WO2019136805A1 - 数字签名生成方法、装置和计算机设备 - Google Patents

数字签名生成方法、装置和计算机设备 Download PDF

Info

Publication number
WO2019136805A1
WO2019136805A1 PCT/CN2018/077441 CN2018077441W WO2019136805A1 WO 2019136805 A1 WO2019136805 A1 WO 2019136805A1 CN 2018077441 W CN2018077441 W CN 2018077441W WO 2019136805 A1 WO2019136805 A1 WO 2019136805A1
Authority
WO
WIPO (PCT)
Prior art keywords
characters
key
digital signature
string
value pairs
Prior art date
Application number
PCT/CN2018/077441
Other languages
English (en)
French (fr)
Inventor
郑乐银
王辉耀
方杰
Original Assignee
深圳市沃特沃德股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市沃特沃德股份有限公司 filed Critical 深圳市沃特沃德股份有限公司
Publication of WO2019136805A1 publication Critical patent/WO2019136805A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • the present invention relates to the field of information security technologies, and in particular, to a digital signature generation method, apparatus, and computer device.
  • a digital signature is a string of digits that only the sender of the message can produce that cannot be forged by others. This digit string is also a valid proof of the authenticity of the information sent by the sender of the message.
  • the digital signature technique encrypts the digest information with the sender's private key (private key) and transmits it to the recipient along with the original text.
  • the receiver can decrypt the encrypted digest information only by using the sender's public key, and then use the HASH function to generate a digest message for the received original text, which is compared with the decrypted digest information. If they are the same, the received information is complete and has not been modified during the transmission. Otherwise, the information has been modified. Therefore, the digital signature can verify the integrity and authenticity of the information, thus ensuring the security of data transmission.
  • Json data consists of key-value pairs, each of which includes a key and a value.
  • Json data is digitally signed, all the characters in the values of all the key value pairs are extracted to form a character string and encrypted, and the encrypted character string is used as a digital signature.
  • the existing digital signature generation rules are relatively simple, and the security is mainly guaranteed by the encryption algorithm.
  • the third party steals the encrypted private key, it can imitate the digital signature and perform the number like the owner of the real key. Signature, so that you can hijack the data in transit and tamper with it, get identity authentication and obtain the right after authentication, so the security needs to be further improved.
  • the main object of the present invention is to provide a digital signature generating method, apparatus and computer device aiming at improving the security of digital signatures.
  • an embodiment of the present invention provides a digital signature generating method, where the method includes the following steps:
  • a digital signature is generated based on the encrypted string.
  • the step of selecting characters of the specified number of bits from the values of the at least two key value pairs to form the initial character string comprises:
  • the selected characters are arranged in order to form an initial string.
  • the step of sequentially selecting the characters of the specified number of bits from the values of each of the key-value pairs in the order of the key-value pairs comprises: sequentially selecting the values of each of the key-value pairs according to the order of the key-value pairs The first N characters, N ⁇ 1.
  • the step of sequentially selecting the characters of the specified number of bits from the values of each of the key-value pairs in the order of the key-value pairs comprises: sequentially selecting the values of each of the key-value pairs according to the order of the key-value pairs The last N characters, N ⁇ 1.
  • the step of sequentially selecting the characters of the specified number of bits from the values of each of the key-value pairs in the order of the key-value pairs comprises: sequentially selecting the values of each of the key-value pairs according to the order of the key-value pairs The Mth character, M ⁇ 1; wherein, when the number of bits of the value of the key value pair is less than M, the last character is selected.
  • the step of sequentially arranging the selected characters into an initial character string comprises: sequentially arranging the selected characters according to a sequence in which the characters are selected, forming a character string, and using the character string as the initial string. String.
  • the step of generating a digital signature according to the encrypted string includes:
  • the string is generated as the digital signature.
  • the step of selecting K characters from the encrypted character string to form a character string comprises: selecting a first K characters in the encrypted character string to form a character string.
  • the step of selecting K characters from the encrypted character string to form a character string comprises: selecting a last K characters in the encrypted character string to form a character string.
  • the embodiment of the invention simultaneously provides a digital signature generating device, the device comprising:
  • Selecting a module and setting an initial string to select a character of a specified number of bits from values of at least two key-value pairs;
  • An encryption module configured to encrypt the initial string to generate an encrypted string
  • a generating module is configured to generate a digital signature based on the encrypted string.
  • the selecting module includes:
  • the combination unit is set to arrange the selected characters in order to form an initial string.
  • the selecting unit is configured to: sequentially select the first N characters in the value of each key value pair according to the order of the key value pairs, N ⁇ 1.
  • the selecting unit is configured to: sequentially select the last N characters in the value of each key value pair according to the order of the key value pairs, N ⁇ 1.
  • the selecting unit is configured to: sequentially select an Mth character of each key value pair according to an arrangement order of the key value pairs, where M ⁇ 1; wherein, when the value of the key value pair is When the number is less than M, the last character is selected.
  • the combining unit is configured to sequentially arrange the selected characters according to a sequence in which the characters are selected, to form a character string, and use the character string as the initial character string.
  • the generating module includes:
  • a generating unit is configured to generate the character string as the digital signature.
  • the selecting unit is configured to: select the first K characters in the encrypted string to form a character string.
  • the selecting unit is configured to: select the last K characters in the encrypted string to form a character string.
  • Embodiments of the present invention also provide a computer device including a memory, a processor, and at least one application stored in the memory and configured to be executed by the processor, the application being configured to be used for The aforementioned digital signature generation method is executed.
  • a digital signature generating method provided by an embodiment of the present invention generates a digital signature by selecting characters of a specified number of bits from at least two key value pairs to form an initial character string and encrypting the character, because the character is selected. It is customized, thus increasing the complexity of the generation rule of the digital signature. Even if the third party steals the encrypted private key, it is not easy to imitate the digital signature, thereby improving the security of the digital signature and preventing the transmission data from being maliciously falsified. Improve the security of data transmission.
  • selecting a partial character string from the encrypted string to generate a digital signature further increases the complexity of the generation rule of the digital signature, improves the security of the digital signature, and further improves the security of the data transmission.
  • FIG. 1 is a flow chart of an embodiment of a digital signature generating method of the present invention
  • FIG. 2 is a block diagram showing an embodiment of a digital signature generating apparatus of the present invention
  • FIG. 3 is a block diagram of the selection module of Figure 2;
  • FIG. 4 is a block diagram of the generation module of FIG. 2.
  • terminal and terminal device used herein include both a wireless signal receiver device, a device having only a wireless signal receiver without a transmitting capability, and a receiving and transmitting hardware.
  • Such devices may include cellular or other communication devices having a single line display or a multi-line display or a cellular or other communication device without a multi-line display; PCS (Personal Communications Service), which may combine voice, data Processing, fax, and/or data communication capabilities; PDA (Personal Digital Assistant), which can include radio frequency receivers, pagers, Internet/Intranet access, web browsers, notepads, calendars, and/or GPS (Global Positioning System (Global Positioning System) receiver; conventional laptop and/or palmtop computer or other device having a conventional laptop and/or palmtop computer or other device that includes and/or includes a radio frequency receiver.
