CN116484412B - Encryption algorithm, medium and storage device for handwriting signing of passive electromagnetic touch screen - Google Patents

Encryption algorithm, medium and storage device for handwriting signing of passive electromagnetic touch screen Download PDF

Info

Publication number
CN116484412B
CN116484412B CN202310744199.8A CN202310744199A CN116484412B CN 116484412 B CN116484412 B CN 116484412B CN 202310744199 A CN202310744199 A CN 202310744199A CN 116484412 B CN116484412 B CN 116484412B
Authority
CN
China
Prior art keywords
information
key
signature
encryption
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310744199.8A
Other languages
Chinese (zh)
Other versions
CN116484412A (en
Inventor
牟莹
曹曦
熊立龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Shangrong Technology Co ltd
Original Assignee
Shenzhen Shangrong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Shangrong Technology Co ltd filed Critical Shenzhen Shangrong Technology Co ltd
Priority to CN202310744199.8A priority Critical patent/CN116484412B/en
Publication of CN116484412A publication Critical patent/CN116484412A/en
Application granted granted Critical
Publication of CN116484412B publication Critical patent/CN116484412B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a handwriting signing encryption algorithm, medium and storage equipment of a passive electromagnetic touch screen, which relate to the technical field of data information processing and solve the problem of lagging data information processing capability.

Description

Encryption algorithm, medium and storage device for handwriting signing of passive electromagnetic touch screen
Technical Field
The invention relates to the technical field of data information processing, in particular to a handwriting signing encryption algorithm of a passive electromagnetic touch screen, a medium and storage equipment.
Background
A passive electromagnetic touch screen (Unifiedified Touchscreen (UIT)) is an electronic device that implements touch technology using electromagnetic induction principles, and generally has high sensitivity, high reliability, high resolution, and a wide range of application scenarios. Passive electromagnetic touch screens typically collect and process touch data during operation, such as passive electromagnetic touch screens typically use touch sensors (e.g., capacitive sensors, infrared sensors, etc.) to collect and process touch data, which may be collected and processed by specialized collection devices. The data is then processed, and processing is required to extract useful information when processing data information, such as for collected data. Then, the handwriting data content of the passive electromagnetic touch screen is analyzed and preprocessed, and the acquired data needs to be analyzed and processed to extract useful information and characteristics. This typically includes the processing of a variety of data information such as feature extraction, feature selection, feature transformation, etc.
In a specific application, the passive electromagnetic touch screen is a touch screen based on an electromagnetic induction principle, and handwriting, signature and other operations can be realized through induction of a passive electromagnetic pen. The handwriting signing encryption algorithm can ensure confidentiality and non-tamper property of data, the handwriting signing storage device can store encrypted signing information, a user can conveniently verify and inquire the signing information, and the medium can encrypt and transmit the handwriting signing information in the touch screen to the handwriting signing storage device. With the continuous development of technology, signing encryption algorithms still have a plurality of defects. On the one hand, the existing signing encryption algorithm directly encrypts signing information, and once external decryption is completed, complete signing information can be directly obtained. On one hand, the encryption mode of the existing signing encryption algorithm is fixed, external decryption is easier to realize, the encryption effect is insufficient, and on the other hand, the complexity of the encryption key of the existing signing encryption algorithm is insufficient, the randomness is low, and the requirement of people on increasing signing density at present cannot be met. Therefore, how to calculate the encryption algorithm, data information transmission medium and storage of the handwriting signing data information of the passive electromagnetic touch screen is a technical problem to be solved urgently.
Disclosure of Invention
Aiming at the defects of the technology, the invention discloses a handwriting signing encryption algorithm, medium and storage device of a passive electromagnetic touch screen, which adopts an improved lightweight residual network model to carry out user biological information verification, increases the privacy of information storage, adopts a method of dividing signing information into signing file information and handwriting signature information for encryption and storage separately, can not directly decrypt from outside to obtain complete signing information, adopts a method of randomly sorting signing file information according to weight and ID sent by a user and then carrying out random grouping by a random number generation method, and carries out random matching encryption method for signing file information, increases the randomness of encryption, increases the difficulty of external decryption, adopts dynamic salt value to carry out double hash and joint hash calculation on an original key generated by DES to obtain a random key, combines the random key with AES to generate a symmetric encryption key, increases the complexity and randomness of the key, adopts a method of mixed encryption of the symmetric encryption key and an RSA key, and carries out encryption and decryption operation by introducing a trust third party platform, and reduces the probability of key exposure and external decryption.
In order to achieve the technical effects, the invention adopts the following technical scheme:
the storage device comprises a data collection module and a storage module;
the data collection module is used for collecting biological information and handwritten signature information of a user;
the data collection module comprises a camera, a fingerprint extraction device, a microphone and a text collection sub-module, wherein the camera is used for collecting face information of a user, the fingerprint extraction device is used for collecting fingerprint information of the user, the microphone is used for extracting sound information of the user, and the text collection sub-module is used for collecting signature information input by the user and dividing the signature information into handwriting signature information and signature file information;
the storage module is used for storing the encrypted signing information;
the storage module comprises a signature storage sub-module, a signature storage sub-module and a biological information base, wherein the signature storage sub-module is used for storing signature file information, the signature storage sub-module is used for storing handwriting signature information, and the biological information base is used for storing face information, fingerprint information and voiceprint information of a user;
the storage device further includes: a data processing module and a user platform; the data processing module is used for encrypting the signing information; the data processing module comprises a user information processing sub-module, a signature encryption model and a synthesis sub-module, wherein the user information processing sub-module extracts and compresses biological information of a user into digital information, the signature encryption model is used for encrypting handwriting signature information, the signature encryption model is used for encrypting signature file information, the synthesis sub-module is used for synthesizing decrypted handwriting signature information and signature file information into signature information, and the output end of the user information processing sub-module is connected with the input end of the signature encryption model;
The user platform is used for storing and inquiring the signing information by the user;
the user platform comprises a login module, a management module and an alarm module, wherein the login module is used for registering and logging in of a user and jumping to a user management interface, the management module is used for sending a function request to a storage device by the user, the alarm module is used for giving an alarm when biological information verification fails in the user login process, and the output end of the login module is connected with the input end of the management module;
the management module comprises a writing sub-module and an access sub-module, wherein the writing sub-module is used for a user to send an information storage instruction to the storage equipment, and the access sub-module is used for the user to send an information application instruction and request information to the storage equipment;
the login module comprises a face recognition system, a fingerprint recognition system and a voiceprint recognition system, wherein the face recognition system adopts a face recognition Eigenface algorithm based on PCA dimension reduction to compare the identity of a user with the bioinformation base according to face information, and the fingerprint recognition system adopts an improved lightweight residual network model to compare the identity of the user with the bioinformation base according to fingerprint information and sound information of the user;
The output end of the data collection module is connected with the input end of the data processing module, the data processing module is connected with the user platform, and the output end of the data processing module is connected with the input end of the database.
As a further technical scheme of the invention, the signature encryption model comprises an encryption scheme library, a data preprocessing system and a random matching system, wherein the encryption scheme library is used for storing a text encryption method set, the data preprocessing system is used for extracting data features of signature file information to form a signature feature set, data are transformed into a unified form for data compression, the random matching system is used for matching an encryption method for storing text according to the weight ordering of the signature feature set in combination with a random number generation method, and the output ends of the data preprocessing system and the encryption scheme library are connected with the input end of the random matching system.
As a further technical scheme of the invention, the random matching system adopts a method of randomly sorting the signing file information according to the weight and the ID sent by the user and then randomly grouping the signing file information by a random number generation method, thereby effectively improving the randomness of the signing file information encryption, and the random matching system comprises the following working steps:
1) The method comprises the steps of initially sorting, weighting the signature file information data characteristics in a signature characteristic set according to the data volume of the signature file information data characteristics, sorting the signature file information according to the large-to-small weight, wherein the weight formula is as follows:
(1)
in the formula (1), i is a label document information subscript,for signing the weight of the file information, +.>The data quantity is the characteristic of the signing file information data; g (x+k, y) represents information data characteristic parameters, x represents a parameter row, y represents a parameter column, k represents a parameter phase, < ->Representing an error average of the acquired data; />An error identification representing the data;
2) The method comprises the steps of re-sequencing, namely generating a random number by a user's sending ID according to a linear congruence method, sequencing the signing file information with the same weight according to the value of the random number from large to small;
3) Random grouping, namely randomly grouping the signing file information through a random number generation method, sequentially matching the signing file information with a text encryption method in the encryption scheme library, and carrying out encryption operation on the signing file information.
As a further technical scheme of the invention, the signature encryption model comprises a key management system, a key derivation system and a hybrid encryption system, wherein the key management system is used for sending a key periodical replacement instruction to the key derivation system so as to avoid the leakage of the key, the key derivation system uses a dynamic salt value to carry out hash processing on an original key generated by DES, the randomness and complexity of the original key are increased, the hybrid encryption system uses a method of symmetric encryption key and RSA key hybrid encryption to carry out encryption and decryption operation on handwritten signature information, the output end of the key management system is connected with the input end of the key derivation system, and the output end of the key derivation system is connected with the input end of the hybrid encryption system.
As a further technical scheme of the present invention, the key derivation system adopts a method of adding a dynamic salt value to an original key generated by DES, increases randomness of the original key, obtains a derived random key after double hash and cascade hash computation of the original key added with the dynamic salt value, increases complexity of the original key, and the key derivation system comprises the following working steps:
c1, generating an original key for symmetric encryption through DES;
c2, generating a dynamic salt value, and respectively splicing 6 random numbers and user IDs as a salt value A and a salt value B after the character strings of the time stamps;
c3, combining the double hash functions, establishing two hash functions, respectively combining the initial salt value A and the initial salt value B with random keys, bringing the initial salt value A and the initial salt value B into the two hash functions, taking the output values of the two hash results as a single hash result, and taking the output values as initial hash results;
and C4, combining the serial hash functions, carrying out hash calculation on the initial hash result through three serial hash functions to obtain a final hash result, and taking the final hash result as a derived random key.
As a further technical scheme of the invention, the hybrid encryption system adopts a method that a storage party and a search party respectively hold a pair of RSA keys, the user platform is added as a trusted third party, the probability of key exposure is reduced, the complexity of symmetric encryption keys is increased by adopting a method of combining an AES algorithm and a derived random key, the probability of external decryption is reduced by adopting a method of combining the symmetric encryption keys and the RSA keys, and the working steps of the hybrid encryption system are as follows:
S1, generating two pairs of public keys and private keys by using RSA, wherein a public key A is a public encryption key of a storage party, a private key A is a secret decryption key of the storage party, a public key B is a public encryption key of a search party, and a private key B is a secret decryption key of the search party;
s2, encrypting the handwritten signature information, encrypting the symmetrical encryption key generated by combining the handwritten signature information to be encrypted through an AES algorithm and a derived random key, adding a timestamp, decrypting by using a private key A, adding an ID of a storage party, encrypting the information by using a public key B to form information M, and transmitting the information M to the storage module, wherein the expression of M is as follows:
(2)
in the formula (2), M is encrypted handwritten signature information,is public key (L)>In order to be able to search for the data,/>in order to find the public key of the party,key derived for AES algorithm, < >>For the derived random key, m is handwritten signature information,/->For time stamp, A is the storage party, +.>For the ID of the party to be stored->Is private key (L)>Is a private key of a storage party;
s3, the storage sends request information to the user platform, the search party decrypts the information by using the private key B to obtain the ID of the storage party, the public key A is used to obtain time stamp information, the search party sends the request information S to the user platform, the request is sent to obtain a symmetric encryption key, and the expression of the request information is as follows:
(3)
In the formula (3), the amino acid sequence of the compound,to verify the request information;
and S4, after the storage side completes decryption operation, the user platform verifies the request information and then sends the symmetric encryption key information to the searching party, and the searching party decrypts the request information by using the private key B and the symmetric encryption key to obtain handwritten signature information.
As a further technical solution of the present invention, the improved lightweight residual network model uses 7 residual modules including two layers of convolution layers, uses a maximum pooling operation to replace average pooling at the end, uses a convolution kernel with a size of 5×5 for the first convolution layer, and uses a sliding step size of 1, matches with the maximum pooling with a window size of 3×3, connects with 5 residual modules with a unified size of 3×3, realizes feature map change of different residual modules through convolution layers with a step size of 2, and obtains the expression of the residual modules through mapping to be fitted of each layer in other convolution layers, where the step sizes of the convolution kernels are all 2:
(4)
in the formula (4), x is the input of the model, y is the output of the model,for the weight of each layer, W is accelerator, < ->The mapping that needs to be fitted for the module, u is the data residue margin.
As a further technical scheme of the invention, a handwriting signature encryption algorithm of a passive electromagnetic touch screen is applied to a handwriting signature storage device of the passive electromagnetic touch screen, and comprises the following steps:
The encryption algorithm comprises an encryption step and a decryption step, wherein the encryption step is as follows:
firstly, a storage party performs user biological information verification, an information storage instruction is sent to the user platform, the storage equipment sends out an alarm when verification fails, and signature information is encrypted and transmitted to the storage equipment through a touch screen by WiFi (wireless fidelity);
dividing the signing information into handwritten signature information and signing document information through a character collecting sub-module;
step three, carrying out random encryption on the signature file information through a signature encryption model, preprocessing the signature file information to obtain a signature feature set, sequencing the signature feature set according to weights, randomly matching the signature feature set with a character encryption method in an encryption scheme library by combining a random number generation method, encrypting the signature file information according to the character encryption method matched with the signature feature set, and storing the encrypted signature file information to a signature storage submodule;
generating a random key through a key derivation system, generating an original key through a DES encryption algorithm, adding a dynamic salt value into the original key, and then performing a double-connection serial hash algorithm on the original key added with the dynamic salt value to generate a final hash result which is the random key for encrypting handwritten signature information;
Step five, periodically replacing a random key, sending a key updating instruction to a key deriving system every 24 hours through the signature encryption model, and receiving the key updating instruction by the key deriving system and recalculating the random key once;
step six, generating a symmetric encryption key, and combining the key generated by the AES with the random key to form the symmetric encryption key;
step seven, encrypting the handwritten signature information by adopting a symmetric encryption key, and storing the encrypted handwritten signature information into the signature storage sub-module;
the decryption step is as follows:
step 1, a user biological information verification is carried out by a search party, an information application instruction is sent to the user platform after the verification is successful, and an alarm is sent if the verification fails;
step 2, the user platform receives the information application instruction and then sends the secret key of the signing file information to the searching party;
step 3, the inquiring party applies for the symmetric encryption key to the user platform, obtains the timestamp and the ID of the storage party through the RSA key, sends application information to the user platform, and asks for the symmetric encryption key to the user platform;
step 4, the searching party obtains a symmetric encryption key, the user platform authenticates the request information of the searching party, after the authentication is successful, the user platform sends the request information to the signature encryption model, the signature encryption model sends the symmetric encryption key to the searching party, and the searching party uses the symmetric encryption key to realize decryption operation of handwritten signature information;
And 5, the complete signing information is obtained by the searching party, the handwritten signature information and the signing file information are combined into signing information through the data processing module, and the signing information is encrypted and transmitted to the touch screen through the WiFi through the storage equipment.
As a further technical scheme of the invention, the medium is an encrypted WiFi wireless local area network adopting a WSP2 protocol and is used for transmitting handwriting signing information between the touch screen and the storage device.
Compared with the prior art, the invention has the beneficial positive effects that:
the invention discloses a handwritten signing encryption algorithm, medium and storage equipment of a passive electromagnetic touch screen, which adopts an improved lightweight residual network model to verify biological information of a user, increase the privacy of information storage, adopts a method of dividing signing information into signing file information and handwritten signature information and separately encrypting and storing the signing information, can not directly decrypt the signing file information from outside to obtain complete signing information, adopts a method of randomly sorting the signing file information according to weight and ID sent by the user and then randomly grouping the signing file information by a random number generation method, increases the randomness of encryption, increases the difficulty of external decryption, adopts dynamic salt value to perform double hash and linkage hash calculation on an original key generated by DES to obtain a random key, combines the random key and AES to generate a symmetric encryption key, increases the complexity and randomness of the key, adopts a method of mixed encryption of the symmetric encryption key and the RSA key, and carries out encryption and decryption operation on handwritten information by introducing a trust third-party platform.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings which are required in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only some embodiments of the invention, and that other drawings may be obtained from these drawings without inventive faculty for a person skilled in the art,
FIG. 1 is a schematic diagram illustrating the operation of a storage device module when storing wholesale information according to the present invention;
FIG. 2 is a schematic diagram illustrating the operation of a storage device module when retrieving wholesale information according to the present invention;
FIG. 3 is a schematic diagram of the key derivation system steps of the present invention;
FIG. 4 is a schematic diagram of steps of a hybrid encryption system according to the present invention;
FIG. 5 is a schematic diagram showing the encryption steps of the encryption algorithm of the handwriting signature of the passive electromagnetic touch screen;
fig. 6 is a schematic diagram of a decryption step of the handwriting signing encryption algorithm of the passive electromagnetic touch screen.
Detailed Description
The following description of the embodiments of the present disclosure will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the disclosure. It should be understood that the description is only illustrative and is not intended to limit the scope of the invention. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the present invention.
1-2, a passive electromagnetic touch screen handwriting batch storage device comprises a data collection module and a storage module;
the data collection module is used for collecting biological information and handwritten signature information of a user;
the data collection module comprises a camera, a fingerprint extraction device, a microphone and a text collection sub-module, wherein the camera is used for collecting face information of a user, the fingerprint extraction device is used for collecting fingerprint information of the user, the microphone is used for extracting sound information of the user, and the text collection sub-module is used for collecting signature information input by the user and dividing the signature information into handwriting signature information and signature file information;
the storage module is used for storing the encrypted signing information;
the storage module comprises a signature storage sub-module, a signature storage sub-module and a biological information base, wherein the signature storage sub-module is used for storing signature file information, the signature storage sub-module is used for storing handwriting signature information, and the biological information base is used for storing face information, fingerprint information and voiceprint information of a user;
the storage device further includes: a data processing module and a user platform; the data processing module is used for encrypting the signing information; the data processing module comprises a user information processing sub-module, a signature encryption model and a synthesis sub-module, wherein the user information processing sub-module extracts and compresses biological information of a user into digital information, the signature encryption model is used for encrypting handwriting signature information, the signature encryption model is used for encrypting signature file information, the synthesis sub-module is used for synthesizing decrypted handwriting signature information and signature file information into signature information, and the output end of the user information processing sub-module is connected with the input end of the signature encryption model;
The user platform is used for storing and inquiring the signing information by the user;
the user platform comprises a login module, a management module and an alarm module, wherein the login module is used for registering and logging in of a user and jumping to a user management interface, the management module is used for sending a function request to a storage device by the user, the alarm module is used for giving an alarm when biological information verification fails in the user login process, and the output end of the login module is connected with the input end of the management module;
the management module comprises a writing sub-module and an access sub-module, wherein the writing sub-module is used for a user to send an information storage instruction to the storage equipment, and the access sub-module is used for the user to send an information application instruction and request information to the storage equipment;
the login module comprises a face recognition system, a fingerprint recognition system and a voiceprint recognition system, wherein the face recognition system adopts a face recognition Eigenface algorithm based on PCA dimension reduction to compare the identity of a user with the bioinformation base according to face information, and the fingerprint recognition system adopts an improved lightweight residual network model to compare the identity of the user with the bioinformation base according to fingerprint information and sound information of the user;
The output end of the data collection module is connected with the input end of the data processing module, the data processing module is connected with the user platform, and the output end of the data processing module is connected with the input end of the database.
In a specific embodiment, the signature encryption model comprises an encryption scheme library, a data preprocessing system and a random matching system, wherein the encryption scheme library is used for storing a text encryption method set, the data preprocessing system is used for extracting data features of signature file information to form a signature feature set, data are converted into a unified form for data compression, the random matching system is used for matching an encryption method for storing text according to weight ordering of the signature feature set and combining a random number generation method, and the output ends of the data preprocessing system and the encryption scheme library are connected with the input end of the random matching system.
In a specific embodiment, the random matching system adopts a method of randomly sorting the signing file information according to the weight and the user sending ID, and then randomly grouping the signing file information by a random number generation method, so that the randomness of the signing file information encryption is effectively improved, and the working steps of the random matching system are as follows:
1) The method comprises the steps of initially sorting, weighting the signature file information data characteristics in a signature characteristic set according to the data volume of the signature file information data characteristics, sorting the signature file information according to the large-to-small weight, wherein the weight formula is as follows:
(1)
in the formula (1), i is a label document information subscript,for signing the weight of the file information, +.>The data quantity is the characteristic of the signing file information data; g (x+k, y) represents information data characteristic parameters, x represents a parameter row, y represents a parameter column, k represents a parameter phase, < ->Representing an error average of the acquired data; />An error identification representing the data;
2) The method comprises the steps of re-sequencing, namely generating a random number by a user's sending ID according to a linear congruence method, sequencing the signing file information with the same weight according to the value of the random number from large to small;
3) Random grouping, namely randomly grouping the signing file information through a random number generation method, sequentially matching the signing file information with a text encryption method in the encryption scheme library, and carrying out encryption operation on the signing file information.
Through the above embodiment, the contents of the encryption scheme bank are shown in table 1:
table 1 encryption scheme storage table
Firstly, the random matching system randomly groups the signing file information, and then the signing file information after random grouping is encrypted according to the encryption scheme sequence shown in the table 1.
In a specific embodiment, the signature encryption model includes a key management system, a key derivation system and a hybrid encryption system, where the key management system is configured to send a key periodic replacement instruction to the key derivation system to avoid leakage of a key, the key derivation system hashes an original key generated by DES with a dynamic salt value, increasing randomness and complexity of the original key, the hybrid encryption system uses a method of hybrid encryption of a symmetric encryption key and an RSA key to encrypt and decrypt handwritten signature information, and an output end of the key management system is connected to an input end of the key derivation system, and an output end of the key derivation system is connected to an input end of the hybrid encryption system.
As shown in fig. 3, the key derivation system adopts a method of adding a dynamic salt value to an original key generated by DES, increases randomness of the original key, obtains a derived random key after double hash and cascade hash calculation of the original key added with the dynamic salt value, increases complexity of the original key, and the key derivation system comprises the following working steps:
c1, generating an original key for symmetric encryption through DES;
C2, generating a dynamic salt value, and respectively splicing 6 random numbers and user IDs as a salt value A and a salt value B after the character strings of the time stamps;
c3, combining the double hash functions, establishing two hash functions, respectively combining the initial salt value A and the initial salt value B with random keys, bringing the initial salt value A and the initial salt value B into the two hash functions, taking the output values of the two hash results as a single hash result, and taking the output values as initial hash results;
and C4, combining the serial hash functions, carrying out hash calculation on the initial hash result through three serial hash functions to obtain a final hash result, and taking the final hash result as a derived random key.
As shown in fig. 4, the hybrid encryption system adopts a method that a storage party and a search party respectively hold a pair of RSA keys, adds the user platform as a trusted third party, reduces the probability of key exposure, adopts a method of combining AES algorithm and derived random keys, increases the complexity of symmetric encryption keys, adopts a method of combining symmetric encryption keys and RSA keys, reduces the probability of external decryption, and the working steps of the hybrid encryption system are as follows:
s1, generating two pairs of public keys and private keys by using RSA, wherein a public key A is a public encryption key of a storage party, a private key A is a secret decryption key of the storage party, a public key B is a public encryption key of a search party, and a private key B is a secret decryption key of the search party;
S2, encrypting the handwritten signature information, encrypting the symmetrical encryption key generated by combining the handwritten signature information to be encrypted through an AES algorithm and a derived random key, adding a timestamp, decrypting by using a private key A, adding an ID of a storage party, encrypting the information by using a public key B to form information M, and transmitting the information M to the storage module, wherein the expression of M is as follows:
(2)
in the formula (2), M is encrypted handwritten signature information,is public key (L)>For the purpose of inquiring, the herb of Temp Reinforcement>In order to find the public key of the party,key derived for AES algorithm, < >>For the derived random key, m is handwritten signature information,/->For time stamp, A is the storage party, +.>For the ID of the party to be stored->Is private key (L)>Is a private key of a storage party;
s3, the storage sends request information to the user platform, the search party decrypts the information by using the private key B to obtain the ID of the storage party, the public key A is used to obtain time stamp information, the search party sends the request information S to the user platform, the request is sent to obtain a symmetric encryption key, and the expression of the request information is as follows:
(3)
in the formula (3), the amino acid sequence of the compound,to verify the request information;
and S4, after the storage side completes decryption operation, the user platform verifies the request information and then sends the symmetric encryption key information to the searching party, and the searching party decrypts the request information by using the private key B and the symmetric encryption key to obtain handwritten signature information.
In a specific embodiment, the improved lightweight residual network model uses 7 residual modules including two layers of convolution layers, uses maximum pooling operation to replace average pooling at the tail end, uses convolution kernels with the size of 5×5 for the first convolution layer, has a sliding step length of 1, matches with maximum pooling with the window size of 3×3, connects with residual modules with the size of 5 convolution kernels unified as 3×3, realizes feature diagram change of different residual modules through convolution layers with the step length of 2, and obtains the expression of the residual modules through mapping to be fitted of each layer in other convolution layers, wherein the step length of the convolution kernels is 2:
(4)
in the formula (4), x is the input of the model, y is the output of the model,for the weight of each layer, W is accelerator, < ->The mapping that needs to be fitted for the module, u is the data residue margin.
Through the above embodiment, the construction process of the improved lightweight residual network model is as follows:
step 1, performing down-conversion and demodulation on a received signal to be identified to obtain a complex baseband time sequence;
step 2, performing energy normalization processing on the acquired original complex baseband time sequence x (n), and then dividing the data into independent segments, wherein each segment comprises 1024 sampling points;
Step 3, performing third-order cumulative quantity estimation on each time sequence segment, obtaining a bispectrum through Fourier transformation, and finally forming a two-dimensional contour map by connecting the same-value points of the output bispectrum;
step 4, training the improved residual network model for multiple times by using a training set, verifying in a verification set, selecting a group of optimal super parameters and storing weight data;
and 5, using the improved residual error network identification transmitter signal to finish voiceprint and fingerprint identification.
As shown in fig. 5, a handwriting signing encryption algorithm of a passive electromagnetic touch screen includes the following steps:
the encryption algorithm comprises an encryption step and a decryption step, wherein the encryption step is as follows:
firstly, a storage party performs user biological information verification, an information storage instruction is sent to the user platform, the storage equipment sends out an alarm when verification fails, and signature information is encrypted and transmitted to the storage equipment through a touch screen by WiFi (wireless fidelity);
dividing the signing information into handwritten signature information and signing document information through a character collecting sub-module;
step three, carrying out random encryption on the signature file information through a signature encryption model, preprocessing the signature file information to obtain a signature feature set, sequencing the signature feature set according to weights, randomly matching the signature feature set with a character encryption method in an encryption scheme library by combining a random number generation method, encrypting the signature file information according to the character encryption method matched with the signature feature set, and storing the encrypted signature file information to a signature storage submodule;
Generating a random key through a key derivation system, generating an original key through a DES encryption algorithm, adding a dynamic salt value into the original key, and then performing a double-connection serial hash algorithm on the original key added with the dynamic salt value to generate a final hash result which is the random key for encrypting handwritten signature information;
step five, periodically replacing a random key, sending a key updating instruction to a key deriving system every 24 hours through the signature encryption model, and receiving the key updating instruction by the key deriving system and recalculating the random key once;
step six, generating a symmetric encryption key, and combining the key generated by the AES with the random key to form the symmetric encryption key;
step seven, encrypting the handwritten signature information by adopting a symmetric encryption key, and storing the encrypted handwritten signature information into the signature storage sub-module;
the decryption step is as follows:
step 1, a user biological information verification is carried out by a search party, an information application instruction is sent to the user platform after the verification is successful, and an alarm is sent if the verification fails;
step 2, the user platform receives the information application instruction and then sends the secret key of the signing file information to the searching party;
Step 3, the inquiring party applies for the symmetric encryption key to the user platform, obtains the timestamp and the ID of the storage party through the RSA key, sends application information to the user platform, and asks for the symmetric encryption key to the user platform;
step 4, the searching party obtains a symmetric encryption key, the user platform authenticates the request information of the searching party, after the authentication is successful, the user platform sends the request information to the signature encryption model, the signature encryption model sends the symmetric encryption key to the searching party, and the searching party uses the symmetric encryption key to realize decryption operation of handwritten signature information;
and 5, the complete signing information is obtained by the searching party, the handwritten signature information and the signing file information are combined into signing information through the data processing module, and the signing information is encrypted and transmitted to the touch screen through the WiFi through the storage equipment.
Through the above embodiment, after the query party searches the signing information from the storage device, the signing information is encrypted and transmitted to the touch screen through WiFi, and the security of the handwriting signing encryption algorithm of the passive electromagnetic touch screen is shown in table 2:
table 2 operating key attack resolution table
According to different attack modes, three test groups are set, four algorithms are adopted to encrypt and decrypt three groups of signature samples respectively, three different modes are adopted to attack four algorithms in the encryption and decryption process, the key cracking rate is calculated, algorithm 1 is adopted to encrypt the signature samples by adopting the traditional RSA and DES combined algorithm, method 2 is adopted to encrypt the signature samples by adopting the signature encryption model, method 3 is adopted to encrypt the signature samples by adopting the signature encryption model, method 4 is adopted to encrypt the signature samples by adopting the passive electromagnetic touch screen handwriting signature encryption algorithm, as shown in table 2, when the key attack is carried out on group A, the cracking rates of algorithm 1 and algorithm 4 are obviously smaller than algorithm 2 and algorithm 3, when the plaintext codebook is known, the randomness of the encryption mode in the signature encryption model enables the key attack to not determine the encryption mode of the signature sample, when the key attack is carried out on the B group, the cracking rate of the algorithm 3 and the algorithm 4 is obviously smaller than that of the algorithm 1 and the algorithm 2, when the data quantity of the ciphertext is known to be enough, the random key in the encryption mode in the signature encryption model is not easy to crack, when the data processing is carried out on the C group, the cracking rate of the algorithm 2, the algorithm 3 and the algorithm 4 is obviously smaller than that of the algorithm 1, and when the key attack is carried out on the C group, the single fixed encryption mode is easy to crack from the outside, so that the security of the handwriting signature encryption algorithm of the passive electromagnetic touch screen is high.
In a specific embodiment, the medium is an encrypted WiFi wireless local area network adopting WSP2 protocol, and is used for transferring handwriting signing information between the touch screen and the storage device.
While specific embodiments of the present invention have been described above, it will be understood by those skilled in the art that these specific embodiments are by way of example only, and that various omissions, substitutions, and changes in the form and details of the methods and systems described above may be made by those skilled in the art without departing from the spirit and scope of the invention. For example, it is within the scope of the present invention to combine the above-described method steps to perform substantially the same function in substantially the same way to achieve substantially the same result. Accordingly, the scope of the invention is limited only by the following claims.

Claims (7)

1. A passive electromagnetic touch screen handwriting signing storage device is characterized in that:
the storage device comprises a data collection module and a storage module;
the data collection module is used for collecting biological information and handwritten signature information of a user;
the data collection module comprises a camera, a fingerprint extraction device, a microphone and a text collection sub-module, wherein the camera is used for collecting face information of a user, the fingerprint extraction device is used for collecting fingerprint information of the user, the microphone is used for extracting sound information of the user, and the text collection sub-module is used for collecting signature information input by the user and dividing the signature information into handwriting signature information and signature file information;
The storage module is used for storing the encrypted signing information;
the storage module comprises a signature storage sub-module, a signature storage sub-module and a biological information base, wherein the signature storage sub-module is used for storing signature file information, the signature storage sub-module is used for storing handwriting signature information, and the biological information base is used for storing face information, fingerprint information and voiceprint information of a user;
the storage device further includes: a data processing module and a user platform; the data processing module is used for encrypting the signing information; the data processing module comprises a user information processing sub-module, a signature encryption model and a synthesis sub-module, wherein the user information processing sub-module extracts and compresses biological information of a user into digital information, the signature encryption model is used for encrypting handwriting signature information, the signature encryption model is used for encrypting signature file information, the synthesis sub-module is used for synthesizing decrypted handwriting signature information and signature file information into signature information, and the output end of the user information processing sub-module is connected with the input end of the signature encryption model;
the user platform is used for storing and inquiring the signing information by the user;
The user platform comprises a login module, a management module and an alarm module, wherein the login module is used for registering and logging in of a user and jumps to a user management interface, the management module is used for sending a function request to a storage device by the user, the alarm module is used for giving an alarm when biological information verification fails in the user login process, the output end of the login module is connected with the input end of the management module, and the output ends of the login module and the management module are connected with the input end of the alarm module;
the management module comprises a writing sub-module and an access sub-module, wherein the writing sub-module is used for a user to send an information storage instruction to the storage equipment, and the access sub-module is used for the user to send an information application instruction and request information to the storage equipment;
the login module comprises a face recognition system, a fingerprint recognition system and a voiceprint recognition system, wherein the face recognition system adopts a face recognition Eigenface algorithm based on PCA dimension reduction to compare the identity of a user with the bioinformation base according to face information, and the fingerprint recognition system adopts an improved lightweight residual network model to compare the identity of the user with the bioinformation base according to fingerprint information and sound information of the user;
The output end of the data collection module is connected with the input end of the data processing module, the data processing module is connected with the user platform, and the output end of the data processing module is connected with the input end of the database;
the signature encryption model comprises an encryption scheme library, a data preprocessing system and a random matching system, wherein the encryption scheme library is used for storing a text encryption method set, the data preprocessing system is used for extracting data features of signature file information to form a signature feature set, data are transformed into a unified form for data compression, the random matching system is used for matching an encryption method for storing text according to weight ordering of the signature feature set and combining a random number generation method, and the output ends of the data preprocessing system and the encryption scheme library are connected with the input end of the random matching system;
the random matching system adopts a method of randomly sorting the signing file information according to the weight and the ID sent by the user and then randomly grouping the signing file information by a random number generation method, thereby effectively improving the encryption randomness of the signing file information, and the working steps of the random matching system are as follows:
1) The method comprises the steps of initially sorting, weighting the signature file information data characteristics in a signature characteristic set according to the data volume of the signature file information data characteristics, sorting the signature file information according to the large-to-small weight, wherein the weight formula is as follows:
(1)
In the formula (1), i is a label document information subscript,for signing the weight of the file information, +.>The data quantity is the characteristic of the signing file information data; g (x+k, y) represents information data characteristic parameters, x represents a parameter row, y represents a parameter column, k represents a parameter phase, < ->Representing an error average of the acquired data; />Representing errors in dataA difference identifier;
2) The method comprises the steps of re-sequencing, namely generating a random number by a user's sending ID according to a linear congruence method, sequencing the signing file information with the same weight according to the value of the random number from large to small;
3) Random grouping, namely randomly grouping the signing file information through a random number generation method, sequentially matching the signing file information with a text encryption method in the encryption scheme library, and carrying out encryption operation on the signing file information.
2. The passive electromagnetic touch screen handwriting signature storage device according to claim 1, wherein: the signature encryption model comprises a key management system, a key derivation system and a hybrid encryption system, wherein the key management system is used for sending a key periodical replacement instruction to the key derivation system to avoid key leakage, the key derivation system uses dynamic salt values to carry out hash processing on an original key generated by DES, randomness and complexity of the original key are increased, the hybrid encryption system uses a symmetric encryption key and RSA key hybrid encryption method to carry out encryption and decryption operation on handwritten signature information, the output end of the key management system is connected with the input end of the key derivation system, and the output end of the key derivation system is connected with the input end of the hybrid encryption system.
3. The passive electromagnetic touch screen handwriting signature storage device according to claim 2, wherein: the key derivation system adopts a method of adding dynamic salt value to an original key generated by DES, increases randomness of the original key, obtains a derived random key after double hash and cascade hash calculation of the original key added with the dynamic salt value, increases complexity of the original key, and comprises the following working steps:
c1, generating an original key for symmetric encryption through DES;
c2, generating a dynamic salt value, and respectively splicing 6 random numbers and user IDs as a salt value A and a salt value B after the character strings of the time stamps;
c3, combining the double hash functions, establishing two hash functions, respectively combining the initial salt value A and the initial salt value B with random keys, bringing the initial salt value A and the initial salt value B into the two hash functions, taking the output values of the two hash results as a single hash result, and taking the output values as initial hash results;
and C4, combining the serial hash functions, carrying out hash calculation on the initial hash result through three serial hash functions to obtain a final hash result, and taking the final hash result as a derived random key.
4. A passive electromagnetic touch screen handwriting signature storage apparatus as recited in claim 3, wherein: the hybrid encryption system adopts a method that a storage party and a search party respectively hold a pair of RSA keys, adds the user platform as a trusted third party, reduces the probability of key exposure, adopts a method of combining an AES algorithm and a derived random key, increases the complexity of a symmetric encryption key, adopts a method of combining the symmetric encryption key and the RSA key, and reduces the probability of external deciphering passwords, and the working steps of the hybrid encryption system are as follows:
S1, generating two pairs of public keys and private keys by using RSA, wherein a public key A is a public encryption key of a storage party, a private key A is a secret decryption key of the storage party, a public key B is a public encryption key of a search party, and a private key B is a secret decryption key of the search party;
s2, encrypting the handwritten signature information, encrypting the symmetrical encryption key generated by combining the handwritten signature information to be encrypted through an AES algorithm and a derived random key, adding a timestamp, decrypting by using a private key A, adding an ID of a storage party, encrypting the information by using a public key B to form information M, and transmitting the information M to the storage module, wherein the expression of M is as follows:
(2)
in the formula (2), M is encrypted handwritten signature information,is public key (L)>For the purpose of inquiring, the herb of Temp Reinforcement>In order to find the public key of the party,key derived for AES algorithm, < >>For the derived random key, m is handwritten signature information,/->For time stamp, A is the storage party, +.>For the ID of the party to be stored->Is private key (L)>Is a private key of a storage party;
s3, the storage sends request information to the user platform, the search party decrypts the information by using the private key B to obtain the ID of the storage party, the public key A is used to obtain time stamp information, the search party sends the request information S to the user platform, the request is sent to obtain a symmetric encryption key, and the expression of the request information is as follows:
(3)
In the formula (3), the amino acid sequence of the compound,to verify the request information;
and S4, after the storage side completes decryption operation, the user platform verifies the request information and then sends the symmetric encryption key information to the searching party, and the searching party decrypts the request information by using the private key B and the symmetric encryption key to obtain handwritten signature information.
5. The passive electromagnetic touch screen handwriting signature storage device according to claim 1, wherein: the improved lightweight residual network model uses 7 residual modules comprising two layers of convolution layers, the tail end uses maximum pooling operation to replace average pooling, the first convolution layer uses convolution kernels with the size of 5 multiplied by 5, the sliding step length is 1, the maximum pooling with the window size of 3 multiplied by 3 is matched, the rear end is connected with the residual modules with the size of 5 convolution kernels unified as 3 multiplied by 3, the characteristic diagram of different residual modules is changed through the convolution layer with the step length of 2, the step length of the convolution kernels is 2 in other convolution layers, and the expression of the residual modules is obtained through the mapping to be fitted of each layer:
(4)
in the formula (4), x is the input of the model, y is the output of the model,for the weight of each layer, W is accelerator, < ->The mapping that needs to be fitted for the module, u is the data residue margin.
6. A handwriting signing encryption algorithm of a passive electromagnetic touch screen is characterized in that: a passive electromagnetic touch screen handwriting signature storage device applied to any one of claims 1-5, comprising the steps of:
the encryption algorithm comprises an encryption step and a decryption step, wherein the encryption step is as follows:
firstly, a storage party performs user biological information verification, an information storage instruction is sent to the user platform, the storage equipment sends out an alarm when verification fails, and signature information is encrypted and transmitted to the storage equipment through a touch screen by WiFi (wireless fidelity);
dividing the signing information into handwritten signature information and signing document information through a character collecting sub-module;
step three, carrying out random encryption on the signature file information through a signature encryption model, preprocessing the signature file information to obtain a signature feature set, sequencing the signature feature set according to weights, randomly matching the signature feature set with a character encryption method in an encryption scheme library by combining a random number generation method, encrypting the signature file information according to the character encryption method matched with the signature feature set, and storing the encrypted signature file information to a signature storage submodule;
Generating a random key through a key derivation system, generating an original key through a DES encryption algorithm, adding a dynamic salt value into the original key, and then performing a double-connection serial hash algorithm on the original key added with the dynamic salt value to generate a final hash result which is the random key for encrypting handwritten signature information;
step five, periodically replacing a random key, sending a key updating instruction to a key deriving system every 24 hours through the signature encryption model, and receiving the key updating instruction by the key deriving system and recalculating the random key once;
step six, generating a symmetric encryption key, and combining the key generated by the AES with the random key to form the symmetric encryption key;
step seven, encrypting the handwritten signature information by adopting a symmetric encryption key, and storing the encrypted handwritten signature information into the signature storage sub-module;
the decryption step is as follows:
step 1, a user biological information verification is carried out by a search party, an information application instruction is sent to the user platform after the verification is successful, and an alarm is sent if the verification fails;
step 2, the user platform receives the information application instruction and then sends the secret key of the signing file information to the searching party;
Step 3, the inquiring party applies for the symmetric encryption key to the user platform, obtains the timestamp and the ID of the storage party through the RSA key, sends application information to the user platform, and asks for the symmetric encryption key to the user platform;
step 4, the searching party obtains a symmetric encryption key, the user platform authenticates the request information of the searching party, after the authentication is successful, the user platform sends the request information to the signature encryption model, the signature encryption model sends the symmetric encryption key to the searching party, and the searching party uses the symmetric encryption key to realize decryption operation of handwritten signature information;
and 5, the complete signing information is obtained by the searching party, the handwritten signature information and the signing file information are combined into signing information through the data processing module, and the signing information is encrypted and transmitted to the touch screen through the WiFi through the storage equipment.
7. A handwriting signing medium of a passive electromagnetic touch screen is characterized in that: the device is applied to the passive electromagnetic touch screen handwriting signing storage device of any one of claims 1 to 5, wherein the medium is an encrypted WiFi wireless local area network adopting a WSP2 protocol and is used for transmitting handwriting signing information between the touch screen and the storage device.
CN202310744199.8A 2023-06-25 2023-06-25 Encryption algorithm, medium and storage device for handwriting signing of passive electromagnetic touch screen Active CN116484412B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310744199.8A CN116484412B (en) 2023-06-25 2023-06-25 Encryption algorithm, medium and storage device for handwriting signing of passive electromagnetic touch screen

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310744199.8A CN116484412B (en) 2023-06-25 2023-06-25 Encryption algorithm, medium and storage device for handwriting signing of passive electromagnetic touch screen

Publications (2)

Publication Number Publication Date
CN116484412A CN116484412A (en) 2023-07-25
CN116484412B true CN116484412B (en) 2024-03-22

Family

ID=87218119

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310744199.8A Active CN116484412B (en) 2023-06-25 2023-06-25 Encryption algorithm, medium and storage device for handwriting signing of passive electromagnetic touch screen

Country Status (1)

Country Link
CN (1) CN116484412B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1675876A (en) * 2002-06-18 2005-09-28 德米特里·亚历克山得罗维奇·格特纳 Individual cryptoprotective complex
CN101872420A (en) * 2010-06-10 2010-10-27 石明霞 Encrypted writing signing mobile terminal
CN101989984A (en) * 2010-08-24 2011-03-23 北京易恒信认证科技有限公司 Electronic document safe sharing system and method thereof
CN106302411A (en) * 2016-08-03 2017-01-04 西安邮电大学 The secure cloud storage method and system of support file encryption based on windows platform
EP3321833A1 (en) * 2016-11-14 2018-05-16 Mastercard International Incorporated Method for biometric based signing of document
CN208636819U (en) * 2018-06-28 2019-03-22 深圳市上融科技有限公司 A kind of encryption electromagnetic screen
CN110188548A (en) * 2019-05-14 2019-08-30 河北世窗信息技术股份有限公司 A kind of official document signs the method and system of file protection, transmission and storage
CN210181577U (en) * 2019-08-07 2020-03-24 深圳市上融科技有限公司 Passive electromagnetic screen with biological identification function
CN111062046A (en) * 2019-12-23 2020-04-24 安徽中科美络信息技术有限公司 Handwritten endorsement data security management method and endorsement terminal
CN111383001A (en) * 2020-03-13 2020-07-07 陕西金合信息科技股份有限公司 Electronic document signing management system and method
CN111654510A (en) * 2020-06-28 2020-09-11 福建捷宇电脑科技有限公司 Signing terminal with national encryption function and signing data transmission method
CN114900304A (en) * 2021-12-29 2022-08-12 北京爱知之星科技股份有限公司 Digital signature method and apparatus, electronic device, and computer-readable storage medium
CN115996120A (en) * 2023-03-22 2023-04-21 江西经济管理干部学院 Computer data encryption and decryption method and system based on mobile storage device

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1675876A (en) * 2002-06-18 2005-09-28 德米特里·亚历克山得罗维奇·格特纳 Individual cryptoprotective complex
CN101872420A (en) * 2010-06-10 2010-10-27 石明霞 Encrypted writing signing mobile terminal
CN101989984A (en) * 2010-08-24 2011-03-23 北京易恒信认证科技有限公司 Electronic document safe sharing system and method thereof
CN106302411A (en) * 2016-08-03 2017-01-04 西安邮电大学 The secure cloud storage method and system of support file encryption based on windows platform
EP3321833A1 (en) * 2016-11-14 2018-05-16 Mastercard International Incorporated Method for biometric based signing of document
CN208636819U (en) * 2018-06-28 2019-03-22 深圳市上融科技有限公司 A kind of encryption electromagnetic screen
CN110188548A (en) * 2019-05-14 2019-08-30 河北世窗信息技术股份有限公司 A kind of official document signs the method and system of file protection, transmission and storage
CN210181577U (en) * 2019-08-07 2020-03-24 深圳市上融科技有限公司 Passive electromagnetic screen with biological identification function
CN111062046A (en) * 2019-12-23 2020-04-24 安徽中科美络信息技术有限公司 Handwritten endorsement data security management method and endorsement terminal
CN111383001A (en) * 2020-03-13 2020-07-07 陕西金合信息科技股份有限公司 Electronic document signing management system and method
CN111654510A (en) * 2020-06-28 2020-09-11 福建捷宇电脑科技有限公司 Signing terminal with national encryption function and signing data transmission method
CN114900304A (en) * 2021-12-29 2022-08-12 北京爱知之星科技股份有限公司 Digital signature method and apparatus, electronic device, and computer-readable storage medium
CN115996120A (en) * 2023-03-22 2023-04-21 江西经济管理干部学院 Computer data encryption and decryption method and system based on mobile storage device

Also Published As

Publication number Publication date
CN116484412A (en) 2023-07-25

Similar Documents

Publication Publication Date Title
KR102536354B1 (en) Systems and methods for biometric identification
TWI615012B (en) Method, device, and server for cryptographic key generation and non-transitory computer readable storage medium thereof
US9787647B2 (en) Secure computer evaluation of decision trees
US9660991B2 (en) Relational encryption
Yuan et al. Efficient privacy-preserving biometric identification in cloud computing
CN107145791B (en) K-means clustering method and system with privacy protection function
JP6180177B2 (en) Encrypted data inquiry method and system capable of protecting privacy
Zhu et al. An efficient and privacy-preserving biometric identification scheme in cloud computing
WO2024077948A1 (en) Private query method, apparatus and system, and storage medium
CN112948795B (en) Identity authentication method and device for protecting privacy
CN115336223A (en) Optimized private biometric matching
Tong et al. VFIRM: Verifiable fine-grained encrypted image retrieval in multi-owner multi-user settings
CN116415079B (en) Top-K track similarity query method for privacy protection
Liu et al. A secure medical information management system for wireless body area networks
CN116484412B (en) Encryption algorithm, medium and storage device for handwriting signing of passive electromagnetic touch screen
Bai et al. CryptoMask: Privacy-preserving Face Recognition
Selimović et al. Authentication based on the image encryption using delaunay triangulation and catalan objects
CN114065169B (en) Privacy protection biometric authentication method and device and electronic equipment
CN115278673A (en) Lightweight biometric authentication method and system based on joint biometric identification
CN110059630B (en) Verifiable outsourced monitoring video pedestrian re-identification method with privacy protection
WO2021167534A1 (en) Biometric template recognition system
Narayan A review on elliptic curve cryptography
CN117131209B (en) Phrase searching and verifying method and system for encrypted data based on blockchain
Kotte et al. Providing Security to Ensure Biometric Identification System in Cloud
CN115733616A (en) Biological characteristic authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant