Decentralized multi-digital signature/electronic signature method

A digital signature and decentralization technology, applied in the field of network security, can solve problems such as malicious tampering, and achieve high security, data privacy protection, and convenient development process

Pending Publication Date: 2020-09-29
上海黔易数据科技有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of development, release, transmission and operation, the software may be maliciously tampered with by viruses, Trojan horses and illegal behaviors (insider hackers), thus causing malicious consequences after running on the customer's system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decentralized multi-digital signature/electronic signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] This embodiment discloses as figure 1 A decentralized multi-digital signature / electronic signature method shown includes the following steps:

[0033] S1 The client obtains any version of the PDF file to be signed, the signature image, the digital certificate and the corresponding certificate password;

[0034] S2 obtains the included signature information according to the PDF file to be signed;

[0035] S3 derives the summary data template of the new signature information according to the signature information contained in S2;

[0036] S4 calculates the corresponding byte range according to the byte range of the PDF file to be signed;

[0037] S5 performs digest calculation on the byte range data in S4, and obtains the calculation result;

[0038] S6 calculates the object number where the new signature is located according to the crosstab of the PDF file to be signed;

[0039] S7 uses the certificate password to calculate the certificate and obtain the digital cert...

Embodiment 2

[0049] This embodiment discloses an RSA algorithm, and its digital signature technology is actually realized through a Hash function. If the file changes, the value of the digital signature will also change accordingly. Different files will get different digital signatures. One of the simplest Hash functions is to add up the binary codes of the files and take the last few bits. The Hash function is public to both parties sending the data.

[0050] The implementation of RSA algorithm includes: key generation, encryption algorithm and decryption algorithm. The security of the RSA system mainly depends on the difficulty of decomposing large prime numbers. In order to ensure the security of the RSA system, each parameter must be carefully selected. The selection of p and q must be a prime number, and the two numbers must be sufficient, because n=pq, making n-factorization computationally infeasible. Therefore, when implementing the RSA algorithm in a computer, it is necessary ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security, in particular to a decentralized multi-digital signature/electronic signature method, which comprises the following steps of: acquiring a PDF file and a signature picture to be signed of any version, a digital certificate and a corresponding certificate password by a client; obtaining an abstract data template of the new signature information; calculating a corresponding byte range and carrying out abstract calculation to obtain an object number where a new signature is located; calculating the certificate to obtain a digital certificate; calculating and combining new signature data according to the object number in the cross table; packaging the latest signature data and writing the packaged signature data into a result ofthe PDF signature field; according to the method, cross-version and cross-platform compatibility of multiple signatures can be realized, offline signature of the to-be-signed data at the local terminal is ensured, and the risk that the to-be-signed data is leaked in transmission and the risk that the digital identity is illegally used and stolen are avoided. Therefore, the development process is more convenient, the electronic signature cannot be tampered, and the data privacy is fully guaranteed.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a decentralized multiple digital signature / electronic signature method. Background technique [0002] The information industry is the leading industry of today's international economic development, and information security, as the foundation of the development of the information industry, has become an important content discussed in the high-tech field. With the rapid development of computer technology, information communication technology and manufacturing technology, significant changes have taken place in social and economic life. During the process of development, release, transmission and operation, the software may be maliciously tampered with by viruses, Trojan horses and illegal activities (insider hackers), which will cause malicious consequences after running on the customer's system. Digital signature is a visual statement to realize the security of online tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/60
CPCG06F21/64G06F21/602
Inventor 易小伟赵琪高帅歌
Owner 上海黔易数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products