signer issues the ciphertext, the current time parameter and the target information stored in the signer are synthesized, so that the current time parameter is prevented from being modified, and the safety and the reliability of the electronic certificate are further improved.
Furthermore, the synthesized electronic certificate is hashed, the authenticity of the electronic certificate can be verified by adopting the hash value, and the safety, reliability and non-tamper property of the electronic certificate are ensured again.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic diagram of a network architecture according to an embodiment of the present invention;
FIG. 2 is an interaction flow diagram of a secure electronic certificate issuance method according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a schematic diagram of a network architecture according to an embodiment of the present invention, where the network architecture includes at least one server and one terminal, and fig. 1 includes, for example, a terminal device, which are a server 1 and a request end 2, respectively, and they can communicate with a network device 3 through a wireless interface, respectively. It should be noted that the present application is applicable to the network architecture shown in fig. 1, but is not limited thereto.
The network device in the present application may be a Base Transceiver Station (BTS) in Global System for Mobile communications (GSM) or Code Division Multiple Access (CDMA), a Base Station (NodeB, NB) in Wideband Code Division Multiple Access (WCDMA), an evolved NodeB (eNB) in Long Term Evolution (LTE) or enhanced Long Term Evolution (LTE), or a next-Evolution-evolved NodeB (ng-eNB), an Access Point (AP) or a relay Station in WLAN, or a gsb in 5G NR, and the like, and is not limited herein.
In addition, a terminal device referred to in this application may refer to a device that provides voice and/or data connectivity to a user, a handheld device having wireless connection capability, or other processing device connected to a wireless modem. The terminal device may communicate with at least one core Network via a Radio Access Network (RAN). The terminal equipment may be mobile terminals such as mobile telephones (or so-called "cellular" telephones) and computers with mobile terminals, e.g. portable, pocket, hand-held, computer-included or car-mounted mobile devices, which exchange voice and/or data with a radio access network. The Terminal device may also be referred to as a Subscriber Unit (Subscriber Unit), a Subscriber Station (Subscriber Station), a Mobile Station (Mobile Station), a Remote Station (Remote Station), an Access Point (Access Point), a Remote Terminal (Remote Terminal), an Access Terminal (Access Terminal), a User Terminal (User Terminal), a User Agent (User Agent), or a User device (User Equipment), which is not limited herein.
As described above, in the prior art, when a terminal device requests download of an issued electronic certificate, any user can download the electronic certificate, and the terminal device cannot be authenticated and is easily tampered. In order to solve the technical problem, the present application provides the following technical solutions.
FIG. 2 is an interaction flow diagram of a secure electronic certificate issuance method according to an embodiment of the present invention. Wherein the method involves a network element comprising: some or all of the terminal devices (i.e., which may be the requesting end shown in fig. 1), the server. The following describes a secure electronic certificate issuing method using a terminal device and a server as execution subjects. As shown in fig. 2, the method comprises the steps of:
step S201: the server acquires the electronic certificate information.
Step S202: the server acquires target information from the electronic certificate information according to preset requirements and sends the target information to the signer, and the signer comprises an encryption algorithm and a seal.
Step S203: and the server encrypts the target information according to the encryption algorithm in the signer to obtain a corresponding ciphertext.
Step S204: the server stores the target information and the ciphertext into the seal and marks the seal as a first seal.
Step S205: the terminal device sends a request for issuing an electronic certificate to the server.
Step S206: and the server adds the current time parameter into the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
The following description is made with respect to step S201:
the electronic certificate information comprises common information and private information, wherein the common information comprises a license template, file information, paper size, picture size and the like; private information includes personal identity information such as identification card information, name, age, gender, etc.; enterprise information such as enterprise name, enterprise unified social credit code, enterprise license number, etc., which the present application does not limit.
The following description is made with respect to step S202:
the server acquires target information from the electronic certificate information according to preset requirements, wherein the preset requirements refer to information capable of representing uniqueness of the electronic certificate, and the target information comprises information which is selected from the electronic information according to the preset requirements and has the represented uniqueness, so that the safety and the reliability of the electronic certificate can be embodied.
Signers include, but are not limited to, asymmetric algorithms, symmetric algorithms, and hash functions and key generation algorithms.
The following description is made with respect to step S203:
the server encrypts the target information according to the encryption algorithm in the signer to obtain a corresponding ciphertext, and one or more encryption algorithms can be adopted to generate the corresponding ciphertext with unique representativeness.
Steps S204, S205, and S206 are explained as follows:
the server stores the target information and the ciphertext into the seal, the seal is marked as a first seal, and the terminal equipment sends a request for issuing the electronic certificate to the server. And the server adds the current time parameter into the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
When the terminal equipment sends a request for issuing the electronic certificate to the server, the server adds the current time parameter into the seal in the signer according to the current time to immediately synthesize a new electronic certificate, so that the new electronic certificate obtained by the terminal equipment is the electronic certificate with uniqueness and safety.
The current time parameter is year, month, day, hour, minute and second, and the unit can be set to be millisecond, minute and second or nanosecond, namely, the time parameter is not changed continuously, so that the request cannot be repeated even in a short time, and the uniqueness of the electronic certificate is ensured.
Preferably, the step of storing the target information and the ciphertext into the seal and before marking as the first seal further comprises: and decrypting the ciphertext according to the encryption algorithm in the signer to obtain a corresponding plaintext, and correspondingly storing the target information, the ciphertext and the plaintext into the seal to mark as a second seal.
Preferably, the electronic certificate issuing request is received, and the current time parameter is added to the second seal to generate a new electronic certificate according to the electronic certificate issuing request.
Preferably, a hash algorithm is adopted to hash the new electronic certificate to generate a hash value, and meanwhile, the generated new electronic certificate is signed.
Preferably, the hash value and the signature are uploaded to a server.
It should be noted that the algorithm of the signer includes, but is not limited to, an asymmetric algorithm, a symmetric algorithm, and a hash function and key generation algorithm, where the MD5, SHA256, SHA512, and SM3 cryptographic algorithms are supported in the hash function library, and the hash algorithm used in the future is selected in the configuration compilation.
Illustratively, the compiling configuration is an SM3 algorithm, and an SM3 hash algorithm generates a hash value after padding and iterative compression, wherein the length of the hash value is 256 bits, and the algorithm realizes the compiling into software.
The symmetric algorithm comprises the steps of reading the current time as a random parameter, obtaining a random number by using a random function, generating a random number with the length of 16 bits as a secret key of the SM4 symmetric algorithm, and encrypting or decrypting data by using the secret key by using the symmetric algorithm.
The asymmetric algorithm library contains RSA, ECC and SM2 algorithms, and is also configured when some type of algorithm is compiled, and illustratively, the SM2 cryptographic algorithm and the SM2 algorithm are compiled into software. SM2 relies on Miracl library function interface, initializes elliptic curve, randomly generates private key, generates public key according to private key, uses hash function to hash plaintext, signs or encrypts hash value
Illustratively, a server provides a port for the terminal device, and a user writes user information, an account password and the like through the port, and logs in through the account and the password. The server communicates with the internal module of the server through a port, the terminal equipment issues a private communication protocol command, the server generates a pair of asymmetric algorithm secret keys and symmetric algorithm secret keys, and the asymmetric secret keys are used for transmitting symmetric secret key encryption and certificate license signature. The secret key is stored in a storage area set by the server, the terminal equipment issues a command message for obtaining the secret key, the server takes out a corresponding asymmetric algorithm public key from the area set by the storage area, a symmetric algorithm secret key ciphertext encrypted by the private key is obtained, and the public key is used for decryption to obtain the symmetric algorithm secret key. User information and the seal are stored and managed in the server.
Illustratively, the terminal equipment encrypts the electronic certificate information by using a symmetric algorithm and stores the electronic certificate information in the server. The specific process is that an issuing template is imported, relevant certificate information, certificate numbers, granted object names and the like are written, a common template, a seal and a private object are respectively extracted, SM4 symmetric encryption is respectively carried out on the object information, certificate ciphertext is generated, and the ciphertext is sequentially stored in a safe storage device.
When the electronic certificate is required to be provided, a user logs in a port, issues an issuing request to a server, the server decrypts a seal in electronic certificate information, adds time parameter information, maps the seal to pixel points of a seal graph, marks the image, decrypts the image by using a symmetric key to obtain a certificate template and private object plaintext information, synthesizes electronic certificate information into a new electronic certificate, and signs the certificate.
The terminal equipment acquires the certificate and the signature. And uploading the file hash and the signature electronic evidence to a server. The client can directly carry out signature verification on the certificate by using the public key, and if the certificate is in doubt, the client can be connected with the server to carry out comparison verification, so that the certificate is not falsified and can be verified.
The invention also provides a secure electronic document issuing apparatus, the apparatus comprising:
an electronic certificate information acquisition module for acquiring electronic certificate information,
the target information acquisition module is used for acquiring target information from electronic certificate information according to preset requirements and sending the target information to the signer, the signer comprises an encryption algorithm and a seal,
the encryption module is used for encrypting the target information according to the encryption algorithm in the signer to obtain a corresponding ciphertext,
the storage marking module is used for storing the target information and the ciphertext into the seal and marking the seal as a first seal;
a receiving module for receiving an electronic certificate issuance request,
and the generating module is used for adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
Optionally, before the storing the marking module, the method further includes:
a decryption module for decrypting the ciphertext according to the encryption algorithm in the signer to obtain a corresponding plaintext,
correspondingly, the storage marking module is also used for storing the target information, the ciphertext and the plaintext into the seal and marking the seal as a second seal.
The device generation module also comprises a step of adding the current time parameter to the second seal to generate a new electronic certificate according to the electronic certificate issuing request.
