Digital signature and signature authenticating method

A technology of digital signature and data signature, applied in the field of security authentication, can solve the problem of unable to trace the signature record of the document handler, etc.

Active Publication Date: 2011-02-02
YONYOU NETWORK TECH
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is no unified standard processing method for the storage of signed document ciphertext. Most business documents are processed by naming a column in the document table for ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature and signature authenticating method
  • Digital signature and signature authenticating method
  • Digital signature and signature authenticating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0026] In the following description, many specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, therefore, the present invention is not limited to the specific embodiments disclosed below limit.

[0027] figure 1 is a flowchart of a digital signature and signature verification method according to an embodiment of the present invention.

[0028] Such as figure 1 As shown, the present invention provides a digital signature and signature verification method, including: step 102, receiving a business document; step 104, reading the signature rule contract corresponding to the business document; s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a digital signature and a signature authenticating method which comprises the following steps: step 102, receiving business documents; step 104, reading the signature rule contract corresponding to the business documents; step 106, according to the signature rule contract corresponding to the business documents, resolving the document fields from the business documents and forming a plain text of signature; step 108, after a sender digitally signs on the plain text of signature, sending the business document to a receiver; and step 110, receiving the business documents by the receiver and authenticating the signature. The invention also provides a digital signature and a signature authenticating device. According to the invention, a user can dynamically configure the field rules of 'signature/signature authentication', relative independence of business demands and an authentication function is realized, and a uniform log record for the authenticating operation is provided, thus ensuring that all signature records can be looked up with a basis.

Description

technical field [0001] The invention relates to security authentication technology, in particular to a digital signature and a signature verification method. Background technique [0002] CA security authentication technology provides an important technical guarantee for verifying and identifying the authenticity of electronic documents (especially involving financial transactions), which can prevent major accidents caused by malicious damage by others, and can also hold relevant responsible persons accountable. However, there are some defects and deficiencies in the application of CA security authentication technology in various application systems at present. [0003] Due to the defects and deficiencies of current CA professional providers, only atomic signature / signature verification APIs are provided, which cannot simplify the application in business. The content rules of "signature / signature verification" cannot be dynamically configured according to the customer's bus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 潘飞
Owner YONYOU NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products