CN113282938A - Method for generating virtual seal in network space by using chip anti-counterfeiting seal and application - Google Patents

Method for generating virtual seal in network space by using chip anti-counterfeiting seal and application Download PDF

Info

Publication number
CN113282938A
CN113282938A CN202110611759.3A CN202110611759A CN113282938A CN 113282938 A CN113282938 A CN 113282938A CN 202110611759 A CN202110611759 A CN 202110611759A CN 113282938 A CN113282938 A CN 113282938A
Authority
CN
China
Prior art keywords
seal
file
virtual
chip
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110611759.3A
Other languages
Chinese (zh)
Inventor
史珺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110611759.3A priority Critical patent/CN113282938A/en
Publication of CN113282938A publication Critical patent/CN113282938A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method for generating a virtual seal in a network space by utilizing a chip anti-counterfeiting seal and application thereof, wherein the method relates to the chip anti-counterfeiting seal comprising a built-in security chip, the chip information of the security chip comprises a global unique sequence code of the security chip, an owner public key and an owner private key, the method is to use the owner private key to carry out encryption operation on the global unique sequence code of the security chip of the chip anti-counterfeiting seal, and a digital certificate is formed and is the virtual seal. The invention solves the problems in the prior art that: the problem how to effectively associate the virtual seal and the entity seal when the network is signed; the second problem is that: how to improve the security and the anti-counterfeiting performance of the virtual seal when the network signature is carried out.

Description

Method for generating virtual seal in network space by using chip anti-counterfeiting seal and application
Technical Field
The invention relates to the technical field of network signature of files, in particular to a method for generating a virtual seal in a network space by using a chip anti-counterfeiting seal and application thereof.
Background
1.1 the chip anti-counterfeiting seal in the real world, year 2019 and month 3, the public security department calls on a special news release to declare that the chip anti-counterfeiting seal is used as a main anti-counterfeiting technical means of a second-generation seal. The chip anti-counterfeiting seal adopts a high-grade anti-counterfeiting technology that a security chip is added in the traditional official seal and an encryption algorithm is built in the traditional official seal. The chip anti-counterfeiting stamp can well realize the anti-counterfeiting of the stamp in the real space, and because the content of the chip can not be copied and counterfeited due to the relationship between the secret key of the chip and the encryption algorithm, the authenticity of the real stamp can be conveniently verified only by using the stamp verification terminal with the same encryption algorithm.
With the rapid development of internet technology and application, the number of electronic commerce completed on the internet is exponentially increased, and the conditions of signing and paying orders on the internet are more and more, even exceed the number of off-line signing; particularly on the E-commerce platforms such as Taobao, Jingdong and the like, the transaction quantity and the transaction amount are rapidly increased. The chip anti-counterfeiting seal can not provide the function (namely the chip anti-counterfeiting seal can not realize the online signing function); the electronic government affair service system also has the requirement of needing enterprise sealing on the network, and the same problem is also met.
1.2 electronic signatures
Because the online transaction cannot be stamped with a physical seal or a manual signature, the chip anti-counterfeiting seal released by the ministry of public security cannot be directly used in electronic commerce or electronic government affairs in the internet, and in addition, countries such as Europe and America and the like adopt electronic signatures to carry out electronic commerce activities such as contract signing and the like, the countries also release the electronic signature law in 2015. Therefore, schemes for realizing the "stamping" of the network space by using "electronic signatures" or "electronic seals" appear on the internet. Therefore, it is proposed to simply abolish the physical official seal in the network space, and to contract the contract in a way of imitating western countries that the seal is replaced by a pure signature.
However, the idea of suggesting the adoption of electronic signatures to abolish official seals seems to be reasonably valid, but is in fact very problematic. In China, since ancient times, official seals (official stamps) are not only the verification of true identities and false identities, but also the symbolism of administrative rights; this is a convention that continues for thousands of years. In real space, the role of official seal is far from the signature can replace. Ancient imperial seals inherit and compete, and the 'gold seal' of guan Yu all indicate that official seal in China represents not only the true and false credit and identity of the seal holder, but also the administrative power acquired by the seal holder. The 'official seal robbing' event of 'being on the current network' in 2020 also shows that even in the current network era, the entity seal represents the control right of a company; who controls the official seal is representative of who controls the company, which is a function that the signature or electronic signature is far from having.
Therefore, in the Chinese society, physical official seals cannot be revoked in a physical form either by law or by conventional practice. Based on the traditional national conditions of China and the 'administrative power' or 'administrative power' represented by the official seal of China, when the public security department discusses the scheme of seal reformation as early as 2014, the scheme of replacing the official seal with an electronic signature is rejected through repeated argumentations, the physical entity of the traditional official seal is determined to be reserved, an encryption chip is added in the official seal, and the entity official seal is upgraded into the chip anti-counterfeiting official seal of the entity.
Similarly, in the world of networks, electronic signatures can only guarantee the true intention and undeniability of the person who signed the signature, but cannot represent the problem of "administrative authority" represented by the official seal. In other words, when a receiver receives a file with an electronic signature, the file can only represent that the file is the embodiment of the true intention of the sender, but cannot know whether the sender passes the legal authorization of the enterprise or the institution. Therefore, the electronic signature does not represent the symbolic role of the administrative right of the seal, and can only be used as an auxiliary means for signing. Because the electronic signatures are in charge of the digital authentication center, the electronic signatures have no relationship with the entity seal and are out of the jurisdiction of the public security organization, thereby bringing about the problem of public security management.
Similarly, in the world of networks, a official seal representing the symbol of the "administrative right" is also necessary, so that in addition to the scheme of the "electronic signature", a scheme of the "electronic seal" is generated.
1.3 electronic seal
The scheme of this kind of approach is recently that the electronic document forming the seal image is encrypted as an electronic seal by means of an electronic signature, so that the seal image can be added to the document in a computer, which is "web stamping", and this scheme is considered to be linked with the actual seal, so that it becomes an "electronic seal". The market of the method is provided with 'Anyin', Yizhanbao ', Shanghai' and 'Chongqing electronic seal', and the local government intervenes in Shenzhen, Shanghai, Chongqing and other places for popularization.
The scheme of the electronic seal is that a client encrypts a self seal image photo or a scanned piece through client software by a technology similar to an electronic signature to form electronic data, the electronic data is stored in a U shield to become an electronic seal of an enterprise, and due to the adoption of the domestic-code-based technical guarantee, the correctness, integrity and undeniability of an electronic document signed are guaranteed. The electronic seal can be used for covering (signing) various electronic documents such as electronic certificates, electronic contracts, electronic invoices and the like, and can also be used for covering electronic documents on the internet.
The method of the electronic seal is really convenient for enterprises, and can save office cost; however, the U shield bearing the electronic seal is not substantially associated with the solid seal or only associated with the scanned image of the seal, and the seal image can be easily forged; this obviously creates a situation where there are two chapters of reality and reality within the company. In electronic commerce, the "electronic seal" in the received file is not authorized by the legal authority of the opposite company, and cannot be verified. The "electronic seal" is only actually verified as the authenticity of the sender's electronic signature, but is independent of the seal.
In addition, the method has a great problem that if one party of two signing and sealing parties of a certain contract stamps a seal by using a solid seal and the other party stamps an electronic seal, the contract belongs to an invalid contract in law regardless of a paper contract or an electronic contract, so that the loophole can be easily utilized by a lawbreaker. Therefore, if both parties of the contract adopt the electronic seal, whether the issuer is authorized or not cannot be confirmed; if one party signs an electronic seal and the other party signs a solid seal, the contract is invalid; if both sides can stamp the electronic seal and the solid seal, the electronic seal becomes a decoration.
Disclosure of Invention
The invention aims to provide a method for generating a virtual seal in a network space by using a chip anti-counterfeiting seal and application thereof, which solve the problems in the prior art that: the problem how to effectively associate the virtual seal and the entity seal when the network is signed; the second problem is that: how to improve the security and the anti-counterfeiting performance of the virtual seal when the network signature is carried out.
In order to solve the problems, the technical scheme of the invention is as follows: a method for generating virtual seal in network space by using chip anti-fake seal is characterized in that the method relates to a chip anti-fake seal with a built-in security chip, chip information of the security chip comprises a global unique sequence code of the security chip, an owner public key and an owner private key.
Further, the method is that the global unique sequence code of the security chip of the chip anti-counterfeiting seal is encrypted by the private key of an owner by adopting a first encryption algorithm and adding a time stamp to form a digital certificate, and the digital certificate is a virtual seal.
Further, the owner private key and the first encryption algorithm are controlled or mastered by an authorized person and/or an authorized institution of the public security organization.
Furthermore, a seal holder corresponding to the chip anti-counterfeiting seal has a seal verification terminal, the seal verification terminal is used for reading chip information to generate a virtual seal and transmitting the virtual seal to the Internet, and the virtual seal formed by encrypting through a first encryption algorithm is not decrypted in the transmission process;
or the seal verification terminal is used for reading the chip information, generating a virtual seal after adding the time stamp, transmitting the virtual seal to the Internet, and not decrypting the virtual seal formed by encrypting through the first encryption algorithm in the transmission process.
Further, the chip information of the security chip also comprises an owner public key; the owner public key is stored in a seal verification terminal of a seal holder; the owner public key is used for verifying the virtual seal by a seal public security management information system or a seal comprehensive service platform of a public security organization; and the owner private key and the first encryption algorithm are both stored in a security chip of the chip anti-counterfeiting seal corresponding to the seal holder.
An application of a virtual seal in the links of network signature and verification relates to the virtual seal generated by the method, which is characterized by comprising the following steps:
the file sending party has a seal verification terminal, and reads chip information in a security chip of a chip anti-counterfeiting seal through the seal verification terminal of the file sending party and generates a virtual seal;
secondly, the read virtual seal and the electronic file to be sealed are encrypted together by a client of a file sender through a second encryption algorithm which is equal to an electronic signature, namely the electronic file to be sealed is subjected to network signature operation to form a network signed file;
thirdly, the sender sends the network signed file to a file receiver, and the file receiver adopts the same second encryption algorithm to separate the virtual seal of the file sender from the network signed file and then sends the virtual seal to a seal public security management information system or a seal comprehensive service platform of a public security organization;
fourthly, reading the received virtual seal by a seal public security management information system or a seal comprehensive service platform of the public security institution by utilizing the owner public key of the file sender, decrypting the virtual seal by utilizing a first encryption algorithm, inquiring the owner related information of the virtual seal which is recorded in the system by the seal public security management information system or the seal comprehensive service platform of the public security institution, and sending the inquired owner related information back to the file receiver as a verification result, namely completing the verification operation on the virtual seal.
Further, the network signature and verification of the virtual seal are realized through software of a client, and the steps are as follows:
firstly, in the transaction activity of electronic commerce, after a contract or other files form an electronic document, when the step of online stamping is required, clicking a network signature button on software, namely entering an interface of a virtual seal of the software, calling the electronic document to be stamped, then clicking a button of online stamping for stamping, reading chip information of a chip anti-counterfeiting seal and generating the virtual seal by using a seal verification terminal of a file sender according to software prompt, encrypting the virtual seal and the electronic document by a second encryption algorithm which is equal to an electronic signature, and then sending the encrypted virtual seal and the electronic document to the other side to finish online signing;
then, after receiving a file with a network signature sent by a file sender, a file receiver clicks a virtual seal verification button on software, so that an interface for virtual seal verification can be accessed, the file after the network signature sent by the file sender is clicked according to software prompt, the software decrypts the file by adopting the same second encryption algorithm and separates out the encrypted file of the virtual seal contained in the file, the virtual seal is sent to a seal public security management information system or a seal comprehensive service platform of a public security institution, the seal public security management information system or the seal comprehensive service platform of the public security institution verifies the file to obtain a verification result of the virtual seal, and then the verification result is sent to the file receiver, so that the virtual seal verification operation is completed;
or
Firstly, after a file sender finishes walking and forms an electronic file according to a normal electronic commerce or government affair flow and reaches a step of needing to carry out online stamping, clicking a button for online signing on an interface of an electronic commerce or government affair platform, and then entering a virtual stamp interface of software;
secondly, the file sender clicks the electronic file to be stamped according to the software prompt, and the electronic file is checked;
thirdly, after the electronic file is checked and verified by the file sender, when the electronic file needs to be signed, reading chip information of a chip anti-counterfeiting seal by using a seal verification terminal of the file sender according to the prompt of a software interface, generating a virtual seal, and encrypting the virtual seal and the electronic file needing to be signed by a second encryption algorithm which is equal to an electronic signature;
fourthly, the file sender clicks a file sending button according to the prompt of software, namely, the file after the second encryption is sent to the file receiver, and at the moment, the file sender completes the online signature operation;
fifthly, after receiving the file with the network signature sent by the file sender, the file receiver clicks a seal verification button on software, and then an interface of virtual seal verification can be accessed;
sixthly, the file receiver clicks the file with the network signature sent by the file sender according to the prompt of the software, and the software decrypts the file by adopting the same second encryption algorithm and separates the encrypted file of the virtual seal contained in the file;
and seventhly, the file receiver clicks a virtual seal verification button according to the prompt of the software, the software sends the encrypted file of the virtual seal to a seal public security management information system or a seal comprehensive service platform of the public security institution in the background, the seal public security management information system or the seal comprehensive service platform of the public security institution verifies the file to obtain a verification result of the virtual seal, and then the verification result is sent to the file receiver, so that the virtual seal verification operation is completed.
Further, the file receiver signs the network signed file again by using the virtual seal of the file receiver according to the steps of the file sender, the online signing operation of the file receiver is completed, then the file signed by the secondary network is sent back to the file sender, the virtual seal of the file receiver in the file signed by the secondary network is sent to a seal public security management information system or a seal comprehensive service platform of a public security organization by the file sender, and a secondary verification result is obtained, and the file sender and the file receiver complete mutual online signing and mutual verification operation on the electronic file to be stamped;
the chip information of the chip anti-counterfeiting seal also comprises the identity information of an authorized user of the seal;
the file sender copies the seal style to the electronic file to be sealed, and then the copied electronic file and the virtual seal perform encryption operation together by a second encryption algorithm which is equal to an electronic signature, namely the electronic file to be sealed is subjected to network signature operation to form a network signed file;
the verification result comprises whether the virtual seal is real or not, and information of the chip anti-counterfeiting seal corresponding to the virtual seal comprises enterprise registration information, a seal name and a seal style.
Further, the file receiver signs the network signed file again by using the virtual seal of the file receiver according to the steps of the file sender, the online signing operation of the file receiver is completed, then the file signed by the secondary network is sent back to the file sender, the virtual seal of the file receiver in the file signed by the secondary network is sent to a seal public security management information system or a seal comprehensive service platform of a public security organization by the file sender, and a secondary verification result is obtained, and the file sender and the file receiver complete mutual online signing and mutual verification operation on the electronic file to be stamped;
the chip information of the chip anti-counterfeiting seal also comprises the identity information of an authorized user of the seal;
the file sender copies the seal style to the electronic file to be sealed, and then the copied electronic file and the virtual seal perform encryption operation together by a second encryption algorithm which is equal to an electronic signature, namely the electronic file to be sealed is subjected to network signature operation to form a network signed file;
the verification result comprises whether the virtual seal is real or not, and information of the chip anti-counterfeiting seal corresponding to the virtual seal comprises enterprise registration information, a seal name and a seal style.
In view of the above technical features, the present invention has the following advantages:
the invention provides a method for generating a virtual seal in a network space by utilizing a chip anti-counterfeiting seal, wherein the generated virtual seal is a globally unique serial code in a chip in an entity seal of the chip anti-counterfeiting seal issued by a public security department, and a string of new data codes is formed by an encryption algorithm (a first encryption algorithm) of an electronic signature, the data codes (namely the virtual seal) can be regarded as a 'virtual seal' based on the globally unique serial code of the chip, or a 'digital certificate' of the globally unique serial code of the chip, and as the serial code of each chip is globally unique, the electronic signature or the digital certificate (namely the virtual seal) based on the globally unique serial code is also illegally cracked and forged; the string of digital codes is a virtual seal that can be used in a network space.
Thus, a solid seal (i.e. a chip anti-counterfeiting seal) and a virtual seal are provided; the chip anti-counterfeiting seal issued by the public security department is used as an entity seal in a real space, and a digital certificate based on a globally unique serial code and stored in a chip in the entity seal is a virtual seal in a network space; the combination of the solid seal and the virtual seal forms a virtual-real integrated digital seal (i.e. a chip anti-counterfeiting seal with a built-in chip containing a virtual seal) which can function in both real space and network space. The seal is characterized in that: in a real space, the digital seal is represented as a solid seal and has an anti-counterfeiting function; in the network space, the virtual seal formed by the virtual seal is a string of data codes (if necessary, a private key and/or a time stamp of an owner can be added, and the data codes and the global unique serial number of the chip are generated into the virtual seal through a first encryption algorithm) based on the global unique serial number of the chip of the entity seal and an electronic signature algorithm (namely, the first encryption algorithm), so that the attribute of the entity seal is passed, the virtual seal also has an anti-counterfeiting function, and the virtual seal is formed through the first encryption algorithm after the global unique serial number which represents the characteristics of the chip is extracted from the chip in the entity seal, so that the virtual seal is inseparable from the entity seal; in addition, because the virtual seal is also anti-counterfeiting (because the virtual seal is encrypted by the first encryption algorithm to play an anti-counterfeiting function), the private key of an owner for generating the virtual seal and the first encryption algorithm are controlled and mastered by a public security organ and are stored in a chip of the chip anti-counterfeiting seal, so that the virtual seal cannot be cracked or copied, and the virtual seal is integrated with the entity seal, inherits all attributes of the entity seal, and cannot be used after leaving the entity seal. Therefore, when the virtual seal is called in the network space to be used for electronic signature or network signature, the virtual seal can completely represent the function of the entity seal in the real space, and if the virtual seal leaves the entity seal, the virtual seal can not be called; therefore, the electronic signature behavior or the network signature behavior of the virtual seal is the same as that in the real space, and represents the authorization of the mechanism to which the seal belongs to the signer, so that the attribute of the administrative power owned by the signer of the virtual seal is embodied.
Therefore, when a file sender signs a seal on the network, the virtual seal and the entity seal can be effectively associated, and meanwhile, the safety and the anti-counterfeiting performance of the virtual seal are effectively improved.
Drawings
Fig. 1 is a flowchart of a method for generating a virtual seal in a network space by using a chip anti-counterfeit seal in embodiment 1 of the present invention.
Fig. 2 is a flowchart of a method for generating a virtual seal in a network space by using a chip anti-counterfeit seal in embodiment 2 of the present invention.
Fig. 3 is a flowchart of an application of a "virtual seal" in a network signing and verifying link in embodiment 3 of the present invention.
Detailed Description
The invention will be further illustrated with reference to specific embodiments. It should be understood that these examples are for illustrative purposes only and are not intended to limit the scope of the present invention. Further, it should be understood that various changes or modifications of the present invention may be made by those skilled in the art after reading the teaching of the present invention, and such equivalents may fall within the scope of the present invention as defined in the appended claims.
Referring to fig. 1, a specific embodiment 1, this embodiment 1 provides a method for generating a virtual seal in a network space by using a chip anti-counterfeit seal, where the method involves a chip anti-counterfeit seal (i.e., an entity seal, and a built-in security chip for anti-counterfeit), where chip information of the security chip includes a globally unique serial code of the security chip, an owner public key, and an owner private key, and the method uses the owner private key to perform an encryption operation on the globally unique serial code of the security chip of the chip anti-counterfeit seal, so as to form a digital certificate, where the digital certificate is a virtual seal.
The first encryption algorithm may be an elliptic algorithm of 256 bits or more under the SM2 standard issued by the national crypto authority or an RSA algorithm, but is not limited thereto.
At this time, the digital certificate (i.e. the virtual seal, or the digital certificate obtained by the first encryption algorithm based on the globally unique serial code of the chip in the chip anti-counterfeiting seal) is a digital certificate obtained by performing encryption operation by using a secret key (i.e. an owner private key) and an encryption algorithm (the first encryption algorithm) on the basis of the globally unique serial code of the chip in the chip anti-counterfeiting seal, so that the virtual seal can perform an encryption anti-counterfeiting function when performing network signing on a network space, and can be closely associated with an entity 'chip anti-counterfeiting seal', i.e. the virtual seal and the chip anti-counterfeiting seal are stored as a whole. That is, the virtual seal cannot be generated without the physical seal in the hand and without the globally unique serial code of the security chip.
Preferably, the owner private key and the first encryption algorithm are controlled or mastered by an authorizer and/or an authorizer of a public security institution, and both the owner private key and the first encryption algorithm are stored in a security chip of the chip anti-counterfeiting stamp corresponding to the stamp holder.
Therefore, the owner private key and the first encryption algorithm in the chip information of the chip anti-counterfeiting seal can be generated and written into the chip of the chip anti-counterfeiting seal only by an authorized person and/or an authorized mechanism of a public security institution in an encryption manner, the owner private key and the first encryption algorithm cannot be obtained by other people, and further the other people cannot obtain a virtual seal, so that the virtual seal has an anti-counterfeiting function which cannot be forged.
Preferably, the chip information of the secure chip further includes an owner public key.
Preferably, the owner public key is stored in a seal verification terminal of the seal holder, and is issued by an authorizer and/or an authorizer of a public security institution to the seal holder of each chip anti-counterfeiting seal in a unified manner, and the owner public key is stored in a seal verification terminal of an enterprise to which the chip anti-counterfeiting seal belongs (for example, in the seal verification terminal of the seal holder). Therefore, the generation and writing-in chip links of the virtual seal are mastered by an authorizer and/or an authorizer of a public security organization, the safety performance is high, and the anti-counterfeiting performance of the virtual seal is ensured.
The owner public key is used for verifying the virtual seal by a seal public security management information system or a seal comprehensive service platform of a public security organization;
the seal holder corresponding to the chip anti-counterfeiting seal has a seal verification terminal, and the seal verification terminal is used for reading chip information to generate a virtual seal (namely, after a globally unique serial code of a read security chip, an owner private key and a first encryption algorithm, encryption operation is carried out to generate the virtual seal), and the virtual seal is transmitted to the Internet. That is, each time the seal verification terminal reads the chip information, a virtual seal is correspondingly generated, and the virtual seal formed by encrypting through the first encryption algorithm is not decrypted in the transmission process.
The seal verification terminal corresponds to a using main body (i.e. a seal holder of the chip anti-counterfeiting seal), and is used for reading chip information (mainly a globally unique serial code of a security chip, an owner private key and a first encryption algorithm) in the chip anti-counterfeiting seal (such as a solid seal and a solid official seal) of the corresponding using main body, producing a virtual seal, and/or uploading the virtual seal to a network or a client, preferably, a single seal verification terminal corresponds to one or more associated using main bodies, therefore, the security of chip information reading in the chip anti-counterfeiting seal using the main body is ensured, namely, the chip information in the anti-counterfeiting seal cannot be read without a corresponding seal verification terminal, good information protection, anti-theft and anti-counterfeiting effects are achieved, and the security of chip information use in the chip anti-counterfeiting seal (namely the security of virtual seal use) is improved.
The chip information also comprises a Chip Operating System (COS) written in the chip by an authorized person and/or an authorized mechanism of a public security organization, encryption software, and/or enterprise registration information written in the chip by the authorized mechanism of the public security organization for engraving and opening the chip anti-counterfeiting seal, a seal name, a seal pattern (namely an electronic image of the seal), and/or identity information of an authorized user of the seal, and the like.
Referring to fig. 2, a specific embodiment 2, this embodiment 2 provides a method for generating a virtual seal in a network space by using a chip anti-counterfeit seal, where the difference between this embodiment 2 and embodiment 1 is that a time stamp is added in a process of generating the virtual seal in this embodiment 2, that is, a method for generating a virtual seal in a network space by using a chip anti-counterfeit seal is to use a private key of an owner to encrypt a globally unique serial code of a security chip of the chip anti-counterfeit seal by using a first encryption algorithm and adding the time stamp to form a digital certificate, where the digital certificate is a virtual seal.
At this time, correspondingly, the seal verification terminal is used for reading the chip information, generating a virtual seal after adding the time stamp, transmitting the virtual seal to the internet, and in the transmission process, not decrypting the virtual seal formed by encrypting through the first encryption algorithm. Since the time stamp (TIME STAMP) for generating the time is added when the first encryption algorithm (such as the SM2 algorithm) is used for encryption, once the virtual seal is generated, the time stamp cannot correspond to the digital certificate if someone copies the virtual seal again. Therefore, the virtual seal cannot be forged, and the anti-counterfeiting function of the virtual seal is further improved.
In addition, the seal verification terminal correspondingly generates a virtual seal each time when reading the chip information, and the time stamp is added, so that the generated virtual seal each time is unique (namely, the unique virtual seal corresponding to the time stamp), and the anti-counterfeiting function of the virtual seal can be improved.
Referring to fig. 3, embodiment 3 specifically provides an application of a virtual seal in a network signing and verifying link, and relates to the application of the virtual seal in the network signing and verifying link, which specifically includes the following steps:
application scenario one, for example, without involving a third party business platform or government platform, performs the operation between the file receiver and the file sender:
the file sending party has a seal verification terminal, and reads chip information in a security chip of a chip anti-counterfeiting seal through the seal verification terminal of the file sending party and generates a virtual seal;
secondly, the read virtual seal and the electronic file to be sealed are encrypted together by a client of a file sender through a second encryption algorithm which is equal to an electronic signature, namely the electronic file to be sealed is subjected to network signature operation to form a network signed file;
thirdly, the sender sends the network signed file to a file receiver, and the file receiver adopts the same second encryption algorithm to separate the virtual seal of the file sender from the network signed file and then sends the virtual seal to a seal public security management information system or a seal comprehensive service platform of a public security organization;
fourthly, reading the received virtual seal by a seal public security management information system or a seal comprehensive service platform of the public security institution by utilizing the owner public key of the file sender, decrypting the virtual seal by utilizing a first encryption algorithm, inquiring the owner related information of the virtual seal which is recorded in the system by the seal public security management information system or the seal comprehensive service platform of the public security institution, and sending the inquired owner related information back to the file receiver as a verification result, namely completing the verification operation on the virtual seal.
An application scenario II, for example, relates to a third party business platform or a government platform, and completes operations among the third party business platform or the government platform, a file receiver and a file sender, wherein the network signing and verification of the virtual seal are realized through software of a client, and the specific steps are as follows:
firstly, in the transaction activity of electronic commerce, after a contract or other files form an electronic document, when the step of online stamping is required, clicking a 'network signature' button on software, namely entering an interface of a virtual seal of the software, calling the electronic document to be stamped, then clicking a 'network stamping' button for stamping, reading chip information of a chip anti-counterfeiting seal and generating the virtual seal by using a seal verification terminal of a file sender according to software prompt, encrypting the virtual seal and the electronic document by a second encryption algorithm which is equivalent to an electronic signature, and then sending the encrypted virtual seal and the electronic document to the other side to finish online stamping;
then, after receiving a file with a network signature sent by a file sender, a file receiver clicks a virtual seal verification button on software, so that an interface for virtual seal verification can be accessed, the file after the network signature sent by the file sender is clicked according to software prompt, the software decrypts the file by adopting the same second encryption algorithm and separates out the encrypted file of the virtual seal contained in the file, the virtual seal is sent to a seal public security management information system or a seal comprehensive service platform of a public security institution, the seal public security management information system or the seal comprehensive service platform of the public security institution verifies the file to obtain a verification result of the virtual seal, and then the verification result is sent to the file receiver, so that the virtual seal verification operation is completed;
or alternatively, as follows:
firstly, after a file sender finishes walking and forms an electronic file according to a normal electronic commerce or government affair flow and reaches a step of stamping on the internet, clicking a button of 'stamping on the internet' on an interface of an electronic commerce or government affair platform, and then entering a virtual stamp interface of software;
at this time, the normal e-commerce (or government affair) process is the normal process of each e-commerce platform or e-government platform at present. The difference between the platforms comprises the following steps from the perspective of an e-commerce platform: goods confirmation, price confirmation, purchase or sale agreement, contract making (mostly standard contracts or form filling), and sealing (namely network signature). For the e-government platform, taking project approval as an example, files are submitted and checked, and after the type and quantity of the electronic files are checked, a network signature function needs to be set. After entering a link of stamping (namely, network signature), and entering an interface of the virtual seal.
Secondly, the file sender clicks the electronic file to be stamped according to the software prompt, and the electronic file is checked;
thirdly, after the electronic file is checked and verified by the file sender, when the electronic file needs to be signed, reading chip information of a chip anti-counterfeiting seal by using a seal verification terminal of the file sender according to the prompt of a software interface, generating a virtual seal, and encrypting the virtual seal and the electronic file (contract, acceptance letter, certificate and the like) needing to be signed by using a second encryption algorithm which is equivalent to an electronic signature;
at the moment, the virtual seal can be generated only by reading the chip information of the chip anti-counterfeiting seal through the seal verification terminal of the file sender, and the seal verification terminal sends the virtual seal to the network world. The conversion process of reading the chip information, generating the virtual seal and sending the virtual seal to the network world through the seal verification terminal of the file sender is inseparable with the entity seal (namely, the chip anti-counterfeiting seal). If the signer (the file sender) has no entity seal (i.e. the chip anti-counterfeiting seal) at hand, the network signing process cannot be completed. Therefore, the network signature using the virtual signature has the legal effectiveness completely equivalent to the stamping operation of the physical seal on the paper document.
The encryption by the second encryption algorithm which is equivalent to the electronic signature means that in order to embody the function of online stamping, the electronic signature algorithm is used for carrying out the electronic signature operation on the virtual seal and the electronic file of the contract, the operation is also encrypted to prevent the virtual seal and the file from being tampered or replaced, and the second encryption can be realized by software in a client of a user (namely a file sender and a stamping party).
Fourthly, the file sender clicks a 'file sending' button according to the software prompt, namely, the file after the second encryption is sent to the file receiver, and at the moment, the file sender completes the online signature operation;
compression of the network signed file is not typically used. However, the file formed after the network signature is carried out on the file can be compressed conventionally (such as zip), and after the compression, the file receiver only needs to carry out conventional decompression, so that the anti-counterfeiting of the network signature file after the second encryption is not influenced.
Fifthly, after receiving the file with the network signature sent by the file sender, the file receiver clicks a 'seal verification' button on software, and then the virtual seal verification interface can be accessed;
in this process, the file receiver needs to register and authenticate when installing the software. The seal verification method is used again after registration, and only needs to log in, but needs to submit the seal of a file receiver or a seal verification terminal for a public security organization to verify the identity of an experimenter. Thus, the virtual seal verification safety is improved.
Sixthly, the file receiver clicks the file with the network signature (namely the file after the network signature) sent by the file sender according to the prompt of the software, the software decrypts the file by adopting the same second encryption algorithm and separates the encrypted file of the virtual seal contained in the file; here, the separation refers to separation of the associated file from the virtual seal.
And seventhly, the file receiver clicks a virtual seal verification button according to the prompt of the software, the software sends the encrypted file of the virtual seal to a seal public security management information system or a seal comprehensive service platform of the public security institution in the background, the seal public security management information system or the seal comprehensive service platform of the public security institution verifies the file to obtain a verification result of the virtual seal, and then the verification result is sent to the file receiver, so that the virtual seal verification operation is completed.
In the process of sending the encrypted file of the virtual seal, the virtual seal is still in an encrypted state (namely, the encrypted state formed by first encryption), and the virtual seal is actually an encrypted file of a globally unique serial code of a chip (namely, a file generated by a first encryption algorithm) by a seal public security administration information system or a seal comprehensive service platform of a public security institution. The file can be decrypted and verified only after a seal public security management information system or a seal comprehensive service platform of a public security organization receives a request of a verification platform, and other parties cannot decrypt the file.
The verification result sent back to the virtual seal by the seal public security management information system or the seal comprehensive service platform of the public security institution comprises the following steps: whether the seal (i.e. the chip anti-counterfeiting seal and/or the corresponding virtual seal) exists or whether the seal is real; if the anti-counterfeiting seal exists or is real, the enterprise name, the official seal name, the seal stamp image (or the stamp pattern) and the like (including the main body information and the chip information corresponding to the chip anti-counterfeiting seal) are sent back together to be used as a verification result. That is, the verification of the virtual seal can actually obtain all the information of the entity seal corresponding to the virtual seal and/or the information of the chip anti-counterfeiting seal corresponding to the verified virtual seal.
In the two application scenes, in addition to the encryption function of the conventional electronic signature according to the encryption algorithm (namely, the second encryption algorithm) approved by the national standard and the public security organization in the related network seal process, the digital certificate of the virtual seal is also contained in the network seal process, and the digital certificate is formed by encryption operation of the owner private key and the first encryption algorithm on the basis of the global unique sequence code of the chip in the chip anti-counterfeiting seal, so that the network seal mode is stronger than the encryption property of the conventional 'electronic signature' in the prior art, and the mode of performing network seal on the electronic file by the virtual seal in the invention can be proved, and the operation of network seal can be performed only under the condition that an entity public seal (namely, the anti-counterfeiting chip seal) exists in the hand. This ensures that the signer is fully authorized by the company or institution in which it is located. Therefore, the network signature has the same legal effectiveness of stamping the entity official seal in the real world, and the virtual seal can also play a role in remotely verifying the electronic document of the file after the network signature is carried out. However, in the prior art, a common electronic signature can only verify that the signature is completed by the publisher, but cannot know whether the signature is signed by the authority of the publisher.
Preferably, the file receiver signs the network-signed file again by using the virtual seal of the file receiver according to the steps of the file sender, the online signing operation of the file receiver is completed, then the file with the secondary network signature is sent back to the file sender, the virtual seal of the file receiver in the file with the secondary network signature is sent to a seal public security management information system or a seal comprehensive service platform of a public security organization by the file sender, and a secondary verification result is obtained, and the file sender and the file receiver complete mutual online signing and mutual verification operations on the electronic file to be stamped; thus, for the same file, the electronic files to be stamped can be signed and verified on the network by one or more parties, and the security of the network signature of each party is ensured.
Preferably, the file sender copies the seal pattern (electronic image of the seal) to the electronic file to be sealed (for example, the electronic image of the seal is copied at the position where the seal is desired to be sealed on the file, that is, the position similar to the seal of the paper document), and then the copied electronic file and the virtual seal perform the encryption operation together by the second encryption algorithm which is equivalent to the electronic signature, that is, the electronic file to be sealed is subjected to the operation of network signature, so as to form the file of network signature; therefore, the conventional printing habit of people is met, and particularly, the content and the stamping pattern of the electronic file are presented. In fact, even if the seal image of the seal is not available, the mode of realizing network signature by using the virtual seal in the invention completely has the same function as the stamping of the solid seal, and has the same authority and legal effect.
The virtual seal is generated based on a solid seal (namely, a chip anti-counterfeiting seal), and the private key of an owner and the first encryption algorithm involved in the generation of the virtual seal (generated by encryption operation of the private key of the owner and the first encryption algorithm on the basis of a globally unique serial code of the chip, and time stamp can be added in the encryption operation process of the first encryption algorithm if necessary) are controlled or mastered by an authorizer and/or an authorizing mechanism of a public security agency. The digital signature algorithm (i.e. the second encryption algorithm) in the network signing process of the virtual seal does not need to be carried out in a seal public security administration information system or a seal comprehensive service platform of a public security institution, and can be operated on another platform (such as a client connected with a file sender).
The chip information of the chip anti-counterfeiting seal also comprises the identity information of an authorized user of the seal; the verification result comprises whether the virtual seal is real or not, and information of the chip anti-counterfeiting seal corresponding to the virtual seal comprises enterprise registration information, a seal name and a seal style.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. That is, all equivalent changes and modifications made according to the content of the claims of the present invention should be within the technical scope of the present invention.

Claims (9)

1. A method for generating virtual seal in network space by using chip anti-fake seal is characterized in that the method relates to a chip anti-fake seal with a built-in security chip, chip information of the security chip comprises a global unique sequence code of the security chip, an owner public key and an owner private key.
2. The method for generating a virtual seal in a network space by using a chip anti-counterfeiting seal according to claim 1, characterized in that: the method is that the global unique sequence code of the security chip of the chip anti-counterfeiting seal is encrypted by a private key of an owner by adopting a first encryption algorithm and adding a time stamp to carry out encryption operation on the security chip, so as to form a digital certificate, wherein the digital certificate is a virtual seal.
3. The method for generating a virtual seal in a network space by using a chip anti-counterfeiting seal according to claim 1 or 2, characterized in that: the owner private key and the first encryption algorithm are controlled or mastered by an authorizer and/or an authorizer of a public security organization.
4. The method for generating a virtual seal in a network space by using a chip anti-counterfeiting seal according to claim 3, characterized in that: the seal holder corresponding to the chip anti-counterfeiting seal is provided with a seal verification terminal, the seal verification terminal is used for reading chip information to generate a virtual seal and transmitting the virtual seal to the Internet, and the virtual seal formed by encrypting through a first encryption algorithm is not decrypted in the transmission process;
or the seal verification terminal is used for reading the chip information, generating a virtual seal after adding the time stamp, transmitting the virtual seal to the Internet, and not decrypting the virtual seal formed by encrypting through the first encryption algorithm in the transmission process.
5. The method for generating a virtual seal in a network space by using a chip anti-counterfeiting seal according to claim 4, characterized in that: the chip information of the security chip also comprises an owner public key; the owner public key is stored in a seal verification terminal of a seal holder; the owner public key is used for verifying the virtual seal by a seal public security management information system or a seal comprehensive service platform of a public security organization; and the owner private key and the first encryption algorithm are both stored in a security chip of the chip anti-counterfeiting seal corresponding to the seal holder.
6. An application of a virtual seal in a network signing and verification link relates to the virtual seal generated by the method of claim 4 or 5, and is characterized by comprising the following specific steps:
the file sending party has a seal verification terminal, and reads chip information in a security chip of a chip anti-counterfeiting seal through the seal verification terminal of the file sending party and generates a virtual seal;
secondly, the read virtual seal and the electronic file to be sealed are encrypted together by a client of a file sender through a second encryption algorithm which is equal to an electronic signature, namely the electronic file to be sealed is subjected to network signature operation to form a network signed file;
thirdly, the sender sends the network signed file to a file receiver, and the file receiver adopts the same second encryption algorithm to separate the virtual seal of the file sender from the network signed file and then sends the virtual seal to a seal public security management information system or a seal comprehensive service platform of a public security organization;
fourthly, reading the received virtual seal by a seal public security management information system or a seal comprehensive service platform of the public security institution by utilizing the owner public key of the file sender, decrypting the virtual seal by utilizing a first encryption algorithm, inquiring the owner related information of the virtual seal which is recorded in the system by the seal public security management information system or the seal comprehensive service platform of the public security institution, and sending the inquired owner related information back to the file receiver as a verification result, namely completing the verification operation on the virtual seal.
7. The application of the virtual seal in the links of network signature and verification according to claim 6, characterized in that: the network signature and verification of the virtual seal are realized through software of a client, and the method comprises the following steps:
firstly, in the transaction activity of electronic commerce, after a contract or other files form an electronic document, when the step of online stamping is required, clicking a network signature button on software, namely entering an interface of a virtual seal of the software, calling the electronic document to be stamped, then clicking a button of online stamping for stamping, reading chip information of a chip anti-counterfeiting seal and generating the virtual seal by using a seal verification terminal of a file sender according to software prompt, encrypting the virtual seal and the electronic document by a second encryption algorithm which is equal to an electronic signature, and then sending the encrypted virtual seal and the electronic document to the other side to finish online signing;
then, after receiving a file with a network signature sent by a file sender, a file receiver clicks a virtual seal verification button on software, so that an interface for virtual seal verification can be accessed, the file after the network signature sent by the file sender is clicked according to software prompt, the software decrypts the file by adopting the same second encryption algorithm and separates out the encrypted file of the virtual seal contained in the file, the virtual seal is sent to a seal public security management information system or a seal comprehensive service platform of a public security institution, the seal public security management information system or the seal comprehensive service platform of the public security institution verifies the file to obtain a verification result of the virtual seal, and then the verification result is sent to the file receiver, so that the virtual seal verification operation is completed;
or
Firstly, after a file sender finishes walking and forms an electronic file according to a normal electronic commerce or government affair flow and reaches a step of needing to carry out online stamping, clicking a button for online signing on an interface of an electronic commerce or government affair platform, and then entering a virtual stamp interface of software;
secondly, the file sender clicks the electronic file to be stamped according to the software prompt, and the electronic file is checked;
thirdly, after the electronic file is checked and verified by the file sender, when the electronic file needs to be signed, reading chip information of a chip anti-counterfeiting seal by using a seal verification terminal of the file sender according to the prompt of a software interface, generating a virtual seal, and encrypting the virtual seal and the electronic file needing to be signed by a second encryption algorithm which is equal to an electronic signature;
fourthly, the file sender clicks a file sending button according to the prompt of software, namely, the file after the second encryption is sent to the file receiver, and at the moment, the file sender completes the online signature operation;
fifthly, after receiving the file with the network signature sent by the file sender, the file receiver clicks a seal verification button on software, and then an interface of virtual seal verification can be accessed;
sixthly, the file receiver clicks the file with the network signature sent by the file sender according to the prompt of the software, and the software decrypts the file by adopting the same second encryption algorithm and separates the encrypted file of the virtual seal contained in the file;
and seventhly, the file receiver clicks a virtual seal verification button according to the prompt of the software, the software sends the encrypted file of the virtual seal to a seal public security management information system or a seal comprehensive service platform of the public security institution in the background, the seal public security management information system or the seal comprehensive service platform of the public security institution verifies the file to obtain a verification result of the virtual seal, and then the verification result is sent to the file receiver, so that the virtual seal verification operation is completed.
8. The application of the virtual seal in the network signing and verifying link according to claim 6 is characterized in that the file receiver signs the network signed file again on the network by using the virtual seal of the file receiver according to the steps of the file sender, the online signing operation of the file receiver is completed, then the file signed by the secondary network is sent back to the file sender, the virtual seal of the file receiver in the file signed by the secondary network is sent to a seal public security management information system or a seal comprehensive service platform of a public security institution by the file sender, and a secondary verification result is obtained, and the file sender and the file receiver complete the mutual online signing and mutual verifying operation on the electronic file to be stamped;
the chip information of the chip anti-counterfeiting seal also comprises the identity information of an authorized user of the seal;
the file sender copies the seal style to the electronic file to be sealed, and then the copied electronic file and the virtual seal perform encryption operation together by a second encryption algorithm which is equal to an electronic signature, namely the electronic file to be sealed is subjected to network signature operation to form a network signed file;
the verification result comprises whether the virtual seal is real or not, and information of the chip anti-counterfeiting seal corresponding to the virtual seal comprises enterprise registration information, a seal name and a seal style.
9. The application of the virtual seal in the network signing and verifying link according to claim 7 is characterized in that the file receiver signs the network signed file again on the network by using the virtual seal of the file receiver according to the steps of the file sender, the online signing operation of the file receiver is completed, then the file signed by the secondary network is sent back to the file sender, the virtual seal of the file receiver in the file signed by the secondary network is sent to a seal public security management information system or a seal comprehensive service platform of a public security institution by the file sender, and a secondary verification result is obtained, and the file sender and the file receiver complete the mutual online signing and mutual verifying operation on the electronic file to be stamped;
the chip information of the chip anti-counterfeiting seal also comprises the identity information of an authorized user of the seal;
the file sender copies the seal style to the electronic file to be sealed, and then the copied electronic file and the virtual seal perform encryption operation together by a second encryption algorithm which is equal to an electronic signature, namely the electronic file to be sealed is subjected to network signature operation to form a network signed file;
the verification result comprises whether the virtual seal is real or not, and information of the chip anti-counterfeiting seal corresponding to the virtual seal comprises enterprise registration information, a seal name and a seal style.
CN202110611759.3A 2021-06-02 2021-06-02 Method for generating virtual seal in network space by using chip anti-counterfeiting seal and application Pending CN113282938A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110611759.3A CN113282938A (en) 2021-06-02 2021-06-02 Method for generating virtual seal in network space by using chip anti-counterfeiting seal and application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110611759.3A CN113282938A (en) 2021-06-02 2021-06-02 Method for generating virtual seal in network space by using chip anti-counterfeiting seal and application

Publications (1)

Publication Number Publication Date
CN113282938A true CN113282938A (en) 2021-08-20

Family

ID=77283048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110611759.3A Pending CN113282938A (en) 2021-06-02 2021-06-02 Method for generating virtual seal in network space by using chip anti-counterfeiting seal and application

Country Status (1)

Country Link
CN (1) CN113282938A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115442143A (en) * 2022-09-05 2022-12-06 开普数智科技(广东)有限公司 Electronic signature method, device, equipment and readable medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003170872A (en) * 2001-12-06 2003-06-17 Toppan Printing Co Ltd Device and method for collation, portable terminal, and registration seal with ic tag
KR20080010792A (en) * 2006-07-28 2008-01-31 김인각 Seal having electronic chip and system and method for certifying thereof seal
CN108200083A (en) * 2018-01-29 2018-06-22 上海霁洲信息科技有限公司 A kind of method being authenticated using seal verification terminal-pair printed text
CN108263105A (en) * 2018-01-19 2018-07-10 上海霁洲信息科技有限公司 A kind of intelligent antifaking method for seal
CN108400874A (en) * 2018-02-28 2018-08-14 上海霁洲信息科技有限公司 The method that the digital signature function of terminal is authenticated printed text is verified using seal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003170872A (en) * 2001-12-06 2003-06-17 Toppan Printing Co Ltd Device and method for collation, portable terminal, and registration seal with ic tag
KR20080010792A (en) * 2006-07-28 2008-01-31 김인각 Seal having electronic chip and system and method for certifying thereof seal
CN108263105A (en) * 2018-01-19 2018-07-10 上海霁洲信息科技有限公司 A kind of intelligent antifaking method for seal
CN108200083A (en) * 2018-01-29 2018-06-22 上海霁洲信息科技有限公司 A kind of method being authenticated using seal verification terminal-pair printed text
CN108400874A (en) * 2018-02-28 2018-08-14 上海霁洲信息科技有限公司 The method that the digital signature function of terminal is authenticated printed text is verified using seal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115442143A (en) * 2022-09-05 2022-12-06 开普数智科技(广东)有限公司 Electronic signature method, device, equipment and readable medium
CN115442143B (en) * 2022-09-05 2023-07-28 开普数智科技(广东)有限公司 Electronic signature method, device, equipment and readable medium

Similar Documents

Publication Publication Date Title
US7689832B2 (en) Biometric-based system and method for enabling authentication of electronic messages sent over a network
US7028180B1 (en) System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature
US6757826B1 (en) Digital graphic signature system
US7475250B2 (en) Assignment of user certificates/private keys in token enabled public key infrastructure system
US7069440B2 (en) Technique for obtaining a single sign-on certificate from a foreign PKI system using an existing strong authentication PKI system
Kou Payment technologies for E-commerce
US20060280297A1 (en) Cipher communication system using device authentication keys
US20070168291A1 (en) Electronic negotiable documents
US7606768B2 (en) Voice signature with strong binding
CN101398915A (en) Electronic stamp platform system based on internet
CN105391713A (en) Biological-certificate-based identity authentication method
CN105635187B (en) Method and device for generating electronic file with stamp and method and device for authenticating electronic file with stamp
JPH10135943A (en) Portable information storage medium, verification method and verification system
CN113282938A (en) Method for generating virtual seal in network space by using chip anti-counterfeiting seal and application
JPH11239129A (en) Method for certifying electronic data
CA2212457C (en) Electronic negotiable documents
Gladman et al. Digital signatures, certificates and electronic commerce
Kuechler et al. Digital signatures: A business view
JP2003006361A (en) Electronic seal impression system and recording medium which records electronic seal impression program
JPH096236A (en) Method for key producing and certificate issuing for open key cipher and its system
JP2004515098A (en) Authentication method and authentication device
TWI751746B (en) Electronic pen with digital signature and method executed by the same
JP2000036049A (en) Digital graphic signature system
TWI234976B (en) Remote electronic seal system and method thereof
JP4351942B2 (en) Electronic signature method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination