A method for signing a document with an identification key and verifying it

A verification method and identification technology, applied in the field of signing documents with identification keys and verification, can solve the problem of inability to verify the originality of signed documents

Active Publication Date: 2021-06-15
XIAN HUIBOXIZHAO INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] For the current signing technology of electronic documents, its security depends on the third-party PKI asymmetric public key platform and CA, but the CA only verifies the user identity connoted in the public key, and cannot realize the originality verification of signed documents. The invention provides a method for signing documents with an identification key and a verification method, using the graphics converted from the identification key data in the identification key algorithm to sign the document, and using the identification key algorithm to identify the user's identity such as name and IP address , e-mail address, mobile phone number, etc. as the advantages of public keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for signing a document with an identification key and verifying it

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0100] Embodiment: use the identification key to sign the document and the verification method to form a system, the system is to sign the document part and the verification part of the signed document by the identification key graphic, and use the Internet electronic document security signature composed of the identification key sending and document verification part , sending system;

[0101] (1) The identification key signing and signing verification parts include:

[0102] 1) Signer: identify the signer disk, card hardware and embedded identification graphics encryption algorithm, time-controlled random function update algorithm and electronic evidence data storage program;

[0103] 2) Client: The client operates the computer hardware and the built-in identification key signing operation algorithm, signature electronic evidence generation, storage algorithm, and verification network data exchange program;

[0104] 3) Verification network: Sign the verification terminal ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for signing a document with an identification key and a method for verifying that the identification data representing the identity feature is generated through an "identification cipher algorithm" operation to generate an asymmetric identification public-private key pair, and the identification cipher data used as the public key is converted into The visual identification graphic is used to sign the document, and it is registered and distributed to the signing end and the verification end; the invention uses the identification code to encrypt and decrypt the file, which ensures the security of the file during transmission, and uses the identification code data converted into The visual graphic signature document guarantees the security of the document during the signing process, and does not rely on the security guarantee of the third party during the transmission and verification process. When signing, electronic evidence is generated to verify anti-counterfeiting, and the verification algorithm that does not need to inspect the original text protects the user's secrets. , using the identification key data to encrypt and decrypt, and the identification key image to sign the document achieves the security of the electronic document, and at the same time achieves the legal connotation and cultural connotation of the signature image and the traditional written document signature (seal or fingerprint).

Description

technical field [0001] The invention belongs to the technical field of anti-counterfeiting of electronic information technology, and relates to the application technology of information security for signing electronic documents with an identification key in e-government and e-commerce, in particular to a method for signing documents with an identification key and a verification method. Background technique [0002] At present, in order to meet the needs of e-government and e-commerce, technologies such as paper scanning, electronic seal signing and digital certificate signing are used to obtain electronically signed documents. [0003] 1. Paper scanning: The electronic version of the signed document obtained by scanning the signed paper document is the most used and relatively simple method. There are problems: After the file is converted into a graphic format, the basic function of "character search" of the document format file will be lost. This "electronic version" can be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/64H04L29/06
CPCG06F21/602G06F21/64H04L63/0442
Inventor 齐宇庆
Owner XIAN HUIBOXIZHAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products