Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Electronic signature and seal verification method and device

An electronic signature and electronic seal technology, applied in the field of data security, can solve the problems of electronic signature credibility discount, unfavorable network office promotion, etc.

Pending Publication Date: 2020-05-01
方正国际软件(北京)有限公司
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For official official documents or electronic documents such as vouchers, the electronic seal of the unit or department is stamped on it, but it is displayed as personal signature information, regardless of the authority of the electronic seal of the unit or department, or the common sense of people in the process of use Sexual habits greatly reduce the credibility of electronic signatures, which is not conducive to the promotion of online office

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic signature and seal verification method and device
  • Electronic signature and seal verification method and device
  • Electronic signature and seal verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] Embodiment 1: Use the private key of the signature operator to sign the first data package to be signed, and use the private key of the organization to sign the second data package to be signed, as shown in image 3 shown, including:

[0089] Step 301, the client obtains the first data package to be signed according to the electronic seal and the electronic file.

[0090] Step 302, the client uses the private key of the signature operator to sign the first data package to be signed to obtain a first signature result.

[0091] Step 303, the client obtains the second data packet to be signed at least according to the first signature result.

[0092] Step 304, the client sends the second data packet to be signed to the server.

[0093] Step 305 , the server signs the second data package to be signed by using the organization's private key to obtain a second signature result.

[0094] Step 306, the server sends the second signature result to the client.

[0095] Step 30...

Embodiment 2

[0096] Embodiment 2, use the private key of the organization to sign the first data package to be signed, and use the private key of the signature operator to sign the second data package to be signed, as shown in Figure 4 shown, including:

[0097] Step 401, the client obtains the first data package to be signed according to the electronic seal and the electronic file.

[0098] Step 402, the client sends the first data packet to be signed to the server.

[0099] Step 403, the server signs the first data package to be signed by using the organization's private key to obtain a first signature result.

[0100] Step 404, the server sends the first signature result to the client.

[0101] Step 405, the client obtains the second data packet to be signed at least according to the first signature result.

[0102] Step 406, the client uses the private key of the signature operator to sign the second data packet to be signed to obtain a second signature result.

[0103] Step 407 ,...

Embodiment 3

[0126] The specific steps of embodiment three include:

[0127] Step 501, the signature component module invokes the client storage module after successfully verifying the PIN code.

[0128] Step 502, the signature component module reads and analyzes the electronic seal, extracts the unique identification code of the seal, the image data of the seal, the name of the seal, the effective time of the seal, the public key certificate of the signature operator, the public key certificate of the seal maker, and the number of the seal maker Signature value, and the public key certificate of the institution to which the electronic seal belongs.

[0129] Step 503, the signature component module verifies the authenticity of the electronic seal itself, specifically using the seal maker's public key certificate to verify the digital signature value of the seal maker, if true, execute step 504, otherwise terminate the signature process.

[0130] Step 504, the signature component module pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the technical field of data security, in particular to an electronic signature and verification method and device, which are used for improving the efficiency of tracing a signature operation executor while maintaining the authority of an electronic seal. The method comprises the steps of obtaining a first to-be-signed data packet obtained according to anelectronic seal and an electronic file; acquiring a first signature result obtained by signing the first to-be-signed data packet by using a first private key; obtaining a second to-be-signed data packet obtained at least according to the first signature result; obtaining a second signature result obtained by signing the second to-be-signed data packet by using a second private key; and forming asignature electronic file with the electronic file by utilizing the electronic seal, a first public key certificate corresponding to the first private key, the first signature result, a second publickey certificate corresponding to the second private key and the second signature result.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a method and device for electronic signature and seal verification. Background technique [0002] In the process of network office, there are a large number of electronic documents such as official documents or vouchers that need to be electronically signed, and the essence of electronic signature technology is image processing and digital signature, so that digital signatures can be visualized and invisible cryptography technology can be transformed into The familiar stamping operation has promoted the popularization and application of digital signatures in network office. [0003] At present, when electronically signing a seal, only the identity certificate of the organization to which the electronic seal belongs, or the personal identity certificate of the executor of the signature operation, is used to digitally sign the electronic document, resulting in the verificatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G06F21/64
CPCH04L9/3247G06F21/64
Inventor 郝松高超霖杨玉坤
Owner 方正国际软件(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products