CN114244518B - Digital signature confusion encryption method, device, computer equipment and storage medium - Google Patents

Digital signature confusion encryption method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN114244518B
CN114244518B CN202111355207.7A CN202111355207A CN114244518B CN 114244518 B CN114244518 B CN 114244518B CN 202111355207 A CN202111355207 A CN 202111355207A CN 114244518 B CN114244518 B CN 114244518B
Authority
CN
China
Prior art keywords
character
digital signature
confusion
encryption
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111355207.7A
Other languages
Chinese (zh)
Other versions
CN114244518A (en
Inventor
黄浩
周安
杨云帆
付佳佳
张喜铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Power Grid Co Ltd
Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd
Original Assignee
Guangdong Power Grid Co Ltd
Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Power Grid Co Ltd, Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd filed Critical Guangdong Power Grid Co Ltd
Priority to CN202111355207.7A priority Critical patent/CN114244518B/en
Publication of CN114244518A publication Critical patent/CN114244518A/en
Application granted granted Critical
Publication of CN114244518B publication Critical patent/CN114244518B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The application relates to a digital signature confusion encryption method, a digital signature confusion encryption device, a digital signature confusion encryption computer device, a digital signature confusion encryption storage medium and a digital signature confusion encryption computer program product. The application can improve the reliability and the safety of information transmission under the condition of not increasing a public key, a private key or a shared key. The method comprises the following steps: acquiring an initial digital signature of a user; the initial digital signature comprises a plurality of text image blocks; resolving each text image block in the initial digital signature to generate a mixed encryption character string for each text image block; acquiring account information of a user, and generating character serial numbers corresponding to all character symbols according to the account information; combining the mixed encryption character strings of the character image blocks with the corresponding character serial numbers respectively to obtain mixed encryption character string password of the character image blocks; and mixing all mixed encryption character strings of the initial digital signature, and generating a mixed password.

Description

Digital signature confusion encryption method, device, computer equipment and storage medium
Technical Field
The present application relates to the field of network communication security technologies, and in particular, to a digital signature confusion encryption method, apparatus, computer device, storage medium, and computer program product.
Background
With the rapid development of network technologies, network security issues are increasingly important, and information encryption technology is a core technology in network security technologies. Among the many information encryption techniques, digital signature (Digital Signatures) is a digital string that cannot be forged by others only the sender of the information, and is also a valid proof of the authenticity of the information sent by the sender of the information. It is a method for authenticating digital information that resembles a common physical signature written on paper, but is implemented using techniques in the field of public key cryptography.
In order to ensure the security of the digital signature, and ensure that the digital signature is not stolen or tampered in the transmission process, encryption processing needs to be performed on the digital signature so as to improve the security. Existing digital signatures are typically encrypted using either symmetric encryption techniques or asymmetric encryption techniques and then transmitted. Symmetric encryption, i.e. where both parties have a shared key, can only be used if both parties know the key, has a limited range of applications, and is typically applied in isolated environments, and this mechanism is not reliable if the number of users is large. Asymmetric encryption, i.e. the key is a key pair consisting of a public key/a private key, the private key is used for encryption, decryption can be performed by using the public key, the private key of the asymmetric encryption technology must be kept secret to ensure the security, but the private key is still easy to steal in the application process.
Therefore, the two encryption modes have certain application defects, confidentiality of the digital signature and integrity of data still cannot be ensured, and the security of the digital signature in the transmission process still needs to be improved.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a digital signature obfuscation encryption method, apparatus, computer device, computer-readable storage medium, and computer program product.
In a first aspect, the application provides a digital signature confusion encryption method, which is applied to a terminal. The method comprises the following steps:
acquiring an initial digital signature of a user; the initial digital signature comprises a plurality of text image blocks;
resolving each text image block in the initial digital signature to generate a confusion encryption character string for each text image block;
acquiring account information of the user, and generating character serial numbers corresponding to the character symbols according to the account information;
combining the mixed encryption character strings of the character image blocks with corresponding character serial numbers respectively to obtain mixed encryption character string password of the character image blocks;
and mixing all mixed encryption character strings of the initial digital signature, and generating a mixed password.
In one embodiment, the obtaining the initial digital signature of the user includes:
acquiring a handwritten signature image of the user;
performing character recognition on the handwritten signature image to obtain each character symbol;
dividing the handwritten signature image based on the literal symbol to obtain a literal image block;
arranging the text image blocks according to the sequence of handwriting time to obtain a text image block sequence; and taking the text image block sequence as the initial digital signature.
In one embodiment, the parsing for each text image block in the initial digital signature generates a mixed encrypted string for each text image block, including:
searching a preset encryption library according to each character symbol to obtain a mixed encryption character string corresponding to each character symbol.
In one embodiment, the account information includes account registration time; the step of obtaining the account information of the user, generating a character serial number corresponding to each character symbol according to the account information, comprises the following steps:
acquiring account information of the user; generating a user unique sequence number of the user based on the account registration time in the account information;
Generating sequence numbers of all character symbols according to the character image block sequence;
and combining the unique serial numbers with the serial numbers of the literal symbols respectively to obtain the character serial numbers corresponding to the literal symbols.
The application provides a digital signature confusion decryption method which is applied to a server. The method comprises the following steps:
obtaining a confusion password corresponding to the initial digital signature of the user from the terminal;
reading each decryption node in the confusion secret password, and decomposing the confusion secret password into a plurality of confusion encryption character string secret passwords based on the decryption node; the decryption node is a character serial number corresponding to each character symbol;
reading a user unique sequence number in the character sequence number, and searching and checking user registration information according to the user unique sequence number;
if the verification is successful, the sequence numbers of all the character symbols are read from the character serial numbers; reordering the confusion encryption character string password corresponding to each character symbol according to the sequence number to obtain a character image block sequence;
reading the confusion encryption character string in the confusion encryption character string password; searching a preset encryption library to obtain text symbols corresponding to the confusion encryption character strings, and forming a text symbol group;
Splicing the text image blocks corresponding to the text symbols to form a digital signature background image;
and superposing the literal symbol group and the digital signature background diagram to obtain the target digital signature.
In a second aspect, the application also provides a digital signature confusion encryption device which is applied to the terminal. The device comprises:
the initial digital signature acquisition module is used for acquiring an initial digital signature of a user; the initial digital signature comprises a plurality of text image blocks;
the confusion encryption character string generation module is used for analyzing each text image block in the initial digital signature to generate a confusion encryption character string for each text image block;
the character serial number generation module is used for acquiring account information of the user and generating character serial numbers corresponding to the character symbols according to the account information;
the confusion encryption character string password generation module is used for respectively combining the confusion encryption character strings of the character image blocks with the corresponding character serial numbers to obtain confusion encryption character string password of the character image blocks;
and the confusion secret password generating module is used for carrying out confusion combination on all the confusion encryption character strings of the initial digital signature to generate confusion secret password.
The application also provides a digital signature confusion decryption device, which is applied to a server and comprises:
the confusion secret order acquisition module is used for acquiring confusion secret orders corresponding to the initial digital signature of the user from the terminal;
the confusion secret password decomposing module is used for reading each decryption node in the confusion secret password, and decomposing the confusion secret password into a plurality of confusion encryption character string secret passwords based on the decryption node; the decryption node is a character serial number corresponding to each character symbol;
the user unique sequence number reading module is used for reading the user unique sequence number in the character sequence number and searching and checking the user registration information according to the user unique sequence number;
the character image block sequence generating module is used for reading the sequence numbers of all character symbols from the character sequence number if the verification is successful; reordering the confusion encryption character string password corresponding to each character symbol according to the sequence number to obtain a character image block sequence;
the character symbol generation module is used for reading the confusion encryption character strings in the confusion encryption character string password; searching a preset encryption library to obtain text symbols corresponding to the confusion encryption character strings, and forming a text symbol group;
The digital signature background image generation module is used for splicing the text image blocks corresponding to the text symbols to form a digital signature background image;
and the target digital signature generation module is used for superposing the literal symbol group and the digital signature background diagram to obtain a target digital signature.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory and a processor, wherein the memory stores a computer program, and the processor executes the computer program to realize the steps in the digital signature confusion encryption method embodiment and the digital signature confusion decryption method embodiment.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the above-described digital signature obfuscation encryption method embodiment and the above-described digital signature obfuscation decryption method embodiment.
In a fifth aspect, the present application also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the steps of implementing the above-described digital signature obfuscation encryption method embodiment and the above-described digital signature obfuscation decryption method embodiment.
The digital signature confusion encryption method, the device, the computer equipment, the storage medium and the computer program product acquire an initial digital signature of a user through a terminal; the initial digital signature comprises a plurality of text image blocks; resolving each text image block in the initial digital signature to generate a mixed encryption character string for each text image block; acquiring account information of a user, and generating character serial numbers corresponding to all character symbols according to the account information; combining the mixed encryption character strings of the character image blocks with the corresponding character serial numbers respectively to obtain mixed encryption character string password of the character image blocks; and mixing all mixed encryption character strings of the initial digital signature, and generating a mixed password. Under the condition that a public key, a private key or a shared key is not added, the remote server can directly decrypt the received confusion secret order to obtain the target digital signature, the situation that the public key, the private key or the shared key is hijacked and cracked in the transmission process to finally lead the initial digital signature to be tampered is avoided, and the reliability and the safety of information transmission are improved.
Further, the confusion password contains user registration information, can be used for verifying the user identity, contains sequence numbers corresponding to the digital signature characters and confusion encryption character strings, is not easy to tamper with or crack, is good in confidentiality, and can better protect the digital signature.
Drawings
FIG. 1 is a diagram of an application environment for a digital signature obfuscation encryption method in one embodiment;
FIG. 2 is a flow diagram of a digital signature obfuscation encryption method according to one embodiment;
FIG. 3 is a flow chart illustrating the steps of obtaining an initial digital signature in one embodiment;
FIG. 4 is a block diagram of a digital signature obfuscation encryption device according to one embodiment;
FIG. 5 is a block diagram of a digital signature obfuscation decryption device according to one embodiment;
FIG. 6 is an internal block diagram of a computer device in one embodiment;
fig. 7 is an internal structural view of a computer device in another embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The digital signature confusion encryption method provided by the embodiment of the application can be applied to an application environment shown in figure 1. Wherein the terminal 101 communicates with the server 102 via a network. The data storage system may store data that the server 102 needs to process. The data storage system may be integrated on the server 102 or may be located on a cloud or other network server. The terminal 101 may be, but not limited to, a device capable of acquiring a signature of a user handwriting, for example, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices and portable wearable devices, and the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart vehicle devices and the like. The portable wearable device may be a smart watch, smart bracelet, headset, or the like. The server 102 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In one embodiment, as shown in fig. 2, a digital signature confusion encryption method is provided, and is described by taking the application of the method to the terminal 101 in fig. 1 as an example, the method includes the following steps:
step S201, obtaining an initial digital signature of a user; the initial digital signature comprises a plurality of text image blocks;
the initial digital signature is a character image generated after a user inputs handwriting through a terminal; the initial digital signature includes a plurality of text image blocks, each text corresponding to a text image block, the text being a Chinese character.
Specifically, the user opens a handwriting function on the terminal device, for example, starts a handwriting board installed on the user side, and performs handwriting signature on the touch display screen. The terminal device generates an initial digital signature based on the handwriting.
Step S202, analyzing each text image block in the initial digital signature, and generating a mixed encryption character string for each text image block.
Specifically, character recognition is performed on an initial digital signature to obtain each character symbol, and image segmentation is performed on the initial digital signature based on the position and the size of each character symbol to obtain character image blocks containing the character symbol, wherein each character image block contains one character symbol. And adjusting each text image block to be of a uniform size. Sequencing the text image blocks according to the handwriting sequence of the user (namely the sequence of text generation) to obtain a text image block sequence; and searching a preset encryption library for each character symbol in sequence to obtain a corresponding confusion encryption character string.
Step S203, acquiring account information of the user, and generating character serial numbers corresponding to the character symbols according to the account information;
the account information refers to registration information of a user registered on a terminal application program, and comprises information used for identifying user characteristics, such as registration time, account names and the like.
Specifically, account information of all users is acquired, wherein the account information comprises user unique sequence numbers which are generated according to the registration time sequence and identify the users. Sequencing the text image blocks according to the handwriting sequence of the user (namely the sequence of text generation), obtaining a text image block sequence, and numbering the text image block sequence to obtain the sequence number of the text symbols; and combining the unique sequence number of the user with the sequence number of each literal symbol to obtain the character serial number of each literal symbol. In this embodiment, the unique serial numbers corresponding to the account information of the user are sequentially generated according to the registration time sequence, for example, the unique serial numbers corresponding to the registration information of a certain user are: GMC154751Z; and the literal sequence of the generated digital signature is numbered sequentially, for example: the sequence number of Chinese characters is: DF10; the sequence number of the Chinese character 'sea' is: DF11; the sequence number of the Chinese characters 'foreign' is: DF12, numbered sequentially in time order. When obtaining the serial number corresponding to each signature text information, taking Chinese character "Zhang" as an example, the corresponding serial number is: GMC154751Z DF10; similarly, the Chinese character "sea" corresponds to the sequence number: GMC154751Z DF11; the Chinese character 'yang' corresponding serial number is: GMC154751Z DF12.