The device also comprises a hash signature module which is used for hashing the new electronic certificate to generate a hash value and signing the generated new electronic certificate.
The secure electronic certificate issuing device of the present invention can be used for implementing the technical scheme in the foregoing secure electronic certificate issuing method embodiment of the present invention, and the implementation principle and technical effect are similar, and are not described herein again.
The terminal device provided by the invention can be used for executing the technical scheme in the embodiment of the safe electronic certificate issuing method, the implementation principle and the technical effect are similar, and details are not repeated here.
Embodiments of the present application further provide a computer-readable storage medium, in which computer-executable instructions are stored, and when executed by a processor, the computer-executable instructions are used to implement any one of the above-mentioned secure electronic certificate issuing methods.
Embodiments of the present application also provide a computer program product comprising computer executable instructions for implementing any of the above described secure electronic certificate issuing methods when executed by a processor.
In the above Specific implementation of the terminal device, it should be understood that the Processor may be a Central Processing Unit (CPU), other general-purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in a processor.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: read-only memory (ROM), RAM, flash memory, hard disk, solid state disk, magnetic tape (magnetic tape), floppy disk (flexible disk), optical disk (optical disk), and any combination thereof.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A method of secure electronic document issuance, comprising:
the information of the electronic certificate is obtained,
acquiring target information from the electronic certificate information according to a preset requirement, sending the target information to a signer, wherein the signer comprises an encryption algorithm and a seal,
encrypting the target information according to the encryption algorithm in the signer to obtain a corresponding ciphertext,
storing the target information and the ciphertext into the seal, and marking the seal as a first seal;
a request to issue an electronic certificate is received,
and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
2. The method according to claim 1, wherein the step of storing the target information and the ciphertext in the stamp before the step of marking the stamp as the first stamp further comprises:
decrypting the ciphertext according to the encryption algorithm in the signer to obtain a corresponding plaintext,
correspondingly, the target information, the ciphertext and the plaintext are stored in the seal and marked as a second seal.
3. The secure electronic document generation issuance method of claim 2,
a request to issue an electronic certificate is received,
and adding the current time parameter to the second seal to generate a new electronic certificate according to the electronic certificate issuing request.
4. A method of secure electronic document issuance according to claim 1 or 3, further comprising: and carrying out hash on the new electronic certificate by adopting a hash algorithm to generate a hash value, and simultaneously signing the generated new electronic certificate.
5. The secure electronic document issuance method of claim 4, further comprising: and uploading the hash value and the signature to a server.
6. The secure electronic document issuance method according to claim 1, wherein the encryption algorithm includes a symmetric encryption algorithm, an asymmetric encryption algorithm, and a hash algorithm.
7. A secure electronic document issuing apparatus, comprising:
an electronic certificate information acquisition module for acquiring electronic certificate information,
the target information acquisition module is used for acquiring target information from the electronic certificate information according to preset requirements and sending the target information to a signer, the signer comprises an encryption algorithm and a seal,
the encryption module is used for encrypting the target information according to the encryption algorithm in the signer to obtain a corresponding ciphertext,
the storage marking module is used for storing the target information and the ciphertext into the seal and marking the seal as a first seal;
a receiving module for receiving an electronic certificate issuance request,
and the generating module is used for adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
8. The secure electronic document issuing apparatus according to claim 7, comprising:
before the storage marking module, the method further comprises:
a decryption module for decrypting the ciphertext according to the encryption algorithm in the signer to obtain a corresponding plaintext,
correspondingly, the storage marking module is also used for storing the target information, the ciphertext and the plaintext into the seal and marking the seal as a second seal.
9. A terminal device comprising a memory, a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to:
the information of the electronic certificate is obtained,
acquiring target information from the electronic certificate information according to a preset requirement, sending the target information to a signer, wherein the signer comprises an encryption algorithm and a seal,
encrypting the target information according to the encryption algorithm in the signer to obtain a corresponding ciphertext,
storing the target information and the ciphertext into the seal, and marking the seal as a first seal;
a request to issue an electronic certificate is received,
and adding the current time parameter to the first seal to generate a new electronic certificate according to the electronic certificate issuing request.
10. A computer readable storage medium having computer executable instructions stored thereon which when executed by a processor are configured to implement the secure electronic certificate issuance method of any one of claims 1 to 6.
CN202011352634.5A 2020-11-26 2020-11-26 Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium Active CN112560050B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011352634.5A CN112560050B (en) 2020-11-26 2020-11-26 Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011352634.5A CN112560050B (en) 2020-11-26 2020-11-26 Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112560050A true CN112560050A (en) 2021-03-26
CN112560050B CN112560050B (en) 2023-05-30

Family

ID=75045965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011352634.5A Active CN112560050B (en) 2020-11-26 2020-11-26 Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112560050B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113221186A (en) * 2021-04-09 2021-08-06 西安慧博文定信息技术有限公司 Signing and signature checking method based on time encryption algorithm

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020144110A1 (en) * 2001-03-28 2002-10-03 Ramanathan Ramanathan Method and apparatus for constructing digital certificates
CN107231331A (en) * 2016-03-23 2017-10-03 阿里巴巴集团控股有限公司 Obtain, issue the implementation method and device of electronic certificate
CN109118229A (en) * 2018-08-24 2019-01-01 长威信息科技发展股份有限公司 A kind of electronics license signature method
JP6465426B1 (en) * 2018-07-20 2019-02-06 Gmoグローバルサイン株式会社 Electronic signature system, certificate issuing system, key management system, and electronic certificate issuing method
CN111291392A (en) * 2020-01-22 2020-06-16 京东数字科技控股有限公司 Electronic signature method and device, electronic equipment and storage medium
CN111506632A (en) * 2020-04-23 2020-08-07 腾讯科技(深圳)有限公司 Data processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020144110A1 (en) * 2001-03-28 2002-10-03 Ramanathan Ramanathan Method and apparatus for constructing digital certificates
CN107231331A (en) * 2016-03-23 2017-10-03 阿里巴巴集团控股有限公司 Obtain, issue the implementation method and device of electronic certificate
JP6465426B1 (en) * 2018-07-20 2019-02-06 Gmoグローバルサイン株式会社 Electronic signature system, certificate issuing system, key management system, and electronic certificate issuing method
CN109118229A (en) * 2018-08-24 2019-01-01 长威信息科技发展股份有限公司 A kind of electronics license signature method
CN111291392A (en) * 2020-01-22 2020-06-16 京东数字科技控股有限公司 Electronic signature method and device, electronic equipment and storage medium
CN111506632A (en) * 2020-04-23 2020-08-07 腾讯科技(深圳)有限公司 Data processing method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113221186A (en) * 2021-04-09 2021-08-06 西安慧博文定信息技术有限公司 Signing and signature checking method based on time encryption algorithm

Also Published As

Publication number Publication date
CN112560050B (en) 2023-05-30

Similar Documents

Publication Publication Date Title
KR101658501B1 (en) Digital signature service system based on hash function and method thereof
JP4870155B2 (en) Electronic passport authentication protocol with enhanced privacy
US9268968B2 (en) Credential validation
CA2976795C (en) Implicitly certified digital signatures
Lisonek et al. SMS encryption for mobile communication
US20110093714A1 (en) Systems and methods for asymmetric cryptographic accessory authentication
CN109829269A (en) Method, apparatus and system based on E-seal authenticating electronic documents
EP2961094A1 (en) System and method for generating a random number
CN101247605A (en) Short information enciphering and endorsement method, mobile terminal and short information ciphering system
CN109495268B (en) Two-dimensional code authentication method and device and computer readable storage medium
CN113572743B (en) Data encryption and decryption methods and devices, computer equipment and storage medium
CN113452526B (en) Electronic file certification method, verification method and corresponding devices
CN109391473B (en) Electronic signature method, device and storage medium
CN114553590A (en) Data transmission method and related equipment
CN111177748A (en) Fingerprint storage encryption method, device and system
CN107947939A (en) Support the PDF endorsement methods and system of SM3 cryptographic Hash algorithm and SM2 Digital Signature Algorithms
CN112560050B (en) Secure electronic certificate issuing method, secure electronic certificate issuing device, terminal equipment and storage medium
CN113918970A (en) Data processing method, communication device and storage medium
CN116455572B (en) Data encryption method, device and equipment
CN110175471B (en) File storage method and system
CN111431873A (en) Method, system, device and medium for reporting information
US9876774B2 (en) Communication security system and method
CN111949996A (en) Generation method, encryption method, system, device and medium of security private key
CN107276961B (en) Method and device for encrypting and decrypting data based on cryptographic algorithm
CN114650181A (en) E-mail encryption and decryption method, system, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant