Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Electronic signature encryption and decryption method and system based on HASH

A technology of electronic signature and encryption method, which is applied in the direction of encryption device with shift register/memory, transmission system, digital transmission system, etc., and can solve the problems of lack of solutions, secret key is easy to be stolen, secret key is easy to forget, etc. , to achieve the effect that is not easy to forget

Pending Publication Date: 2022-03-04
CHONGQING AOXIONG INFORMATION TECH
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, the secret key is easy to be stolen, the password is passively used, and the secret key is easy to forget. At present, there is no effective solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic signature encryption and decryption method and system based on HASH
  • Electronic signature encryption and decryption method and system based on HASH
  • Electronic signature encryption and decryption method and system based on HASH

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The application will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solutions of the present invention more clearly, but not to limit the protection scope of the present application.

[0068] First aspect, such as figure 1 As shown, this application proposes a hash-based encryption and decryption method for electronic signatures, including an encryption process and a decryption process.

[0069] Specifically include the following steps:

[0070] Encryption process:

[0071] Step S11: collecting signature stroke data to be encrypted;

[0072] Step S12: Standardize the signature stroke data to be encrypted to obtain the standardized signature stroke data to be encrypted;

[0073] Step S13: Extract the features of the stroke data of the signature to be encrypted after standardization, that is, extract various feature data corresponding to each point of the stroke of the signatur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an electronic signature encryption and decryption method and system based on HASH. The method comprises the following steps: an encryption process: acquiring to-be-encrypted signature stroke data; performing standardization; extracting features; processing through a threshold value; the HASH value of each signature stroke feature is calculated, and the HASH value is a final signature key; the decryption process comprises the following steps: collecting to-be-decoded signature stroke data; performing standardization; performing feature extraction; similarity comparison is carried out; and decrypting according to a comparison result of the similarity and a similarity threshold. The encryption part comprises a data acquisition module, a standardization module, a feature extraction module, a threshold value processing module, a HASH value calculation module, an encryption module and a signature feature library; and the decryption part comprises a data acquisition module, a standardization module, a feature extraction module, a similarity comparison module and a decryption module. The problems that the secret key is easy to steal, the password is passively used and the secret key is easy to forget are solved.

Description

technical field [0001] The invention belongs to the technical field of encryption and decryption, and in particular relates to a HASH-based electronic signature encryption and decryption method and system. Background technique [0002] At present, with the vigorous development of the Internet and the rise of various applications, online payment is also booming. When we use the convenience brought to us by the Internet, it is also full of various potential information security problems. There are various problems in conventional password storage and input methods. The most common ones are password theft, and passive With password questions, the password can be used without the password owner's knowledge and encrypted data can be obtained. For example: there are memory problems in character passwords, and the problem of forgetting passwords often occurs, and this kind of password is the easiest to be stolen, and the password can be used passively. Another example is fingerpr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06G06K9/62G06V10/96G06V40/30G06V40/50
CPCH04L9/3247H04L9/3236H04L9/0643G06F18/22
Inventor 杨远杰申发海
Owner CHONGQING AOXIONG INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products