Signature management method and device and electronic equipment

A management method and electronic signature technology, applied in computer security devices, data processing applications, electronic digital data processing, etc., can solve the problems of information leakage, high security requirements of third-party platforms, etc., and achieve the effect of security

Active Publication Date: 2021-02-02
上海市数字证书认证中心有限公司
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this method requires high security requirements for third-party platforms
In addition, there may also be a risk of information leakage when uploading the original file to a third-party platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature management method and device and electronic equipment
  • Signature management method and device and electronic equipment
  • Signature management method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055]In order to facilitate the understanding of this embodiment, firstly, an operating environment for executing a signature management method disclosed in the embodiment of the present application is introduced in detail.

[0056] Such as figure 1 Shown is a schematic diagram of the signature management system provided by the embodiment of the present application. The signature management system includes: a signature terminal 100 and a third-party server 200 .

[0057] The third-party server 200 communicates with one or more signing terminals 100 through the network for data communication or interaction. The third-party server 200 may be a web server, a database server, and the like. The signature terminal 100 may be a personal computer (personal computer, PC), a tablet computer, a smart phone, a personal digital assistant (personal digital assistant, PDA) and the like.

[0058] In this embodiment, the third-party server 200 is used to store the signature data sent by th...

Embodiment 2

[0072] see image 3 , is a flow chart of the signature management method provided in the embodiment of the present application. The following will be image 3 The specific process shown will be described in detail. Optionally, the signature management method in the embodiment of the present application can be applied to a signature terminal.

[0073] Step 401, use the service public key to encrypt the signed historical node data to obtain information ciphertext.

[0074] Optionally, the above service public key may be provided by a third-party server.

[0075] Optionally, before generating the information ciphertext, it may also be judged whether the historical node data is the latest historical node data. If the current storage of the signing terminal is not the latest historical node data, first obtain the latest historical node data, and then encrypt the signed historical node data with the service public key to obtain the information ciphertext.

[0076] Exemplarily, ...

Embodiment 3

[0127] Based on the same application concept, the embodiment of the present application also provides a signature management device corresponding to the signature management method. Since the problem-solving principle of the device in the embodiment of the present application is similar to the aforementioned embodiments of the signature management method, this application For the implementation of the device in the embodiment, reference may be made to the description in the embodiment of the above method, and repeated descriptions will not be repeated.

[0128] see Figure 4 , is a schematic diagram of the functional modules of the signature management device provided in the embodiment of the present application. Each module in the signature management apparatus in this embodiment is used to execute each step in the above method embodiment. The signature management device includes: an encryption module 501, a first generation module 502, a second generation module 503, and a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a signature management method and device and electronic equipment, and the method comprises the steps: carrying out encryption on signed historical node data through a service public key so as to obtain an information ciphertext; using a signature private key and the information ciphertext to generate an electronic signature picture, which contains seal watermark informationcarrying the information ciphertext; generating a signature file according to the electronic signature picture and an original file; and sending file data corresponding to the signature file to a third-party server, so that the third-party server updates the historical node data. Through the method in the embodiment of the invention, the convenience of electronic signature can be improved under the condition of keeping the signature safety of the electronic signature.

Description

technical field [0001] The present application relates to the technical field of electronic signatures, in particular, to a signature management method, device and electronic equipment. Background technique [0002] With the popularization of the Internet and the development of e-commerce technology, more and more online business activities will use electronic contracts. An important technology in electronic contracts is the signing of electronic signatures. [0003] At present, the signing of the electronic signature of the electronic contract is generally through a third-party platform. For example, when a signature is required, upload the prepared electronic original document that needs to be signed to the third-party platform for the signature, and the third-party platform will affix the required electronic signature on the original electronic document to complete the signing of the contract Work. However, this method requires high security requirements for the third-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/13G06F21/16G06Q10/10
CPCG06F21/602G06F21/6218G06F16/137G06F21/16G06Q10/10
Inventor 崔久强孙欣冯晔王玉林
Owner 上海市数字证书认证中心有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products