CN114978527B - Electronic signature method, electronic signature device, electronic equipment and storage medium - Google Patents

Electronic signature method, electronic signature device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114978527B
CN114978527B CN202210458468.XA CN202210458468A CN114978527B CN 114978527 B CN114978527 B CN 114978527B CN 202210458468 A CN202210458468 A CN 202210458468A CN 114978527 B CN114978527 B CN 114978527B
Authority
CN
China
Prior art keywords
target
document
user
target document
stamp
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210458468.XA
Other languages
Chinese (zh)
Other versions
CN114978527A (en
Inventor
苏卓涵
杨春全
熊冰林
刘庆忠
李家乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Internet Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202210458468.XA priority Critical patent/CN114978527B/en
Publication of CN114978527A publication Critical patent/CN114978527A/en
Application granted granted Critical
Publication of CN114978527B publication Critical patent/CN114978527B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The application discloses an electronic signature method, an electronic signature device, electronic equipment and a storage medium, which belong to the technical field of network security and are used for realizing electronic signature of documents edited by multiple persons in a collaborative manner and increasing non-repudiation. The method comprises the following steps: acquiring first position information of a first user, wherein the first user comprises one of at least one second user editing a target document; responding to the save operation of the first user on the target document, and determining a first time corresponding to the save operation; performing first encryption processing on the first time and the first position information to obtain a target position stamp corresponding to the target document; and associating the target position stamp with the target document to obtain a target signature document.

Description

Electronic signature method, electronic signature device, electronic equipment and storage medium
Technical Field
The application belongs to the technical field of network security, and particularly relates to a method and device for electronic signature, electronic equipment and a storage medium.
Background
With the development of computer and network communication technologies, electronic signatures are widely used as an important means for authentication technology and information security assurance in various business scenarios of enterprises, such as internet banking, signing of electronic contracts, and the like. The electronic signature is contained in an electronic form in the data text and attached to the data for identifying the identity of the signer and indicating that the signer approves the content, and the contained position information for indicating the generation position of the electronic data file can improve the non-repudiation of the electronic signature.
And aiming at the electronic signature of the document cooperatively edited by multiple persons, aiming at the editing histories of multiple users in the document generation process, the electronic signature of the document needs to be carried out based on the multiple pieces of corresponding position information.
Disclosure of Invention
The embodiment of the application provides a method, a device, electronic equipment and a storage medium for electronic signature, which can realize the processing of a structured message containing a plurality of information elements.
In a first aspect, an embodiment of the present application provides a method for electronic signature, including: acquiring first position information of a first user, wherein the first user comprises one of at least one second user editing a target document; responding to the save operation of the first user on the target document, and determining a first time corresponding to the save operation; performing first encryption processing on the first time and the first position information to obtain a target position stamp corresponding to the target document; and associating the target position stamp with the target document to obtain a target signature document.
In a second aspect, an embodiment of the present application provides an apparatus for electronic signature, including: an acquisition module for acquiring first location information of a first user, wherein the first user comprises one of at least one second user who is editing a target document; the determining module is used for responding to the storage operation of the first user on the target document and determining the first time corresponding to the storage operation; the encryption module is used for carrying out first encryption processing on the first time and the first position information to obtain a target position stamp corresponding to the target document; and the signature module is used for associating the target position stamp with the target document to obtain the target signature document.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions implementing the steps of the electronic signature method according to the first aspect when executed by the processor.
In a fourth aspect, embodiments of the present application provide a readable storage medium having stored thereon a program or instructions which when executed by a processor implement the steps of the electronic signature method as described in the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the electronic signature method according to the first aspect.
In the embodiment of the application, the first position information of a first user is acquired, wherein the first user comprises one of at least one second user editing a target document; responding to the save operation of the first user on the target document, and determining a first time corresponding to the save operation; performing first encryption processing on the first time and the first position information to obtain a target position stamp corresponding to the target document; and associating the target position stamp with the target document to obtain a target signature document, so that the electronic signature of the document edited by multiple persons in a collaborative manner can be realized, and the non-repudiation is increased.
Drawings
Fig. 1 is a schematic flow chart of an electronic signature method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an electronic signature device according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged, as appropriate, such that embodiments of the present application may be implemented in sequences other than those illustrated or described herein, and that the objects identified by "first," "second," etc. are generally of a type, and are not limited to the number of objects, such as the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/", generally means that the associated object is an "or" relationship.
The method, the device, the electronic equipment and the storage medium for electronic signature provided by the embodiment of the application are described in detail below through specific embodiments and application scenes thereof with reference to the accompanying drawings.
Fig. 1 shows an electronic signature method provided by an embodiment of the application, which can be performed by an electronic device. The electronic device may include: server and/or terminal device. In other words, the method may be performed by software or hardware installed in the electronic device, the method comprising the steps of:
s101: first location information of a first user is acquired.
Wherein the first user comprises one of at least one second user who is editing the target document.
With the development of internet technology and communication technology, often meet the situation that a plurality of people are required to be responsible for part of document writing tasks together in office, and finally, integration is carried out, and generally, the online editing of a plurality of people is realized through sharing the document, so that the working efficiency can be greatly improved. An electronic signature refers to a signature associated with an electronic document that may be used to identify a signer and indicate that the signer approves an electronic form of content therein. In addition to the signature of the elements of 'what, when and what' are contained in the electronic signature, the element of 'what' is needed to be signed so as to further improve the non-repudiation of the electronic signature. When signing an electronic document cooperatively edited by a plurality of persons, there is a plurality of location information associated with the electronic document, and it is necessary to electronically sign the document based on the plurality of location information.
In the embodiment of the present application, the location information may be location information based on user internet protocol (Internet Protocol, IP) address information, but a very accurate IP and geographic location mapping library is required, and dynamic maintenance is also required, or location information based on global positioning system (Global Positioning System, GPS) or base station location is also required, which is not particularly limited in the present application.
S102: and responding to the save operation of the first user on the target document, and determining a first time corresponding to the save operation.
When a user editing the target document performs a saving operation, a corresponding one-time editing task is completed for the target document, and the time corresponding to the saving operation is recorded. Thus, the mapping relation between the position information and the corresponding time is obtained, and the non-repudiation is further enhanced when the position signature is verified.
S103: and performing first encryption processing on the first time and the first position information to obtain a target position stamp corresponding to the target document.
The step obtains the target position stamp corresponding to the target document by encrypting the obtained time and position information, wherein the encryption algorithm can be a symmetric encryption algorithm, an asymmetric encryption algorithm or other encryption algorithms besides the symmetric encryption algorithm, and the step is not particularly limited. It should be noted that the target location stamp is a location stamp formed for the current first user, and for each user having editing or accessing rights to the target document, the corresponding location stamp may be formed respectively.
S104: and associating the target position stamp with the target document to obtain a target signature document.
And associating the position stamp obtained in the step with the target document to obtain a document subjected to position signature.
The embodiment of the application provides an electronic signature method, which comprises the steps of obtaining first position information of a first user, wherein the first user comprises one of at least one second user editing a target document; responding to the save operation of the first user on the target document, and determining a first time corresponding to the save operation; performing first encryption processing on the first time and the first position information to obtain a target position stamp corresponding to the target document; and associating the target position stamp with the target document to obtain a target signature document, so that the electronic signature of the document edited by multiple persons in a collaborative manner can be realized, and the non-repudiation is increased.
In one implementation, step S103 includes: when the number of the second users is greater than 1, a first position stamp corresponding to the first user is obtained according to the following formula:
s=(r-d)+k*e mod n;
wherein s is a first position stamp corresponding to the first user, r is the number of users editing the target document, d is the number of users executing a saving operation on the target document, e is a first hash value corresponding to the first position information, k is a predetermined constant, and n is a random number;
the first location stamp is determined as the target location stamp.
In one implementation, step S103 includes: and when the number of the first users is equal to 1, performing first encryption processing on the first time and the first position information based on a preset encryption algorithm to obtain a target position stamp corresponding to the target document, wherein the preset encryption algorithm comprises at least one of a symmetrical encryption algorithm and an asymmetrical encryption algorithm.
In one implementation, before step S103, the method further includes:
when the number of the second users is greater than 1, sorting a plurality of second times and a plurality of second position information corresponding to a plurality of second users to obtain target position labels;
and sending the target position label to a receiver of the target file, wherein the target position label is used for verifying the target position stamp.
In one implementation manner, the sorting the plurality of second times and the plurality of second location information corresponding to the plurality of second users to obtain a target location tag includes:
determining second editing information of each second user on the target document, wherein the second editing information comprises at least one of editing content length, importance of editing content and editing duration;
and sorting a plurality of second times and a plurality of second position information corresponding to a plurality of second users according to the second editing information of each second user to obtain a target position label.
In the general process of signing a document, a lot of other note information needs to be added, but no matter what note information is added, a certain storage space is occupied, so that the burden of a server is increased, therefore, the idea of the part is that the data of the geographic position information is endowed with more functions, the content in the data is enriched, and on the basis of not adding other notes, more content in the label can be read through the label of the geographic position information.
For example, the format of the generated geographic location information tag is: time saved by user 1, longitude and latitude coordinates of user 1; time saved by the user 2, longitude and latitude coordinates of the user 2; … …; the time saved by the user n, the longitude and latitude coordinates of the user n, wherein the ranking rule of the longitude and latitude coordinates of the user can rank according to the length, the editing time and the importance degree of the edited content of the document which are edited by the user, the first round of ranking is firstly performed according to the editing time of the user (the ranking with long editing time is before), then the ranking is performed according to the quantity of the edited content of the document which is edited by the user (the ranking with more editing content is before), and finally the ranking is performed according to the importance degree of the document in the edited document which is edited by the user (the importance degree of the edited content is before).
Thus, not only the location information of the user but also information such as the operation behavior of the user can be analyzed from the location tag information, and the location tag can be transmitted to the receiving side of the target file. After receiving the position label and the position stamp, the receiver encrypts the position label by using the same encryption algorithm as that of the sender, judges whether the obtained encryption result is consistent with the position stamp, and if so, verifies that the position information label is corresponding to the position stamp. When the location stamp is obtained by a symmetric or asymmetric encryption algorithm, the receiver may decrypt the location stamp with a predetermined key, and verify whether the decryption result is consistent with the location tag.
In one implementation, before the step S104, the method further includes:
determining a second hash value corresponding to the target document;
performing second encryption processing on the second hash value to obtain a second signature corresponding to the target file;
and associating the second signature with the target file.
In one implementation, before the step S104, the method further includes:
sending a request to a time service center, and acquiring a time stamp and a time stamp certificate corresponding to the target document;
and respectively associating the timestamp and the timestamp certificate with the target document.
For example, a signature digest is generated by performing a hashing algorithm (e.g., a secure hashing algorithm, a message digest algorithm, etc.) on target document data, then encrypting the signature digest by using a private key issued to a signing user, and then associating the encrypted signature digest with a certificate authority (Certificate Authority, CA) certificate of the user with which the data is associated as a base component with the target file. The encrypted document may then also be time stamped, and after receipt of the target document to which the user signature has been associated, the document after the certificate has been signed may be trusted time stamped to enhance the security of the electronic signature because the certificate itself may have expired or been revoked (referred to as "invalid") in its data associated with the electronic signature. The timestamp service is an electronic signature that is signed by a trusted third party (e.g., a national time service) to prove that a certificate chain of a signed document exists and is valid at the time specified in the timestamp to ensure that the time information is not tampered with and falsified. While it may be transmitted or stored.
Upon receiving the signed document, the document recipient may decrypt the encrypted signature digest associated with the document and the location signature using the public key of the signer (available from the signer or public-private key authority). If the hash of the received electronic document matches the decrypted signature digest, the validity of the received digital message is verified, i.e., the signature is considered to be the signer's signature; if it is determined that the received location tag information matches the location stamp, the location where the signature was sent is certified and the document has not changed since the time of the signature.
It should be noted that, in the electronic signature method provided in the embodiment of the present application, the execution subject may be an electronic signature device, or a control module in the electronic signature device for executing the electronic signature method. In the embodiment of the application, an electronic signature device is taken as an example to execute an electronic signature method.
Fig. 2 is a schematic structural diagram of an electronic signature device according to an embodiment of the present application. As shown in fig. 2, the electronic signature apparatus 200 includes: an obtaining module 210, configured to obtain first location information of a first user, where the first user includes one of at least one second user that is editing a target document; a determining module 220, configured to determine a first time corresponding to a save operation of the first user on the target document; an encryption module 230, configured to perform a first encryption process on the first time and the first location information, so as to obtain a target location stamp corresponding to the target document; and the signature module 240 is configured to associate the target location stamp with the target document to obtain a target signature document.
In one implementation, the encryption module 230 is configured to: when the number of the second users is greater than 1, a first position stamp corresponding to the first user is obtained according to the following formula:
s=(r-d)+k*e mod n;
wherein s is a first position stamp corresponding to the first user, r is the number of users editing the target document, d is the number of users executing a saving operation on the target document, e is a first hash value corresponding to the first position information, k is a predetermined constant, and n is a random number;
the first location stamp is determined as the target location stamp.
In one implementation, the encryption module 230 is further configured to: and when the number of the first users is equal to 1, performing first encryption processing on the first time and the first position information based on a preset encryption algorithm to obtain a target position stamp corresponding to the target document, wherein the preset encryption algorithm comprises at least one of a symmetrical encryption algorithm and an asymmetrical encryption algorithm.
In one implementation, the signature module 240 is further configured to: determining a second hash value corresponding to the target document; performing second encryption processing on the second hash value to obtain a second signature corresponding to the target file; and associating the second signature with the target file.
In one implementation, the signature module 240 is further configured to: sending a request to a time service center, and acquiring a time stamp and a time stamp certificate corresponding to the target document; and respectively associating the timestamp and the timestamp certificate with the target document.
In one implementation, the electronic signature apparatus 200 further includes: the sending module is used for sequencing a plurality of second times and a plurality of second position information corresponding to a plurality of second users when the number of the second users is larger than 1, so as to obtain a target position label; and sending the target position label to a receiver of the target file, wherein the target position label is used for verifying the target position stamp.
In one implementation, the sending module is further configured to:
determining second editing information of each second user on the target document, wherein the second editing information comprises at least one of editing content length, importance of editing content and editing duration;
and sorting a plurality of second times and a plurality of second position information corresponding to a plurality of second users according to the second editing information of each second user to obtain a target position label.
The electronic signature device in the embodiment of the application can be a device, and can also be a component, an integrated circuit or a chip in a terminal. The device may be a mobile electronic device or a non-mobile electronic device. By way of example, the mobile electronic device may be a cell phone, tablet computer, notebook computer, palm computer, vehicle mounted electronic device, wearable device, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), netbook or personal digital assistant (personal digital assistant, PDA), etc., and the non-mobile electronic device may be a server, network attached storage (Network Attached Storage, NAS), personal computer (personal computer, PC), television (TV), teller machine or self-service machine, etc., and embodiments of the present application are not limited in particular.
The electronic signature device in the embodiment of the application can be a device with an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, and the embodiment of the present application is not limited specifically.
The electronic signature device provided by the embodiment of the application can realize each process realized in the embodiment of the electronic signature method of fig. 1, and in order to avoid repetition, the description is omitted here.
Optionally, as shown in fig. 3, an embodiment of the present application further provides an electronic device 300, including a processor 301, a memory 302, and a program or an instruction stored in the memory 302 and executable on the processor 301, where the program or the instruction is implemented when executed by the processor 301: acquiring first position information of a first user, wherein the first user comprises one of at least one second user editing a target document; responding to the save operation of the first user on the target document, and determining a first time corresponding to the save operation; performing first encryption processing on the first time and the first position information to obtain a target position stamp corresponding to the target document; and associating the target position stamp with the target document to obtain a target signature document.
In one implementation, the above-described programs or instructions, when executed by the processor 301, implement: when the number of the second users is greater than 1, a first position stamp corresponding to the first user is obtained according to the following formula:
s=(r-d)+k*e mod n;
wherein s is a first position stamp corresponding to the first user, r is the number of users editing the target document, d is the number of users executing a saving operation on the target document, e is a first hash value corresponding to the first position information, k is a predetermined constant, and n is a random number;
the first location stamp is determined as the target location stamp.
In one implementation, the above-described programs or instructions, when executed by the processor 301, implement: and when the number of the first users is equal to 1, performing first encryption processing on the first time and the first position information based on a preset encryption algorithm to obtain a target position stamp corresponding to the target document, wherein the preset encryption algorithm comprises at least one of a symmetrical encryption algorithm and an asymmetrical encryption algorithm.
In one implementation, the above-described programs or instructions, when executed by the processor 301, implement: determining a second hash value corresponding to the target document; performing second encryption processing on the second hash value to obtain a second signature corresponding to the target file; and associating the second signature with the target file.
In one implementation, the above-described programs or instructions, when executed by the processor 301, implement: sending a request to a time service center, and acquiring a time stamp and a time stamp certificate corresponding to the target document; and respectively associating the timestamp and the timestamp certificate with the target document.
In one implementation, the above-described programs or instructions, when executed by the processor 301, implement: when the number of the second users is greater than 1, sorting a plurality of second times and a plurality of second position information corresponding to a plurality of second users to obtain target position labels; and sending the target position label to a receiver of the target file, wherein the target position label is used for verifying the target position stamp.
In one implementation, the above-described programs or instructions, when executed by the processor 301, implement: determining second editing information of each second user on the target document, wherein the second editing information comprises at least one of editing content length, importance of editing content and editing duration; and sorting a plurality of second times and a plurality of second position information corresponding to a plurality of second users according to the second editing information of each second user to obtain a target position label.
The specific implementation steps can refer to the steps of the embodiment of the electronic signature method, and the same technical effects can be achieved, so that repetition is avoided and no further description is provided here.
It should be noted that, the electronic device in the embodiment of the present application includes: a server, a terminal device, or other devices in addition to a terminal device.
The above electronic device structure does not constitute a limitation of the electronic device, and the electronic device may include more or less components than illustrated, or may combine some components, or may be different in arrangement of components, for example, an input unit, may include a graphics processor (Graphics Processing Unit, GPU) and a microphone, and a display unit may configure a display panel in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit includes at least one of a touch panel and other input devices. Touch panels are also known as touch screens. Other input devices may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and so forth, which are not described in detail herein.
The memory may be used to store software programs as well as various data. The memory may mainly include a first memory area storing programs or instructions and a second memory area storing data, wherein the first memory area may store an operating system, application programs or instructions (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, the memory may include volatile memory or nonvolatile memory, or the memory may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM), static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (ddr SDRAM), enhanced SDRAM (Enhanced SDRAM), synchronous DRAM (SLDRAM), and Direct RAM (DRRAM).
The processor may include one or more processing units; optionally, the processor integrates an application processor that primarily processes operations involving an operating system, user interface, application programs, and the like, and a modem processor that primarily processes wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor.
The embodiment of the application also provides a readable storage medium, on which a program or an instruction is stored, which when executed by a processor, implements each process of the above embodiment of the electronic signature method, and can achieve the same technical effects, and in order to avoid repetition, the description is omitted here.
Wherein the processor is a processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium such as a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
The embodiment of the application further provides a chip, which comprises a processor and a communication interface, wherein the communication interface is coupled with the processor, and the processor is used for running programs or instructions to realize the processes of the embodiment of the electronic signature method, and can achieve the same technical effects, so that repetition is avoided, and the description is omitted here.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, chip systems, or system-on-chip chips, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.

Claims (10)

1. An electronic signature method, the method comprising:
acquiring first position information of a first user, wherein the first user comprises one of at least one second user editing a target document;
responding to the save operation of the first user on the target document, and determining a first time corresponding to the save operation;
when the number of the second users is greater than 1, a first position stamp corresponding to the first user is obtained according to the number of users of the target document, the number of users who perform a saving operation on the target document, a first hash value corresponding to the first position information, a preset constant and a random number, and the first position stamp is determined to be a target position stamp;
when the number of the first users is equal to 1, performing first encryption processing on the first time and the first position information based on a preset encryption algorithm to obtain a target position stamp corresponding to the target document;
and associating the target position stamp with the target document to obtain a target signature document.
2. The method according to claim 1, wherein when the number of the second users is greater than 1, obtaining the first location stamp corresponding to the first user according to the number of users of the target document, the number of users who have performed a save operation on the target document, the first hash value corresponding to the first location information, a predetermined constant, and a random number, includes:
the first location stamp is obtained according to the following formula:
s=(r-d)+k*e mod n;
wherein s is a first position stamp corresponding to the first user, r is the number of users editing the target document, d is the number of users executing a saving operation on the target document, e is a first hash value corresponding to the first position information, k is a predetermined constant, and n is a random number.
3. The method of claim 1, wherein the predetermined encryption algorithm comprises at least one of a symmetric encryption algorithm, an asymmetric encryption algorithm.
4. The method of claim 1, wherein prior to said associating the target location stamp with the target document to obtain a target signature document, the method further comprises:
determining a second hash value corresponding to the target document;
performing second encryption processing on the second hash value to obtain a second signature corresponding to the target document;
the second signature is associated with the target document.
5. The method of claim 1, wherein prior to said associating the target location stamp with the target document to obtain a target signature document, the method further comprises:
sending a request to a time service center, and acquiring a time stamp and a time stamp certificate corresponding to the target document;
and respectively associating the timestamp and the timestamp certificate with the target document.
6. The method of claim 1, wherein prior to said first encrypting said first time and said first location information to obtain a target location stamp corresponding to said target document, said method further comprises:
when the number of the second users is greater than 1, sorting a plurality of second times and a plurality of second position information corresponding to a plurality of second users to obtain target position labels;
and sending the target position label to a receiver of the target document, wherein the target position label is used for verifying the target position stamp.
7. The method of claim 6, wherein the sorting the plurality of second times and the plurality of second location information corresponding to the plurality of second users to obtain the target location tag includes:
determining second editing information of each second user on the target document, wherein the second editing information comprises at least one of editing content length, importance of editing content and editing duration;
and sorting a plurality of second times and a plurality of second position information corresponding to a plurality of second users according to the second editing information of each second user to obtain a target position label.
8. An electronic signature device, the device comprising:
an acquisition module for acquiring first location information of a first user, wherein the first user comprises one of at least one second user who is editing a target document;
the determining module is used for responding to the storage operation of the first user on the target document and determining the first time corresponding to the storage operation;
the encryption module is used for obtaining a first position stamp corresponding to the first user according to the number of users of the target document, the number of users performing a saving operation on the target document, a first hash value corresponding to the first position information, a preset constant and a random number when the number of the second users is larger than 1, and determining the first position stamp as a target position stamp;
when the number of the first users is equal to 1, performing first encryption processing on the first time and the first position information based on a preset encryption algorithm to obtain a target position stamp corresponding to the target document;
and the signature module is used for associating the target position stamp with the target document to obtain the target signature document.
9. An electronic device, comprising: memory, a processor and a computer program stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the electronic signature method as claimed in any one of claims 1 to 7.
10. A storage medium, comprising: the storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the electronic signature method as claimed in any one of claims 1 to 7.
CN202210458468.XA 2022-04-28 2022-04-28 Electronic signature method, electronic signature device, electronic equipment and storage medium Active CN114978527B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210458468.XA CN114978527B (en) 2022-04-28 2022-04-28 Electronic signature method, electronic signature device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210458468.XA CN114978527B (en) 2022-04-28 2022-04-28 Electronic signature method, electronic signature device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114978527A CN114978527A (en) 2022-08-30
CN114978527B true CN114978527B (en) 2023-09-19

Family

ID=82979206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210458468.XA Active CN114978527B (en) 2022-04-28 2022-04-28 Electronic signature method, electronic signature device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114978527B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116090027A (en) * 2023-04-07 2023-05-09 深圳奥联信息安全技术有限公司 Electronic document signature protection method and system

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7607018B2 (en) * 2001-05-08 2009-10-20 Ip.Com, Inc. Method and apparatus for collecting electronic signatures
JP2012034329A (en) * 2010-04-16 2012-02-16 Mekiki:Kk Digital data content certification system
WO2012049592A3 (en) * 2010-10-10 2012-06-14 Vpsign, Ltd. Electronic signature apparatus and method
US9026147B2 (en) * 2012-09-24 2015-05-05 Physio-Control, Inc. Defibrillator location tracking device
US9100419B2 (en) * 2011-02-23 2015-08-04 Seiko Instruments Inc. Long-term signature terminal, long-term signature server, long-term signature terminal program, and long-term signature server program
CN110659569A (en) * 2019-08-16 2020-01-07 平安科技(深圳)有限公司 Electronic signature method, device, storage medium and electronic equipment
CN111291392A (en) * 2020-01-22 2020-06-16 京东数字科技控股有限公司 Electronic signature method and device, electronic equipment and storage medium
CN112580111A (en) * 2020-12-28 2021-03-30 杭州天谷信息科技有限公司 Electronic signature method and system with signing time
WO2021208526A1 (en) * 2020-04-17 2021-10-21 福建福昕软件开发股份有限公司 Enterprise user-based method and system for simplified pdf document electronic signature
CN113890738A (en) * 2020-07-03 2022-01-04 中移互联网有限公司 Electronic signature method and device
CN114021531A (en) * 2021-11-18 2022-02-08 北京索为系统技术股份有限公司 Document collaborative editing method and device, electronic equipment and storage medium
CN114338035A (en) * 2021-12-15 2022-04-12 南京壹证通信息科技有限公司 Mobile terminal PDF electronic signature method and system based on key collaborative signature

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012150980A1 (en) * 2011-05-05 2012-11-08 Vsig.Com, Inc. Systems and methods for electronic document identification and certification
US20160337806A1 (en) * 2015-05-14 2016-11-17 Ronald C. Schurr Method of Location Based Electronic Document Signature Tracking by Executing Computer-Executable Instructions Stored On a Non-Transitory Computer-Readable Medium
US20180019987A1 (en) * 2016-07-17 2018-01-18 Synergex Group System and method for creating an electronic signature containing a captured signature, date and time, physical location address, and unique identifier.

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7607018B2 (en) * 2001-05-08 2009-10-20 Ip.Com, Inc. Method and apparatus for collecting electronic signatures
JP2012034329A (en) * 2010-04-16 2012-02-16 Mekiki:Kk Digital data content certification system
WO2012049592A3 (en) * 2010-10-10 2012-06-14 Vpsign, Ltd. Electronic signature apparatus and method
US9100419B2 (en) * 2011-02-23 2015-08-04 Seiko Instruments Inc. Long-term signature terminal, long-term signature server, long-term signature terminal program, and long-term signature server program
US9026147B2 (en) * 2012-09-24 2015-05-05 Physio-Control, Inc. Defibrillator location tracking device
CN110659569A (en) * 2019-08-16 2020-01-07 平安科技(深圳)有限公司 Electronic signature method, device, storage medium and electronic equipment
CN111291392A (en) * 2020-01-22 2020-06-16 京东数字科技控股有限公司 Electronic signature method and device, electronic equipment and storage medium
WO2021208526A1 (en) * 2020-04-17 2021-10-21 福建福昕软件开发股份有限公司 Enterprise user-based method and system for simplified pdf document electronic signature
CN113890738A (en) * 2020-07-03 2022-01-04 中移互联网有限公司 Electronic signature method and device
CN112580111A (en) * 2020-12-28 2021-03-30 杭州天谷信息科技有限公司 Electronic signature method and system with signing time
CN114021531A (en) * 2021-11-18 2022-02-08 北京索为系统技术股份有限公司 Document collaborative editing method and device, electronic equipment and storage medium
CN114338035A (en) * 2021-12-15 2022-04-12 南京壹证通信息科技有限公司 Mobile terminal PDF electronic signature method and system based on key collaborative signature

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
Ameen Bin Obadi ect..A Survey on Vital Signs Detection Using Radar Techniques and Processing With FPGA Implementation.《 IEEE Circuits and Systems Magazine 》.2021,全文. *
Guofu Ma ect..Recovery of Evidence and the Judicial Identification of Electronic Data Based on ExFAT.《2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery》.2015,全文. *
仇王城 ; 王国俭 ; 刘 ; .电子签名在建筑设计的应用探索.土木建筑工程信息技术.2013,(第02期),全文. *
张瑞娟 ; .数字签名技术在网络安全中的应用研究.科技广场.2010,(06),全文. *
蔡盈芳 ; .电子档案管理应用区块链价值分析.中国档案.2020,(第08期),全文. *

Also Published As

Publication number Publication date
CN114978527A (en) 2022-08-30

Similar Documents

Publication Publication Date Title
US11323272B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US11757641B2 (en) Decentralized data authentication
US20230300119A1 (en) Method, computer program product and apparatus for encrypting and decrypting data using multiple authority keys
US20200342129A1 (en) Preventing digital forgery
CN102017512B (en) Location information verification
US20240187420A1 (en) Securing browser cookies
US20240146739A1 (en) Preventing data manipulation and protecting user privacy in determining accurate location event measurements
CN114978527B (en) Electronic signature method, electronic signature device, electronic equipment and storage medium
Aulya et al. An authenticated passengers based on dynamic QR Code for Bandung Smart Transportation Systems
US9537842B2 (en) Secondary communications channel facilitating document security
KR102562178B1 (en) Prevention of data manipulation of communication network measurements and protection of user privacy
USRE49968E1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN113742671A (en) Online collaborative information processing method, system, electronic device and storage medium
Zefferer A Sustainable Architecture for Secure and Usable Mobile Signature Solutions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant