CN101090320A - Indentify authorization method for dectronic signature - Google Patents
Indentify authorization method for dectronic signature Download PDFInfo
- Publication number
- CN101090320A CN101090320A CN 200710016862 CN200710016862A CN101090320A CN 101090320 A CN101090320 A CN 101090320A CN 200710016862 CN200710016862 CN 200710016862 CN 200710016862 A CN200710016862 A CN 200710016862A CN 101090320 A CN101090320 A CN 101090320A
- Authority
- CN
- China
- Prior art keywords
- signature
- file
- user
- checking
- leaf
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
This invention discloses an identity verification method for electronic signature including: a, a server sends a confirmation request to a receiving party, b, the receiving party verifies it according to the request and generates a result, c, the server decides if it is a true signature according to the verification result.
Description
Technical field
The present invention relates to the electronic signature field, relate in particular to a kind of auth method of electronic signature.
Background technology
The process of existing digital signature is: at first, to treat that the hash algorithm of signature file by both sides' agreement calculates one section code, it is digital digest, on mathematics, guarantee, as long as change in the message any one, the digital digest value that recalculates will not conform to original value, has so just guaranteed to treat the unalterable feature of signature file; Secondly, this digital digest value is encrypted with sender's private key, send to the recipient together with the former signature file for the treatment of then, and the digital digest that produces promptly claims digital signature; At last, after the recipient receives digital signature, message is calculated digest value, be decrypted the message digest value of untiing with public-key cryptography then and compare, illustrate then that as equating message is really from alleged sender with the sender with same hash algorithm.
As seen, in above-mentioned process, whether signer's identity is stolen, treat that to described whether signer that signature file signs electronically is exactly I of this signature in other words, the this point said process can't guarantee, can't guarantee that promptly the signer that this signature file generates should carry out the signer to this signature file exactly, just can't guarantee signer's uniqueness.This be because, in above-mentioned signature system, the identity of signer only just is verified when the application digital certificate, and digital certificate and public and private key all are the string number symbols, unlikely remembered, therefore, generally can only be kept on the disk, and just there is the stolen possibility of certificate in this, thus also just occur identity falsely used sign may.
So existing electronic signature system can't solve the problem that identity is falsely used.In addition, can't learn also from digital signature technology whether a digital signature is carried out when the signer is conscious, whether be coerced carried out down and whether be by other people allograph.Defective on the legal effect that these queries all can cause signing electronically.Therefore, demand occurring a kind of method that can verify the true identity and the actual signature wish of signer urgently.
Summary of the invention
The method that the technical problem to be solved in the present invention is to provide the authenticity of a kind of signature user's to electronic signature identity to verify.
In order to address the above problem, the present invention proposes a kind of auth method of electronic signature, it may further comprise the steps:
A, server send to the recipient confirms request;
B, recipient verify and produce the checking result according to described affirmation request;
C, server determine whether to be actual signature according to described checking result.
Wherein, described step a is specially according to reservation mode and sends the affirmation request to the signature user of electronic signature.
Preferably, described reservation mode comprises at least a in the following mode: Email, landline telephone, mobile phone, internet instant communication instrument, manual type.
Wherein, step b is specially described signature user verified and produced positive or negative to the authenticity of described electronic signature according to described affirmation request checking result.
Preferably, described affirmation request comprises a kind of in the following information at least: signature time, signature place, signature file title, signature file summary, described signature file uniqueness sign.
In addition, described affirmation request is the authentication notice to described electronic signature, and it is sent to the checking personnel.
Wherein, step b is specially described checking personnel verified and produced positive or negative according to described checking notice checking result.
Preferably, described checking personnel are at least according to a kind of checking the in the following variety of way: manual telephone system checking, artificial mobile phone checking, biological specimen checking.
Preferably, described checking notice comprises a kind of in the following information at least: signature time, signature place, signature file title, signature file summary, described signature file uniqueness sign.
Wherein, step c is specially: if step b produces sure checking result, think that then described electronic signature is for effectively signing; If step b produces the checking result who negates, think that then described electronic signature is an invalid signature.
Implementing the present invention and can realize checking to the authenticity of the user's of electronic signature identity, and determine whether it is the signature of true wish of signer of described signature, is signer's uniqueness with the authenticity of guaranteeing to sign.
Description of drawings
Fig. 1 be the present invention based on the network configuration block diagram of an embodiment of system;
Fig. 2 is based on the flow chart of an embodiment of the course of work of network configuration shown in Figure 1;
Fig. 3 is the flow chart of an embodiment of the concrete registration process of step 20 among Fig. 2;
Fig. 4 is the flow chart of an embodiment of the concrete electronic signature process of step 21 among Fig. 2;
Fig. 5 is the schematic diagram that target signature page or leaf adds frame;
Fig. 6 is the schematic diagram of the signature page or leaf behind the interpolation signing messages;
Fig. 7 is the flow chart of another embodiment of the concrete electronic signature process of step 21 among Fig. 2;
Fig. 8 is the flow chart of an embodiment of the concrete proof procedure of step 22 among Fig. 2;
Fig. 9 is the flow chart of another embodiment of the concrete proof procedure of step 22 among Fig. 2;
Figure 10 is the flow chart of another embodiment of the concrete proof procedure of step 22 among Fig. 2;
Figure 11 is the flow chart of another embodiment of the concrete electronic signature process of step 21 among Fig. 2.
Embodiment
Below in conjunction with accompanying drawing formulate whole process of the present invention.
With reference to figure 1, illustrate the present invention based on the network configuration block diagram of an embodiment of system.As shown in the figure, system described in the present embodiment adopts SOA (Service Oriented Architecture, the Service-Oriented Architecture Based) network architecture to realize that it specifically comprises:
Wherein, server 11 is at first collected the subscriber data of client 10 by registration process 13 and is stored in the database 12, described subscriber data comprises authentication information and user's register information, this user's register information comprises client login user name, land password, described authentication information comprises the information of can be unique determining this registered user, for example this user is to unique answer of certain problem, ID card No., information such as impression of the hand or other biological specimen, the contact details that also comprise the user, telephone number for example, phone number, e-mail addresses etc. perhaps also comprise authentication password that another is used etc. when authentication.Wherein, can adopt Ethernet to be connected communication between described server 10 and the client 11, Internet etc. for example, or adopt communication communication, GPRS (Gerneral Packer Radio Service, GPRS) data transfer mode etc. for example.
With reference to figure 2, illustrate flow chart based on an embodiment of the course of work of network configuration shown in Figure 1.As shown in the figure, may further comprise the steps:
With reference to figure 3, illustrate the flow chart of an embodiment of the concrete registration process of step 20 among Fig. 2.Adopt the WEB enrollment page of client user's logon server to register the mode of operation in the present embodiment.As shown in the figure, may further comprise the steps:
The foregoing description has just adopted the mode of WEB registration, can also adopt the mode of Email registration here, and perhaps the mode of registering by the register interface of client etc. the invention is not restricted to this.
With reference to figure 4, illustrate the flow chart of an embodiment of the concrete electronic signature process of step 21 among Fig. 2.Before setting forth present embodiment, at first describe the implication of two kinds of electronic signatures: the true picture frame is signed, and is meant that signature page or leaf and signing messages and corresponding frame are stored as a picture; The virtual graph frame is signed, and is meant that signature page or leaf and signing messages are separated storage, does not synthesize a picture and stores, and Zui Da benefit is to save memory space like this.
In the present embodiment treating that signature file is a text formatting, and with it part or all to be converted to picture format be that example describes as target signature page or leaf, this signature mode is actually a kind of situation that the true picture frame is signed.As shown in the figure, may further comprise the steps:
At first, use 2D image function instrument to generate a blank image, its width is 2 times of the X width that adds left and right side frame, and its length is that Y adds the width of upper side frame and the width of lower frame; The width of described left and right side frame, the width of upper and lower side frame can be set as required;
Secondly, use 2D image function instrument described target signature page or leaf to be copied on the described blank image by the position of design; Here can realize that described position by design is meant the width of defined upper and lower, left and right frame in the previous step in the mode of difference figure layer;
At last, generate new target signature page or leaf; That is, can realize by the mode of Flatten Image.
Step 214 is added into described frame with described signing messages and generates the signature page or leaf.Client utilizes 2D image function instrument (for example, the drawstring function in the Java 2D image function storehouse etc.) that the form of described signing messages with picture write in the described frame, specifically can be added in the lower frame, and situation can be with reference to shown in Figure 6 in detail.In addition, the user can select whether to add remark information etc. according to individual demand.After this step was finished, the content on described target signature page or leaf and frame and the frame was promptly together as the signature page or leaf.
Step 215 judges that the described signature file for the treatment of has or not annex, if then execution in step 216 is arranged, otherwise execution in step 220.
Step 216 generates the target signature file.When the signature file for the treatment of of text formatting described in the step 211 all is converted to picture format as target signature page or leaf, and when finally being converted to the signature page or leaf, then with file of described signature page or leaf and described annex merging as the target signature file; When the signature file for the treatment of of text formatting described in the step 211 partly is converted to picture format as target signature page or leaf, and finally be converted to when signing page or leaf, then described signature page or leaf, remaining described signature file and the described annex treated are merged as the target signature file.Wherein, the process of merging into a file can adopt following method: client-side program uses the ZIP Library (ZIP storehouse) in ZIP (a kind of compressed format commonly used) instrument or its high-level language bag that carries (for example Java language bag) that described signature page or leaf is merged into single ZIP document files as the target signature file with described annex, or described annex is continued to be added in the ZIP document of original target signature file.
Step 217 generates digital digest or uses PKI (Public Key Infrastructure, PKIX) technology to generate digital signature.The process of described generation digital digest is that object utilizes One-Way Encryption hash algorithm (hash algorithm) to generate one section code for the binary code with described target signature file, and described One-Way Encryption hash algorithm (hash algorithm) can adopt MD5 algorithm, SHA-1 algorithm etc.If use the PKI digital signature, then described digital signature module is integrated in the client for calling, at this moment, the signature user will manually import private key, or in advance private key is kept at (on USB flash disk) on the local main frame, read by client, perhaps also can call the external digital signature blocks and operate.Because the PKI digital signature technology is quite ripe prior art, no longer further sets forth at this.
Need to prove, owing to comprised signing messages in the described target signature file, and comprise signature time, the positional information at signature operation place, address name in this signing messages, and described signature temporal information obtains from server, and the positional information at described signature operation place obtains and also obtained from server by server authentication, described address name from signature operation place main frame.Therefore the target signature file that will comprise above-mentioned signing messages again carries out PKI (Public Key Infrastructure, PKIX) digital signature, perhaps directly generate digital digest, can guarantee that just the result of PKI digital signature and the digital digest that directly generates have temporal uniqueness based on the described signature time, have based on the uniqueness on the space of described signature operation position; And, can guarantee described user's (being the signer) signer's uniqueness by the authentication process itself of step 22, prevent from that other people from replacing signature or forcing the signer run counter to its real will to sign.The detailed process of step 22 can be with reference to follow-up description.Even described time uniqueness is meant that it also is different that same user carries out twice its result of signature in same place to identical file, because the asynchronism(-nization) of twice signature; Described space uniqueness is meant that same user also is different in different places to identical file its result that signs at one time; Even described signer's uniqueness be meant different users to identical file in same place, the same time signs consequently different, signer's uniqueness was should be not doubt originally, but because identity is stolen and look for the problem of people's allograph, whether the signer of signature file is exactly that the signer who is claimed has just existed query actually, therefore just can guarantee signer's uniqueness by the authentication process itself of step 22.
Step 219 is uploaded to the database storage of server end and turns to step 223 to carry out.Be about to store in the database that described file logging is uploaded to server end.
Step 220 generates digital digest or uses PKI (Public Key Infrastructure, PKIX) technology to generate digital signature.The process of described generation digital digest is that object utilizes One-Way Encryption hash algorithm (hash algorithm) to generate one section code for the binary code with described signature page or leaf, and described One-Way Encryption hash algorithm (hash algorithm) can adopt MD5 algorithm or SHA-1 algorithm or the like.If use the PKI digital signature, then described digital signature module is integrated in the client for calling, at this moment, the signature user will manually import private key, or in advance private key is kept at (on USB flash disk) on the local main frame, read by client, perhaps also can call the external digital signature blocks and operate.Because the PKI digital signature technology is quite ripe prior art, no longer further sets forth at this.
Need to prove, owing to comprised signing messages in the described signature page or leaf, and comprise signature time, the positional information at signature operation place, address name in this signing messages, and described signature temporal information obtains from server, and the positional information at described signature operation place obtains and also obtained from server by server authentication, described address name from signature operation place main frame.Therefore the signature page or leaf that will comprise above-mentioned signing messages again carries out the PKI digital signature, perhaps directly generate digital digest, can guarantee that just the result of PKI digital signature and the digital digest that directly generates have temporal uniqueness based on the described signature time, have based on the uniqueness on the space of described signature operation position; And, can guarantee described user's (being the signer) signer's uniqueness by the authentication process itself of step 22, prevent from that other people from replacing signature or forcing the signer run counter to its real will to sign.The detailed process of step 22 can be with reference to follow-up description.Even described time uniqueness is meant that it also is different that same user carries out twice its result of signature in same place to identical file, because the asynchronism(-nization) of twice signature; Described space uniqueness is meant that same user also is different in different places to identical file its result that signs at one time; Even described signer's uniqueness be meant different users to identical file in same place, the same time signs consequently different, signer's uniqueness was should be not doubt originally, but because identity is stolen and look for the problem of people's allograph, whether the signer of signature file is exactly that the signer who is claimed has just existed query actually, therefore just can guarantee signer's uniqueness by the authentication process itself of step 22.
Step 222 is uploaded to the database storage of server end and turns to step 223 to carry out.Be about to store in the database that described file logging is uploaded to server end.
Step 223 finishes the flow process of this electronic signature.
With reference to figure 7, illustrate the flow chart of another embodiment of the concrete electronic signature process of step 21 among Fig. 2.In the present embodiment to treat that signature file can be audio frequency, video or multimedia form, or text or picture format etc., it chooses picture or input characters arbitrarily by the user, perhaps chooses the business card masterplate as target signature page or leaf, and this signature mode is a kind of for true picture frame label also.As shown in the figure, may further comprise the steps:
Step 2102 is called described business card masterplate, and execution in step 2104 then.Being about to described user's preprepared business card masterplate and accessing, can be that it is presented on the screen.
Step 2111 generates digital digest or uses PKI (Public Key Infrastructure, PKIX) technology to generate digital signature.The associated description of the specific implementation of this step in can refer step 217.
With reference to Figure 11, illustrate the flow chart of another embodiment of the concrete electronic signature process of step 21 among Fig. 2.In the present embodiment, the described signature file for the treatment of can be the file of any form.The actual a kind of situation for virtual graph frame label of present embodiment as shown in the figure, may further comprise the steps:
Step 2303, the user chooses arbitrarily picture or literal as masterplate.Described literal can directly be imported in the documents editing window by the user, and is presented on the screen, for example in the window of described client.
Present embodiment is with the different of maximum embodiment illustrated in fig. 4, among the embodiment shown in Figure 4 with the frame that generates and the signing messages on this frame all as the part of described signature page or leaf, that is to say that described signature page or leaf is an image file that comprises target signature page or leaf, frame and signing messages, its storage also is to store as picture format; And in the present embodiment, only be as the signature page or leaf in the step 214 and be shown on the screen according to one of described signature page or leaf and the interim generation of signing messages, and described signing messages is not made as a whole image file with described signature page or leaf and stored, but separate storage.Do like this and can save memory space, because the signature page or leaf of picture format will take bigger memory space.
Need to prove, owing to comprised signing messages in the described target signature file, and comprise signature time, the positional information at signature operation place, address name in this signing messages, and described signature temporal information obtains from server, and the positional information at described signature operation place obtains and also obtained from server by server authentication, described address name from signature operation place main frame.Therefore the target signature file that will comprise above-mentioned signing messages again carries out the PKI digital signature, perhaps directly generate digital digest, can guarantee that just the result of PKI digital signature and the digital digest that directly generates have temporal uniqueness based on the described signature time, have based on the uniqueness on the space of described signature operation position; And, can guarantee described user's (being the signer) signer's uniqueness by the authentication process itself of step 22, prevent from that other people from replacing signature or forcing the signer run counter to its real will to sign.The detailed process of step 22 can be with reference to follow-up description.Even described time uniqueness is meant that it also is different that same user carries out twice its result of signature in same place to identical file, because the asynchronism(-nization) of twice signature; Described space uniqueness is meant that same user also is different in different places to identical file its result that signs at one time; Even described signer's uniqueness be meant different users to identical file in same place, the same time signs consequently different, signer's uniqueness was should be not doubt originally, but because identity is stolen and look for the problem of people's allograph, whether the signer of signature file is exactly that the signer who is claimed has just existed query actually, therefore just can guarantee signer's uniqueness by the authentication process itself of step 22.
Among another embodiment of the concrete electronic signature process of step 21, the described signature file for the treatment of is the file that has passed through signature in Fig. 2, and promptly this embodiment is specially a kind of method of signature again.To briefly set forth this method below:
The first step, the user that sign again submits the request of inquiry file record to server.The purpose of this step is, the file logging that makes this user find him to sign once more;
Second step, server response described request, and at described user client display file record.Comprise signature page or leaf, annex, signature result (digital digest or PKI digital signature result), endorsement method (forming digital digest or PKI digital signature) in the described file logging, can also comprise signing messages or the like;
In the 3rd step, described user differentiates the problem of having judged whether to described file logging.Here, the first judges the authenticity of described electronic signature, and it two is that described user judges whether to agree signature this document; Whether the authenticity for electronic signature is judged, can obtain the result that signs by the endorsement method that this document is repeated in the described file logging, and compare consistent with signature result in the described file logging described signature result;
In the 4th step,, then it is signed electronically if described user is without demur to this document.The process of described electronic signature is comparatively simple with respect to the process of Fig. 4 and embodiment shown in Figure 7, because the signature of the target here page or leaf is promptly from the signature page or leaf in the described file logging, the object of signature also comprises annex in the described file logging (the original signature file of partly or entirely treating, and this treats the annex of signature file etc.).Therefore, its detailed process can be with reference to the later process of step 212 among the figure 4, or the later process of step 2106 among Fig. 7, for fear of repetition, be not further elaborated for detailed process, here only describe: in the present embodiment with regard to its place that should be noted that, this user who signs once more also needs after electronic signature information addings such as described signature result, endorsement methods to described file logging, sign for the virtual graph frame, also need this user's who signs once more signing messages is appended in the described file logging.Independent file logging can also be created for the user that signs once more by system, and this document record only need be preserved signing messages again and comprise the file logging identification number of original signature file.
Need to prove that described signing messages posting field is not limited to described frame, can also be a zone that only is positioned at signature page or leaf below, can be shape arbitrarily, and the present invention is not limited.
In addition, the operation of carrying out the synthetic or demonstration of image etc. in this embodiment is not limited to the 2D tool image, can also adopt more advanced 3D rendering instrument etc.
With reference to figure 8, illustrate the flow chart of an embodiment of the concrete proof procedure of step 22 among Fig. 2.As shown in the figure, may further comprise the steps:
Step 2210 sends the affirmation request according to reservation mode.Be after server end receives described signature file, just send the request of confirming signature to the signature user of described signature according to the mode of reserving.Wherein, the mode of described reservation is by being provided by user or system manager in the described registration process 20, and it comprises a kind of in the following manner at least: Email, landline telephone, mobile phone, internet instant communication instrument, manual type; Described E-mail mode is meant by server end and sends the affirmation request to user's left e-mail address in registration process 20, described landline telephone mode is meant by server end confirms request to user's left landline telephone tone information in registration process 20, described mobile phone mode is meant by server end and sends the affirmation request of short message form or the affirmation request of tone information formula to user's left Mobile Directory Number in registration process 20, described internet instant communication instrument mode is meant by server end to user left internet instant communication instrument (OICQ for example in registration process 20, ICQ, MSN or the like) ID sends the affirmation request message, described manual type is meant by another user (user with identity validation authority in the system, notary public of system manager or engagement etc. for example) left possible communication mode in registration process 20, the mode of for example making a phone call is manually passed on described affirmation request.
In addition, the content in the described affirmation request comprises a kind of in the following information at least: signature time, signature place, signature file title, signature file summary, described signature file uniqueness sign etc.
Judge that described signature is the signature of own true wish if described user is final, then execution in step 2215, otherwise execution in step 2213.
With reference to figure 9, illustrate the flow chart of another embodiment of the concrete proof procedure of step 22 among Fig. 2.As shown in the figure, may further comprise the steps:
This process can also be the process of an interaction, automatically confirm signer's identity with signer's interaction by system, for example in confirming request, signer user is required that login system carries out authentication, after the user landed, system can point out the user to input the identity validation password so that identity verification; Perhaps the system prompt user reads passage, and system recording is gathered this stored in sample sound and database user's sample and compared and confirm identity.
Step 2224, server end judge whether described authorization information is correct, if correct, then execution in step 2226, otherwise execution in step 2225.Whether an identifying code that needs checking and registration process to reserve is consistent for described identifying code mode, correct if unanimity is then thought, otherwise otherwise.For described mode of answering a question, only need to judge that answer that the user provides is whether consistent with left answer in the registration process, correct if unanimity is then thought, otherwise otherwise.
With reference to Figure 10, illustrate the flow chart of another embodiment of the concrete proof procedure of step 22 among Fig. 2.As shown in the figure, may further comprise the steps:
The recipient is manually in this embodiment, but can also be computer or the like.
In a word, different identity validation modes solves the different problems in the electronic signature, and this also is that user and system manager will consider when the identity validation mode is set.If the identity validation mode is implicit expression Email and way of short messages, this can solve the stolen problem of identity; If the identity validation mode is the mode of explicit interaction, not only can solve the stolen problem of identity, and can determine whether the signer is voluntary or is not to sign under conscious mind ground situation, this be because of:
● signer user is if coerced down but not signature and identity validation that aspiration ground carries out, and this user can deliberately answer wrong interactive problem or identification cipher, and system can warn to relevant system manager, and the system manager will take corresponding measure.
● signer user is if in non-conscious mind ground situation, and this user can not answer questions the problem in the interaction
● signer user participates in identity validation and answers questions interactive problem, particularly parcel used the interaction of sample sound control methods can get rid of by other people allograph may, this user's identity just can be confirmed so, system looks signature and is recorded as effectively, and this electronic signature meets all legal requiremnts of traditional signatures.It except that have can not distorting property, also have non repudiation.
Above disclosed is a kind of preferred embodiment of the present invention only, can not limit the present invention's interest field certainly with this, and therefore the equivalent variations of doing according to claim of the present invention still belongs to the scope that the present invention is contained.
Claims (10)
1, a kind of auth method of electronic signature, it may further comprise the steps:
A, server send to the recipient confirms request;
B, recipient verify and produce the checking result according to described affirmation request;
C, server determine whether to be actual signature according to described checking result.
2, the method for claim 1 is characterized in that, described step a is specially according to reservation mode and sends the affirmation request to the signature user of electronic signature.
3, method as claimed in claim 2 is characterized in that, described reservation mode comprises at least a in the following mode: Email, landline telephone, mobile phone, internet instant communication instrument, manual type.
4, method as claimed in claim 2 is characterized in that, step b is specially described signature user verified and produced positive or negative to the authenticity of described electronic signature according to described affirmation request checking result.
5, as each described method in the claim 1,2,3,4, it is characterized in that described affirmation request comprises a kind of in the following information at least: signature time, signature place, signature file title, signature file summary, described signature file uniqueness sign.
6, the method for claim 1 is characterized in that, described affirmation request is the authentication notice to described electronic signature, and it is sent to the checking personnel.
7, method as claimed in claim 6 is characterized in that, step b is specially described checking personnel verified and produced positive or negative according to described checking notice checking result.
8, method as claimed in claim 7 is characterized in that, described checking personnel are at least according to a kind of checking the in the following variety of way: identity validation password authentification, manual telephone system checking, artificial mobile phone checking, biological specimen checking.
9, method as claimed in claim 7 is characterized in that, described checking notice comprises a kind of in the following information at least: signature time, signature place, signature file title, signature file summary, described signature file uniqueness sign.
10, as claim 4 or 7 described methods, it is characterized in that step c is specially:, think that then described electronic signature is for effectively signing if step b produces sure checking result; If step b produces the checking result who negates, think that then described electronic signature is an invalid signature.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200710016862 CN101090320A (en) | 2007-07-13 | 2007-07-13 | Indentify authorization method for dectronic signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200710016862 CN101090320A (en) | 2007-07-13 | 2007-07-13 | Indentify authorization method for dectronic signature |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101090320A true CN101090320A (en) | 2007-12-19 |
Family
ID=38943507
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200710016862 Pending CN101090320A (en) | 2007-07-13 | 2007-07-13 | Indentify authorization method for dectronic signature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101090320A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252439B (en) * | 2008-04-10 | 2010-09-01 | 北京飞天诚信科技有限公司 | System and method for increasing information safety equipment security |
CN102946379A (en) * | 2012-10-16 | 2013-02-27 | 无锡江南计算技术研究所 | Multi-layer digest file generation method and file correctness verification method for massively parallel system |
CN104980275A (en) * | 2014-04-10 | 2015-10-14 | 吴小龙 | Two-dimension code-based digital signature authentication scheme allowing proxy signing |
CN105635070A (en) * | 2014-11-05 | 2016-06-01 | 许田 | Anti-counterfeit method and system for digital file |
CN108833104A (en) * | 2018-04-08 | 2018-11-16 | 北京信安世纪科技股份有限公司 | A kind of signature method, verification method and the device of file |
CN108989038A (en) * | 2017-05-31 | 2018-12-11 | 国民技术股份有限公司 | It is a kind of for the identification equipment of geographic position authentication, system and method |
CN111901767A (en) * | 2020-08-05 | 2020-11-06 | 杭州叙简科技股份有限公司 | System of POC ad hoc network of law enforcement recorder |
CN112597851A (en) * | 2020-12-15 | 2021-04-02 | 泰康保险集团股份有限公司 | Signature acquisition method and device, electronic equipment and storage medium |
CN112686648A (en) * | 2021-01-31 | 2021-04-20 | 重庆渝高科技产业(集团)股份有限公司 | Electronic signature management method and system for auditing signature files |
CN113282963A (en) * | 2020-02-20 | 2021-08-20 | ***通信集团重庆有限公司 | Electronic signature verification method, device and equipment |
-
2007
- 2007-07-13 CN CN 200710016862 patent/CN101090320A/en active Pending
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252439B (en) * | 2008-04-10 | 2010-09-01 | 北京飞天诚信科技有限公司 | System and method for increasing information safety equipment security |
CN102946379A (en) * | 2012-10-16 | 2013-02-27 | 无锡江南计算技术研究所 | Multi-layer digest file generation method and file correctness verification method for massively parallel system |
CN104980275A (en) * | 2014-04-10 | 2015-10-14 | 吴小龙 | Two-dimension code-based digital signature authentication scheme allowing proxy signing |
CN105635070B (en) * | 2014-11-05 | 2019-12-27 | 许田 | Anti-counterfeiting method and system for digital file |
CN105635070A (en) * | 2014-11-05 | 2016-06-01 | 许田 | Anti-counterfeit method and system for digital file |
CN108989038A (en) * | 2017-05-31 | 2018-12-11 | 国民技术股份有限公司 | It is a kind of for the identification equipment of geographic position authentication, system and method |
CN108989038B (en) * | 2017-05-31 | 2021-06-22 | 国民技术股份有限公司 | Identification equipment, system and method for geographic position authentication |
CN108833104A (en) * | 2018-04-08 | 2018-11-16 | 北京信安世纪科技股份有限公司 | A kind of signature method, verification method and the device of file |
CN113282963A (en) * | 2020-02-20 | 2021-08-20 | ***通信集团重庆有限公司 | Electronic signature verification method, device and equipment |
CN111901767A (en) * | 2020-08-05 | 2020-11-06 | 杭州叙简科技股份有限公司 | System of POC ad hoc network of law enforcement recorder |
CN112597851A (en) * | 2020-12-15 | 2021-04-02 | 泰康保险集团股份有限公司 | Signature acquisition method and device, electronic equipment and storage medium |
CN112686648A (en) * | 2021-01-31 | 2021-04-20 | 重庆渝高科技产业(集团)股份有限公司 | Electronic signature management method and system for auditing signature files |
CN112686648B (en) * | 2021-01-31 | 2024-01-30 | 重庆渝高科技产业(集团)股份有限公司 | Electronic signature management method and system for auditing signature file |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101089880A (en) | Electronic signature method | |
US20230370257A1 (en) | Methods and systems of providing verification of information using a centralized or distributed ledger | |
CN101090320A (en) | Indentify authorization method for dectronic signature | |
CN108881290B (en) | Block chain based digital certificate use method, system and storage medium | |
US20190319948A1 (en) | Remote authentication and identification proofing systems and methods | |
JP5694344B2 (en) | Authentication using cloud authentication | |
CN110098932B (en) | Electronic document signing method based on safe electronic notarization technology | |
US20140089062A1 (en) | Voting systems and voting methods based on smart mobile communication devices | |
US11749047B2 (en) | Electronic voting system and control method | |
US20190005268A1 (en) | Universal original document validation platform | |
EP1682967B1 (en) | Method and system for identity recognition | |
CN101086776B (en) | Browsing management apparatus, browsing management method, and program product thereof | |
US20050132201A1 (en) | Server-based digital signature | |
CN108092779A (en) | A kind of method and device for realizing electronic signature | |
US20060095376A1 (en) | Virtual meetings | |
US9166986B1 (en) | Witnessing documents | |
JP2006525563A (en) | User and web site authentication method and apparatus | |
US20160020909A1 (en) | A method, a system, a computer system and a computer program product for certifying a procedure of signature of an electronic file relating to an agreement between at least two parties | |
CN105591744A (en) | Network real-name authentication method and system | |
CN106656505A (en) | Mobile terminal electronic signature system based on event certificate and mobile terminal electronic signature method thereof | |
CN113239335A (en) | Block chain personnel information management system and method based on Baas | |
US10977386B2 (en) | Method and apparatus for disconnection of user actions and user identity | |
WO2022099909A1 (en) | Application method for delegating electronic certificate among multiple roles | |
GB2391438A (en) | Electronic sealing for electronic transactions | |
van den Broek et al. | Securely derived identity credentials on smart phones via self-enrolment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20071219 |