CN109756341A - Electronic signature method and device - Google Patents
Electronic signature method and device Download PDFInfo
- Publication number
- CN109756341A CN109756341A CN201811480446.3A CN201811480446A CN109756341A CN 109756341 A CN109756341 A CN 109756341A CN 201811480446 A CN201811480446 A CN 201811480446A CN 109756341 A CN109756341 A CN 109756341A
- Authority
- CN
- China
- Prior art keywords
- file
- cryptographic hash
- signature
- stamped signature
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The present embodiments relate to block chain technical field, a kind of electronic signature method and device are provided, which comprises obtain the first trial file that terminal uploads;Hash operation is carried out to first trial file, obtains the first cryptographic Hash;Identification information is embedded in first trial file to obtain to stamped signature file;According to stamped signature file, the first cryptographic Hash and the pre-stored and associated Electronic Signature of stamped signature unit, the second cryptographic Hash is obtained;First cryptographic Hash, the second cryptographic Hash and signature information are sent to block chain network, so that block chain network carries out cochain to the first cryptographic Hash, the second cryptographic Hash and signature information, and cochain result is back to server-side.Compared with prior art, the embodiment of the present invention introduces block chain network in Electronic Signature technology, and the technical characterstic that can not be distorted using information in block chain network can be effectively prevented stamped signature file and be tampered, high reliablity.
Description
Technical field
The present embodiments relate to block chain technical fields, in particular to a kind of electronic signature method and device.
Background technique
In daily life, each of us be unable to do without this part thing of affixing one's seal, in order to prove the authenticity and power of some file
Prestige, applicant are usually that the file printout affixed one's seal will be needed to come out, and find sealer and cover in the corresponding position of paper document
Seal brings applicant and brings inconvenience, simultaneously as the transreplication of seal in kind and the easy alterability of paper content,
It determines whether it is true or false so that recipient can not be reflected by effective evidence.
With the development of electronic technology, Electronic Signature has gradually replaced papery and has affixed one's seal, compared with papery is affixed one's seal, Electronic Signature
Scene is taken a significant amount of time without applicant to affix one's seal, in addition, traditional Electronic Signature technology uses centralized management, is used every time
Imprinted must upload center-side in real time, and recipient can identify the file after stamped signature by center-side, still, this
Integrated system, as long as controlling center-side, so that it may arbitrarily distort the file after stamped signature, cause its reliability insufficient.
Summary of the invention
The embodiment of the present invention is designed to provide a kind of electronic signature method and device, to improve the above problem.
To achieve the goals above, technical solution used in the embodiment of the present invention is as follows:
In a first aspect, the embodiment of the invention provides a kind of electronic signature method, be applied to server-side, the server-side with
Block chain network is communicated and is communicated to connect with terminal, which comprises obtains the first trial file that the terminal uploads;To described
First trial file carries out Hash operation, obtains the first cryptographic Hash;Identification information is embedded in the first trial file to obtain to stamped signature
File;According to described to stamped signature file, first cryptographic Hash and the pre-stored and associated electronics label of stamped signature unit
Chapter obtains the second cryptographic Hash;First cryptographic Hash, second cryptographic Hash and signature information are sent to the block chain
Network, so that the block chain network carries out cochain to first cryptographic Hash, second cryptographic Hash and signature information, and will
Cochain result is back to the server-side.
Second aspect, the embodiment of the invention also provides a kind of electronic seal signing equipments, are applied to server-side, the server-side
It communicates with block chain network and is communicated to connect with terminal, described device includes that file acquisition module, the first computing module, information are embedding
Enter module, the second computing module and the first execution module.Wherein, file acquisition module is used to obtain the first trial that the terminal uploads
File;First computing module is used to carry out Hash operation to the first trial file, obtains the first cryptographic Hash;Information is embedded in module and uses
In in the first trial file be embedded in identification information to obtain to stamped signature file;Second computing module is used for according to described to stamped signature
File, the first cryptographic Hash and the pre-stored and associated Electronic Signature of stamped signature unit, obtain the second cryptographic Hash;First holds
Row module is used to first cryptographic Hash, second cryptographic Hash and signature information being sent to the block chain network, with
The block chain network is set to carry out cochain to first cryptographic Hash, second cryptographic Hash and signature information, and by upper link
Fruit is back to the server-side.
Compared with the prior art, a kind of electronic signature method and device provided in an embodiment of the present invention, firstly, server-side passes through
It obtains the first trial file that terminal uploads and carries out Hash operation and obtain the first cryptographic Hash;Then, identification is embedded in first trial file
Information is obtained to stamped signature file, and according to stamped signature file, the first cryptographic Hash and pre-stored associated with stamped signature unit
Electronic Signature obtains the second cryptographic Hash;The first cryptographic Hash, the second cryptographic Hash and signature information are sent to block link network again
Network, so that block chain network carries out cochain to it.Compared with prior art, the embodiment of the present invention introduces in Electronic Signature technology
Block chain network, the technical characterstic that can not be distorted using information in block chain network can be effectively prevented stamped signature file and be tampered,
High reliablity.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows the architecture diagram of Electronic Seal System provided in an embodiment of the present invention.
Fig. 2 shows electronic signature method flow charts provided in an embodiment of the present invention.
Fig. 3 shows the block diagram of server-side provided in an embodiment of the present invention.
Fig. 4 shows the block diagram of electronic seal signing equipment provided in an embodiment of the present invention.
Icon: 10- Electronic Seal System;11- terminal;100- server-side;101- processor;102- memory;103- is total
Line;104- communication interface;200- electronic seal signing equipment;201- file acquisition module;The first computing module of 202-;203- information is embedding
Enter module;The second computing module of 204-;The first execution module of 205-;The second execution module of 206-.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile of the invention
In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
Fig. 1 is please referred to, Fig. 1 shows the block diagram of Electronic Seal System 10 provided in an embodiment of the present invention.Electronics
Sealing system 10 includes at least one terminal 11, server-side 100 and block chain network, at least one terminal 11 and server-side 100
It communicates to connect, server-side 100 is communicated with block chain network.Terminal 11, server-side 100 and block chain network constitute a stamped signature
On the one hand chain, this stamped signature chain may insure the legitimacy and antifalsification of Electronic Signature itself, on the other hand may insure to apply
The chapter that the required chapter signed of people and stamped signature people are signed is authentic and valid.
In embodiments of the present invention, server-side 100 is previously stored with the Electronic Signature of multiple authorized mechanism authorizations, and one
Electronic Signature is associated with a stamped signature unit.Authorized organization can be the mechanism that industrial and commercial bureau, Minister of the General Administration for Quality Supervision etc. have authority of law,
Server-side 100 can be server.Authorized organization authorizes Electronic Signature to stamped signature unit, is equivalent to and opens an account, as authorized organization head
It is secondary for some stamped signature unit authorize Electronic Signature when, the Electronic Signature and the corresponding stamped signature unit of the Electronic Signature are stored to clothes
Business end 100.
In embodiments of the present invention, terminal 11 may be, but not limited to, smart phone, tablet computer, personal computer, wear
Wear formula mobile terminal etc..Terminal 11 may include stamped signature people's terminal, also may include applicant terminal and stamped signature people's terminal.Label
Chapter people can be the people in stamped signature unit with stamped signature permission, and stamped signature unit has the right to change stamped signature people, when stamped signature human hair changes more
When, it needs to store stamped signature people's information after change to server-side 100, stamped signature people's information includes name, identification card number, Yuan Gonggong
Number etc..
In embodiments of the present invention, block chain network is for storing data comprising multiple nodes, each node can be with
Be, but be not limited to server, private clound, public cloud etc., it establishes and trusts between different nodes in block chain network, and use and divide
Cloth calculate and storage, there is no the hardware of centralization or management organization, each node be stored with authorized organization authorize it is each
Stamped signature people's information of the Electronic Signature of stamped signature unit and each stamped signature unit.In addition, block chain network also with authorized organization
Server and the server of stamped signature unit communicate, the accessible authorized organization of each node in block chain network
The server of server and stamped signature unit, and then the chapter that can check that the required chapter signed of applicant and stamped signature people are signed is
No is authentic and valid.It is further explained below.
First embodiment
Referring to figure 2., Fig. 2 shows the electronic signature method streams provided in an embodiment of the present invention applied to server-side 100
Cheng Tu.Applied to server-side 100 electronic signature method the following steps are included:
Step S101 obtains the first trial file that terminal uploads.
In embodiments of the present invention, first trial file can be the electronic document that stamped signature is needed through stamped signature people's preliminary audit survey.When
When terminal 11 includes stamped signature people terminal, firstly, original document and application material are filed an application to stamped signature people and submitted in applicant scene
Material, original document can be the certificate or file for needing to cover Electronic Signature, and application material can be applicant when handling stamped signature
The material that must be provided, for example, identity card, enterprise's license, diploma etc., for example, applicant is enterprise staff, need out
Has incumbency certificate, then applicant to the stamped signature people of enterprise when filing an application, it is desirable to provide incumbency certificate file and employee's work number
Stamped signature people is given, so that whether stamped signature people is enterprise in-service employee according to employee's work number confirmation applicant;Then, stamped signature people is to Shen
Ask someone submit original document and application material carry out preliminary audit survey, if audit do not pass through, feed back to applicant, do not give
Stamped signature, if audit passes through, which is passed through stamped signature people terminal using original document as first trial file by stamped signature people
It is uploaded to server-side 100.
When terminal 11 includes stamped signature people terminal and applicant terminal, firstly, applicant passes through applicant terminal to service
Original document and application material are requested and uploaded to 100 transmission stamped signature of end, and server-side 100 receives the stamped signature of applicant terminal transmission
The notification information that notification information is received to stamped signature people's terminal, stamped signature people according to stamped signature people terminal is sent after request, passes through stamped signature
People's terminal carries out preliminary audit survey to original document and application material and submits auditing result, if auditing result is not pass through,
Auditing result is fed back to applicant by server-side 100, does not give stamped signature, if auditing result is to pass through, server-side 100 is by Shen
The original document that terminal of asking someone uploads is as first trial file.
Step S102 carries out Hash operation to first trial file, obtains the first cryptographic Hash.
In embodiments of the present invention, the first trial text that server-side 100 gets applicant terminal or stamped signature people's terminal uploads
After part, server-side 100 carries out Hash operation to the first trial file with Hash operation program, and one segment length of generation is fixed and table
Levy the data of first trial file unique features, i.e. the first cryptographic Hash.First cryptographic Hash has the following characteristics that first, can not be by first
The anti-content for releasing first trial file of cryptographic Hash;Second, first trial file once changes, and the cryptographic Hash that regenerates is inevitable with the
One cryptographic Hash is different.About the detail problem of Hash operation, details are not described herein again.
Step S103 is embedded in identification information in first trial file to obtain to stamped signature file.
In embodiments of the present invention, identification information can reflect the key content in first trial file, therefore can pass through identification
Information further prevents file to be tampered, and can be to stamped signature file and is embedded in identification information but not yet stamped signature in first trial file
File, treat stamped signature file carry out stamped signature, stamped signature file can be obtained.In first trial file be embedded in identification information with obtain to
The detailed process of stamped signature file may is that
Firstly, extracting the key message in first trial file, key message refers to the feature for being able to reflect first trial file and can
For identifying or uniquely determining the information of first trial file comprising at least one of name information, digital information, for example, can
To be applicant's information (such as title, identification card number, enterprise's industrial and commercial registration code for can be contract party concerned etc.), file volume
Number, the amount of money etc.;
Then, key message is converted into identification information, and identification information is embedded into first trial file to obtain wait sign
Chapter file, identification information can be dark watermark, that is, key message is converted to dark watermark using digital watermark technology.Due to rear
When continuous certifying organization verifies the stamped signature file that applicant holds, block chain network is required connect to, once it can not connect
The legitimacy of stamped signature file can not be just verified to block chain network;In addition, if the size of stamped signature file is become when verifying
Change, for example, amplification, diminution etc., cryptographic Hash can also change, it can not just be verified at this time by block chain network, this
Under two kinds of situations, it is necessary to extract key message from dark watermark and be verified, therefore, dark watermark is used to not connect when certifying organization
It is connected to when the size of block chain network or stamped signature file changes and stamped signature file is verified.
Currently, the Electronic Signature realized using block chain technology, domestic usually used alliance's chain technical tie-up judicial expertise,
Audit, notarization, arbitration organ server carry out distribution deposit card, it is ensured that data can not tamper and authority witness property, together
When, once there is dispute, each side's node on alliance's chain can verify data at any time primitiveness and authenticity, and energy
Data report is enough provided, the legal documents such as notarization letter realize one-stop judicial landing.But this process must assure that and area
The connection of block chain network, once cannot connect to block chain, can not just verify the legitimacy of stamped signature file.The embodiment of the present invention passes through
Dark watermark is embedded in first trial file, it, can be by extracting the dark watermark in stamped signature file when being not attached to block chain network
Key message is obtained, and then inquires the true legitimacy of stamped signature file by key message.
Step S104, according to stamped signature file, the first cryptographic Hash and the pre-stored and associated electronics of stamped signature unit
Stamped signature obtains the second cryptographic Hash.
In embodiments of the present invention, identification information is embedded in first trial file to obtain to after stamped signature file, server-side 100
It is first depending on to stamped signature file, the first cryptographic Hash and the pre-stored and associated Electronic Signature of stamped signature unit, generates stamped signature
File;Then, server-side 100 carries out Hash operation to stamped signature file again, generates a segment length and fixes and characterize stamped signature file only
The data of one feature, i.e. the second cryptographic Hash.Second cryptographic Hash has the following characteristics that first, can not be released by the second cryptographic Hash is counter
The content of stamped signature file;Second, stamped signature file once changes, and the cryptographic Hash certainty regenerated and the second cryptographic Hash are not
Together.About the detail problem of Hash operation, details are not described herein again.
First cryptographic Hash, the second cryptographic Hash and signature information are sent to block chain network, so that block by step S105
Chain network carries out cochain to the first cryptographic Hash, the second cryptographic Hash and signature information, and cochain result is back to server-side.
In embodiments of the present invention, in order to save the occupied space of block chain network, only by the first cryptographic Hash, the second Hash
Value and signature information carry out cochain, other information not cochain, signature information may include stamped signature people information, stamped signature unit information and
Timestamp, stamped signature people's information may include name, identification card number, employee's work number etc., and stamped signature unit information may include enterprise's name
Title, Institution Code etc..
In embodiments of the present invention, the first cryptographic Hash, the second cryptographic Hash and signature information are sent to block chain network
Later, it is communicated due to block chain network with the server of authorized organization and the server of stamped signature unit, block chain network can
To carry out validation verification, including stamped signature to signature information by the server of the server of access mandate mechanism, stamped signature unit
Whether whether people have stamped signature permission, applicant can be by stamped signature etc., just can be by first only when signature information verifying is effective
Cryptographic Hash, the second cryptographic Hash and signature information store after being packaged into block to each node, otherwise can be abandoned, this process is
It is executed and is verified automatically by issuing the intelligent contract in block chain network.For example, block chain network passes through intelligent contract verifying
It is not inconsistent to stamped signature people information with stamped signature people's information with stamped signature permission or applicant is not belonging to the in-service employee of stamped signature unit
Deng, then it is assumed that this time stamped signature is invalid, and the first cryptographic Hash, the second cryptographic Hash and signature information are without cochain.
Step S106 receives the cochain of block chain network return as a result, and when cochain result is successfully by cochain result
Terminal is sent to stamped signature file, cochain result is only sent to terminal when cochain result is fails.
In embodiments of the present invention, block chain network carries out cochain to the first cryptographic Hash, the second cryptographic Hash and signature information
Afterwards, need for cochain result to be back to server-side 100, server-side 100 receives the cochain of block chain network return as a result, and upper
Cochain result and stamped signature file are sent to terminal 11 when chain result is successfully, when cochain result is unsuccessfully only by upper link
Fruit is sent to terminal 11.Specifically, when terminal 11 includes stamped signature people terminal, server-side 100 is when cochain result is successfully
Cochain result and stamped signature file are sent to stamped signature people terminal, cochain result is only sent to label when cochain result is fails
Chapter people's terminal, then applicant is informed by stamped signature people's terminal;When terminal 11 includes stamped signature people terminal and applicant terminal, server-side
100 cochain result and stamped signature file are sent directly to applicant terminal when cochain result is successfully, are mistake in cochain result
Cochain result is only sent to applicant terminal when losing.
In the follow-up process, the stamped signature file that certifying organization needs to hold applicant is verified, to inquire stamped signature text
The authenticity of part, specifically, if certifying organization is connected to block chain network, by the calculating Hash and block of stamped signature file
The second cryptographic Hash stored in chain network compares, if the two is consistent, shows that stamped signature file is not modified, if the two is not
Unanimously, it is likely that be the size that applicant has adjusted stamped signature file, for example, amplifying, reducing to stamped signature file, at this time
It needs to extract dark watermark from stamped signature file, and obtains the key message of first trial file from dark watermark, so that it may according to crucial
Information is inquired from stamped signature chain;It, can be by extracting in dark watermark if certifying organization is not attached to block chain network
Key message, by key message inquire stamped signature file it is whether true.
Electronic signature method provided in an embodiment of the present invention, has the advantages that
Firstly, block chain network is introduced, due to the characteristic that information can not distort in block chain network, once the first Hash
Value, the second cryptographic Hash and signature information store after being packaged into block to each node, permanent will store and can not
Distort, unless can control simultaneously be more than in block chain network 51% node and meanwhile modify data, therefore, can be effectively prevented
Stamped signature file is tampered, high reliablity;Meanwhile signature information includes stamped signature people information, stamped signature unit information and timestamp, block
Chain network can make data source non-repudiation, it is ensured that stamped signature process is conveniently traced to the source.
Secondly, after the first cryptographic Hash, the second cryptographic Hash and signature information are sent to block chain network by server-side 100,
Block chain network can carry out validity to signature information by the server of access mandate mechanism and the server of stamped signature unit
Verifying, guarantees the authority and legitimacy of stamped signature file, while it is stolen that stamped signature can be effectively prevented.
Third, when the size that certifying organization is not attached to block chain network or stamped signature file changes, verification machine
Structure can inquire the true legitimacy of stamped signature file by extracting the dark watermark in stamped signature file, and safety is higher.
Second embodiment
Referring to figure 3., the block diagram of server-side 100 provided in an embodiment of the present invention.Server-side 100 includes processor
101, memory 102, bus 103 and communication interface 104, the processor 101, memory 102 and communication interface 104 pass through total
Line 103 connects;Processor 101 is for executing the executable module stored in memory 102, such as computer program.
Wherein, memory 102 may include high-speed random access memory (RAM:Random AccessMemory),
It may further include non-labile memory (non-volatile memory), for example, at least a magnetic disk storage.By extremely
A few communication interface 104 (can be wired or wireless) is realized between the server-side 100 and at least one other network element
Communication connection.
Bus 103 can be isa bus, pci bus or eisa bus etc..It is only indicated with a four-headed arrow in Fig. 3, but
It is not offered as only a bus or a type of bus.
Wherein, memory 102 is for storing program, such as electronic seal signing equipment shown in Fig. 4 200.Electronic seal signing equipment
200 include that at least one can be stored in the memory 102 or be solidificated in institute in the form of software or firmware (firmware)
State the software function module in the operating system (operating system, OS) of server-side 100.The processor 101 is connecing
It receives after executing instruction, executes described program to realize the electronic signature method of invention first embodiment announcement.
Processor 101 may be a kind of IC chip, the processing capacity with signal.It is above-mentioned during realization
Each step of method can be completed by the integrated logic circuit of the hardware in processor 101 or the instruction of software form.On
The processor 101 stated can be general processor, including central processing unit (Central Processing Unit, abbreviation
CPU), network processing unit (NetworkProcessor, abbreviation NP) etc.;It can also be digital signal processor (DSP), dedicated collection
At circuit (ASIC), ready-made programmable gate array (FPGA), either other programmable logic device, discrete gate or transistor are patrolled
Collect device, discrete hardware components.
The embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, calculate
Machine program realizes the electronic signature method that above-mentioned first embodiment discloses when being executed by processor 101.
3rd embodiment
Referring to figure 4., Fig. 4 shows the block diagram of electronic seal signing equipment 200 provided in an embodiment of the present invention.Electronics
Stamped signature device 200 is deployed in server-side 100, and electronic seal signing equipment 200 includes file acquisition module 201, the first computing module
202, information insertion module 203, the second computing module 204, the first execution module 205 and the second execution module 206.
File acquisition module 201, for obtaining the first trial file of terminal upload.
First computing module 202 obtains the first cryptographic Hash for carrying out Hash operation to first trial file.
Information is embedded in module 203, for being embedded in identification information in first trial file to obtain to stamped signature file.
In embodiments of the present invention, information insertion module 203 is specifically used for extracting the key message in first trial file;It will close
Key information is converted to identification information, and identification information is embedded into first trial file to obtain to stamped signature file.
In embodiments of the present invention, key message includes at least one of name information, digital information;Identification information is
Dark watermark, dark watermark are used for when the size that certifying organization is not attached to block chain network or stamped signature file changes pair
Stamped signature file is verified.
Second computing module 204, for according to stamped signature file, the first cryptographic Hash and pre-stored and stamped signature list
The associated Electronic Signature in position, obtains the second cryptographic Hash.
In embodiments of the present invention, the second computing module 204 be specifically used for according to stamped signature file, the first cryptographic Hash, with
And the pre-stored and associated Electronic Signature of stamped signature unit, generate stamped signature file;Hash operation is carried out to stamped signature file, is obtained
Second cryptographic Hash.
First execution module 205, for the first cryptographic Hash, the second cryptographic Hash and signature information to be sent to block link network
Network so that block chain network carries out cochain to the first cryptographic Hash, the second cryptographic Hash and signature information, and cochain result is back to
Server-side.
In embodiments of the present invention, the first execution module 205 is specifically used for the first cryptographic Hash, the second cryptographic Hash and stamped signature
Information is sent to block chain network, so that block chain network, which passes through intelligent contract, carries out validation verification to signature information, and
It stores after first cryptographic Hash, the second cryptographic Hash and signature information are packaged into block when signature information verifying is effective to each section
Point, wherein signature information includes stamped signature people information, stamped signature unit information and timestamp.
Second execution module 206, for receiving the cochain of block chain network return as a result, and when cochain result is successfully
Cochain result and stamped signature file are sent to terminal, cochain result is only sent to terminal when cochain result is fails.
In conclusion a kind of electronic signature method provided in an embodiment of the present invention and device, are applied to server-side, the clothes
Business end communicates with block chain network and communicates to connect with terminal, which comprises obtains the first trial file that terminal uploads;To first
It examines file and carries out Hash operation, obtain the first cryptographic Hash;Identification information is embedded in first trial file to obtain to stamped signature file;According to
According to stamped signature file, the first cryptographic Hash and the pre-stored and associated Electronic Signature of stamped signature unit, the second Hash is obtained
Value;First cryptographic Hash, the second cryptographic Hash and signature information are sent to block chain network, so that block chain network is breathed out to first
Uncommon value, the second cryptographic Hash and signature information carry out cochain, and cochain result is back to server-side.Compared with prior art, originally
Inventive embodiments introduce block chain network in Electronic Signature technology, and the technology that can not be distorted using information in block chain network is special
Point can be effectively prevented stamped signature file and be tampered, high reliablity.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through
Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing
Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product,
Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code
Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held
Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart
The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement
It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-OnlyMemory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.It needs
Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with
Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities
The relationship or sequence on border.Moreover, the terms "include", "comprise" or its any other variant are intended to the packet of nonexcludability
Contain, so that the process, method, article or equipment for including a series of elements not only includes those elements, but also including
Other elements that are not explicitly listed, or further include for elements inherent to such a process, method, article, or device.
In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element
Process, method, article or equipment in there is also other identical elements.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist
Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing
It is further defined and explained.
Claims (10)
1. a kind of electronic signature method, which is characterized in that be applied to server-side, the server-side communicated with block chain network and with
Terminal communication connection, which comprises
Obtain the first trial file that the terminal uploads;
Hash operation is carried out to the first trial file, obtains the first cryptographic Hash;
Identification information is embedded in the first trial file to obtain to stamped signature file;
According to described to stamped signature file, the first cryptographic Hash and the pre-stored and associated Electronic Signature of stamped signature unit, obtain
Second cryptographic Hash;
First cryptographic Hash, second cryptographic Hash and signature information are sent to the block chain network, so that described
Block chain network carries out cochain to first cryptographic Hash, second cryptographic Hash and signature information, and cochain result is returned
To the server-side.
2. the method as described in claim 1, which is characterized in that the foundation to stamped signature file, the first cryptographic Hash and in advance
Storage with the associated Electronic Signature of stamped signature unit, the step of obtaining the second cryptographic Hash, comprising:
According to stamped signature file, the first cryptographic Hash and the pre-stored and associated Electronic Signature of stamped signature unit, stamped signature is generated
File;
Hash operation is carried out to the stamped signature file, obtains the second cryptographic Hash.
3. method according to claim 2, which is characterized in that the identification information that is embedded in first trial file is to obtain wait sign
The step of chapter file, comprising:
Extract the key message in the first trial file;
The key message is converted into identification information, and the identification information is embedded into the first trial file with obtain to
Stamped signature file.
4. method as claimed in claim 3, which is characterized in that the key message includes name information, in digital information
At least one;The identification information be dark watermark, the dark watermark be used for when certifying organization be not attached to the block chain network,
Or the size of the stamped signature file is verified the stamped signature file when changing.
5. method according to claim 2, which is characterized in that the method also includes:
Receive the cochain that the block chain network returns as a result, and when the cochain result be successfully by the cochain result with
The stamped signature file is sent to the terminal, described to be only sent to the cochain result when failure in the cochain result
Terminal.
6. the method as described in claim 1, which is characterized in that described by the first cryptographic Hash, the second cryptographic Hash and signature information
It is sent to the block chain network, so that the block chain network believes first cryptographic Hash, the second cryptographic Hash and stamped signature
Breath carries out the step of cochain, comprising:
First cryptographic Hash, the second cryptographic Hash and signature information are sent to the block chain network, so that the block
Chain network passes through intelligent contract and carries out validation verification to the signature information, and when signature information verifying is effective by the
One cryptographic Hash, the second cryptographic Hash and signature information store after being packaged into block to each node, wherein the signature information includes
Stamped signature people information, stamped signature unit information and timestamp.
7. a kind of electronic seal signing equipment, which is characterized in that be applied to server-side, the server-side communicated with block chain network and with
Terminal communication connection, described device include:
File acquisition module, the first trial file uploaded for obtaining the terminal;
First computing module obtains the first cryptographic Hash for carrying out Hash operation to the first trial file;
Information is embedded in module, for being embedded in identification information in the first trial file to obtain to stamped signature file;
Second computing module, for being closed according to described to stamped signature file, the first cryptographic Hash and pre-stored and stamped signature unit
The Electronic Signature of connection obtains the second cryptographic Hash;
First execution module, for first cryptographic Hash, second cryptographic Hash and signature information to be sent to the area
Block chain network, so that the block chain network carries out cochain to first cryptographic Hash, second cryptographic Hash and signature information,
And cochain result is back to the server-side.
8. device as claimed in claim 7, which is characterized in that second computing module is specifically used for:
According to stamped signature file, the first cryptographic Hash and the pre-stored and associated Electronic Signature of stamped signature unit, stamped signature is generated
File;
Hash operation is carried out to the stamped signature file, obtains the second cryptographic Hash.
9. device as claimed in claim 8, which is characterized in that the information insertion module is specifically used for:
Extract the key message in the first trial file;
The key message is converted into identification information, and the identification information is embedded into the first trial file with obtain to
Stamped signature file.
10. device as claimed in claim 8, which is characterized in that described device further include:
Second execution module, for receiving the cochain of the block chain network return as a result, and being successfully in the cochain result
When the cochain result and the stamped signature file be sent to the terminal, only will be described when the cochain result is failure
Cochain result is sent to the terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811480446.3A CN109756341B (en) | 2018-12-05 | 2018-12-05 | Electronic signature method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811480446.3A CN109756341B (en) | 2018-12-05 | 2018-12-05 | Electronic signature method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109756341A true CN109756341A (en) | 2019-05-14 |
CN109756341B CN109756341B (en) | 2022-03-11 |
Family
ID=66403605
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811480446.3A Active CN109756341B (en) | 2018-12-05 | 2018-12-05 | Electronic signature method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109756341B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110175474A (en) * | 2019-05-31 | 2019-08-27 | 苏州国泰新点软件有限公司 | Merging method, device, medium, server and the user terminal of Electronic Signature |
CN110598823A (en) * | 2019-08-14 | 2019-12-20 | 深圳壹账通智能科技有限公司 | Signature method and device based on virtual three-dimensional seal and computer equipment |
CN110781526A (en) * | 2019-12-23 | 2020-02-11 | 杭州鸽子蛋网络科技有限责任公司 | Digital medal creation method, device, electronic apparatus, and medium |
CN110955921A (en) * | 2019-12-09 | 2020-04-03 | ***通信集团江苏有限公司 | Electronic signature method, device, equipment and storage medium |
CN111431916A (en) * | 2020-03-30 | 2020-07-17 | 朱丽珍 | Seal verification method based on asymmetric encryption, seal and computer storage medium |
CN111898155A (en) * | 2020-06-19 | 2020-11-06 | 杭州鸽子蛋网络科技有限责任公司 | Information storage method, information inspection method and information storage and inspection system |
CN112101938A (en) * | 2020-09-10 | 2020-12-18 | 支付宝(杭州)信息技术有限公司 | Block chain-based digital seal using method and device and electronic equipment |
CN112115432A (en) * | 2020-09-18 | 2020-12-22 | 山大地纬软件股份有限公司 | Block chain based electronic seal credible use system and method |
WO2021136316A1 (en) * | 2019-12-30 | 2021-07-08 | 论客科技(广州)有限公司 | Blockchain technology-based email archiving and evidence storage method and apparatus |
CN113688360A (en) * | 2020-05-18 | 2021-11-23 | 天逸财金科技服务股份有限公司 | Distributed digital signature processing method and system thereof |
CN114154189A (en) * | 2021-01-29 | 2022-03-08 | 北京天德科技有限公司 | Two-section type Hash chain link certificate storing method for data or file |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100082994A1 (en) * | 2007-05-25 | 2010-04-01 | Donglin Wang | Method and apparatus for implementing electronic seal |
CN106022775A (en) * | 2016-05-13 | 2016-10-12 | 邓迪 | File signature method and system based on block chains |
CN106452775A (en) * | 2015-08-07 | 2017-02-22 | 阿里巴巴集团控股有限公司 | Method and apparatus for accomplishing electronic signing and signing server |
CN108304710A (en) * | 2018-02-11 | 2018-07-20 | 安云印(天津)大数据科技有限公司 | A kind of E-seal signature method of the involvement identity authentication function based on block chain |
-
2018
- 2018-12-05 CN CN201811480446.3A patent/CN109756341B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100082994A1 (en) * | 2007-05-25 | 2010-04-01 | Donglin Wang | Method and apparatus for implementing electronic seal |
CN106452775A (en) * | 2015-08-07 | 2017-02-22 | 阿里巴巴集团控股有限公司 | Method and apparatus for accomplishing electronic signing and signing server |
CN106022775A (en) * | 2016-05-13 | 2016-10-12 | 邓迪 | File signature method and system based on block chains |
CN108304710A (en) * | 2018-02-11 | 2018-07-20 | 安云印(天津)大数据科技有限公司 | A kind of E-seal signature method of the involvement identity authentication function based on block chain |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110175474A (en) * | 2019-05-31 | 2019-08-27 | 苏州国泰新点软件有限公司 | Merging method, device, medium, server and the user terminal of Electronic Signature |
CN110598823A (en) * | 2019-08-14 | 2019-12-20 | 深圳壹账通智能科技有限公司 | Signature method and device based on virtual three-dimensional seal and computer equipment |
CN110598823B (en) * | 2019-08-14 | 2022-11-04 | 深圳壹账通智能科技有限公司 | Signature method and device based on virtual three-dimensional seal and computer equipment |
CN110955921A (en) * | 2019-12-09 | 2020-04-03 | ***通信集团江苏有限公司 | Electronic signature method, device, equipment and storage medium |
CN110781526A (en) * | 2019-12-23 | 2020-02-11 | 杭州鸽子蛋网络科技有限责任公司 | Digital medal creation method, device, electronic apparatus, and medium |
WO2021136316A1 (en) * | 2019-12-30 | 2021-07-08 | 论客科技(广州)有限公司 | Blockchain technology-based email archiving and evidence storage method and apparatus |
CN111431916B (en) * | 2020-03-30 | 2021-12-24 | 绍兴章控智能科技有限公司 | Seal verification method based on asymmetric encryption, seal and computer storage medium |
CN111431916A (en) * | 2020-03-30 | 2020-07-17 | 朱丽珍 | Seal verification method based on asymmetric encryption, seal and computer storage medium |
CN113688360A (en) * | 2020-05-18 | 2021-11-23 | 天逸财金科技服务股份有限公司 | Distributed digital signature processing method and system thereof |
CN113688360B (en) * | 2020-05-18 | 2024-02-09 | 天逸财金科技服务股份有限公司 | Distributed digital signature processing method and system thereof |
CN111898155A (en) * | 2020-06-19 | 2020-11-06 | 杭州鸽子蛋网络科技有限责任公司 | Information storage method, information inspection method and information storage and inspection system |
CN111898155B (en) * | 2020-06-19 | 2024-04-26 | 杭州鸽子蛋网络科技有限责任公司 | Information storage method, information checking method and information storage and checking system |
CN112101938A (en) * | 2020-09-10 | 2020-12-18 | 支付宝(杭州)信息技术有限公司 | Block chain-based digital seal using method and device and electronic equipment |
CN112101938B (en) * | 2020-09-10 | 2024-03-01 | 支付宝(杭州)信息技术有限公司 | Digital seal using method and device based on block chain and electronic equipment |
CN112115432A (en) * | 2020-09-18 | 2020-12-22 | 山大地纬软件股份有限公司 | Block chain based electronic seal credible use system and method |
CN114154189A (en) * | 2021-01-29 | 2022-03-08 | 北京天德科技有限公司 | Two-section type Hash chain link certificate storing method for data or file |
Also Published As
Publication number | Publication date |
---|---|
CN109756341B (en) | 2022-03-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109756341A (en) | Electronic signature method and device | |
AU2018101148A4 (en) | A system and method for document information authenticity verification | |
US11645632B2 (en) | System and method for a decentralized portable information container supporting privacy protected digital information credentialing, remote administration, local validation, access control and remote instruction signaling utilizing blockchain distributed ledger and container wallet technologies | |
CN109409122A (en) | File memory method and its electronic equipment, storage medium | |
CN102647423B (en) | The discrimination method of a kind of digital signature and seal and system | |
CN106209877A (en) | A kind of be certification core with block chain backstage false-proof authentication system | |
CN109741056A (en) | A kind of method and device that electronic certificate uploads | |
CN112037068B (en) | Resource transfer method, system, device, computer equipment and storage medium | |
CN102855577B (en) | Multiple commodity antifake check method based on cloud computing | |
CN104680389A (en) | NFC mobile phone terminal anti-fake system and method based on time encryption | |
CN109034843A (en) | A kind of generation method, verification method and the system of article anti-counterfeit information | |
CN106934621A (en) | The examination & approval safety certifying method and system of payment funding | |
CN101447985A (en) | Digital credentials method based on notarization information | |
CN111914230B (en) | Identity verification method, system, terminal equipment and storage medium based on block chain | |
CN109360008B (en) | Product anti-counterfeiting authentication updating method and system | |
CN109242666A (en) | Personal reference method, apparatus and computer equipment are obtained based on block chain | |
CN112417518A (en) | File verification method and device, electronic equipment and computer readable medium | |
CN110598433A (en) | Anti-counterfeiting information processing method and device based on block chain | |
CN110689348B (en) | Revenue verification method, device, terminal and medium based on alliance chain | |
CN104156645A (en) | Copy verification system and application method thereof | |
CN112598502A (en) | Evidence obtaining method, device, equipment and storage medium | |
CN103647650A (en) | Rule definition based automatic signature/signature verification device and method | |
CN109726574A (en) | A kind of electronic proof system that can not be distorted based on block chain | |
CN109509007A (en) | Product false proof electronic tag and electronic tag authentication method and system | |
CN112383407A (en) | Online notarization full-flow log processing method and system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230616 Address after: 310052 11th Floor, 466 Changhe Road, Binjiang District, Hangzhou City, Zhejiang Province Patentee after: H3C INFORMATION TECHNOLOGY Co.,Ltd. Address before: 310052 Changhe Road, Binjiang District, Hangzhou, Zhejiang Province, No. 466 Patentee before: NEW H3C TECHNOLOGIES Co.,Ltd. |
|
TR01 | Transfer of patent right |