  • PCS Personal Communications Service
  • PDA Personal Digital Assistant
  • terminal may be portable, transportable, installed in a vehicle (aviation, sea and/or land), or adapted and/or configured to operate locally, and/or Run in any other location on the Earth and/or space in a distributed form.
  • the "terminal” and “terminal device” used herein may also be a communication terminal, an internet terminal, a music/video playing terminal, and may be, for example, a PDA, a MID (Mobile Internet Device), and/or have a music/video playback.
  • Functional mobile phones can also be smart TVs, set-top boxes and other devices.
  • the server used herein includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a cloud composed of a plurality of servers.
  • the cloud is based on cloud computing (Cloud Computing)
  • communication can be implemented by any communication means between the server, the terminal device and the WNS server, including but not limited to, mobile communication based on 3GPP, LTE, WIMAX, and computer network communication based on TCP/IP and UDP protocols. And short-range wireless transmission based on Bluetooth and infrared transmission standards.
  • the method and device for generating a digital signature in the embodiment of the present invention can be applied to a computer device such as a terminal device and a server.
  • the terminal device mainly refers to an electronic device such as a mobile phone, a tablet, a personal computer, a notebook computer, etc.
  • the server mainly refers to the terminal device on the user side.
  • a background system for data interaction such as a car background system. The following is a detailed description of the application to the in-vehicle background system.
  • the method includes the following steps:
  • each key-value pair includes a key and a value.
  • the in-vehicle background system first selects the characters of the specified number of bits from the values of each key-value pair according to the order of the key-value pairs (such as from the order of going to the back or from the back to the front), and then selecting The characters are sequentially arranged to form an initial string.
  • the selected characters are sequentially arranged in the order in which the characters are selected to form a string, and the string is used as an initial string.
  • the in-vehicle background system can select characters from the key-value pairs by:
  • the in-vehicle background system may sequentially select the first N (N ⁇ 1) characters in the value of each key-value pair according to the order of the key-value pairs, wherein the first N characters are the first character, the first two characters.
  • the character, the first three characters, etc. that is, the number of characters from the first character in the value to the next N characters.
  • the number of digits of the value is less than or equal to N, all the characters in the value are selected.
  • the in-vehicle background system selects the first two characters 56; when the value in the key-value pair is 7, the in-vehicle background system selects the character 7 .
  • the in-vehicle background system may sequentially select the last N (N ⁇ 1) characters in the value of each key-value pair according to the order of the key-value pairs, and the last N characters are the last character, the last two characters.
  • N the number of digits is less than or equal to N, all the characters in the value are selected.
  • the in-vehicle background system selects the last two characters 89; when the value in the key-value pair is 7, the in-vehicle background system selects the character 7 .
  • the in-vehicle background system may sequentially select the Mth (M ⁇ 1) characters in the value of each key-value pair according to the order of the key-value pairs, the M-th character being the first character, the second character. Characters, third characters, etc., wherein when the number of digits of the key-value pair is less than M, the last character is selected.
  • the in-vehicle background system selects the third character 1; when the value in the key-value pair is 56, the in-vehicle background system selects the last character. 6.
  • the in-vehicle background system may further select the first to third (I ⁇ 1, I ⁇ J) characters in the value of each key-value pair according to the order of the key-value pairs, the first to the first The characters are 1st to 3rd characters, 2nd to 5th characters, and so on.
  • the first to last character is selected; when the number of digits of the value is less than 1, the (J-I+1) character is selected from the back to the front or from the heading, if the value is Insufficient digits (J-I+1) take all the characters in the value.
  • the in-vehicle background system selects the character 6143; when the value is 561, the character 61 is selected; when the value is 5, the in-vehicle background system Then select the character 5.
  • the in-vehicle background system may also sequentially select odd-numbered or even-numbered characters in the value of each key-value pair according to the order of the key-value pairs. For example, assuming the value of the key-value pair is 5614389, the odd-numbered character 5139 can be selected, or the even-numbered character 648 can be selected.
  • the in-vehicle background system may not select characters from all of the key-value pairs, but select key-value pairs in a manner similar to the selected characters, and then select characters from the selected key-value pairs.
  • the in-vehicle backend system may select the first N (N ⁇ 1) key value pairs, the last N (N ⁇ 1) key value pairs, and the first to the first order according to the order of the key value pairs, I ⁇ J (I ⁇ 1, I ⁇ J)
  • the initial string is composed of all the characters in the key-value pair, the value of the key-value pair whose odd or even number is odd or even.
  • the in-vehicle background system uses the MD5 encryption algorithm to encrypt the initial string and generate an encrypted string.
  • MD5 encryption algorithm may also be used, which are not limited by the present invention.
  • the in-vehicle background system may generate the entire encrypted character string as a digital signature.
  • the in-vehicle background system first selects K (K ⁇ 2) characters from the encrypted character string to form a character string. The string is then generated as a digital signature to further improve security.
  • the in-vehicle background system may select the first K characters or the last K characters in the encrypted string to form a character string, where K is preferably 6 ⁇ K ⁇ 10, such as selecting the front of the encrypted string. 8 characters make up a string. You can also select the first to J (I ⁇ 1, I ⁇ J) characters in the encrypted string to form a string, of which 5 ⁇ JI ⁇ 9, for example, select the 2 ⁇ 9 characters in the encrypted string to form a character. string. You can also select an odd-numbered or even-bited character in an encrypted string to form a string.
  • the digital signature generating method of the embodiment of the present invention generates a digital signature by selecting characters of a specified number of bits from at least two key value pairs to form an initial character string, and encrypting the characters, because the character selection method is customized. Therefore, the complexity of the generation rule of the digital signature is increased. Even if the third party steals the encrypted private key, it is not easy to imitate the digital signature, thereby improving the security of the digital signature and preventing the transmission data from being maliciously falsified, thereby improving the data transmission. Security.
  • selecting a partial character string from the encrypted string to generate a digital signature further increases the complexity of the generation rule of the digital signature, improves the security of the digital signature, and further improves the security of the data transmission.
  • the apparatus includes a selecting module 10, an encryption module 20, and a generating module 30, wherein: the selecting module 10 is configured to select a specified number of bits from values of at least two key-value pairs.
  • the characters constitute an initial string; the encryption module 20 is configured to encrypt the initial string to generate an encrypted string; and the generating module 30 is configured to generate a digital signature based on the encrypted string.
  • the selection module 10 includes a selection unit 11 and a combination unit 12, wherein: the selection unit 11 is arranged in the order of the key value pairs (eg, from the back to the front or from the back to the front). The order of selecting a character with a specified number of bits from each value of the key value pair; the combining unit 12 is arranged to sequentially arrange the selected characters to form an initial character string, for example, the selected characters are sequentially arranged according to the order in which the characters are selected. Arrange, form a string, and use the string as the initial string.
  • the selecting unit 11 can select characters from the key value pairs by:
  • the selecting unit 11 may sequentially select the first N (N ⁇ 1) characters in the value of each key value pair according to the order of the key value pairs, and the first N characters are the first character, the first two characters.
  • the character, the first three characters, etc. that is, the number of characters from the first character in the value to the next N characters.
  • the number of digits of the value is less than or equal to N, all the characters in the value are selected.
  • the selection unit 11 selects the first two characters 56; when the value in the key-value pair is 7, the selection unit 11 selects the character 7 .
  • the selecting unit 11 may sequentially select the last N (N ⁇ 1) characters in the value of each key value pair according to the order of the key value pairs, and the last N characters are the last character, the last two characters. The character, the last three characters, etc., that is, the first N characters from the last character in the value. When the number of digits is less than or equal to N, all the characters in the value are selected.
  • the selection unit 11 selects the last two characters 89; when the value in the key-value pair is 7, the selection unit 11 selects the character 7 .
  • the selecting unit 11 may sequentially select the Mth (M ⁇ 1) characters in the value of each key value pair according to the order of the key value pairs, and the Mth character is the first character and the second character. Characters, third characters, etc., wherein when the number of digits of the key-value pair is less than M, the last character is selected.
  • the selection unit 11 selects the third character 1; when the value of the key-value pair is 56, the selection unit 11 selects the last character. 6.
  • the selecting unit 11 may also sequentially select the first to third (I ⁇ 1, I ⁇ J) characters in the value of each key value pair according to the order of the key value pairs, the first to the first The characters are 1st to 3rd characters, 2nd to 5th characters, and so on.
  • the first to last character is selected; when the number of digits of the value is less than 1, the (J-I+1) character is selected from the back to the front or from the heading, if the value is Insufficient digits (J-I+1) take all the characters in the value.
  • the selection unit 11 selects the character 6143; when the value is 561, the character 61 is selected; when the value is 5, the selection unit 11 Then select the character 5.
  • the selecting unit 11 may sequentially select the odd-numbered or even-numbered characters in the values of each of the key-value pairs in the order of the key-value pairs. For example, assuming that the value of the key-value pair is 5614389, the selection unit 11 can select the odd-numbered character 5139 or the even-numbered character 648.
  • the selection module 10 may not select characters from all of the key-value pairs, but select key-value pairs in a manner similar to the selected characters, and then select characters from the selected key-value pairs. .
  • the selection module 10 may select the first N (N ⁇ 1) key value pairs, the last N (N ⁇ 1) key value pairs, and the first to the first order according to the order of the key value pairs, I ⁇ J (I ⁇ 1, I ⁇ J)
  • the initial string is composed of all the characters in the key-value pair, the value of the key-value pair whose odd or even number is odd or even.
  • the encryption module 20 may perform an encryption process on the initial character string by using an MD5 encryption algorithm to generate an encrypted character string.
  • MD5 an MD5 encryption algorithm
  • other encryption algorithms may also be used, which are not limited by the present invention.
  • the generating module 30 can directly generate the entire encrypted string as a digital signature.
  • the generating module 30, as shown in FIG. 4 includes a selecting unit 31 and a generating unit 32, wherein: the selecting unit 31 is configured to select K characters from the encrypted character string to form a character String, K ⁇ 2; generation unit 32, set to generate a string as a digital signature.
  • the selecting unit 31 may select the first K characters or the last K characters in the encrypted character string to form a character string, wherein K is preferably 6 ⁇ K ⁇ 10, such as selecting the front of the encrypted character string. 8 characters make up a string. You can also select the first to J (I ⁇ 1, I ⁇ J) characters in the encrypted string to form a string, of which 5 ⁇ JI ⁇ 9, for example, select the 2 ⁇ 9 characters in the encrypted string to form a character. string. You can also select an odd-numbered or even-bited character in an encrypted string to form a string.
  • the digital signature generating apparatus of the embodiment of the present invention generates a digital signature by selecting characters of a specified number of bits from the values of at least two key value pairs to form an initial character string, and the method of selecting the characters is customized. Therefore, the complexity of the generation rule of the digital signature is increased. Even if the third party steals the encrypted private key, it is not easy to imitate the digital signature, thereby improving the security of the digital signature and preventing the transmission data from being maliciously falsified, thereby improving the data transmission. Security.
  • selecting a partial character string from the encrypted string to generate a digital signature further increases the complexity of the generation rule of the digital signature, improves the security of the digital signature, and further improves the security of the data transmission.
  • the invention also proposes a computer device comprising a memory, a processor and at least one application stored in the memory and configured to be executed by the processor, the application being configured to perform a digital signature generation method.
  • the method for generating the digital signature includes the steps of: selecting an initial character string from characters of at least two key value pairs to form an initial character string; encrypting the initial character string to generate an encrypted character string; generating the encrypted character string according to the encrypted character string digital signature.
  • the digital signature generation method described in this embodiment is a digital signature generation method according to the foregoing embodiment of the present invention, and details are not described herein again.
  • the computer device of the embodiment of the present invention generates a digital signature by selecting a character string of a specified number of bits from at least two key value pairs and encrypting the image, since the character selection method is customized,
  • the complexity of the generation rule of the digital signature is increased, and even if the third party steals the encrypted private key, it is not easy to imitate the digital signature, thereby improving the security of the digital signature and preventing the transmission data from being maliciously falsified, thereby improving the security of the data transmission. Sex.
  • selecting a partial character string from the encrypted string to generate a digital signature further increases the complexity of the generation rule of the digital signature, improves the security of the digital signature, and further improves the security of the data transmission.
  • the present invention includes apparatus that is directed to performing one or more of the operations described herein. These devices may be specially designed and manufactured for the required purposes, or may also include known devices in a general purpose computer. These devices have computer programs stored therein that are selectively activated or reconfigured.
  • Such computer programs may be stored in a device (eg, computer) readable medium or in any type of medium suitable for storing electronic instructions and coupled to a bus, respectively, including but not limited to any Types of disks (including floppy disks, hard disks, optical disks, CD-ROMs, and magneto-optical disks), ROM (Read-Only Memory), RAM (Random Access) Memory, random access memory), EPROM (Erasable Programmable Read-Only Memory, EEPROM (Electrically Erasable Programmable Read-Only Memory), flash memory, magnetic card or light card.
  • a readable medium includes any medium that is stored or transmitted by a device (eg, a computer) in a readable form.
  • each block of the block diagrams and/or block diagrams and/or flow diagrams and combinations of blocks in the block diagrams and/or block diagrams and/or flow diagrams can be implemented by computer program instructions. .
  • these computer program instructions can be implemented by a general purpose computer, a professional computer, or a processor of other programmable data processing methods, such that the processor is executed by a computer or other programmable data processing method.
  • steps, measures, and solutions in the various operations, methods, and processes that have been discussed in the present invention may be alternated, changed, combined, or deleted. Further, other steps, measures, and schemes of the various operations, methods, and processes that have been discussed in the present invention may be alternated, modified, rearranged, decomposed, combined, or deleted. Further, the steps, measures, and solutions in the prior art having various operations, methods, and processes disclosed in the present invention may also be alternated, changed, rearranged, decomposed, combined, or deleted.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

本发明揭示了一种数字签名生成方法、装置和计算机设备,所述方法包括以下步骤:从至少两个键值对的值中选取指定位数的字符组成初始字符串;对初始字符串进行加密处理,生成加密字符串;根据加密字符串生成数字签名。由于字符的挑选方式是自定义的,因此增加了数字签名的生成规则的复杂度,,从而提高了数字签名的安全性。

Description

数字签名生成方法、装置和计算机设备 技术领域
本发明涉及信息安全技术领域,特别是涉及到一种数字签名生成方法、装置和计算机设备。
背景技术
数字签名,是只有信息的发送者才能产生的别人无法伪造的一段数字串,这段数字串同时也是对信息的发送者发送信息真实性的一个有效证明。数字签名技术是将摘要信息用发送者的私钥(私人密钥)加密,与原文一起传送给接收者。接收者只有用发送者的公钥才能解密被加密的摘要信息,然后用HASH函数对收到的原文产生一个摘要信息,与解密的摘要信息对比。如果相同,则说明收到的信息是完整的,在传输过程中没有被修改,否则说明信息被修改过,因此数字签名能够验证信息的完整性和真实性,从而保证数据传输的安全性。
以Json数据为例,Json数据由键值对组成,每一个键值对包括键(key)和值(value)。现有技术中对Json数据进行数字签名时,将所有键值对的值中的所有字符提取出来组成字符串并进行加密处理,将加密后的字符串作为数字签名。
由此可见,现有的数字签名的生成规则比较简单,其安全性主要靠加密算法保障,一旦第三方窃取到加密的私钥,就可以模仿数字签名,像真正密钥的拥有者一样进行数字签名,从而可以随意劫持传输中的数据并进行篡改,获取身份认证以及获得认证后的权限,因此安全性有待进一步提高。
技术问题
本发明的主要目的为提供一种数字签名生成方法、装置和计算机设备,旨在提高数字签名的安全性。
技术解决方案
为达以上目的,本发明实施例提出一种数字签名生成方法,所述方法包括以下步骤:
从至少两个键值对的值中选取指定位数的字符组成初始字符串;
对所述初始字符串进行加密处理,生成加密字符串;
根据所述加密字符串生成数字签名。
可选地,所述从至少两个键值对的值中选取指定位数的字符组成初始字符串的步骤包括:
按照键值对的排列顺序依次从每一个键值对的值中选取指定位数的字符;
将选取的字符依次排列组成初始字符串。
可选地,所述按照键值对的排列顺序依次从每一个键值对的值中选取指定位数的字符的步骤包括:按照键值对的排列顺序依次选取每一个键值对的值中的前N个字符,N≥1。
可选地,所述按照键值对的排列顺序依次从每一个键值对的值中选取指定位数的字符的步骤包括:按照键值对的排列顺序依次选取每一个键值对的值中的后N个字符,N≥1。
可选地,所述按照键值对的排列顺序依次从每一个键值对的值中选取指定位数的字符的步骤包括:按照键值对的排列顺序依次选取每一个键值对的值中的第M个字符,M≥1;其中,当所述键值对的值的位数小于M时,选取最后一位字符。
可选地,所述将选取的字符依次排列组成初始字符串的步骤包括:将选取的字符按照所述字符被选取的先后顺序依次排列,组成一个字符串,将所述字符串作为所述初始字符串。
可选地,所述根据所述加密字符串生成数字签名的步骤包括:
从所述加密字符串中挑选K个字符组成字符串,K≥2;
将所述字符串生成为所述数字签名。
可选地,所述从所述加密字符串中选取K个字符组成字符串的步骤包括:选取所述加密字符串中前K个字符组成字符串。
可选地,所述从所述加密字符串中选取K个字符组成字符串的步骤包括:选取所述加密字符串中后K个字符组成字符串。
可选地,6≤K≤10。
本发明实施例同时提出一种数字签名生成装置,所述装置包括:
选取模块,设置为从至少两个键值对的值中选取指定位数的字符组成初始字符串;
加密模块,设置为对所述初始字符串进行加密处理,生成加密字符串;
生成模块,设置为根据所述加密字符串生成数字签名。
可选地,所述选取模块包括:
选取单元,设置为按照键值对的排列顺序依次从每一个键值对的值中选取指定位数的字符;
组合单元,设置为将选取的字符依次排列组成初始字符串。
可选地,所述选取单元设置为:按照键值对的排列顺序依次选取每一个键值对的值中的前N个字符,N≥1。
可选地,所述选取单元设置为:按照键值对的排列顺序依次选取每一个键值对的值中的后N个字符,N≥1。
可选地,所述选取单元设置为:按照键值对的排列顺序依次选取每一个键值对的值中的第M个字符,M≥1;其中,当所述键值对的值的位数小于M时,选取最后一位字符。
可选地,所述组合单元设置为:将选取的字符按照所述字符被选取的先后顺序依次排列,组成一个字符串,将所述字符串作为所述初始字符串。
可选地,所述生成模块包括:
挑选单元,设置为从所述加密字符串中挑选K个字符组成字符串,K≥2;
生成单元,设置为将所述字符串生成为所述数字签名。
可选地,所述挑选单元设置为:选取所述加密字符串中前K个字符组成字符串。
可选地,所述选取单元设置为:选取所述加密字符串中后K个字符组成字符串。
可选地,6≤K≤10。
本发明实施例还提出一种计算机设备,其包括存储器、处理器和至少一个被存储在所述存储器中并被配置为由所述处理器执行的应用程序,所述应用程序被配置为用于执行前述数字签名生成方法。
有益效果
本发明实施例所提供的一种数字签名生成方法,通过从至少两个键值对的值中选取指定位数的字符组成初始字符串并进行加密的方式来生成数字签名,由于字符的挑选方式是自定义的,因此增加了数字签名的生成规则的复杂度,即使第三方窃取了加密的私钥,也不易模仿数字签名,从而提高了数字签名的安全性,防止传输数据被恶意篡改,进而提高了数据传输的安全性。
进一步地,从加密字符串中挑选部分字符组成字符串来生成数字签名,进一步增加了数字签名的生成规则的复杂度,提高了数字签名的安全性,从而进一步提高了数据传输的安全性。
附图说明
图1是本发明的数字签名生成方法一实施例的流程图;
图2是本发明的数字签名生成装置一实施例的模块示意图;
图3是图2中的选取模块的模块示意图;
图4是图2中的生成模块的模块示意图。
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
本发明的最佳实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,仅用于解释本发明,而不能解释为对本发明的限制。
本技术领域技术人员可以理解,除非特意声明,这里使用的单数形式“一”、“一个”、“所述”和“该”也可包括复数形式。应该进一步理解的是,本发明的说明书中使用的措辞“包括”是指存在所述特征、整数、步骤、操作、元件和/或组件,但是并不排除存在或添加一个或多个其他特征、整数、步骤、操作、元件、组件和/或它们的组。应该理解,当我们称元件被“连接”或“耦接”到另一元件时,它可以直接连接或耦接到其他元件,或者也可以存在中间元件。此外,这里使用的“连接”或“耦接”可以包括无线连接或无线耦接。这里使用的措辞“和/或”包括一个或更多个相关联的列出项的全部或任一单元和全部组合。
本技术领域技术人员可以理解,除非另外定义,这里使用的所有术语(包括技术术语和科学术语),具有与本发明所属领域中的普通技术人员的一般理解相同的意义。还应该理解的是,诸如通用字典中定义的那些术语,应该被理解为具有与现有技术的上下文中的意义一致的意义,并且除非像这里一样被特定定义,否则不会用理想化或过于正式的含义来解释。
本技术领域技术人员可以理解,这里所使用的“终端”、“终端设备”既包括无线信号接收器的设备,其仅具备无发射能力的无线信号接收器的设备,又包括接收和发射硬件的设备,其具有能够在双向通信链路上,执行双向通信的接收和发射硬件的设备。这种设备可以包括:蜂窝或其他通信设备,其具有单线路显示器或多线路显示器或没有多线路显示器的蜂窝或其他通信设备;PCS(Personal Communications Service,个人通信系统),其可以组合语音、数据处理、传真和/或数据通信能力;PDA(Personal Digital Assistant,个人数字助理),其可以包括射频接收器、寻呼机、互联网/内联网访问、网络浏览器、记事本、日历和/或GPS(Global Positioning System,全球定位系统)接收器;常规膝上型和/或掌上型计算机或其他设备,其具有和/或包括射频接收器的常规膝上型和/或掌上型计算机或其他设备。这里所使用的“终端”、“终端设备”可以是便携式、可运输、安装在交通工具(航空、海运和/或陆地)中的,或者适合于和/或配置为在本地运行,和/或以分布形式,运行在地球和/或空间的任何其他位置运行。这里所使用的“终端”、“终端设备”还可以是通信终端、上网终端、音乐/视频播放终端,例如可以是PDA、MID(Mobile Internet Device,移动互联网设备)和/或具有音乐/视频播放功能的移动电话,也可以是智能电视、机顶盒等设备。
本技术领域技术人员可以理解,这里所使用的服务器,其包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云。在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个超级虚拟计算机。本发明的实施例中,服务器、终端设备与WNS服务器之间可通过任何通信方式实现通信,包括但不限于,基于3GPP、LTE、WIMAX的移动通信、基于TCP/IP、UDP协议的计算机网络通信以及基于蓝牙、红外传输标准的近距无线传输方式。
本发明实施例的数字签名生成方法和装置,可以应用于终端设备、服务器等计算机设备,终端设备主要指手机、平板、个人电脑、笔记本电脑等电子设备,服务器主要指与用户侧的终端设备进行数据交互的后台系统,如车载后台系统等。以下以应用于车载后台系统为例进行详细说明。
参照图1,提出本发明的数字签名生成方法一实施例,所述方法包括以下步骤:
S11、从至少两个键值对的值中选取指定位数的字符组成初始字符串。
在jason数据中,每一个键值对包括一个键(key)和一个值(value)。
本发明实施例中,车载后台系统首先按照键值对的排列顺序依次(如从前往后或从后往前的顺序)从每一个键值对的值中选取指定位数的字符,然后将选取的字符依次排列组成初始字符串,比如,将选取的字符按照字符被选取的先后顺序依次排列,组成一个字符串,将该字符串作为初始字符串。
具体实施时,车载后台系统可以通过以下方式从键值对中选取字符:
可选地,车载后台系统可以按照键值对的排列顺序依次选取每一个键值对的值中的前N (N≥1)个字符,所述前N个字符如首个字符、前两个字符、前三个字符等,即从值中的第一个字符开始往后数N个字符,当值的位数小于或等于N时,则选取该值中的所有字符。
例如,假设设定选取前两个字符,当键值对中的值为5614389,车载后台系统则选取前两个字符56;当键值对中的值为7时,车载后台系统则选取字符7。
可选地,车载后台系统可以按照键值对的排列顺序依次选取每一个键值对的值中的后N (N≥1)个字符,所述后N个字符如最后一个字符、后两个字符、后三个字符等,即从值中的最后一个字符开始往前数N个字符,当值的位数小于或等于N时,则选取该值中的所有字符。
例如,假设设定选取后两个字符,当键值对中的值为5614389,车载后台系统则选取后两个字符89;当键值对中的值为7时,车载后台系统则选取字符7。
可选地,车载后台系统可以按照键值对的排列顺序依次选取每一个键值对的值中的第M (M≥1)个字符,所述第M个字符如第一个字符、第二个字符、第三个字符等,其中,当键值对的值的位数小于M时,则选取最后一位字符。
例如,假设设定选取第三个字符,当键值对的值为5614389,车载后台系统则选取第三个字符1;当键值对中的值为56时,车载后台系统则选取最后一个字符6。
可选地,车载后台系统还可以按照按照键值对的排列顺序依次选取每一个键值对的值中的第I~J(I≥1,I<J)个字符,所述第I~J个字符如第1~3个字符、第2~5个字符等。当值的位数小于J时,则选取第I到最后一个字符;当值的位数小于I时,则从后往前或从前往后选取(J-I+1)个字符,若值的位数不足(J-I+1)则取该值中的所有字符。
例如,假设设定选取第2-4个字符,当键值对的值为5614389,车载后台系统则选取字符6143;当值为561时,则选取字符61;当值为5时,车载后台系统则选取字符5。
可选地,车载后台系统还可以按照键值对的排列顺序依次选取每一个键值对的值中的奇数位或偶数位的字符。例如,假设键值对的值为5614389,可以选取奇数位字符5139,或者选取偶数位字符648。
在其它实施例中,车载后台系统也可以不从所有的键值对中选取字符,而是按照与前述选取字符相类似的方式来选取键值对,然后从选取的键值对中来选取字符。例如,车载后台系统可以按照键值对的排列顺序,选取前N(N≥1)个键值对、后N(N≥1)个键值对、第I~J(I≥1,I<J)个键值对、排列序号为奇数或偶数的键值对的值中的所有字符或指定位数的字符组成初始字符串。
S12、对初始字符串进行加密处理,生成加密字符串。
本发明实施例中,车载后台系统采用MD5加密算法对初始字符串进行加密处理,生成加密字符串。当然,也可以采用其它的加密算法,本发明对此不作限定。
S13、根据加密字符串生成数字签名。
本步骤S13中,车载后台系统可以将整个加密字符串生成为数字签名,作为优选,本发明实施例中,车载后台系统首先从加密字符串中挑选K (K≥2)个字符组成字符串,再将该字符串生成为数字签名,从而进一步提高安全性。
在从加密字符串中挑选字符时,车载后台系统可以选取加密字符串中前K个字符或后K个字符组成字符串,其中K优选为6≤K≤10,比如选取加密字符串中的前8个字符组成字符串。也可以选取加密字符串中的第I~J(I≥1,I<J)个字符组成字符串,其中优选5≤J-I≤9,比如选取加密字符串中的第2~9个字符组成字符串。还可以选取加密字符串中奇数位或偶位的字符组成字符串。
本发明实施例的数字签名生成方法,通过从至少两个键值对的值中选取指定位数的字符组成初始字符串并进行加密的方式来生成数字签名,由于字符的挑选方式是自定义的,因此增加了数字签名的生成规则的复杂度,即使第三方窃取了加密的私钥,也不易模仿数字签名,从而提高了数字签名的安全性,防止传输数据被恶意篡改,进而提高了数据传输的安全性。
进一步地,从加密字符串中挑选部分字符组成字符串来生成数字签名,进一步增加了数字签名的生成规则的复杂度,提高了数字签名的安全性,从而进一步提高了数据传输的安全性。
参照图2,提出本发明的数字签名生成装置,该装置包括选取模块10、加密模块20和生成模块30,其中:选取模块10,设置为从至少两个键值对的值中选取指定位数的字符组成初始字符串;加密模块20,设置为对初始字符串进行加密处理,生成加密字符串; 生成模块30,设置为根据加密字符串生成数字签名。
本发明实施例中,选取模块10如图3所示,包括选取单元11和组合单元12,其中:选取单元11,设置为按照键值对的排列顺序依次(如从前往后或从后往前的顺序)从每一个键值对的值中选取指定位数的字符;组合单元12,设置为将选取的字符依次排列组成初始字符串,比如,将选取的字符按照字符被选取的先后顺序依次排列,组成一个字符串,将该字符串作为初始字符串。
具体实施时,选取单元11可以通过以下方式从键值对中选取字符:
可选地,选取单元11可以按照键值对的排列顺序依次选取每一个键值对的值中的前N (N≥1)个字符,所述前N个字符如首个字符、前两个字符、前三个字符等,即从值中的第一个字符开始往后数N个字符,当值的位数小于或等于N时,则选取该值中的所有字符。
例如,假设设定选取前两个字符,当键值对中的值为5614389,选取单元11则选取前两个字符56;当键值对中的值为7时,选取单元11则选取字符7。
可选地,选取单元11可以按照键值对的排列顺序依次选取每一个键值对的值中的后N (N≥1)个字符,所述后N个字符如最后一个字符、后两个字符、后三个字符等,即从值中的最后一个字符开始往前数N个字符,当值的位数小于或等于N时,则选取该值中的所有字符。
例如,假设设定选取后两个字符,当键值对中的值为5614389,选取单元11则选取后两个字符89;当键值对中的值为7时,选取单元11则选取字符7。
可选地,选取单元11可以按照键值对的排列顺序依次选取每一个键值对的值中的第M (M≥1)个字符,所述第M个字符如第一个字符、第二个字符、第三个字符等,其中,当键值对的值的位数小于M时,则选取最后一位字符。
例如,假设设定选取第三个字符,当键值对的值为5614389,选取单元11则选取第三个字符1;当键值对中的值为56时,选取单元11则选取最后一个字符6。
可选地,选取单元11还可以按照按照键值对的排列顺序依次选取每一个键值对的值中的第I~J(I≥1,I<J)个字符,所述第I~J个字符如第1~3个字符、第2~5个字符等。当值的位数小于J时,则选取第I到最后一个字符;当值的位数小于I时,则从后往前或从前往后选取(J-I+1)个字符,若值的位数不足(J-I+1)则取该值中的所有字符。
例如,假设设定选取第2-4个字符,当键值对的值为5614389,选取单元11则选取字符6143;当值为561时,则选取字符61;当值为5时,选取单元11则选取字符5。
可选地,选取单元11还可以按照键值对的排列顺序依次选取每一个键值对的值中的奇数位或偶数位的字符。例如,假设键值对的值为5614389,选取单元11可以选取奇数位字符5139,或者选取偶数位字符648。
在其它实施例中,选取模块10也可以不从所有的键值对中选取字符,而是按照与前述选取字符相类似的方式来选取键值对,然后从选取的键值对中来选取字符。例如,选取模块10可以按照键值对的排列顺序,选取前N(N≥1)个键值对、后N(N≥1)个键值对、第I~J(I≥1,I<J)个键值对、排列序号为奇数或偶数的键值对的值中的所有字符或指定位数的字符组成初始字符串。
本发明实施例中,加密模块20可以采用MD5加密算法对初始字符串进行加密处理,生成加密字符串。当然,也可以采用其它的加密算法,本发明对此不作限定。
本发明实施例中,生成模块30可以直接将整个加密字符串生成为数字签名。为了进一步提高安全性,在一优选实施例中,生成模块30如图4所示,包括挑选单元31和生成单元32,其中:挑选单元31,设置为从加密字符串中挑选K个字符组成字符串,K≥2;生成单元32,设置为将字符串生成为数字签名。
在从加密字符串中挑选字符时,挑选单元31可以选取加密字符串中前K个字符或后K个字符组成字符串,其中K优选为6≤K≤10,比如选取加密字符串中的前8个字符组成字符串。也可以选取加密字符串中的第I~J(I≥1,I<J)个字符组成字符串,其中优选5≤J-I≤9,比如选取加密字符串中的第2~9个字符组成字符串。还可以选取加密字符串中奇数位或偶位的字符组成字符串。
本发明实施例的数字签名生成装置,通过从至少两个键值对的值中选取指定位数的字符组成初始字符串并进行加密的方式来生成数字签名,由于字符的挑选方式是自定义的,因此增加了数字签名的生成规则的复杂度,即使第三方窃取了加密的私钥,也不易模仿数字签名,从而提高了数字签名的安全性,防止传输数据被恶意篡改,进而提高了数据传输的安全性。
进一步地,从加密字符串中挑选部分字符组成字符串来生成数字签名,进一步增加了数字签名的生成规则的复杂度,提高了数字签名的安全性,从而进一步提高了数据传输的安全性。
本发明同时提出一种计算机设备,包括存储器、处理器和至少一个被存储在存储器中并被配置为由处理器执行的应用程序,所述应用程序被配置为用于执行数字签名生成方法。所述数字签名的生成方法包括以下步骤:从至少两个键值对的值中选取指定位数的字符组成初始字符串;对初始字符串进行加密处理,生成加密字符串;根据加密字符串生成数字签名。本实施例中所描述的数字签名生成方法为本发明中上述实施例所涉及的数字签名生成方法,在此不再赘述。
本发明实施例的计算机设备,通过从至少两个键值对的值中选取指定位数的字符组成初始字符串并进行加密的方式来生成数字签名,由于字符的挑选方式是自定义的,因此增加了数字签名的生成规则的复杂度,即使第三方窃取了加密的私钥,也不易模仿数字签名,从而提高了数字签名的安全性,防止传输数据被恶意篡改,进而提高了数据传输的安全性。
进一步地,从加密字符串中挑选部分字符组成字符串来生成数字签名,进一步增加了数字签名的生成规则的复杂度,提高了数字签名的安全性,从而进一步提高了数据传输的安全性。
本领域技术人员可以理解,本发明包括涉及用于执行本申请中所述操作中的一项或多项的设备。这些设备可以为所需的目的而专门设计和制造,或者也可以包括通用计算机中的已知设备。这些设备具有存储在其内的计算机程序,这些计算机程序选择性地激活或重构。这样的计算机程序可以被存储在设备(例如,计算机)可读介质中或者存储在适于存储电子指令并分别耦联到总线的任何类型的介质中,所述计算机可读介质包括但不限于任何类型的盘(包括软盘、硬盘、光盘、CD-ROM、和磁光盘)、ROM(Read-Only Memory,只读存储器)、RAM(Random Access Memory,随机存储器)、EPROM(Erasable Programmable Read-Only Memory,可擦写可编程只读存储器)、EEPROM(Electrically Erasable Programmable Read-Only Memory,电可擦可编程只读存储器)、闪存、磁性卡片或光线卡片。也就是,可读介质包括由设备(例如,计算机)以能够读的形式存储或传输信息的任何介质。
本技术领域技术人员可以理解,可以用计算机程序指令来实现这些结构图和/或框图和/或流图中的每个框以及这些结构图和/或框图和/或流图中的框的组合。本技术领域技术人员可以理解,可以将这些计算机程序指令提供给通用计算机、专业计算机或其他可编程数据处理方法的处理器来实现,从而通过计算机或其他可编程数据处理方法的处理器来执行本发明公开的结构图和/或框图和/或流图的框或多个框中指定的方案。
本技术领域技术人员可以理解,本发明中已经讨论过的各种操作、方法、流程中的步骤、措施、方案可以被交替、更改、组合或删除。进一步地,具有本发明中已经讨论过的各种操作、方法、流程中的其他步骤、措施、方案也可以被交替、更改、重排、分解、组合或删除。进一步地,现有技术中的具有与本发明中公开的各种操作、方法、流程中的步骤、措施、方案也可以被交替、更改、重排、分解、组合或删除。
以上所述仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (20)

  1. 一种数字签名生成方法,包括以下步骤:
    从至少两个键值对的值中选取指定位数的字符组成初始字符串;
    对所述初始字符串进行加密处理,生成加密字符串;
    根据所述加密字符串生成数字签名。
  2. 根据权利要求1所述的数字签名生成方法,其中,所述从至少两个键值对的值中选取指定位数的字符组成初始字符串的步骤包括:
    按照键值对的排列顺序依次从每一个键值对的值中选取指定位数的字符;
    将选取的字符依次排列组成初始字符串。
  3. 根据权利要求2所述的数字签名生成方法,其中,所述按照键值对的排列顺序依次从每一个键值对的值中选取指定位数的字符的步骤包括:按照键值对的排列顺序依次选取每一个键值对的值中的前N个字符,N≥1。
  4. 根据权利要求2所述的数字签名生成方法,其中,所述按照键值对的排列顺序依次从每一个键值对的值中选取指定位数的字符的步骤包括:按照键值对的排列顺序依次选取每一个键值对的值中的后N个字符,N≥1。
  5. 根据权利要求2所述的数字签名生成方法,其中,所述按照键值对的排列顺序依次从每一个键值对的值中选取指定位数的字符的步骤包括:按照键值对的排列顺序依次选取每一个键值对的值中的第M个字符,M≥1;其中,当所述键值对的值的位数小于M时,选取最后一位字符。
  6. 根据权利要求2所述的数字签名生成方法,其中,所述将选取的字符依次排列组成初始字符串的步骤包括:
    将选取的字符按照所述字符被选取的先后顺序依次排列,组成一个字符串,将所述字符串作为所述初始字符串。
  7. 根据权利要求1所述的数字签名生成方法,其中,所述根据所述加密字符串生成数字签名的步骤包括:
    从所述加密字符串中挑选K个字符组成字符串,K≥2;
    将所述字符串生成为所述数字签名。
  8. 根据权利要求7所述的数字签名生成方法,其中,所述从所述加密字符串中选取K个字符组成字符串的步骤包括:
    选取所述加密字符串中前K个字符组成字符串。
  9. 根据权利要求7所述的数字签名生成方法,其中,所述从所述加密字符串中选取K个字符组成字符串的步骤包括:
    选取所述加密字符串中后K个字符组成字符串。
  10. 根据权利要求7所述的数字签名生成方法,其中,6≤K≤10。
  11. 一种数字签名生成装置,包括:
    选取模块,设置为从至少两个键值对的值中选取指定位数的字符组成初始字符串;
    加密模块,设置为对所述初始字符串进行加密处理,生成加密字符串;
    生成模块,设置为根据所述加密字符串生成数字签名。
  12. 根据权利要求11所述的数字签名生成装置,其中,所述选取模块包括:
    选取单元,设置为按照键值对的排列顺序依次从每一个键值对的值中选取指定位数的字符;
    组合单元,设置为将选取的字符依次排列组成初始字符串。
  13. 根据权利要求12所述的数字签名生成装置,其中,所述选取单元设置为:按照键值对的排列顺序依次选取每一个键值对的值中的前N个字符,N≥1。
  14. 根据权利要求12所述的数字签名生成装置,其中,所述选取单元设置为:按照键值对的排列顺序依次选取每一个键值对的值中的后N个字符,N≥1。
  15. 根据权利要求12所述的数字签名生成装置,其中,所述选取单元设置为:按照键值对的排列顺序依次选取每一个键值对的值中的第M个字符,M≥1;其中,当所述键值对的值的位数小于M时,选取最后一位字符。
  16. 根据权利要求12所述的数字签名生成装置,其中,所述组合单元设置为:将选取的字符按照所述字符被选取的先后顺序依次排列,组成一个字符串,将所述字符串作为所述初始字符串。
  17. 根据权利要求11所述的数字签名生成装置,其中,所述生成模块包括:
    挑选单元,设置为从所述加密字符串中挑选K个字符组成字符串,K≥2;
    生成单元,设置为将所述字符串生成为所述数字签名。
  18. 根据权利要求17所述的数字签名生成装置,其中,所述挑选单元设置为:选取所述加密字符串中前K个字符组成字符串。
  19. 根据权利要求17所述的数字签名生成装置,其中,所述选取单元设置为:选取所述加密字符串中后K个字符组成字符串。
  20. 一种计算机设备,包括存储器、处理器和至少一个被存储在所述存储器中并被配置为由所述处理器执行的应用程序,其中,所述应用程序被配置为用于执行权利要求1所述的数字签名生成方法。
     
PCT/CN2018/077441 2018-01-11 2018-02-27 数字签名生成方法、装置和计算机设备 WO2019136805A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810027292.6A CN108183802B (zh) 2018-01-11 2018-01-11 数字签名生成方法和装置
CN201810027292.6 2018-01-11

Publications (1)

Publication Number Publication Date
WO2019136805A1 true WO2019136805A1 (zh) 2019-07-18

Family

ID=62550433

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/077441 WO2019136805A1 (zh) 2018-01-11 2018-02-27 数字签名生成方法、装置和计算机设备

Country Status (2)

Country Link
CN (1) CN108183802B (zh)
WO (1) WO2019136805A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109088736B (zh) * 2018-09-25 2023-10-03 平安科技(深圳)有限公司 一种基于数字签名的数据通信方法、系统及装置
CN110830261B (zh) * 2019-10-12 2023-05-02 平安普惠企业管理有限公司 加密方法、装置、计算机设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971059A (zh) * 2014-05-09 2014-08-06 中国科学院计算技术研究所 一种Cookie本地存储与使用方法
CN105472052A (zh) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 一种跨域服务器的登录方法和系统
CN105897402A (zh) * 2016-04-05 2016-08-24 乐视控股(北京)有限公司 参数加密方法、装置
CN106533658A (zh) * 2017-01-11 2017-03-22 安徽博约信息科技股份有限公司 基于md5算法的url防篡改签名及验签方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000049768A1 (en) * 1999-02-17 2000-08-24 Thomas Mittelholzer Method for signature splitting to protect private keys
US8166525B2 (en) * 2005-09-08 2012-04-24 Xerox Corporation Document management system with public key infrastructure
CN103761298B (zh) * 2014-01-20 2017-04-19 华东师范大学 一种基于分布式架构的实体匹配方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971059A (zh) * 2014-05-09 2014-08-06 中国科学院计算技术研究所 一种Cookie本地存储与使用方法
CN105472052A (zh) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 一种跨域服务器的登录方法和系统
CN105897402A (zh) * 2016-04-05 2016-08-24 乐视控股(北京)有限公司 参数加密方法、装置
CN106533658A (zh) * 2017-01-11 2017-03-22 安徽博约信息科技股份有限公司 基于md5算法的url防篡改签名及验签方法

Also Published As

Publication number Publication date
CN108183802A (zh) 2018-06-19
CN108183802B (zh) 2020-06-19

Similar Documents

Publication Publication Date Title
US10944575B2 (en) Implicitly certified digital signatures
CA2838322C (en) Secure implicit certificate chaining
GB2538052B (en) Encoder, decoder, encryption system, encryption key wallet and method
CN111130803B (zh) 数字签名的方法、系统及装置
AbdElminaam Improving the security of cloud computing by building new hybrid cryptography algorithms
CN109257346B (zh) 基于区块链的隐蔽传输系统
US20020023216A1 (en) Ad-hoc radio communication verification system
KR20180029695A (ko) 블록체인을 이용한 데이터 전송 시스템 및 방법
AU2019204724C1 (en) Cryptography chip with identity verification
WO2021169521A1 (zh) 签名方法、终端设备及网络设备
WO2019071722A1 (zh) 设备标识方法、装置和电子设备
WO2019136805A1 (zh) 数字签名生成方法、装置和计算机设备
KR102355918B1 (ko) 블록체인을 이용한 전자 데이터 제공 방법 및 그 시스템
CN112529537A (zh) 一种基于区块链的专利许可方法、装置、设备及存储介质
CN110175471B (zh) 一种档案的存储方法及系统
Al-juaifari Secure SMS Mobile Transaction with Peer to Peer Authentication Design for Mobile Government
CN106209348A (zh) 一种声波安全传输方法及装置
CN111754233A (zh) 基于多方签名的电子支付方法和系统
KR102019558B1 (ko) 내재적 인증서를 사용하는 전자서명에 대한 효율적인 서명 검증 방법
US20160036592A1 (en) Non-repudiation of electronic transactions
CN112350920A (zh) 基于区块链的即时通讯系统
CN115426195B (zh) 数据传输方法、装置、计算机设备和存储介质
US20210014051A1 (en) System and method for secure input at a remote service
US20240177155A1 (en) Decentralized information transmission system and method thereof
TW202418782A (zh) 去中心化信息傳輸系統及其方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18900465

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18900465

Country of ref document: EP

Kind code of ref document: A1