Step S204, the mixed encryption character strings of the character image blocks are respectively combined with the corresponding character serial numbers to obtain mixed encryption character string password of the character image blocks;
specifically, the confusion encrypted character string of each text image block obtained in step S202 is correspondingly combined with the character serial number of each text symbol generated in step S203, so as to obtain the confusion encrypted character string password corresponding to each character symbol. Taking "Zhang" of Chinese characters as an example, the confusion encryption string password of the "Zhang" of Chinese characters is: 00024 GMC154751Z DF10. Likewise, the confusion encryption string password of the Chinese character 'sea' is: 05847 GMC154751Z DF11; the confusion encryption string password of the Chinese character 'foreign' is: 06871 GMC154751Z DF12.
In step S205, the confusion combination of all the confusion encrypted character strings of the initial digital signature is performed to generate a confusion password.
Specifically, the mixed encryption character string and the serial number are combined to obtain the mixed encryption character string password of each piece of signature text information. As described above, the confusion encryption string password for kanji "Zhang" is: 00024 GMC154751Z DF10. Likewise, the confusion encryption string password of the Chinese character 'sea' is: 05847 GMC154751Z DF11; the confusion encryption string password of the Chinese character 'foreign' is: 06871 GMC154751Z DF12. And then randomly scrambling the text information of the digital signature, and sequentially combining the confusion encryption character string password corresponding to the scrambled text to generate a confusion password. For example, the generated confusion password is: 06871 GMC154751Z DF12 00024 GMC154751Z DF10 05847 GMC154751Z DF11.
In the above embodiment, in the transmission process of the confusion secret password, on the premise that characters generated randomly in the Chinese database are not loaded offline, the confusion secret password cannot be cracked, and cannot be tampered, once tampered, the positions which are not corresponding to the decryption or decryption after being tampered can be directly checked and dealt with during verification, so that the confidentiality is good, and the digital signature can be better protected.
In one embodiment, as shown in fig. 3, fig. 3 shows a flowchart of the steps of obtaining an initial digital signature, where step S201 includes:
step S301, acquiring a handwritten signature image of a user;
specifically, a text symbol input by a user is acquired through handwriting equipment, and a signature image is stored.
Step S302, performing character recognition on the handwritten signature image to obtain each character symbol;
specifically, the terminal recognizes characters corresponding to the writing handwriting according to the handwriting data through a KNN (k-Nearest Neighbor algorithm) algorithm, and obtains character information of the digital signature. In this embodiment, the recognition algorithm of ocr (Optical Character Recognition ) is used to perform handwriting recognition on the digital signature screenshot, and the recognition result is compared with the text corresponding to the handwriting recognized by the KNN algorithm, so as to verify the correctness of the text information of the digital signature. In this embodiment, the ocr recognition algorithm adopts an existing image text recognition algorithm, wherein before the KNN algorithm recognizes handwriting data, writing handwriting of handwriting is read and converted into an input vector, the input vector is input into a KNN handwriting recognition model trained by training set samples, a label vector corresponding to the input vector is obtained, and characters corresponding to the closest label vector are determined to be used as character symbols of a digital signature.
Step S303, dividing the handwritten signature image into character image blocks based on the character symbols;
specifically, based on the position and the size of each literal symbol, the initial digital signature is subjected to image segmentation to obtain literal image blocks containing literal symbols, wherein each literal image block contains one literal symbol.
Step S304, arranging the text image blocks according to the sequence of handwriting time to obtain a text image block sequence; and taking the text image block sequence as the initial digital signature.
Specifically, each text image block is adjusted to a uniform size. Sequencing the text image blocks according to the handwriting sequence of the user (namely the sequence of text generation) to obtain a text image block sequence; the text image block sequence is used as an initial digital signature.
According to the embodiment, the handwriting input by the user is split and sequenced, so that each character symbol can be processed later.
In an embodiment, the step S202 includes: searching a preset encryption library according to each character symbol to obtain a mixed encryption character string corresponding to each character symbol.
Specifically, for each text symbol, searching a preset encryption library, and generating a mixed encryption character string corresponding to each signed text message. The encrypted library is a character string corresponding to each character, which is randomly generated in the Chinese databases such as CBMWEB (Chinese biomedical literature database), CMCC (Chinese Medical Current Contents, chinese biomedical journal literature database), CNKI (China National Knowledge Infrastructure, chinese knowledge infrastructure engineering) and the like, and is downloaded in a line. By generating a random string in the Chinese character database in advance, the string represents a signature character when encryption is performed. For example, the random string of the Chinese character "sea" is: 05847; the random character string of the Chinese character 'yang' is as follows: 06871; the random character string of Chinese character "Zhang" is: 00024. when each piece of signature text information and the corresponding image block are combined together to generate a mixed encrypted character string corresponding to each piece of signature text information, the mixed encrypted character strings are "00024", "05847" and "06871", respectively.
In the above embodiment, by loading a plurality of preset encryption libraries, the confusion encryption character string of each literal symbol can be obtained.
In an embodiment, the account information includes account registration time; the step S203 includes: acquiring account information of the user; generating a user unique sequence number of the user based on the account registration time in the account information; generating sequence numbers of all character symbols according to the character image block sequence; and combining the unique serial numbers with the serial numbers of the literal symbols respectively to obtain the character serial numbers corresponding to the literal symbols.
Specifically, account information of all users is acquired, wherein the account information comprises user unique sequence numbers which are generated according to the registration time sequence and identify the users. Sequencing the text image blocks according to the handwriting sequence of the user (namely the sequence of text generation), obtaining a text image block sequence, and numbering the text image block sequence to obtain the sequence number of the text symbols; and combining the unique sequence number of the user with the sequence number of each literal symbol to obtain the character serial number of each literal symbol. In this embodiment, the unique serial numbers corresponding to the account information of the user are sequentially generated according to the registration time sequence, for example, the unique serial numbers corresponding to the registration information of a certain user are: GMC154751Z; and the literal sequence of the generated digital signature is numbered sequentially, for example: the sequence number of Chinese characters is: DF10; the sequence number of the Chinese character 'sea' is: DF11; the sequence number of the Chinese characters 'foreign' is: DF12, numbered sequentially in time order. When obtaining the serial number corresponding to each signature text information, taking Chinese character "Zhang" as an example, the corresponding serial number is: GMC154751Z DF10; similarly, the Chinese character "sea" corresponds to the sequence number: GMC154751Z DF11; the Chinese character 'yang' corresponding serial number is: GMC154751Z DF12.
In the above embodiment, the user unique serial number for uniquely identifying the user is generated by the account registration time, and the character serial number is obtained by combining the user unique serial number with each character symbol based on the user unique serial number, so as to lay data for generating the confusion encryption character string password subsequently.
In an embodiment, there is also provided a digital signature confusion decryption method, applied to a server, including: obtaining a confusion password corresponding to the initial digital signature of the user from the terminal; reading each decryption node in the confusion secret password, and decomposing the confusion secret password into a plurality of confusion encryption character string secret passwords based on the decryption node; the decryption node is a character serial number corresponding to each character symbol; reading a user unique sequence number in the character sequence number, and searching and checking user registration information according to the user unique sequence number; if the verification is successful, the sequence numbers of all the character symbols are read from the character serial numbers; reordering the confusion encryption character string password corresponding to each character symbol according to the sequence number to obtain a character image block sequence; reading the confusion encryption character string in the confusion encryption character string password; searching a preset encryption library to obtain text symbols corresponding to the confusion encryption character strings, and forming a text symbol group; splicing the text image blocks corresponding to the text symbols to form a digital signature background image; and superposing the literal symbol group and the digital signature background diagram to obtain the target digital signature.
Specifically, when decrypting the confusion secret password, resolving the confusion encryption character string secret password through a decryption node, then searching and checking user registration information according to unique sequence number information contained in the sequence number, checking user identity information if the user identity information is consistent with the information in registration, then reordering the confusion encryption character string secret password to obtain a digital signature character sequence, and searching an encryption library to obtain decrypted character information and forming complete digital signature characters; and finally, forming complete digital signature characters and the digital signature screenshot, and safely transmitting the generated digital signature as a target signature.
In the above embodiment, since the encryption scheme of the confusion secret is adopted without adding a public key, a private key or a shared secret key, the remote server can directly decrypt the received confusion secret to obtain the target signature, and the confusion secret contains the bound user registration information to verify the user identity information, wherein the confusion secret contains the sequence number corresponding to the digital signature text and the confusion encryption character string, and the formed confusion secret is not easy to tamper or crack after disclosure, so that the confidentiality is good, and the digital signature can be better protected.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a digital signature confusion encryption device for realizing the above-mentioned related digital signature confusion encryption method, which is applied to a terminal, and a digital signature confusion decryption device for realizing the above-mentioned related digital signature confusion decryption method, which is applied to a server. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitations of one or more embodiments of the digital signature obfuscation encryption device and the embodiments of the digital signature obfuscation decryption device provided below may refer to the limitations of the digital signature obfuscation encryption method and the digital signature obfuscation decryption method described above, and are not repeated herein.
In one embodiment, as shown in fig. 4, there is provided a digital signature obfuscation encryption apparatus 400 applied to a terminal, including: an initial digital signature acquisition module 401, a confusion encryption character string generation module 402, a character sequence number generation module 403, a confusion encryption character string password generation module 404, and a confusion password generation module 405, wherein:
an initial digital signature acquisition module 401, configured to acquire an initial digital signature of a user; the initial digital signature comprises a plurality of text image blocks;
the confusion encryption string generation module 402 is configured to parse each text image block in the initial digital signature to generate a confusion encryption string for each text image block;
a character serial number generating module 403, configured to obtain account information of the user, and generate a character serial number corresponding to each text symbol according to the account information;
the confusion encryption character string password generation module 404 is configured to combine the confusion encryption character strings of the respective text image blocks with corresponding character serial numbers to obtain confusion encryption character string password of the respective text image blocks;
and the confusion secret generation module 405 is configured to generate a confusion secret by combining all confusion encrypted character strings of the initial digital signature.
In an embodiment, the initial digital signature obtaining module 401 is further configured to obtain a handwritten signature image of the user; performing character recognition on the handwritten signature image to obtain each character symbol; dividing the handwritten signature image based on the literal symbol to obtain a literal image block; arranging the text image blocks according to the sequence of handwriting time to obtain a text image block sequence; and taking the text image block sequence as the initial digital signature.
In an embodiment, the confusion encryption string generation module 402 is further configured to search a preset encryption library according to each text symbol to obtain a confusion encryption string corresponding to each text symbol.
In an embodiment, the account information includes account registration time; the character serial number generating module 403 is further configured to obtain account information of the user; generating a user unique sequence number of the user based on the account registration time in the account information; generating sequence numbers of all character symbols according to the character image block sequence; and combining the unique serial numbers with the serial numbers of the literal symbols respectively to obtain the character serial numbers corresponding to the literal symbols.
In one embodiment, as shown in fig. 5, there is provided a digital signature obfuscation decryption apparatus 500, applied to a server, including: a confusion password acquisition module 501, a confusion password decomposition module 502, a user unique sequence number reading module 503, a text image block sequence generation module 504, a text symbol generation module 505, a digital signature background diagram generation module 506 and a target digital signature generation module 507, wherein:
a confusion secret acquisition module 501, configured to acquire a confusion secret corresponding to an initial digital signature of a user from a terminal;
the confusion secret password decomposing module 502 is configured to read each decryption node in the confusion secret password, and decompose the confusion secret password into a plurality of confusion encryption character string secret passwords based on the decryption node; the decryption node is a character serial number corresponding to each character symbol;
a user unique sequence number reading module 503, configured to read a user unique sequence number in the character sequence number, and search and verify user registration information according to the user unique sequence number;
a text image block sequence generating module 504, configured to read the sequence number of each text symbol from the character sequence number if the verification is successful; reordering the confusion encryption character string password corresponding to each character symbol according to the sequence number to obtain a character image block sequence;
A literal symbol generating module 505, configured to read the confusion encrypted character string in the confusion encrypted character string password; searching a preset encryption library to obtain text symbols corresponding to the confusion encryption character strings, and forming a text symbol group;
the digital signature background diagram generating module 506 is configured to splice text image blocks corresponding to the text symbols to form a digital signature background diagram;
and the target digital signature generation module 507 is configured to superimpose the text symbol group and the digital signature background map to obtain a target digital signature.
The above-described respective modules in the digital signature obfuscation encryption apparatus and the digital signature obfuscation decryption apparatus may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 6. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing a preset word stock and initial digital signature or target digital signature data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a digital signature obfuscation decryption method.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure of which may be as shown in fig. 7. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a digital signature obfuscation encryption method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by persons skilled in the art that the structures shown in FIGS. 6-7 are block diagrams of the elements of structures in association with aspects of the present application and are not intended to limit the computer system to which aspects of the present application may be applied, and that a particular computer system may include more or less elements than those shown, or may combine some of the elements, or have a different arrangement of elements.
In one embodiment, a computer device is provided, including a memory and a processor, where the memory stores a computer program, and the processor implements the steps in the above-described digital signature obfuscation encryption method embodiment or digital signature obfuscation decryption method embodiment when the computer program is executed.
In one embodiment, a computer readable storage medium is provided, on which a computer program is stored, which when executed by a processor implements the steps of the above-described digital signature obfuscation encryption method embodiment or digital signature obfuscation decryption method embodiment.
In one embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the digital signature obfuscation encryption method embodiment or the digital signature obfuscation decryption method embodiment described above.
The user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or sufficiently authorized by each party.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (8)

1. A digital signature obfuscation encryption method, characterized by being applied to a terminal, the method comprising:
acquiring an initial digital signature of a user; the initial digital signature comprises a plurality of literal image blocks based on respective literal symbols; arranging the text image blocks according to the sequence of handwriting time to obtain a text image block sequence; taking the text image block sequence as the initial digital signature;
Resolving each text image block in the initial digital signature to generate a confusion encryption character string for each text image block;
acquiring account information of the user, wherein the account information comprises account registration time; generating a user unique sequence number of the user based on the account registration time in the account information; generating sequence numbers of all character symbols according to the character image block sequence; combining the unique serial numbers with the serial numbers of the literal symbols respectively to obtain character serial numbers corresponding to the literal symbols;
combining the mixed encryption character strings of the character image blocks with corresponding character serial numbers respectively to obtain mixed encryption character string password of the character image blocks;
and mixing all mixed encryption character strings of the initial digital signature, and generating a mixed password.
2. The method of claim 1, wherein the obtaining the initial digital signature of the user comprises:
acquiring a handwritten signature image of the user;
performing character recognition on the handwritten signature image to obtain each character symbol;
and dividing the handwritten signature image based on the literal symbol to obtain a literal image block.
3. The method of claim 2, wherein the parsing for each literal image block in the initial digital signature generates a garbled encrypted string for each literal image block, comprising:
searching a preset encryption library according to each character symbol to obtain a mixed encryption character string corresponding to each character symbol.
4. A digital signature obfuscation decryption method, applied to a server, the method comprising:
obtaining a confusion password corresponding to the initial digital signature of the user from the terminal;
reading each decryption node in the confusion secret password, and decomposing the confusion secret password into a plurality of confusion encryption character string secret passwords based on the decryption node; the decryption node is a character serial number corresponding to each character symbol;
reading a user unique sequence number in the character sequence number, and searching and checking user registration information according to the user unique sequence number;
if the verification is successful, the sequence numbers of all the character symbols are read from the character serial numbers; reordering the confusion encryption character string password corresponding to each character symbol according to the sequence number to obtain a character image block sequence;
Reading the confusion encryption character string in the confusion encryption character string password; searching a preset encryption library to obtain text symbols corresponding to the confusion encryption character strings, and forming a text symbol group;
splicing the text image blocks corresponding to the text symbols to form a digital signature background image;
and superposing the literal symbol group and the digital signature background diagram to obtain the target digital signature.
5. A digital signature obfuscation encryption device, for application to a terminal, the device comprising:
the initial digital signature acquisition module is used for acquiring an initial digital signature of a user; the initial digital signature comprises a plurality of literal image blocks based on respective literal symbols; arranging the text image blocks according to the sequence of handwriting time to obtain a text image block sequence; taking the text image block sequence as the initial digital signature;
the confusion encryption character string generation module is used for analyzing each text image block in the initial digital signature to generate a confusion encryption character string for each text image block;
the character serial number generation module is used for acquiring account information of the user, wherein the account information comprises account registration time; generating a user unique sequence number of the user based on the account registration time in the account information; generating sequence numbers of all character symbols according to the character image block sequence; combining the unique serial numbers with the serial numbers of the character symbols to obtain the character serial numbers corresponding to the character symbols;
The confusion encryption character string password generation module is used for respectively combining the confusion encryption character strings of the character image blocks with the corresponding character serial numbers to obtain confusion encryption character string password of the character image blocks;
and the confusion secret password generating module is used for carrying out confusion combination on all the confusion encryption character strings of the initial digital signature to generate confusion secret password.
6. A digital signature obfuscation decryption apparatus for use with a server, the apparatus comprising:
the confusion secret order acquisition module is used for acquiring confusion secret orders corresponding to the initial digital signature of the user from the terminal;
the confusion secret password decomposing module is used for reading each decryption node in the confusion secret password, and decomposing the confusion secret password into a plurality of confusion encryption character string secret passwords based on the decryption node; the decryption node is a character serial number corresponding to each character symbol;
the user unique sequence number reading module is used for reading the user unique sequence number in the character sequence number and searching and checking the user registration information according to the user unique sequence number;
the character image block sequence generating module is used for reading the sequence numbers of all character symbols from the character sequence number if the verification is successful; reordering the confusion encryption character string password corresponding to each character symbol according to the sequence number to obtain a character image block sequence;
The character symbol generation module is used for reading the confusion encryption character strings in the confusion encryption character string password; searching a preset encryption library to obtain text symbols corresponding to the confusion encryption character strings, and forming a text symbol group;
the digital signature background image generation module is used for splicing the text image blocks corresponding to the text symbols to form a digital signature background image;
and the target digital signature generation module is used for superposing the literal symbol group and the digital signature background diagram to obtain a target digital signature.
7. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 4 when the computer program is executed.
8. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 4.
CN202111355207.7A 2021-11-16 2021-11-16 Digital signature confusion encryption method, device, computer equipment and storage medium Active CN114244518B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111355207.7A CN114244518B (en) 2021-11-16 2021-11-16 Digital signature confusion encryption method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111355207.7A CN114244518B (en) 2021-11-16 2021-11-16 Digital signature confusion encryption method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114244518A CN114244518A (en) 2022-03-25
CN114244518B true CN114244518B (en) 2023-10-03

Family

ID=80749559

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111355207.7A Active CN114244518B (en) 2021-11-16 2021-11-16 Digital signature confusion encryption method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114244518B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117330941B (en) * 2023-11-29 2024-02-02 珠海智锐科技有限公司 Performance test method and related device for new energy BMS printed circuit board
CN118051892B (en) * 2024-04-15 2024-08-02 山东捷瑞数字科技股份有限公司 Integer unique identification confusion protection method, device, equipment and medium
CN118368368B (en) * 2024-06-17 2024-08-20 广东电网有限责任公司湛江供电局 Encryption method, encryption device, storage medium and program product for aerial image

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110808966A (en) * 2019-10-23 2020-02-18 天津华来科技有限公司 Identity information generation method and device and storage medium
CN110929270A (en) * 2019-10-29 2020-03-27 北京芯盾集团有限公司 Information security encryption method and device
CN111866770A (en) * 2020-07-21 2020-10-30 上海聚均科技有限公司 Capital monitoring method based on short message
WO2021221331A1 (en) * 2020-04-29 2021-11-04 (주)폰트릭스 Method for encoding text, and device for implementing same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110808966A (en) * 2019-10-23 2020-02-18 天津华来科技有限公司 Identity information generation method and device and storage medium
CN110929270A (en) * 2019-10-29 2020-03-27 北京芯盾集团有限公司 Information security encryption method and device
WO2021221331A1 (en) * 2020-04-29 2021-11-04 (주)폰트릭스 Method for encoding text, and device for implementing same
CN111866770A (en) * 2020-07-21 2020-10-30 上海聚均科技有限公司 Capital monitoring method based on short message

Also Published As

Publication number Publication date
CN114244518A (en) 2022-03-25

Similar Documents

Publication Publication Date Title
CN114244518B (en) Digital signature confusion encryption method, device, computer equipment and storage medium
US10498542B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US8485438B2 (en) Mobile computing device authentication using scannable images
CN107612683B (en) Encryption and decryption method, device, system, equipment and storage medium
CN106815716B (en) A kind of electronic record file forming method and system
CN115795538B (en) Anti-desensitization method, device, computer equipment and storage medium for desensitizing document
CN114266033A (en) Verification code generation method and device, verification code login system and electronic equipment
CN114240347A (en) Business service secure docking method and device, computer equipment and storage medium
CN110069907A (en) Big data source tracing method and system based on digital watermarking
CN117978446A (en) Chip communication transmission encryption method, device, computer equipment and storage medium
CN111475690B (en) Character string matching method and device, data detection method and server
CN116049802B (en) Application single sign-on method, system, computer equipment and storage medium
CN114553556B (en) Data encryption method, device, computer equipment and storage medium
CN114244565B (en) Key distribution method, device, equipment and storage medium
CN113901502A (en) Data processing method and device, electronic equipment and storage medium
CN113904865A (en) Log transmission method and device based on asymmetric algorithm
CN107682161B (en) Offline authentication method and device for two-dimensional code
JP2017123077A (en) Electronic document terminal, signature authentication system, signature authentication method, and program for electronic document terminal
CN113672967A (en) File content dense point marking method
CN117522417B (en) Transaction security verification method and device based on quantum encryption
CN117763625B (en) Token acquisition method, device, computer equipment and storage medium
CN117932630A (en) Chip data security interaction method, device, equipment, medium and product
CN115174260A (en) Data verification method, data verification device, computer, storage medium and program product
Yesiltepe et al. Fake and Real Massaging at the Same Time with QR Code in Web Services for Different Users
CN117611165A (en) Abnormal object detection method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant