CN116611082A - File electronic signature algorithm capable of improving electronic signature security - Google Patents

File electronic signature algorithm capable of improving electronic signature security Download PDF

Info

Publication number
CN116611082A
CN116611082A CN202310363785.8A CN202310363785A CN116611082A CN 116611082 A CN116611082 A CN 116611082A CN 202310363785 A CN202310363785 A CN 202310363785A CN 116611082 A CN116611082 A CN 116611082A
Authority
CN
China
Prior art keywords
electronic signature
image
signature
electronic
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310363785.8A
Other languages
Chinese (zh)
Inventor
孙林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Youpei Electronic Technology Co ltd
Original Assignee
Jiangsu Youpei Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Youpei Electronic Technology Co ltd filed Critical Jiangsu Youpei Electronic Technology Co ltd
Priority to CN202310363785.8A priority Critical patent/CN116611082A/en
Publication of CN116611082A publication Critical patent/CN116611082A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a file electronic signature algorithm capable of improving the security of electronic signature, which relates to the technical field of electronic signature and comprises the following steps: (1) uploading an electronic signature image; (2) electronic signature image segmentation; (3) encrypting the electronic signature image; (4) invoking decryption of the electronic signature image; (5) checking the electronic signature image; (6) generating an electronic signature; (7) And (8) executing the electronic signature and distinguishing the electronic signature. The file electronic signature algorithm capable of improving the security of the electronic signature has the advantages that the decryption structure is more complex and the decryption difficulty is higher through different encryption forms, the decrypted electronic signature image can be checked later, the correctness of the electronic signature image is ensured, signature data are added in the process of generating and executing the electronic signature provided with signature information, the electronic signature is not easy to be stolen, and the electronic signature is beneficial to realizing independent and controllable information security and is safe and reliable.

Description

File electronic signature algorithm capable of improving electronic signature security
Technical Field
The invention relates to the technical field of electronic signature, in particular to a file electronic signature algorithm capable of improving the security of electronic signature.
Background
Electronic signatures, which generally refer to all electronic forms that exist, are attached to and logically associated with electronic documents, can be used to identify the signer of the electronic document, ensure the integrity of the document, and represent the content of the facts stated by the signer in agreement with the electronic document. The electronic signature is a representation form of the electronic signature, the electronic signature operation is converted into the same visual effect as the paper file stamping operation by utilizing an image processing technology, and meanwhile, the authenticity and the integrity of the electronic information and the non-repudiation of a signer are ensured by utilizing the electronic signature technology.
The existing electronic signature algorithm for files is easy to crack in the process of being applied to a blockchain through encrypting and decrypting the mode by a single secret key, and has insufficient safety.
Accordingly, in view of the above, research and improvement on the existing structure and the existing defects are performed, and a document electronic signature algorithm capable of improving the security of the electronic signature is proposed.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a file electronic signature algorithm capable of improving the security of electronic signature, and solves the problems in the background art.
In order to achieve the above object, the present invention is realized by the following technical scheme, and the document electronic signature algorithm capable of improving the security of electronic signature includes the following specific steps:
(1) Electronic signature image upload
Scanning and reading an original seal image to obtain an electronic signature image, binding the electronic signature image with a digital certificate, and uploading the individual seal image, a public key and part of individual identity information of a user to a blockchain authentication center by a blockchain user, so that the blockchain authentication center verifies the identity of the user, after verifying the identity, the blockchain user distributes a corresponding signature number for the seal image sent by the user, and then generates a key pair for the electronic signature;
(2) Electronic signature image segmentation
The signing system of the block chain divides the electronic signature image into a plurality of pixel images, encodes each pixel image, and converts encoded pixel image data into a digital form to be stored in a database;
(3) Electronic signature image encryption
Then, the acquisition authority of the electronic signature image is encrypted in a verification code mode, the correct coding sequence of the pixel image is encrypted through an encryption algorithm, and the decryption structure is more complex and the decryption difficulty is higher due to different encryption modes.
Further, the file electronic signature algorithm capable of improving the security of the electronic signature further comprises the following specific steps:
(4) Electronic signature image call decryption
Acquiring calling authority of digital pixel image data by inputting a verification code, calling and converting to obtain encoded pixel image data, decrypting the encrypted correct encoding sequence through a key of an encryption algorithm to obtain a correct pixel image encoding string, and recombining a plurality of pixel images into a complete seal image, namely an electronic signature image according to the correct encoding sequence;
(5) Electronic signature image use verification
After the decrypted electronic signature image is obtained, a signature number corresponding to the electronic signature image is input, and the signature number stored in the background and the corresponding seal image are checked by a signature system of the blockchain to ensure that the electronic signature image is correct.
Further, the file electronic signature algorithm capable of improving the security of the electronic signature further comprises the following specific steps:
(6) Electronic signature generation
Then the signing system of the blockchain carries out encryption operation on the signing mechanism name, the signing number and the signing time of the user by utilizing the private key of the user to obtain signature data; and embedding the signature data and the digital certificate into the electronic signature image in a watermark form to generate a complete electronic signature.
Further, the file electronic signature algorithm capable of improving the security of the electronic signature further comprises the following specific steps:
(7) Electronic signature execution
And adding a signature domain at a position to be signed of the electronic document file or the PDF file, inserting an electronic signature at the position of the signature domain selected by a signature user in the electronic document file or the PDF file to be signed by the signature system, and executing the electronic signature on the specified electronic file to generate a signature file.
Further, the file electronic signature algorithm capable of improving the security of the electronic signature further comprises the following specific steps:
(8) Electronic signature discrimination
The signature file receiver verifies the information of the electronic signature through the public key, ensures that the electronic signature is consistent with the corresponding digital certificate, prevents tamper through signature verification, and improves the safety.
Further, in the process of uploading the electronic signature image in the step (1), the electronic signature generated by the original seal image must have uniqueness and reliability.
Further, in the process of uploading the electronic signature image in the step (1), the blockchain user generates a key pair of the blockchain user aiming at the electronic signature, wherein the key pair of the electronic signature adopts a public key system, namely, encryption and decryption are carried out by utilizing a pair of mutually matched keys, and each user sets a specific private key only for the user to carry out decryption and signature; a public key is set and disclosed by the user, and is shared by a group of users and used for encrypting and verifying the signature.
Furthermore, in the process of invoking and decrypting the electronic signature image in the step (4), the verification code input when the invoking right of the pixel image data in the digital form is obtained can be a dynamic verification code or a mobile phone short message verification code of the electronic signature user, so that the theft is prevented.
The invention provides a file electronic signature algorithm capable of improving the security of electronic signature, which has the following beneficial effects: the file electronic signature algorithm capable of improving the security of the electronic signature is characterized in that an electronic signature image is divided into a plurality of pixel images, then encoding and storing are carried out, in the process of subsequently calling the signature, verification codes are required to be input to acquire calling rights, on the other hand, decryption is also required to be carried out to acquire correct pixel image encoding strings, the plurality of pixel images can be recombined into a complete seal image according to a correct encoding sequence, therefore, a decryption structure is more complicated through different encryption forms, the cracking difficulty is higher, verification can be carried out on the decrypted electronic signature image, the correctness of the electronic signature image is ensured, signature data such as signature numbers, signature time and the like are added in the process of generating and executing the electronic signature with signature information, the electronic signature is not easy to be stolen, and therefore, the file electronic signature is beneficial to realizing autonomous and controllable information security, and is safe and reliable, and compliance and data security of a user signed file are guaranteed.
Drawings
Fig. 1 is a schematic overall flow chart of a document electronic signature algorithm capable of improving the security of electronic signature according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will clearly and fully describe the technical solutions of the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments.
The file electronic signature algorithm capable of improving the electronic signature security comprises the following specific steps:
(1) Electronic signature image upload
Scanning and reading an original seal image to obtain an electronic signature image, binding the electronic signature image with a digital certificate, and uploading the individual seal image, a public key and part of individual identity information of a user to a blockchain authentication center by a blockchain user, so that the blockchain authentication center verifies the identity of the user, after verifying the identity, the blockchain user distributes a corresponding signature number for the seal image sent by the user, and then generates a key pair for the electronic signature;
(2) Electronic signature image segmentation
The signing system of the block chain divides the electronic signature image into a plurality of pixel images, encodes each pixel image, and converts encoded pixel image data into a digital form to be stored in a database;
(3) Electronic signature image encryption
Then, the acquisition authority of the electronic signature image is encrypted in a verification code mode, the correct coding sequence of the pixel image is encrypted through an encryption algorithm, and the decryption structure is more complex and the decryption difficulty is higher due to different encryption modes.
The file electronic signature algorithm capable of improving the security of the electronic signature further comprises the following specific steps:
(4) Electronic signature image call decryption
Acquiring calling authority of digital pixel image data by inputting a verification code, calling and converting to obtain encoded pixel image data, decrypting the encrypted correct encoding sequence through a key of an encryption algorithm to obtain a correct pixel image encoding string, and recombining a plurality of pixel images into a complete seal image, namely an electronic signature image according to the correct encoding sequence;
(5) Electronic signature image use verification
After the decrypted electronic signature image is obtained, a signature number corresponding to the electronic signature image is input, and the signature number stored in the background and the corresponding seal image are checked by a signature system of the blockchain to ensure that the electronic signature image is correct.
The file electronic signature algorithm capable of improving the security of the electronic signature further comprises the following specific steps:
(6) Electronic signature generation
Then the signing system of the blockchain carries out encryption operation on the signing mechanism name, the signing number and the signing time of the user by utilizing the private key of the user to obtain signature data; and embedding the signature data and the digital certificate into the electronic signature image in a watermark form to generate a complete electronic signature.
The file electronic signature algorithm capable of improving the security of the electronic signature further comprises the following specific steps:
(7) Electronic signature execution
And adding a signature domain at a position to be signed of the electronic document file or the PDF file, inserting an electronic signature at the position of the signature domain selected by a signature user in the electronic document file or the PDF file to be signed by the signature system, and executing the electronic signature on the specified electronic file to generate a signature file.
The file electronic signature algorithm capable of improving the security of the electronic signature further comprises the following specific steps:
(8) Electronic signature discrimination
The signature file receiver verifies the information of the electronic signature through the public key, ensures that the electronic signature is consistent with the corresponding digital certificate, prevents tamper through signature verification, and improves the safety.
In the process of uploading the electronic signature image in the step (1), the electronic signature generated by the original seal image must have uniqueness and reliability.
In the process of uploading an electronic signature image, a blockchain user generates a private key pair of the user aiming at the electronic signature, wherein the private key pair of the electronic signature adopts a public key system, namely, encryption and decryption are carried out by utilizing a pair of mutually matched private keys, and each user sets a specific private key only for the user to carry out decryption and signature; a public key is set and disclosed by the user, and is shared by a group of users and used for encrypting and verifying the signature.
In the step (4), in the process of invoking and decrypting the electronic signature image, the verification code input when the invoking right of the pixel image data in a digital form is acquired can be a dynamic verification code or a mobile phone short message verification code of the electronic signature user, so that the embezzlement is prevented.
In summary, the file electronic signature algorithm capable of improving the security of the electronic signature comprises the following specific steps:
(1) Uploading an electronic signature image: scanning and reading an original seal image to obtain an electronic seal image, wherein the electronic seal generated by the original seal image must have uniqueness and reliability, binding the electronic seal image with a digital certificate, then uploading the seal image, a public key and part of personal identity information of a user to a blockchain authentication center by a blockchain user, so that the blockchain authentication center verifies the identity of the user, then distributing a corresponding seal number for the seal image sent by the user after verifying the identity, and the blockchain user generates a self key pair for the electronic seal, wherein the key pair of the electronic seal adopts a public key system, namely, a pair of mutually matched keys is used for encryption and decryption, and each user sets a special private key only for the user himself to decrypt and seal; simultaneously setting a public key and disclosing the public key by the inventor, wherein the public key is shared by a group of users and is used for encrypting and verifying signature;
(2) Electronic signature image segmentation: the signing system of the block chain divides the electronic signature image into a plurality of pixel images, encodes each pixel image, and converts encoded pixel image data into a digital form to be stored in a database;
(3) Electronic signature image encryption: then encrypting the acquisition authority of the electronic signature image in a verification code mode, encrypting the correct coding sequence of the pixel image by an encryption algorithm, and enabling the decryption structure to be more complex and the decryption difficulty to be higher by different encryption modes;
(4) Decryption is invoked by the electronic signature image: the method comprises the steps that through a mode of inputting verification codes, calling authority of digital pixel image data is obtained, when the calling authority of the digital pixel image data is obtained, the input verification codes can be dynamic verification codes or mobile phone short message verification codes of electronic signature users, theft is prevented, the coded pixel image data is obtained after calling and conversion, then the encrypted correct coding sequence is decrypted through a key of an encryption algorithm, a correct pixel image coding string is obtained, and a plurality of pixel images can be recombined into a complete seal image according to the correct coding sequence, namely an electronic signature image;
(5) Verification of electronic signature image use: after the decrypted electronic signature image is obtained, a signature number corresponding to the electronic signature image is input, and a signature system of a blockchain carries out verification on the signature number stored in the background and the corresponding seal image to ensure that the electronic signature image is correct;
(6) Electronic signature generation: then the signing system of the blockchain carries out encryption operation on the signing mechanism name, the signing number and the signing time of the user by utilizing the private key of the user to obtain signature data; embedding the signature data and the digital certificate into the electronic signature image in a watermark form to generate a complete electronic signature;
(7) Electronic signature execution: adding a signature domain at a position to be signed of an electronic document file or a PDF file, inserting an electronic signature at the position of the signature domain selected by a signature user in the electronic document file or the PDF file to be signed by a signature system, and executing the electronic signature on the specified electronic file to generate a signature file;
(8) And (3) electronic signature discrimination: the signature file receiver verifies the information of the electronic signature through the public key, ensures that the electronic signature is consistent with the corresponding digital certificate, prevents tamper through signature verification, and improves the safety.
The foregoing is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art, who is within the scope of the present invention, should make equivalent substitutions or modifications according to the technical scheme of the present invention and the inventive concept thereof, and should be covered by the scope of the present invention.

Claims (8)

1. The file electronic signature algorithm capable of improving the electronic signature safety is characterized by comprising the following specific steps of:
(1) Electronic signature image upload
Scanning and reading an original seal image to obtain an electronic signature image, binding the electronic signature image with a digital certificate, and uploading the individual seal image, a public key and part of individual identity information of a user to a blockchain authentication center by a blockchain user, so that the blockchain authentication center verifies the identity of the user, after verifying the identity, the blockchain user distributes a corresponding signature number for the seal image sent by the user, and then generates a key pair for the electronic signature;
(2) Electronic signature image segmentation
The signing system of the block chain divides the electronic signature image into a plurality of pixel images, encodes each pixel image, and converts encoded pixel image data into a digital form to be stored in a database;
(3) Electronic signature image encryption
Then, the acquisition authority of the electronic signature image is encrypted in a verification code mode, the correct coding sequence of the pixel image is encrypted through an encryption algorithm, and the decryption structure is more complex and the decryption difficulty is higher due to different encryption modes.
2. The electronic signature algorithm for documents with improved electronic signature security as recited in claim 1, wherein said electronic signature algorithm for documents with improved electronic signature security further comprises the following specific steps:
(4) Electronic signature image call decryption
Acquiring calling authority of digital pixel image data by inputting a verification code, calling and converting to obtain encoded pixel image data, decrypting the encrypted correct encoding sequence through a key of an encryption algorithm to obtain a correct pixel image encoding string, and recombining a plurality of pixel images into a complete seal image, namely an electronic signature image according to the correct encoding sequence;
(5) Electronic signature image use verification
After the decrypted electronic signature image is obtained, a signature number corresponding to the electronic signature image is input, and the signature number stored in the background and the corresponding seal image are checked by a signature system of the blockchain to ensure that the electronic signature image is correct.
3. The electronic signature algorithm for documents with improved electronic signature security as recited in claim 1, wherein said electronic signature algorithm for documents with improved electronic signature security further comprises the following specific steps:
(6) Electronic signature generation
Then the signing system of the blockchain carries out encryption operation on the signing mechanism name, the signing number and the signing time of the user by utilizing the private key of the user to obtain signature data; and embedding the signature data and the digital certificate into the electronic signature image in a watermark form to generate a complete electronic signature.
4. The electronic signature algorithm for documents with improved electronic signature security as recited in claim 1, wherein said electronic signature algorithm for documents with improved electronic signature security further comprises the following specific steps:
(7) Electronic signature execution
And adding a signature domain at a position to be signed of the electronic document file or the PDF file, inserting an electronic signature at the position of the signature domain selected by a signature user in the electronic document file or the PDF file to be signed by the signature system, and executing the electronic signature on the specified electronic file to generate a signature file.
5. The electronic signature algorithm for documents with improved electronic signature security as recited in claim 1, wherein said electronic signature algorithm for documents with improved electronic signature security further comprises the following specific steps:
(8) Electronic signature discrimination
The signature file receiver verifies the information of the electronic signature through the public key, ensures that the electronic signature is consistent with the corresponding digital certificate, prevents tamper through signature verification, and improves the safety.
6. The document electronic signature algorithm capable of improving electronic signature security as recited in claim 1, wherein: in the process of uploading the electronic signature image in the step (1), the electronic signature generated by the original seal image must have uniqueness and reliability.
7. The document electronic signature algorithm capable of improving electronic signature security as recited in claim 1, wherein: in the step (1) of uploading the electronic signature image, a blockchain user generates a key pair of the blockchain user aiming at the electronic signature, wherein the key pair of the electronic signature adopts a public key system, namely, encryption and decryption are carried out by utilizing a pair of mutually matched keys, and each user sets a specific private key only for the user to carry out decryption and signature; a public key is set and disclosed by the user, and is shared by a group of users and used for encrypting and verifying the signature.
8. The document electronic signature algorithm for improving the security of electronic signatures as set forth in claim 2 wherein: in the step (4), in the process of invoking and decrypting the electronic signature image, the verification code input when the invoking right of the pixel image data in a digital form is acquired can be a dynamic verification code or a mobile phone short message verification code of the electronic signature user, so that the theft is prevented.
CN202310363785.8A 2023-04-07 2023-04-07 File electronic signature algorithm capable of improving electronic signature security Pending CN116611082A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310363785.8A CN116611082A (en) 2023-04-07 2023-04-07 File electronic signature algorithm capable of improving electronic signature security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310363785.8A CN116611082A (en) 2023-04-07 2023-04-07 File electronic signature algorithm capable of improving electronic signature security

Publications (1)

Publication Number Publication Date
CN116611082A true CN116611082A (en) 2023-08-18

Family

ID=87680737

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310363785.8A Pending CN116611082A (en) 2023-04-07 2023-04-07 File electronic signature algorithm capable of improving electronic signature security

Country Status (1)

Country Link
CN (1) CN116611082A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116828203A (en) * 2023-08-30 2023-09-29 北京点聚信息技术有限公司 Intelligent encryption protection method for electronic seal
CN117171817A (en) * 2023-11-03 2023-12-05 北京点聚信息技术有限公司 Electronic signature safety management method based on block chain
CN118013494A (en) * 2024-04-08 2024-05-10 福建亿榕信息技术有限公司 Identity verification method and system based on vectorization signature

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111833004A (en) * 2019-04-23 2020-10-27 天地融科技股份有限公司 Signature method, verification method and system of electronic signature
CN111914283A (en) * 2020-08-20 2020-11-10 绍兴市麦芒智能科技有限公司 File electronic signature algorithm based on big data block chain
CN113360952A (en) * 2021-05-21 2021-09-07 浙江百汇企业服务集团有限公司 Novel electronic seal processing method
CN114662132A (en) * 2022-04-12 2022-06-24 平安国际智慧城市科技股份有限公司 Block chain-based electronic seal monitoring method, device, equipment and medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111833004A (en) * 2019-04-23 2020-10-27 天地融科技股份有限公司 Signature method, verification method and system of electronic signature
CN111914283A (en) * 2020-08-20 2020-11-10 绍兴市麦芒智能科技有限公司 File electronic signature algorithm based on big data block chain
CN113360952A (en) * 2021-05-21 2021-09-07 浙江百汇企业服务集团有限公司 Novel electronic seal processing method
CN114662132A (en) * 2022-04-12 2022-06-24 平安国际智慧城市科技股份有限公司 Block chain-based electronic seal monitoring method, device, equipment and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
余香敏;焦占亚;: "数字水印在电子印章系统中的应用", 自动化与信息工程, no. 03 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116828203A (en) * 2023-08-30 2023-09-29 北京点聚信息技术有限公司 Intelligent encryption protection method for electronic seal
CN116828203B (en) * 2023-08-30 2023-10-27 北京点聚信息技术有限公司 Intelligent encryption protection method for electronic seal
CN117171817A (en) * 2023-11-03 2023-12-05 北京点聚信息技术有限公司 Electronic signature safety management method based on block chain
CN117171817B (en) * 2023-11-03 2024-01-19 北京点聚信息技术有限公司 Electronic signature safety management method based on block chain
CN118013494A (en) * 2024-04-08 2024-05-10 福建亿榕信息技术有限公司 Identity verification method and system based on vectorization signature

Similar Documents

Publication Publication Date Title
US10594688B2 (en) Privacy-enhanced biometrics-secret binding scheme
CN116611082A (en) File electronic signature algorithm capable of improving electronic signature security
US8285991B2 (en) Electronically signing a document
EP3132368B1 (en) Method and apparatus of verifying usability of biological characteristic image
CN110870283A (en) Data validation
US20070277040A1 (en) Electronically Signing a Document
CN106951943B (en) Method for printing credible electronic contract into paper contract and recovering electronic contract
CN110391914B (en) File acquisition method and equipment based on two-dimensional code and two-dimensional code generation method
CN105825257A (en) Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof
CN108900298B (en) Quantum cipher watermark-based private block chain honest node authentication access method
JPH06176036A (en) Method for forming duplication which can be authenticated
US7606768B2 (en) Voice signature with strong binding
CN1382332A (en) Method of data protection
IL137099A (en) Method for carrying out secure digital signature and a system therefor
JP2009519490A (en) Secure threshold decryption protocol calculation
CN107294964B (en) Information transmission method
WO2022193620A1 (en) Encoding method and apparatus for network file protection, and decoding method and apparatus for network file protection
CN111541713A (en) Identity authentication method and device based on block chain and user signature
CN101894232B (en) Safe input method applied to identity authentication
CN112597455A (en) Document anti-counterfeiting method and device
CN110210270A (en) Two-dimensional barcode information safety encryption and system and image in 2 D code analytic method and system
CN104715537A (en) Encryption and decryption method based on digital tags
Wang et al. Securing image-based document transmission in logistics and supply chain management through cheating-resistant visual cryptographic protocols
EP3316162B1 (en) Method and system for creating an electronic signature of a document associated to a person by means of the voice print of the person, and corresponding method for verifying the electronic signature
Mark et al. A secured online voting system by using blockchain as the medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination