CN112653558B - Validity identification method, device and medium for mobile equipment electronic signature - Google Patents

Validity identification method, device and medium for mobile equipment electronic signature Download PDF

Info

Publication number
CN112653558B
CN112653558B CN202011618133.7A CN202011618133A CN112653558B CN 112653558 B CN112653558 B CN 112653558B CN 202011618133 A CN202011618133 A CN 202011618133A CN 112653558 B CN112653558 B CN 112653558B
Authority
CN
China
Prior art keywords
user
random number
treemap
time
electronic signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011618133.7A
Other languages
Chinese (zh)
Other versions
CN112653558A (en
Inventor
吴志雄
蔡剑研
张建宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linewell Software Co Ltd
Original Assignee
Linewell Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linewell Software Co Ltd filed Critical Linewell Software Co Ltd
Priority to CN202011618133.7A priority Critical patent/CN112653558B/en
Publication of CN112653558A publication Critical patent/CN112653558A/en
Application granted granted Critical
Publication of CN112653558B publication Critical patent/CN112653558B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides a method, a device and a medium for identifying the validity of an electronic signature of mobile equipment, belonging to the technical field of information, wherein the method comprises the following steps: acquiring a real identity card number, a real name and a face recognition picture of a user; acquiring time T and then calculating a random number N; splitting the encrypted real identity card number according to the random number N to obtain a part B and a rest part A with the length of the random number N, and splicing the part B and the rest part A with the encoded real name to obtain spliced data serving as a part C; the face recognition picture is processed in reverse order to be used as a D part; acquiring an electronic signature image stream of a user as an E part, sequentially adding data of each part into a TreeMap, and converting the TreeMap into an encryption character string; transmitting the encrypted character string and the time T to a mobile equipment end; and splitting the identification card number input by the user through the time T and comparing the identification card number with the content of the encrypted character string, thereby verifying the validity of the electronic signature.

Description

Validity identification method, device and medium for mobile equipment electronic signature
Technical Field
The present invention relates to the field of information technologies, and in particular, to a method, an apparatus, and a medium for identifying validity of an electronic signature of a mobile device.
Background
Many mobile application systems currently provide a way for users to directly write signatures by handwriting, but the signatures of the users on the mobile devices are inconsistent with the signatures on paper, whether the users themselves sign themselves on the mobile devices cannot be confirmed, and the data security of the electronic signatures is not guaranteed.
Disclosure of Invention
The invention aims to solve the technical problem of providing a method, a device and a medium for identifying the validity of an electronic signature of mobile equipment, which ensure the validity and the safety of the data of the electronic signature of a user by carrying out specific processing and verification on the real information of the user.
In a first aspect, the present invention provides a method for identifying validity of an electronic signature of a mobile device, including:
step 10, acquiring a real identity card number, a real name and a face recognition picture of a user;
step 20, acquiring time T, and then calculating a random number N according to the time T;
step 30, splitting the real identity card number encrypted by the MD5 according to the random number N to obtain a part B and a rest part A with the length of the random number N, and then splicing the part A and the part B with the real name after Unicode coding treatment to obtain spliced data serving as a part C; the face recognition picture is processed in reverse order to be used as a D part; acquiring an electronic signature picture stream of a user as an E part, sequentially adding the A part, the B part, the C part, the D part and the E part into a TreeMap, and converting the TreeMap into an encryption character string; transmitting the encrypted character string and the time T to a mobile equipment end;
step 40, when the user performs identity verification on the mobile equipment end, acquiring an electronic signature of the user and an input identity card number, calculating a random number N according to the time T, performing MD5 encryption on the input identity card number to obtain a character string M, and splitting the character string M into a B1 part with the length of the random number N and a residual A1 part according to the random number N; performing Base64 decoding on the encrypted character string to obtain a TreeMap, taking out an A part and a B part of the TreeMap, judging whether the A1 part is identical to the A part and whether the B1 part is identical to the B part, entering a step 50 when the A1 part is identical to the B part, and failing to verify identity when at least one of the A and B parts is different;
and 50, taking out the C part of the TreeMap, removing the A part and the B part, performing Unicode decoding to obtain the real name of the user, taking out the D part of the TreeMap, performing reverse processing to obtain the face recognition picture, and taking out the E part of the TreeMap to obtain the electronic signature picture stream of the user.
Further, the step 20 specifically includes:
the method comprises the steps of obtaining the current time as time T, setting the minute unit number of the time T as m1, the minute ten unit number as m2, the second unit number as s1, the second ten unit number as s2, and the calculation formula of the random number N is as follows:
n1=|m1-m2|+|s1-s2|
wherein, when n1=0, let n=1.
In a second aspect, the present invention provides a validity identifying apparatus for an electronic signature of a mobile device, including: the system comprises a real information acquisition module, a random number generation module, a user information processing module, a user information verification module and a user information restoration module;
the real information acquisition module is used for acquiring the real identity card number, the real name and the face recognition picture of the user;
the random number generation module is used for acquiring time T and then calculating a random number N according to the time T;
the user information processing module is used for splitting the real identity card number encrypted by MD5 according to the random number N to obtain a part B and a rest part A with the length of the random number N, and then splicing the part A and the part B with the real name after Unicode encoding processing to obtain spliced data serving as a part C; the face recognition picture is processed in reverse order to be used as a D part; acquiring an electronic signature picture stream of a user as an E part, sequentially adding the A part, the B part, the C part, the D part and the E part into a TreeMap, and converting the TreeMap into an encryption character string; transmitting the encrypted character string and the time T to a mobile equipment end;
the user information verification module is used for acquiring an electronic signature of a user and an input identity card number when the user performs identity verification on a mobile equipment end, calculating a random number N according to the time T, performing MD5 encryption on the input identity card number to obtain a character string M, and splitting the character string M into a B1 part with the length of the random number N and a residual A1 part according to the random number N; performing Base64 decoding on the encrypted character string to obtain a TreeMap, taking out an A part and a B part of the TreeMap, judging whether the A1 part is identical to the A part and whether the B1 part is identical to the B part, entering a user information reduction module when the A1 part is identical to the B part, and failing to verify identity when at least one of the A and B parts is different;
and the user information restoration module is used for taking out the C part of the TreeMap, removing the A part and the B part, performing Unicode decoding to obtain the real name of the user, taking out the D part of the TreeMap, then performing reverse processing to obtain the face recognition picture, and taking out the E part of the TreeMap to obtain the electronic signature picture stream of the user.
Further, the random number generation module is specifically configured to:
the method comprises the steps of obtaining the current time as time T, setting the minute unit number of the time T as m1, the minute ten unit number as m2, the second unit number as s1, the second ten unit number as s2, and the calculation formula of the random number N is as follows:
n1=|m1-m2|+|s1-s2|
wherein, when n1=0, let n=1.
In a third aspect, the present invention provides a computer readable storage medium having stored thereon a computer program which when executed by a processor implements the method of the first aspect.
The invention has the following advantages:
1. the method comprises the steps of encrypting the real identity card number of a user and processing according to a splitting rule, and comparing the encrypted real identity card number with the identity card number input by the user during identity verification, so that the current electronic signature is ensured to be a self-authorized signature of the user;
2. the real identity card number, the real name and the face recognition picture identity card of the user are subjected to specific processing, then the TreeMap is added and encrypted for transmission, so that the security of sensitive information is ensured, and meanwhile, the data processing efficiency is improved.
The foregoing description is only an overview of the present invention, and is intended to be implemented in accordance with the teachings of the present invention in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present invention more readily apparent.
Drawings
The invention will be further described with reference to examples of embodiments with reference to the accompanying drawings.
FIG. 1 is a flow chart of a method according to a first embodiment of the invention;
FIG. 2 is a schematic diagram of a device according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a medium in a third embodiment of the present invention.
Detailed Description
Example 1
The embodiment discloses a validity identification method of an electronic signature of a mobile device, as shown in fig. 1, including:
step 10, acquiring a real identity card number, a real name and a face recognition picture of a user;
before the user uses the electronic signature, the user needs to fill in the real identity card number and the real name in the corresponding mobile device system, and then the user needs to conduct face recognition in the corresponding mobile device system before the user uses the electronic signature, so that identity information is ensured to be consistent with the input real identity card number and the input real name.
Step 20, acquiring time T, and then calculating a random number N according to the time T;
in one possible implementation manner, the current time (including the time of year, month, day, minute, second) may be obtained as the time T, where the minute unit number of the time T is set to m1, the minute ten number is set to m2, the second unit number is set to s1, the second ten number is set to s2, and the calculation formula of the random number N is as follows:
n1=|m1-m2|+|s1-s2|
wherein, when n1=0, let n=1;
and obtaining the time T, and then calculating to obtain a random number N as a rule basis for subsequent splitting treatment and verification.
Step 30, splitting the real identity card number encrypted by MD5 according to the random number N to obtain a part B and a rest part A with the length of the random number N, and then splicing the part A and the part B with the real name after Unicode encoding treatment to obtain spliced data serving as a part C (for example, splicing the part A in front of the real name after Unicode encoding treatment, splicing the part B behind the real name after Unicode encoding treatment, and splicing the data obtained after completion of splicing serving as a part C); the face recognition picture is processed in reverse order to be used as a D part; acquiring an electronic signature picture stream of a user as an E part, sequentially adding the A part, the B part, the C part, the D part and the E part into a TreeMap, and converting the TreeMap into an encryption character string (such as by Base64 coding); transmitting the encrypted character string and the time T to a mobile equipment end;
after the real identity card number, the real name, the face recognition picture and the electronic signature picture of the user are acquired, an encrypted character string generated by performing specific processing on all information and a time T for generating a random number N are required to be sent to a mobile equipment end for subsequent verification; the encrypted string and the time T may be identified by the mobile device by receiving radio waves of a specific frequency through radio frequency signal transmission. The data processing efficiency is improved while the security of the sensitive information is ensured by carrying out specific processing on the real identity card number, the real name, the face recognition picture and the electronic signature picture of the user and adding the TreeMap.
Step 40, when the user performs identity verification on the mobile equipment end, acquiring an electronic signature of the user and an input identity card number, calculating a random number N according to the time T, performing MD5 encryption on the input identity card number to obtain a character string M, and splitting the character string M into a B1 part with the length of the random number N and a residual A1 part according to the random number N; performing Base64 decoding on the encrypted character string to obtain a TreeMap, taking out an A part and a B part of the TreeMap, judging whether the A1 part is identical to the A part and whether the B1 part is identical to the B part, entering a step 50 when the A1 part is identical to the B part, and failing to verify identity when at least one of the A and B parts is different;
the method comprises the steps of carrying out MD5 encryption on an identification card number input by a user during verification, splitting a random number N calculated according to time T, then respectively comparing the random number N with data obtained after the encryption and splitting of the real identification card number of the user, and when the comparison result is inconsistent, indicating that the data is lost and obtained or tampered by a person, and carrying out no next processing; under the same condition, the identity card number and the time T are matched, the data are correct, and then the next processing is carried out.
And 50, taking out the C part of the TreeMap, removing the A part and the B part, performing Unicode decoding to obtain the real name of the user, taking out the D part of the TreeMap, performing reverse processing to obtain the face recognition picture, and taking out the E part of the TreeMap to obtain the electronic signature picture stream of the user.
The acquired real name can be compared with the real name of the identity authentication provided by the current user, the face recognition picture is compared with the face recognition image or the face seen by the user when the user performs the identity authentication at the mobile equipment end, the electronic signature picture stream of the user is compared with the electronic signature picture of the user when the user performs the identity authentication at the mobile equipment end, a more accurate comparison result is ensured, and the reliability of the electronic signature is determined.
Based on the same inventive concept, the present application also provides a device corresponding to the method in the first embodiment, and details of the second embodiment are described in the following.
Example two
In this embodiment, there is provided a validity identifying device for an electronic signature of a mobile device, as shown in fig. 2, including: the system comprises a real information acquisition module, a random number generation module, a user information processing module, a user information verification module and a user information restoration module;
the real information acquisition module is used for acquiring the real identity card number, the real name and the face recognition picture of the user;
the random number generation module is used for acquiring time T and then calculating a random number N according to the time T;
the user information processing module is used for splitting the real identity card number encrypted by MD5 according to the random number N to obtain a part B and a rest part A with the length of the random number N, and then splicing the part A and the part B with the real name after Unicode encoding processing to obtain spliced data serving as a part C; the face recognition picture is processed in reverse order to be used as a D part; acquiring an electronic signature picture stream of a user as an E part, sequentially adding the A part, the B part, the C part, the D part and the E part into a TreeMap, and converting the TreeMap into an encryption character string; transmitting the encrypted character string and the time T to a mobile equipment end;
the user information verification module is used for acquiring an electronic signature of a user and an input identity card number when the user performs identity verification on a mobile equipment end, calculating a random number N according to the time T, performing MD5 encryption on the input identity card number to obtain a character string M, and splitting the character string M into a B1 part with the length of the random number N and a residual A1 part according to the random number N; performing Base64 decoding on the encrypted character string to obtain a TreeMap, taking out an A part and a B part of the TreeMap, judging whether the A1 part is identical to the A part and whether the B1 part is identical to the B part, entering a user information reduction module when the A1 part is identical to the B part, and failing to verify identity when at least one of the A and B parts is different;
and the user information restoration module is used for taking out the C part of the TreeMap, removing the A part and the B part, performing Unicode decoding to obtain the real name of the user, taking out the D part of the TreeMap, then performing reverse processing to obtain the face recognition picture, and taking out the E part of the TreeMap to obtain the electronic signature picture stream of the user.
In one possible implementation manner, the random number generation module is specifically configured to:
the method comprises the steps of obtaining the current time as time T, setting the minute unit number of the time T as m1, the minute ten unit number as m2, the second unit number as s1, the second ten unit number as s2, and the calculation formula of the random number N is as follows:
n1=|m1-m2|+|s1-s2|
wherein, when n1=0, let n=1.
Since the device described in the second embodiment of the present invention is a device for implementing the method described in the first embodiment of the present invention, based on the method described in the first embodiment of the present invention, a person skilled in the art can understand the specific structure and the deformation of the device, and thus the detailed description thereof is omitted herein. All devices used in the method according to the first embodiment of the present invention are within the scope of the present invention.
Based on the same inventive concept, the application provides a storage medium corresponding to the first embodiment, and the details of the fourth embodiment are described in detail.
Example III
The present embodiment provides a computer readable storage medium, as shown in fig. 3, on which a computer program is stored, which when executed by a processor, can implement any implementation of the first embodiment.
According to the embodiment of the invention, the real identity card number of the user is encrypted and processed according to the splitting rule, and then the encrypted real identity card number is compared with the identity card number input by the user during identity verification, so that the current electronic signature is ensured to be the self-authorized signature of the user; the real identity card number, the real name and the face recognition picture identity card of the user are subjected to specific processing, then the TreeMap is added and encrypted for transmission, so that the security of sensitive information is ensured, and meanwhile, the data processing efficiency is improved.
While specific embodiments of the invention have been described above, it will be appreciated by those skilled in the art that the specific embodiments described are illustrative only and not intended to limit the scope of the invention, and that equivalent modifications and variations of the invention in light of the spirit of the invention will be covered by the claims of the present invention.

Claims (3)

1. A method for identifying validity of an electronic signature of a mobile device, comprising:
step 10, acquiring a real identity card number, a real name and a face recognition picture of a user;
step 20, acquiring time T, and then calculating a random number N according to the time T;
step 30, splitting the real identity card number encrypted by the MD5 according to the random number N to obtain a part B and a rest part A with the length of the random number N, and then splicing the part A and the part B with the real name after Unicode coding treatment to obtain spliced data serving as a part C; the face recognition picture is processed in reverse order to be used as a D part; acquiring an electronic signature picture stream of a user as an E part, sequentially adding the A part, the B part, the C part, the D part and the E part into a TreeMap, and converting the TreeMap into an encryption character string; transmitting the encrypted character string and the time T to a mobile equipment end;
step 40, when the user performs identity verification on the mobile equipment end, acquiring an electronic signature of the user and an input identity card number, calculating a random number N according to the time T, performing MD5 encryption on the input identity card number to obtain a character string M, and splitting the character string M into a B1 part with the length of the random number N and a residual A1 part according to the random number N; performing Base64 decoding on the encrypted character string to obtain a TreeMap, taking out an A part and a B part of the TreeMap, judging whether the A1 part is identical to the A part and whether the B1 part is identical to the B part, entering a step 50 when the A1 part is identical to the B part, and failing to verify identity when at least one of the A and B parts is different;
step 50, taking out the C part of the TreeMap, removing the A part and the B part, performing Unicode decoding to obtain the real name of the user, taking out the D part of the TreeMap, then performing reverse processing to obtain the face recognition picture, and taking out the E part of the TreeMap to obtain the electronic signature picture stream of the user;
the step 20 specifically includes:
the method comprises the steps of obtaining the current time as time T, setting the minute unit number of the time T as m1, the minute ten unit number as m2, the second unit number as s1, the second ten unit number as s2, and the calculation formula of the random number N is as follows:
n1=|m1-m2|+|s1-s2|
wherein, when n1=0, let n=1.
2. A validity recognition device for an electronic signature of a mobile device, comprising: the system comprises a real information acquisition module, a random number generation module, a user information processing module, a user information verification module and a user information restoration module;
the real information acquisition module is used for acquiring the real identity card number, the real name and the face recognition picture of the user;
the random number generation module is used for acquiring time T and then calculating a random number N according to the time T;
the user information processing module is used for splitting the real identity card number encrypted by MD5 according to the random number N to obtain a part B and a rest part A with the length of the random number N, and then splicing the part A and the part B with the real name after Unicode encoding processing to obtain spliced data serving as a part C; the face recognition picture is processed in reverse order to be used as a D part; acquiring an electronic signature picture stream of a user as an E part, sequentially adding the A part, the B part, the C part, the D part and the E part into a TreeMap, and converting the TreeMap into an encryption character string; transmitting the encrypted character string and the time T to a mobile equipment end;
the user information verification module is used for acquiring an electronic signature of a user and an input identity card number when the user performs identity verification on a mobile equipment end, calculating a random number N according to the time T, performing MD5 encryption on the input identity card number to obtain a character string M, and splitting the character string M into a B1 part with the length of the random number N and a residual A1 part according to the random number N; performing Base64 decoding on the encrypted character string to obtain a TreeMap, taking out an A part and a B part of the TreeMap, judging whether the A1 part is identical to the A part and whether the B1 part is identical to the B part, entering a user information reduction module when the A1 part is identical to the B part, and failing to verify identity when at least one of the A and B parts is different;
the user information restoring module is used for taking out the C part of the TreeMap, removing the A part and the B part, then performing Unicode decoding to obtain the real name of the user, taking out the D part of the TreeMap, then performing reverse processing to obtain the face recognition picture, and taking out the E part of the TreeMap to obtain the electronic signature picture stream of the user;
the random number generation module is specifically used for:
the method comprises the steps of obtaining the current time as time T, setting the minute unit number of the time T as m1, the minute ten unit number as m2, the second unit number as s1, the second ten unit number as s2, and the calculation formula of the random number N is as follows:
n1=|m1-m2|+|s1-s2|
wherein, when n1=0, let n=1.
3. A computer readable storage medium, on which a computer program is stored, which program, when being executed by a processor, implements the method according to claim 1.
CN202011618133.7A 2020-12-31 2020-12-31 Validity identification method, device and medium for mobile equipment electronic signature Active CN112653558B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011618133.7A CN112653558B (en) 2020-12-31 2020-12-31 Validity identification method, device and medium for mobile equipment electronic signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011618133.7A CN112653558B (en) 2020-12-31 2020-12-31 Validity identification method, device and medium for mobile equipment electronic signature

Publications (2)

Publication Number Publication Date
CN112653558A CN112653558A (en) 2021-04-13
CN112653558B true CN112653558B (en) 2023-07-18

Family

ID=75364596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011618133.7A Active CN112653558B (en) 2020-12-31 2020-12-31 Validity identification method, device and medium for mobile equipment electronic signature

Country Status (1)

Country Link
CN (1) CN112653558B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460966A (en) * 2018-10-12 2019-03-12 深圳壹账通智能科技有限公司 Contract signing method, apparatus and terminal device based on requesting party's classification
CN109523392A (en) * 2018-10-19 2019-03-26 中国平安财产保险股份有限公司 Signature file generation method, device, computer equipment and storage medium
CN110138795A (en) * 2019-05-23 2019-08-16 南威软件股份有限公司 A kind of multistep in communication process mixes encipher-decipher method
CN110245481A (en) * 2019-05-08 2019-09-17 深圳法大大网络科技有限公司 A kind of method, apparatus and terminal device of real-name authentication
CN111242579A (en) * 2020-01-14 2020-06-05 珠海市华兴软件信息服务有限公司 Electronic contract signing method, system, device and storage medium
WO2020125839A1 (en) * 2018-12-18 2020-06-25 GRID INVENT gGmbH Electronic element and electrically controlled display element

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460966A (en) * 2018-10-12 2019-03-12 深圳壹账通智能科技有限公司 Contract signing method, apparatus and terminal device based on requesting party's classification
CN109523392A (en) * 2018-10-19 2019-03-26 中国平安财产保险股份有限公司 Signature file generation method, device, computer equipment and storage medium
WO2020125839A1 (en) * 2018-12-18 2020-06-25 GRID INVENT gGmbH Electronic element and electrically controlled display element
CN110245481A (en) * 2019-05-08 2019-09-17 深圳法大大网络科技有限公司 A kind of method, apparatus and terminal device of real-name authentication
CN110138795A (en) * 2019-05-23 2019-08-16 南威软件股份有限公司 A kind of multistep in communication process mixes encipher-decipher method
CN111242579A (en) * 2020-01-14 2020-06-05 珠海市华兴软件信息服务有限公司 Electronic contract signing method, system, device and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
具有强安全认证和隐私保护功能的酒店管理系统;胡卫;吴邱涵;吴童;王先航;;通信技术(第02期);全文 *
电子政务公共数据交换系统安全模型;侯济恭 等;《农业网络信息》;全文 *

Also Published As

Publication number Publication date
CN112653558A (en) 2021-04-13

Similar Documents

Publication Publication Date Title
KR101853610B1 (en) Digital signature authentication system based on biometric information and digital signature authentication method thereof
CN111797430B (en) Data verification method, device, server and storage medium
US11227037B2 (en) Computer system, verification method of confidential information, and computer
CN110545542B (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
KR101077975B1 (en) Method of generating fuzzy vault based on biometric information and verifying user's indentification using fuzzy vault
CN108900472B (en) Information transmission method and device
US20170155916A1 (en) Methods and systems for reversible muti-layer data hiding
CN112653558B (en) Validity identification method, device and medium for mobile equipment electronic signature
CN110516425B (en) Secret sharing method and system
CN112039890A (en) Verification code verification method, device, terminal and medium
CN113177214A (en) Image publishing and auditing method, related device and computer program product
CN115906188A (en) Electronic signature file verification method, device and equipment and computer storage medium
CN112202748B (en) Security verification system, method, device, equipment and medium
CN113591155A (en) Electronic seal authorization method, system, electronic equipment and storage medium
CN112396418A (en) Information processing method, device and system
CN117592125B (en) Reliability electronic signature method of paperless transaction system for second-hand house transaction
Mohamed et al. Protecting wireless data transmission in mobile application systems using digital watermarking technique
CN111611459A (en) File data protection method based on block chain
CN115795417B (en) Method and device for tracing OOXML document, electronic equipment and storage medium
CN113221186A (en) Signing and signature checking method based on time encryption algorithm
Kim et al. Design of an efficient image protection method based on QR code
CN110690973B (en) Identity verification method, identity verification device, identity verification medium and electronic equipment
US20220391327A1 (en) Methods for enrolling data in order to verify the authenticity of a security datum or for verifying the authenticity of a security datum
CN118036637A (en) Verification copy method, device, equipment and readable medium of near field communication label
CN116843943A (en) Equipment identification method, system, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230613

Address after: No.2 Building, Nanwei Building, Fenghai Road, Fengze District, Quanzhou City, Fujian Province, 362000

Applicant after: LINEWELL SOFTWARE Co.,Ltd.

Address before: 362000 16 / F, building 2, Nanwei building, Fenghai Road, Fengze District, Quanzhou City, Fujian Province

Applicant before: LINEWELL SOFTWARE Co.,Ltd.

Applicant before: Nanwei Internet Technology Group Co.,Ltd.

GR01 Patent grant
GR01 Patent grant