CN116112178A - Verification identifier generation method, system, electronic device and storage medium - Google Patents

Verification identifier generation method, system, electronic device and storage medium Download PDF

Info

Publication number
CN116112178A
CN116112178A CN202310020327.4A CN202310020327A CN116112178A CN 116112178 A CN116112178 A CN 116112178A CN 202310020327 A CN202310020327 A CN 202310020327A CN 116112178 A CN116112178 A CN 116112178A
Authority
CN
China
Prior art keywords
digital signature
client
server
signature
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310020327.4A
Other languages
Chinese (zh)
Inventor
贺鑫
杨超宇
李佩伦
周细祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Boya Zhongke Beijing Information Technology Co ltd
Original Assignee
Boya Zhongke Beijing Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Boya Zhongke Beijing Information Technology Co ltd filed Critical Boya Zhongke Beijing Information Technology Co ltd
Priority to CN202310020327.4A priority Critical patent/CN116112178A/en
Publication of CN116112178A publication Critical patent/CN116112178A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to the technical field of data security, and discloses a verification identifier generation method, a device, electronic equipment and a storage medium, wherein the method comprises the following steps: the method comprises the steps that a server generates a first digital signature under the condition that authentication of a client passes, the client is instructed to generate a second digital signature according to the first digital signature, and the second digital signature is acquired; generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature and client information of the client; and generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information. Under the condition of verifying the identity of the client, the server and the client cooperate with the signature to generate a verification identifier, and the verification identifier can effectively improve the authenticity, the integrity and the non-repudiation of the electronic certificate and reduce the probability of tampering and illegal use of the electronic certificate.

Description

Verification identifier generation method, system, electronic device and storage medium
Technical Field
The application relates to the technical field of data security, in particular to a verification identifier generation method, a verification identifier generation system, electronic equipment and a storage medium.
Background
With the continuous development of internet technology, in order to solve the problems of inconvenient carrying, easy loss and the like, the physical paper certificates are gradually converted into electronic forms, and as an example, the common electronic certificate implementation modes mainly include the following three types:
first, unsigned electronic certificate: the electronic certificate without signature converts the electronic certificate information into electronic image information, and the electronic image information is displayed on the mobile intelligent terminal, for example: pictures, layout files, but risks of malicious modification, photographing use, and copy impossibility.
Second, an authoritative electronic certificate signed: the authoritative electronic certificate is characterized in that the authoritative digital signature is carried out on the electronic certificate information by the electronic certificate server, the authenticity, the integrity and the undeniability of the electronic certificate can be protected by the electronic document format with a fixed page presentation effect, but the risk of impersonation of the user identity exists, and the user identity cannot be effectively identified.
Third, electronic certificates based on cryptographic hardware: electronic certificates based on password hardware use password technology to secure electronic certificate information at a client, and the current implementation mode is mainly SIMKey. The SIMKey is used as a special SIM card, and when in use, the cryptographic operation is carried out through a secret key in the card, so that the SIMKey mode needs to use a special hardware medium, and the cost is high.
In summary, the existing electronic certificates have the problems that the user identity is fraudulent, the user identity cannot be effectively identified, the cost is high, and the like.
Disclosure of Invention
The embodiment of the application provides a verification identifier generation method, which aims to solve the problems that in the prior art, an electronic certificate has the fraudulent use of a user identity, the user identity cannot be effectively identified, the cost is high and the like.
Correspondingly, the embodiment of the application also provides a verification identifier generation system, electronic equipment and a storage medium, which are used for guaranteeing the implementation and application of the method.
In order to solve the above problems, an embodiment of the present application discloses a method for generating a verification identifier, which is applied to a server, and the method includes:
generating a first digital signature under the condition that the identity of the client passes the authentication, indicating the client to generate a second digital signature according to the first digital signature and acquiring the second digital signature;
generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature and client information of the client;
and generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information.
The embodiment of the application also discloses a verification identifier generation method which is applied to the client, and the method comprises the following steps:
sending a verification identification generation request to a server; the verification identification generation request instructs the server to generate a first digital signature;
generating a second digital signature and sending the second digital signature to the server;
receiving a verification identifier generated by the server according to the second digital signature;
the verification mark is generated by the server according to a third digital signature, an electronic signature and the client information, and the third digital signature is generated by the server according to the second digital signature; the electronic signature is generated by the server according to the third digital signature and the client information.
The embodiment of the application also discloses a verification identifier generation system, which comprises a server and a client;
the client sends a verification identifier generation request to the server to acquire a verification identifier;
the server generates a first digital signature under the condition that the identity verification of the client passes, instructs the client to generate a second digital signature according to the first digital signature and acquires the second digital signature;
Generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature and client information of the client;
and generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information.
The embodiment of the application also discloses an electronic device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the method of the first aspect of the application.
Embodiments of the present application also disclose a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method as described in one or more of the embodiments of the present application.
The beneficial effects that technical scheme that this application embodiment provided brought are:
in the embodiment of the application, a server generates a first digital signature under the condition that the authentication of a client passes, instructs the client to generate a second digital signature according to the first digital signature and acquires the second digital signature; generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature of the client and the client information; and generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information. Under the condition of verifying the identity of the client, the server and the client cooperate with the signature to generate a verification identifier, and the verification identifier can effectively improve the authenticity, the integrity and the non-repudiation of the electronic certificate and reduce the probability of tampering and illegal use of the electronic certificate.
Additional aspects and advantages of embodiments of the application will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
fig. 1 is a flowchart of a server-side verification identifier generation method provided in an embodiment of the present application;
FIG. 2 is a schematic diagram of an electronic certificate according to an embodiment of the present application;
FIG. 3 is a schematic diagram of electronic certificate generation according to an embodiment of the present application;
fig. 4 is a flowchart of a client verification identifier generating method provided in an embodiment of the present application;
fig. 5 is a schematic structural diagram of a verification identifier generating system provided in an embodiment of the present application;
fig. 6 is a schematic diagram of a server-side verification identifier generating device provided in an embodiment of the present application;
fig. 7 is a schematic diagram of a client verification identifier generating device provided in an embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are exemplary only for the purpose of illustrating the present application and are not to be construed as limiting the present application.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. The term "and/or" as used herein includes all or any element and all combination of one or more of the associated listed items.
It will be understood by those skilled in the art that all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs unless defined otherwise. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The scheme provided by the embodiment of the application can be executed by any electronic device, such as a terminal device or a server, wherein the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server for providing cloud computing service. The terminal may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, etc. The terminal and the server may be directly or indirectly connected through wired or wireless communication, which is not limited herein. For the technical problems in the prior art, the verification identifier generation method, the verification identifier generation system, the electronic equipment and the storage medium provided by the application aim to solve at least one of the technical problems in the prior art.
The following describes the technical solution of the present application and how the technical solution of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
The embodiment of the present application provides a possible implementation manner, as shown in fig. 1, a flowchart of a method for generating a verification identifier is provided, where the method may be executed by any electronic device, optionally, may be executed at a server side or a terminal device, and for convenience of description, the method provided in the embodiment of the present application is described below with the server as an execution body.
In the prior art, the scheme for realizing the electronic certificate mainly comprises the following three types:
the first is an unsigned electronic document, which may also be referred to as a static electronic document. And the static electronic certificate fills the electronic certificate information into the static picture and the format file style according to the fixed format, generates the static electronic certificate and displays the static electronic certificate on the mobile intelligent terminal.
The second is an authoritative signed electronic certificate. The authoritative electronic certificate carries out digital signature operation on the electronic certificate information through the server, and the authoritative digital signature is covered on the electronic certificate, so that the electronic certificate has legal effect.
The third is an electronic certificate based on cryptographic hardware. The implementation mode of the electronic certificate based on the password hardware is mainly SIMKey, the SIMKey is used as a key information carrier, no additional software is required to be installed by a user, a safe area is specially opened up in the SIM card by the SIMKey mode depending on a special SIM card hardware medium, and the electronic certificate is generated by digitally signing the electronic certificate data by using a key in the SIM card.
The above three schemes can realize electronic certificates, but all have some problems, in particular:
the static electronic certificate is not encrypted and protected by using a cryptographic technology and is easy to modify; the integrity and non-repudiation protection are not carried out by using a digital signature technology, and risks of malicious modification, photographing use and copy impossibility exist; the method is applicable to manual verification, but does not have the machine-readable anti-counterfeiting capability.
The electronic certificate with the signature, namely the electronic certificate with the authoritative signature, has limited capability of confirming the identity of the user, can be protected only by means of passwords and the like, can be suitable for the electronic certificate only by acquiring the passwords, and has lower safety protection degree.
Electronic certificates based on password hardware depend on special hardware media, special SIM cards and mobile intelligent terminals are required to be used for supporting, users are required to pay for purchasing additionally, and the use cost is high.
In order to solve the above technical problem, the present application provides a method for generating a verification identifier, as shown in fig. 1, the method may include the following steps:
step 101, under the condition that the identity of the client passes, a first digital signature is generated, the client is instructed to generate a second digital signature according to the first digital signature, and the second digital signature is acquired.
The embodiment can be applied to the generation of electronic certificates, including but not limited to electronic identity cards, electronic medical insurance cards and the like. The client information may include basic information and image information of the certificate, among others. The basic information may include, but is not limited to, name, gender, phone number, identification card number, document status, document identification, document type, issuing authority, expiration date, etc. The image information may be, for example, an avatar.
Wherein the server may generate a first digital signature and then send the first digital signature to the client. The client can calculate the first digital signature according to a preset client collaborative signature key, and then generate a second digital signature.
Wherein the server generates a first digital signature comprising:
and generating a random number, and generating a first digital signature according to the random number and a preset signature algorithm.
In addition, the server may perform hash computation on the client information, generate a hash value, and send the hash value to the client. After receiving the first digital signature and the hash value, the client may calculate the first digital signature and the hash value to generate a second digital signature.
Step 102, generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature and the client information of the client.
Specifically, the server is preset with a server-side collaborative signature private key, and the server-side collaborative signature private key can be used for calculating the second digital signature so as to generate a third digital signature.
The first digital signature is calculated by the server, the second digital signature is calculated by the client according to the first digital signature, and the server and the client both participate in the 5-process of the digital signature, so that the identity of the client can be authenticated according to the third digital signature generated by the second digital signature, the client binds the behavior of the client, and the reliability of the third digital signature is ensured.
The server may calculate the third digital signature and the client information based on the preset signing key to generate an electronic signature, the electronic signature being issued on behalf of the electronic certificate by an authority to verify the authenticity of the electronic certificate.
Step 0, 103, according to the third digital signature, the electronic signature and the client side information
And generating a verification identification of the client.
The client information can be certificate identification, such as an identity card number, a social security card account number and the like.
The server-generated authentication identifier includes a third digital signature, an electronic signature and client information,
the authenticity of the client identity, the authenticity of the electronic certificate, and the authenticity of the 5 pieces of information can be determined by the verification identity. And meanwhile, the client information can be searched according to the verification identification.
After the server generates the verification identifier of the client, the verification identifier can be sent to the client, and meanwhile, the client information can also be sent to the client. After receiving the client information and the verification identifier, the client information and the verification identifier can be displayed to generate an electronic certificate.
As a first example, as shown in fig. 2, the generated electronic certificate may include an electronic certificate basic 0 information field 201, an electronic certificate image information field 202, and an electronic certificate two-dimensional code field 203. In particular, the method comprises the steps of,
generating an electronic certificate using a display function, such as d=display (b|m||q), wherein D is the electronic certificate; b is the information of the basic information domain of the electronic certificate; m is information of an image information domain of the electronic certificate; q is information of two-dimension code domain of electronic certificate.
The process of generating the electronic identifier is shown in fig. 3, and includes: step 301, a client initiates an electronic certificate generation request, and verifies the identity of a user based on the identity authentication operation of the collaborative signature.
In step 302, the server and the client perform digital signature operation on the information B of the basic information domain of the electronic certificate and the information M of the image information domain of the electronic certificate, and the server calculates a complete digital signature S (i.e. a third digital signature) according to the digital signatures (i.e. the first digital signature and the second digital signature) of the client and the server.
In step 303, the server uses the preset signing key of the server to perform digital signature operation on the information B of the basic information domain of the electronic certificate, the information M of the image information domain of the electronic certificate and the complete digital signature S, so as to generate a server authority digital signature Sa (i.e. electronic signature).
The server returns the relevant data to the client, step 304, the electronic certificate client assembles the data and presents it, generating an electronic certificate d= display (b||m||q). The related data returned by the server comprises information B of the basic information domain of the electronic certificate, information M of the image information domain of the electronic certificate and information Q of the two-dimensional code domain of the electronic certificate, and the information Q of the two-dimensional code domain of the electronic certificate is generated according to the complete digital signature S, the information B of the basic information domain of the electronic certificate and the authoritative digital signature Sa.
As shown in fig. 2, the client may present the basic information in the client information in the electronic certificate basic information field B, for example, name: plums remote; gender: a male; cell phone number: 156 x 0001 x; identification card number: 11 and 01; certificate status: normal; certificate number: XXXX00000001; certificate type: XXX certificate; issuing authorities: a XXX mechanism; expiration date: 2022, 12 and 31.
Optionally, the basic information in the client information may be processed by a sequence function to obtain information B of the electronic certificate basic information domain, for example, b=sequence (b1|b2|b3|b4|b5|b6|b7|b8|b9), where B1 is a name, B2 is a gender, B3 is a mobile phone number, B4 is an identity card number, B5 is a certificate status, B6 is a certificate number, B7 is a certificate type, B8 is an issuing authority, and B9 is a validity period.
The client may present the image information in the client information in an electronic certificate image information field.
Optionally, the image information in the client information may be processed by a sequence function to obtain information M of an image information domain of the electronic certificate, for example, m=sequence (M1), where M1 is an electronic certificate picture, such as a head portrait or the like.
The client can display the verification identification in the two-dimensional code domain Q of the electronic certificate. The authenticity of the electronic certificate can be verified by the verification mark, and the certificate information of the user, such as basic information, image information, and the like, can be read by the verification mark.
Optionally, the verification identifier may be processed by a base64 function to obtain information Q of the two-dimensional code domain of the electronic certificate, for example, q=base 64 (s|b6||sa), where S is a third digital signature; b6 is the certificate number, namely the client information; sa is an electronic signature. The electronic verification identifier can be coded and converted into a two-dimensional code form shown in fig. 2 through a base64 function.
In the embodiment of the application, a server generates a first digital signature under the condition that the authentication of a client passes, instructs the client to generate a second digital signature according to the first digital signature and acquires the second digital signature; generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature of the client and the client information; and generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information. Under the condition of verifying the identity of the client, the server and the client cooperate with the signature to generate a verification identifier, and the verification identifier can effectively improve the authenticity, the integrity and the non-repudiation of the electronic certificate and reduce the probability of tampering and illegal use of the electronic certificate.
In an alternative embodiment, the method further comprises, before generating the first digital signature in case the client authentication passes:
and receiving a verification identification generation request of the client, and verifying the identity of the client.
Taking the generation of the electronic certificate as an example, when a user applies for the electronic certificate, the user can send a verification identifier generation request to the server through the client, and the server can verify the identity of the client after receiving the verification identifier generation request. The server may determine the identity of the user based on the co-signed authentication operation and if the verification passes, determine that the authentication of the client passes.
In an alternative embodiment, the instructing the client to generate a second digital signature from the first digital signature and obtain the second digital signature includes:
sending a second digital signature request to the client; the second digital signature request instructs the client to generate a second digital signature according to the first digital signature and acquire the second digital signature.
The server may perform hash computation on the client information while generating the first digital signature according to the client information, generate a hash value, and then send a second digital signature request to the client, where the second digital signature request may include the first digital signature and the hash value. The client may use the client collaborative signing key to calculate the first digital signature and the hash value upon receipt of the second digital signature request to generate the second digital signature.
Generally, when the client information is directly calculated, the calculation efficiency is lower, and the client information is subjected to hash calculation, so that the client information can be compressed into a hash value with a shorter length. The first digital signature and the hash value are calculated by using the client-side collaborative signature key, so that the calculation efficiency can be improved.
In this embodiment, the second digital signature is calculated by the client using the client signing key, and when the client signing key is called, the client may require the client to input a PIN code bound to the client, so as to determine the identity of the client, which is equivalent to binding the client behavior, and may prove the authenticity of the client sending the verification identifier request to the server.
In an alternative embodiment, the generating an electronic signature according to the third digital signature and the client information includes:
and calculating the third digital signature and the client information according to a preset signing key to obtain the electronic signature.
The server stores a preset signing key in advance, after the third digital signature is obtained through calculation, the server can calculate the third digital signature and the client through the preset signing key, and then an electronic signature is obtained, wherein the electronic signature is obtained through calculation according to the third digital signature, and the third digital signature is obtained through collaborative signature of the server and the client, so that the authenticity of the identity of the client can be ensured through the finally obtained electronic signature. The electronic signature is issued by a representative authority, and in the use process of the electronic certificate, the authenticity of the electronic certificate can be verified according to the verification mark generated by the electronic signature.
In the embodiment of the application, a server generates a first digital signature under the condition that the authentication of a client passes, instructs the client to generate a second digital signature according to the first digital signature and acquires the second digital signature; generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature and client information of the client; and generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information. Under the condition of verifying the identity of the client, the server and the client cooperate with the signature to generate a verification identifier, and the verification identifier can effectively improve the authenticity, the integrity and the non-repudiation of the electronic certificate and reduce the probability of tampering and illegal use of the electronic certificate.
The embodiment of the application also provides a verification identifier generation method, which is applied to the client, as shown in fig. 4, and comprises the following steps:
step 401, sending a verification identifier generation request to a server; the authentication identification generation request instructs the server to generate a first digital signature.
After receiving the verification identifier generation request, the server firstly verifies the identity of the client, and generates a first digital signature under the condition that the identity of the client passes the verification.
The embodiment can be applied to the generation of electronic certificates, including but not limited to electronic identity cards, electronic medical insurance cards and the like. The client information may include basic information and image information of the certificate, among others. The basic information may include, but is not limited to, name, gender, phone number, identification card number, document status, document identification, document type, issuing authority, expiration date, etc. The image information may be, for example, an avatar.
Wherein the server generates a first digital signature comprising:
and generating a random number, and generating a first digital signature according to the random number and a preset signature algorithm.
Step 402, generating a second digital signature and sending the second digital signature to the server.
After the server generates the first digital signature, a second digital signature request can be sent to the client, the second digital signature request comprises the first digital signature, and after the client receives the second digital signature request, the second digital signature can be generated according to the first digital signature.
The server may also perform hash computation on the client information, generate a hash value, and send the hash value to the client. After receiving the first digital signature and the hash value, the client may calculate the first digital signature and the hash value to generate a second digital signature.
And step 403, receiving a verification identifier generated by the server according to the second digital signature.
The verification mark is generated by the server according to a third digital signature, an electronic signature and the client information, and the third digital signature is generated by the server according to the second digital signature; the electronic signature is generated by the server according to the third digital signature and the client information.
The first digital signature is calculated by the server, the second digital signature is calculated by the client according to the first digital signature, and the server and the client both participate in the digital signature process, so that the identity of the client can be authenticated according to the third digital signature generated by the second digital signature, the client binds the behavior of the client, and the reliability of the third digital signature is ensured.
The server may calculate the third digital signature and the client information based on the preset signing key to generate an electronic signature, the electronic signature being issued on behalf of the electronic certificate by an authority to verify the authenticity of the electronic certificate.
The client information can be certificate identification, such as an identity card number, a social security card account number and the like. 5 the verification identifier generated by the server comprises a third digital signature, an electronic signature and client information,
The authenticity of the client identity, the authenticity of the electronic certificate, and the authenticity of the certificate information may be determined by the verification identity. And meanwhile, the client information can be searched according to the verification identification.
After receiving the client information and the verification identifier, the client information and the verification identifier can be displayed to generate an electronic certificate.
0 as a first example, as shown in fig. 2, the generated electronic certificate may include an electronic certificate basic information field, an electronic certificate image information field, and an electronic certificate two-dimensional code field. In particular, electronic certificates are generated using display functions, if D=display% B M Q), wherein D is an electronic certificate; b is the information of the basic information domain of the electronic certificate; m is information of an image information domain of the electronic certificate; q is information of two-dimension code domain of electronic certificate.
5 the process of generating the electronic identifier is shown in fig. 3, and includes:
in step 301, a client initiates an electronic certificate generation request, and verifies a user identity based on a co-signed identity authentication operation.
Step 302, the server and the client perform digital signature operation on the information B of the basic information domain of the electronic certificate and the information M of the image information domain of the electronic certificate, and the server calculates the complete digital signature S (i.e. according to the client and the server 0 part digital signatures (i.e. the first digital signature and the second digital signature)
Third digital signature).
In step 303, the server uses the preset signing key of the server to perform digital signature operation on the information B of the basic information domain of the electronic certificate, the information M of the image information domain of the electronic certificate and the complete digital signature S, so as to generate a server authority digital signature Sa (i.e. electronic signature).
Step 5, step 304, the server returns the related data to the client, and the electronic certificate client assembles the data
And it is shown that the display device, generating an electronic certificate d= display (B|) M Q. The related data returned by the server comprises information B of the basic information domain of the electronic certificate, information M of the image information domain of the electronic certificate and information Q of the two-dimensional code domain of the electronic certificate, and the information Q of the two-dimensional code domain of the electronic certificate is generated according to the complete digital signature S, the information B of the basic information domain of the electronic certificate and the authoritative digital signature Sa.
As shown in fig. 2, the client may present the basic information in the client information in the electronic certificate basic information field B, for example, name: plums remote; gender: a male; cell phone number: 156 x 0001 x; identification card number: 11 and 01; certificate status: normal; certificate number: XXXX00000001; certificate type: XXX certificate; issuing authorities: a XXX mechanism; expiration date: 2022, 12 and 31.
Optionally, the basic information in the client information may be processed by a sequence function to obtain information B of the electronic certificate basic information domain, for example, b=sequence (b1|b2|b3|b4|b5|b6|b7|b8|b9), where B1 is a name, B2 is a gender, B3 is a mobile phone number, B4 is an identity card number, B5 is a certificate status, B6 is a certificate number, B7 is a certificate type, B8 is an issuing authority, and B9 is a validity period.
The client may present the image information in the client information in an electronic certificate image information field.
Optionally, the image information in the client information may be processed by a sequence function to obtain information M of an image information domain of the electronic certificate, for example, m=sequence (M1), where M1 is an electronic certificate picture, such as a head portrait or the like.
The client can display the verification identification in the two-dimensional code domain Q of the electronic certificate. The authenticity of the electronic certificate can be verified by the verification mark, and the certificate information of the user, such as basic information, image information, and the like, can be read by the verification mark.
Optionally, the verification identifier may be processed by a base64 function to obtain information Q of the two-dimensional code domain of the electronic certificate, for example, q=base 64 (s|b6||sa), where S is a third digital signature; b6 is the certificate number, namely the client information; sa is an electronic signature. The electronic verification identifier can be coded and converted into a two-dimensional code form shown in fig. 2 through a base64 function.
In the embodiment of the application, a server generates a first digital signature under the condition that the authentication of a client passes, instructs the client to generate a second digital signature according to the first digital signature and acquires the second digital signature; generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature and client information of the client; and generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information. Under the condition of verifying the identity of the client, the server and the client cooperate with the signature to generate a verification identifier, and the verification identifier can effectively improve the authenticity, the integrity and the non-repudiation of the electronic certificate and reduce the probability of tampering and illegal use of the electronic certificate.
In an alternative embodiment, the generating the second digital signature includes:
acquiring the first digital signature and the hash value; the hash value is generated by the server through hash calculation on the client information;
the second digital signature is generated from the first digital signature and the hash value.
Generally, when the client information is directly calculated, the calculation efficiency is lower, and the client information is subjected to hash calculation, so that the client information can be compressed into a hash value with a shorter length. The first digital signature and the hash value are calculated by using the client-side collaborative signature key, so that the calculation efficiency can be improved.
In an alternative embodiment, before the authentication identifier generation request is sent to the server, the client may verify the identity of the user by inputting a PIN password or using fingerprint identification and face identification data bound to the PIN password, that is, the client establishes a binding relationship with the user. And under the condition that the client verifies that the identity of the user passes, the user can send a verification identification generation request to the server through the client. When receiving the verification identification generation request, the server firstly verifies the identity of the client, and if the identity verification of the client passes, the identity verification of the user bound with the client is proved to pass. Thus greatly avoiding the risk of electronic certificates being stolen and faked.
Based on the same principle as the method provided by the embodiment of the present application, the embodiment of the present application further provides a verification identifier generating system, as shown in fig. 5, where the system includes a server 501 and a client 502;
the client sends a verification identifier generation request to the server to acquire a verification identifier;
the server generates a first digital signature under the condition that the identity verification of the client passes, instructs the client to generate a second digital signature according to the first digital signature and acquires the second digital signature;
The embodiment can be applied to the generation of electronic certificates, including but not limited to electronic identity cards, electronic medical insurance cards and the like. The client information may include basic information and image information of the certificate, among others. The basic information may include, but is not limited to, name, gender, phone number, identification card number, document status, document identification, document type, issuing authority, expiration date, etc. The image information may be, for example, an avatar.
The server may generate a random number, and generate a first digital signature according to the random number and a preset signature algorithm. The server may also instruct the client to calculate the client information according to the preset client collaborative signing key, thereby generating a second digital signature.
And generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature and client information of the client.
The first digital signature is calculated by the server, the second digital signature is calculated by the client according to the first digital signature, and the server and the client both participate in the digital signature process, so that the identity of the client can be authenticated according to the third digital signature generated by the second digital signature, the client binds the behavior of the client, and the reliability of the third digital signature is ensured.
The server may calculate the third digital signature and the client information based on the preset signing key to generate an electronic signature, the electronic signature being issued on behalf of the electronic certificate by an authority to verify the authenticity of the electronic certificate.
And generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information.
The client information can be certificate identification, such as an identity card number, a social security card account number and the like. The verification identifier generated by the server comprises a third digital signature, an electronic signature and client information, and the authenticity of the client identity, the authenticity of the electronic certificate and the authenticity of the certificate information can be determined through the verification identifier. And meanwhile, the client information can be searched according to the verification identification.
After the server generates the verification identifier of the client, the verification identifier can be sent to the client, and meanwhile, the client information can also be sent to the client. After receiving the client information and the verification identifier, the client information and the verification identifier can be displayed to generate an electronic certificate.
As a first example, as shown in fig. 2, the generated electronic certificate may include an electronic certificate basic information field, an electronic certificate image information field, and an electronic certificate two-dimensional code field. In particular, electronic certificates are generated using display functions, if D=display% B M Q), wherein D is an electronic certificate; b is the information of the basic information domain of the electronic certificate; m is information of an image information domain of the electronic certificate; q is information of two-dimension code domain of electronic certificate.
The process of generating the electronic identifier is shown in fig. 3, and includes:
in step 301, a client initiates an electronic certificate generation request, and verifies a user identity based on a co-signed identity authentication operation.
In step 302, the server and the client perform digital signature operation on the information B of the basic information domain of the electronic certificate and the information M of the image information domain of the electronic certificate, and the server calculates a complete digital signature S (i.e. a third digital signature) according to the digital signatures (i.e. the first digital signature and the second digital signature) of the client and the server.
In step 303, the server uses the preset signing key of the server to perform digital signature operation on the information B of the basic information domain of the electronic certificate, the information M of the image information domain of the electronic certificate and the complete digital signature S, so as to generate a server authority digital signature Sa (i.e. electronic signature).
The server returns the relevant data to the client, step 304, the electronic certificate client assembles the data and presents it, generating an electronic certificate d= display (b||m||q). The related data returned by the server comprises information B of the basic information domain of the electronic certificate, information M of the image information domain of the electronic certificate and information Q of the two-dimensional code domain of the electronic certificate, and the information Q of the two-dimensional code domain of the electronic certificate is generated according to the complete digital signature S, the information B of the basic information domain of the electronic certificate and the authoritative digital signature Sa.
As shown in fig. 2, the client may present the basic information in the client information in the electronic certificate basic information field B, for example, name: plums remote; gender: a male; cell phone number: 156 x 0001 x; identification card number: 11 and 01; certificate status: normal; certificate number: XXXX00000001; certificate type: XXX certificate; issuing authorities: a XXX mechanism; expiration date: 2022, 12 and 31.
Optionally, the basic information in the client information may be processed by a sequence function to obtain information B of the electronic certificate basic information domain, for example, b=sequence (b1|b2|b3|b4|b5|b6|b7|b8|b9), where B1 is a name, B2 is a gender, B3 is a mobile phone number, B4 is an identity card number, B5 is a certificate status, B6 is a certificate number, B7 is a certificate type, B8 is an issuing authority, and B9 is a validity period.
The client may present the image information in the client information in an electronic certificate image information field.
Optionally, the image information in the client information may be processed by a sequence function to obtain information M of an image information domain of the electronic certificate, for example, m=sequence (M1), where M1 is an electronic certificate picture, such as a head portrait or the like.
The client can display the verification identification in the two-dimensional code domain Q of the electronic certificate. The authenticity of the electronic certificate can be verified by the verification mark, and the certificate information of the user, such as basic information, image information, and the like, can be read by the verification mark.
Optionally, the verification identifier may be processed by a base64 function to obtain information Q of the two-dimensional code domain of the electronic certificate, for example, q=base 64 (s|b6||sa), where S is a third digital signature; b6 is the certificate number, namely the client information; sa is an electronic signature. The electronic verification identifier can be coded and converted into a two-dimensional code form shown in fig. 2 through a base64 function.
The verification identifier generating system provided in the embodiment of the present application can implement each process implemented in the method embodiments of fig. 1 to fig. 4, and in order to avoid repetition, a detailed description is omitted here.
In the embodiment of the application, a server generates a first digital signature under the condition that the authentication of a client passes, instructs the client to generate a second digital signature according to the first digital signature and acquires the second digital signature; generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature and client information of the client; and generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information. Under the condition of verifying the identity of the client, the server and the client cooperate with the signature to generate a verification identifier, and the verification identifier can effectively improve the authenticity, the integrity and the non-repudiation of the electronic certificate and reduce the probability of tampering and illegal use of the electronic certificate.
The verification identifier generating system of the embodiment of the present application may execute the verification identifier generating method provided by the embodiment of the present application, and its implementation principle is similar, and actions executed by each module and unit in the verification identifier generating system of each embodiment of the present application correspond to steps in the verification identifier generating method of each embodiment of the present application, and detailed functional descriptions of each module of the verification identifier generating system may be specifically referred to descriptions in the corresponding verification identifier generating method shown in the foregoing, which are not repeated herein.
Based on the same principle as the method provided by the embodiment of the present application, the embodiment of the present application further provides an apparatus for generating a verification identifier, which is applied to a server, as shown in fig. 6, where the apparatus includes:
the first signature module 601 generates a first digital signature when the identity of the client passes, instructs the client to generate a second digital signature according to the first digital signature, and acquires the second digital signature;
a second signature module 602, configured to generate a third digital signature according to the second digital signature, and generate an electronic signature according to the third digital signature and client information of the client;
And the verification identifier generating module 603 generates a verification identifier of the client according to the third digital signature, the electronic signature and the client information.
In the embodiment of the application, a server generates a first digital signature under the condition that the authentication of a client passes, instructs the client to generate a second digital signature according to the first digital signature and acquires the second digital signature; generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature and client information of the client; and generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information. Under the condition of verifying the identity of the client, the server and the client cooperate with the signature to generate a verification identifier, and the verification identifier can effectively improve the authenticity, the integrity and the non-repudiation of the electronic certificate and reduce the probability of tampering and illegal use of the electronic certificate.
Based on the same principle as the method provided by the embodiment of the present application, the embodiment of the present application further provides an apparatus for generating a verification identifier, which is applied to a client, as shown in fig. 7, where the apparatus includes:
The verification identifier request module 701 sends a verification identifier generation request to the server; the verification identification generation request instructs the server to generate a first digital signature;
a digital signature module 702 that generates a second digital signature and sends the second digital signature to the server;
a verification identifier receiving module 703, configured to receive a verification identifier generated by the server according to the second digital signature;
the verification mark is generated by the server according to a third digital signature, an electronic signature and the client information, and the third digital signature is generated by the server according to the second digital signature; the electronic signature is generated by the server according to the third digital signature and the client information.
In the embodiment of the application, when the authentication of the client passes, the server instructs the client to generate a second digital signature according to the first digital signature and acquire the second digital signature according to the generation of the first digital signature; generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature and client information of the client; and generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information. Under the condition of verifying the identity of the client, the server and the client cooperate with the signature to generate a verification identifier, and the verification identifier can effectively improve the authenticity, the integrity and the non-repudiation of the electronic certificate and reduce the probability of tampering and illegal use of the electronic certificate.
Based on the same principles as the methods shown in the embodiments of the present application, the embodiments of the present application also provide an electronic device that may include, but is not limited to: a processor and a memory; a memory for storing a computer program; and the processor is used for executing the verification identifier generation method shown in any optional embodiment of the application by calling the computer program. Compared with the prior art, in the verification identifier generation method, the server generates the first digital signature under the condition that the identity of the client passes verification, instructs the client to generate the second digital signature according to the first digital signature and acquires the second digital signature; generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature and client information of the client; and generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information. Under the condition of verifying the identity of the client, the server and the client cooperate with the signature to generate a verification identifier, and the verification identifier can effectively improve the authenticity, the integrity and the non-repudiation of the electronic certificate and reduce the probability of tampering and illegal use of the electronic certificate.
In an alternative embodiment, there is also provided an electronic device, as shown in fig. 8, where the electronic device 800 shown in fig. 8 may be a server, including: a processor 801 and a memory 803. The processor 801 is coupled to a memory 803, such as via a bus 802. Optionally, the electronic device 800 may also include a transceiver 804. It should be noted that, in practical applications, the transceiver 804 is not limited to one, and the structure of the electronic device 800 is not limited to the embodiments of the present application.
The processor 801 may be a CPU (central processing unit), general purpose processor, DSP (digital signal processor), ASIC (application specific integrated circuit), FPGA (Field ProgrammableGateArray ) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules, and circuits described in connection with this disclosure. The processor 801 may also be a combination of computing functions, e.g., including one or more microprocessor combinations, a combination of a DSP and a microprocessor, etc.
Bus 802 may include a path to transfer information between the aforementioned components. Bus 802 may be a PCI (peripheral component interconnect) bus or an EISA (extended industrial standard architecture) bus, or the like. Bus 802 may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in fig. 8, but not only one bus or one type of bus.
The memory 803 may be, but is not limited to, ROM (read only memory) or other type of static storage device that can store static information and instructions, RAM (RandomAccess Memory ) or other type of dynamic storage device that can store information and instructions, EEPROM (ElectricallyErasableProgrammableReadOnly Memory ), CD-ROM (CompactDiscReadOnly Memory, compact disc read only memory) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
The memory 803 is used for storing application program codes for executing the present application and is controlled to be executed by the processor 801. The processor 801 is configured to execute application code stored in the memory 803 to implement what is shown in the foregoing method embodiment.
Among them, electronic devices include, but are not limited to: mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and stationary terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 8 is only an example and should not impose any limitation on the functionality and scope of use of the embodiments of the present application.
The server provided by the application can be an independent physical server, can also be a server cluster or a distributed system formed by a plurality of physical servers, and can also be a cloud server for providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, basic cloud computing services such as big data and artificial intelligent platforms. The terminal may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, etc. The terminal and the server may be directly or indirectly connected through wired or wireless communication, which is not limited herein.
The present application provides a computer readable storage medium having a computer program stored thereon, which when run on a computer, causes the computer to perform the corresponding method embodiments described above.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
It should be noted that the computer readable storage medium described in the present application may also be a computer readable signal medium or a combination of a computer readable storage medium and a computer readable storage medium. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, a computer-readable signal medium may include a data signal that propagates in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device.
The computer-readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to perform the methods shown in the above-described embodiments.
According to one aspect of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the verification identification generation method provided in the above-described various alternative implementations.
Computer program code for carrying out operations of the present application may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules involved in the embodiments described in the present application may be implemented by software, or may be implemented by hardware. The name of the module is not limited to the module itself in some cases, and for example, the search intention category determination module may also be described as "a search intention category determination module that determines a search request".
The foregoing description is only of the preferred embodiments of the present application and is presented as a description of the principles of the technology being utilized. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in this application is not limited to the specific combinations of features described above, but it is intended to cover other embodiments in which any combination of features described above or equivalents thereof is possible without departing from the spirit of the disclosure. Such as the above-described features and technical features having similar functions (but not limited to) disclosed in the present application are replaced with each other.

Claims (11)

1. A method for generating a verification identifier, which is applied to a server, and is characterized in that the method comprises the following steps:
generating a first digital signature under the condition that the identity of the client passes the authentication, indicating the client to generate a second digital signature according to the first digital signature and acquiring the second digital signature;
generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature and client information of the client;
and generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information.
2. The method for generating a verification identifier according to claim 1, wherein, in the case that the authentication of the client passes, before the first digital signature is generated, the method further comprises:
and receiving a verification identification generation request of the client, and verifying the identity of the client.
3. The method of generating a verification identifier according to claim 1, wherein the instructing the client to generate a second digital signature from the first digital signature and obtain the second digital signature includes:
sending a second digital signature request to the client; the second digital signature request instructs the client to generate a second digital signature according to the first digital signature and acquire the second digital signature.
4. The authentication identifier generation method according to claim 1, wherein the generating an electronic signature from the third digital signature and the client information includes:
and calculating the third digital signature and the client information according to a preset signing key to obtain the electronic signature.
5. A method for generating a verification identifier, applied to a client, the method comprising:
Sending a verification identification generation request to a server; the verification identification generation request instructs the server to generate a first digital signature;
generating a second digital signature and sending the second digital signature to the server;
receiving a verification identifier generated by the server according to the second digital signature;
the verification mark is generated by the server according to a third digital signature, an electronic signature and the client information, and the third digital signature is generated by the server according to the second digital signature; the electronic signature is generated by the server according to the third digital signature and the client information.
6. The method of generating a verification identification of claim 5, wherein the generating a second digital signature comprises:
acquiring the first digital signature and the hash value; the hash value is generated by the server through hash calculation on the client information;
the second digital signature is generated from the first digital signature and the hash value.
7. The verification identifier generation system is characterized by comprising a server and a client;
the client sends a verification identifier generation request to the server to acquire a verification identifier;
The server generates a first digital signature under the condition that the identity verification of the client passes, instructs the client to generate a second digital signature according to the first digital signature and acquires the second digital signature;
generating a third digital signature according to the second digital signature, and generating an electronic signature according to the third digital signature and client information of the client;
and generating a verification identifier of the client according to the third digital signature, the electronic signature and the client information.
8. An authentication identifier generating apparatus applied to a server, the apparatus comprising:
the first signature module generates a first digital signature under the condition that the identity verification of the client passes, instructs the client to generate a second digital signature according to the first digital signature and acquires the second digital signature;
the second signature module generates a third digital signature according to the second digital signature and generates an electronic signature according to the third digital signature and client information of the client;
and the verification identifier generation module is used for generating the verification identifier of the client according to the third digital signature, the electronic signature and the client information.
9. An authentication identifier generating apparatus applied to a client, the apparatus comprising:
the verification identification request module is used for sending a verification identification generation request to the server; the verification identification generation request instructs the server to generate a first digital signature;
the digital signature module generates a second digital signature and sends the second digital signature to the server;
the verification identification receiving module is used for receiving a verification identification generated by the server according to the second digital signature;
the verification mark is generated by the server according to a third digital signature, an electronic signature and the client information, and the third digital signature is generated by the server according to the second digital signature; the electronic signature is generated by the server according to the third digital signature and the client information.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any one of claims 1 to 6 when the program is executed.
11. A computer readable storage medium, characterized in that it has stored thereon a computer program which, when executed by a processor, implements the method of any of claims 1 to 6.
CN202310020327.4A 2023-01-05 2023-01-05 Verification identifier generation method, system, electronic device and storage medium Pending CN116112178A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310020327.4A CN116112178A (en) 2023-01-05 2023-01-05 Verification identifier generation method, system, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310020327.4A CN116112178A (en) 2023-01-05 2023-01-05 Verification identifier generation method, system, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN116112178A true CN116112178A (en) 2023-05-12

Family

ID=86266873

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310020327.4A Pending CN116112178A (en) 2023-01-05 2023-01-05 Verification identifier generation method, system, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN116112178A (en)

Similar Documents

Publication Publication Date Title
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US11777726B2 (en) Methods and systems for recovering data using dynamic passwords
US10558974B2 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
US11082221B2 (en) Methods and systems for creating and recovering accounts using dynamic passwords
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN110391913B (en) Vehicle binding method and device
WO2020038137A1 (en) Two-dimensional code generation method, data processing method, apparatus, and server
CN112165382B (en) Software authorization method and device, authorization server side and terminal equipment
KR101253683B1 (en) Digital Signing System and Method Using Chained Hash
CN111062059B (en) Method and device for service processing
CN110999254A (en) Securely performing cryptographic operations
CN111817857A (en) Electronic document signing method based on electronic notarization and SM2 collaborative signature and server adopted by same
CN114519206A (en) Method for anonymously signing electronic contract and signature system
US20240048395A1 (en) Method and system for authentication credential
CN116112178A (en) Verification identifier generation method, system, electronic device and storage medium
CN115967508A (en) Data access control method and device, equipment, storage medium and program product
USRE49968E1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
KR102484533B1 (en) Method for Issuing Verifiable Credential Including Digital Certificate and Authenticating Method Using the Same
CN112507370A (en) Electronic license verification method based on block chain network
CN116305077A (en) Data processing method, device, electronic equipment and storage medium
JP2023179334A (en) Authentication method, authentication system, portable information device, and authentication device
CN115987525A (en) Method and device for adding authorized signature data
CN114401100A (en) Cross-application platform login method and system for block chain account
CN116226932A (en) Service data verification method and device, computer medium and electronic equipment
CN114830092A (en) System and method for protecting against malicious program code injection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination