Safe and valid signature scheme for electronic file and paper file thereof

A technology for electronic documents and paper documents, applied in the field of information security, can solve the problems of waste of resources, general use, not having the validity of recognizing the content of a certain document, etc., to achieve the effect of saving resources and convenient verification of signatures and seals

Inactive Publication Date: 2016-11-09
李论
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Signatures, seals, and fingerprints are often used in our daily production and life to express our approval of a certain document, a certain contract, or a certain transaction. If these signatures, seals and fingerprints are entered into the computer, they will not have the effect of approving the content of a certain document because they are easy to copy and embezzle.
The digital signature of information security technology can perfectly solve the unique authenticity and validity of the document, but the digital signature data itself is a long series of abstract mathematical symbols. In daily use, there is no signature or stamp at a glance, and the data is not obtained through technology and the Internet. , it is also difficult to know the identity of the signer
Therefore, simple signatures or digital signatures cannot well meet the certification requirements for information and documents in modern production and life.
[0003] The certification and signature of documents in the office is difficult to be used in both paper and electronic documents; some bank POS machines use handwriting screen signatures, and purely electronic signatures are very easy to copy and steal, and customers need to save POS slips to reconcile with the bank. It is cumbersome; there is currently no effective authentication method for credit card consumption on the mobile phone only through signature confirmation and no password; multi-party visas in the contract need to be kept by multiple parties to prevent tampering, waste resources, and inefficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and valid signature scheme for electronic file and paper file thereof
  • Safe and valid signature scheme for electronic file and paper file thereof
  • Safe and valid signature scheme for electronic file and paper file thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Below in conjunction with accompanying drawing, the present invention is described in further detail, and steps are as follows:

[0025] Such as figure 1 As shown in the figure, it is the process of the user signing a document in the scheme of the present invention. The present invention uses the user's private key and the signature pattern to sign the document requiring the user's visa, and the specific steps are as follows.

[0026] The document signed by the user can be a paper or electronic document, and the paper document can follow certain rules, and the information contained in it can be converted into an electronic document by means of electronic entry, and the scheme uses the user's private key to digitally sign the electronic document;

[0027] The user enters his signature or seal or logo as a binary image through input devices such as a mouse, tablet, and screen stylus, and judges whether the image can be embedded with the specified digital signature length...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safe and valid signature scheme for an electronic file and a paper file thereof. The scheme comprises the following steps of: inputting a signature or seal of a user through an electronic input device, performing digital signature on the file by the user through the adoption of a private key, embedding the digital signature into the user signature through the adoption of a specific image information embedding technology so as to certificate the electronic file accepted by the user or the electronic edition of the paper file thereof; the aim that the certificated file cannot be tampered or denied that the file is certificated by the user himself can be still achieved through the verification on the electronic or paper signature of the user even if the certificated electronic file or the user signature in which the information is embedded are printed and output as the paper edition.

Description

technical field [0001] The invention relates to digital signature technology in the field of information security, in particular to a safe and effective signing scheme for electronic documents and paper documents. Background technique [0002] Signatures, seals, and fingerprints are often used in our daily production and life to express our approval of a certain document, a certain contract, or a certain transaction. If these signatures, seals and fingerprints are entered into the computer, they will not have the effect of approving the content of a certain file because they are easy to copy and embezzle. The digital signature of information security technology can perfectly solve the unique authenticity and validity of the document, but the digital signature data itself is a long series of abstract mathematical symbols. In daily use, there is no signature or stamp at a glance, and the data is not obtained through technology and the Internet. , and it is difficult to know t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3249H04L9/0866
Inventor 李论
Owner 李论
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products