CN108111311B - Method for realizing bank counter electronic signature based on state cryptographic algorithm - Google Patents
Method for realizing bank counter electronic signature based on state cryptographic algorithm Download PDFInfo
- Publication number
- CN108111311B CN108111311B CN201711415790.XA CN201711415790A CN108111311B CN 108111311 B CN108111311 B CN 108111311B CN 201711415790 A CN201711415790 A CN 201711415790A CN 108111311 B CN108111311 B CN 108111311B
- Authority
- CN
- China
- Prior art keywords
- terminal
- certificate
- signature
- public key
- national
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000002194 synthesizing effect Effects 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 6
- 238000012795 verification Methods 0.000 claims description 6
- 238000004140 cleaning Methods 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 abstract description 4
- 238000004891 communication Methods 0.000 abstract description 2
- 230000015572 biosynthetic process Effects 0.000 description 9
- 238000003786 synthesis reaction Methods 0.000 description 8
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention provides a method for realizing bank counter electronic signature based on a national cryptographic algorithm, which needs to provide an equipment end, a terminal and a server end, and the method comprises the following steps: the terminal sends an instruction to the equipment end to generate a SM2 secret key pair for storage, and the public key is transferred to the server end through the terminal; after receiving the public key, the server side acquires and stores the national secret certificate through the public key and forwards the national secret certificate to the equipment side by the terminal; the equipment terminal analyzes the national secret certificate, judges whether the public key of the certificate is consistent with the public key stored by the equipment terminal, and reports a matching result to the terminal; when the terminal receives the matching result, the terminal issues the PDF document to the equipment terminal for display; after the client submits the handwritten signature, the equipment end synthesizes the handwritten signature into the current PDF document, and uses a national secret certificate and an SM2 private key to digitally sign the synthesized PDF document, and the terminal forwards the PDF document to the server end; and the server side uses the national secret certificate and the public key to confirm the legality of the PDF document and then archives the PDF document. The invention ensures the transmission security of three-party communication and prevents the document and the signature from being falsified.
Description
Technical Field
The invention relates to the field of banks, in particular to a method for realizing electronic signature of a bank counter based on a national cryptographic algorithm.
Background
Current lump bank has all expanded electronic handwritten signature business to counter devices such as traditional counter foreign currency to reduce the expense of paper document. The conventional electronic signature business process of the bank counter at present is as follows: the background sends the PDF document to the terminal, the terminal issues the PDF document to the equipment end through HID (human input device) or Bluetooth for displaying, after the client signs, the equipment end uploads the signature data (including picture and track data) to the terminal, and the terminal synthesizes the signature data into PDF and uploads the PDF to the background server for storage. In the business process, the formation and synthesis of the signature track are respectively carried out at the equipment end and the terminal end, and the server only participates in the storage work, which can cause the following risks:
(1) although the transmission security from the device side to the terminal is ensured through the encryption of the key, the PDF before the synthesis and the PDF displayed by the device side cannot be ensured to be matched, namely, the document viewed by the client and the document finally participating in the synthesis are possibly inconsistent;
(2) the terminal cannot guarantee that the signature data source is legal, i.e. the signature data participating in the synthesis may not come from the correct device;
(3) the server passively receives the final PDF document uploaded by the terminal, and cannot ensure whether the document is legal or not and confirm whether the document is tampered or not.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method for realizing bank counter electronic signature based on a national cryptographic algorithm, which can prevent the document and the signature from being falsified while ensuring the transmission security of three-party communication.
The invention is realized by the following steps: a method for realizing bank counter electronic signature based on a state cryptographic algorithm needs to provide an equipment end, a terminal and a server end, and the method comprises the following steps:
step S1, the terminal issues an instruction to the equipment terminal;
step S2, after receiving the instruction of the terminal, the device generates a SM2 secret key pair for storage, and sends the public key to the terminal, and the terminal forwards the public key to the server;
step S3, after receiving the public key, the server side obtains the national password certificate through the public key, stores the national password certificate, issues the national password certificate to the terminal, and forwards the national password certificate to the equipment side through the terminal;
step S4, the device terminal analyzes the received national secret certificate, judges whether the public key carried by the certificate is consistent with the public key stored by the device terminal, and reports the matching result to the terminal;
step S5, when the matching results are consistent, the terminal issues the PDF document to the equipment terminal to be displayed to the client;
step S6, after the client reads and submits the handwritten signature, the device end synthesizes the handwritten signature of the client into the current PDF document, and uses the stored national secret certificate and the SM2 private key to digitally sign the synthesized PDF document, and sends the digitally signed PDF to the terminal, which is forwarded to the server end by the terminal;
and step S7, after the server side receives the PDF after the digital signature, the server side uses the national secret certificate and the public key to confirm the legality of the PDF document and then carries out archiving processing.
Further, the equipment end is cabinet outside cleaning equipment.
Furthermore, the equipment end adopts a hard encryption chip which accords with national password certification.
Furthermore, the equipment end is provided with an electromagnetic screen with a national password chip, and a signature track data source is acquired through the electromagnetic screen.
Further, the step S3 of "obtaining the national secret certificate through the public key" specifically includes that the server side submits the public key and the information of the bank party to the CA to apply for obtaining the national secret certificate.
Further, the step S6, where the step "the device side synthesizes the handwritten signature of the client into the current PDF document" specifically includes: and acquiring a dictionary object of the current signature page of the currently displayed PDF, calculating the area coordinate to be signed, and finally synthesizing the signature track into the designated position in the form of the watermark.
Further, the step S6 of "digitally signing the synthesized PDF document with the saved cryptographic certificate and the SM2 private key" specifically includes: the method comprises the steps of firstly calculating a PDF main body domain by using an SM3 algorithm to obtain a summary, then carrying out private key encryption on the summary by using an SM2 algorithm, forming a PKCS7 data stream by using an encrypted result and a national secret certificate, and synthesizing the data stream into a signature domain of a PDF document to obtain a PDF after digital signature.
Further, the step S7 is specifically: after receiving the digitally signed PDF, the server side takes out a PKCS7 stream from the signature domain, splits a national secret certificate and signature data, compares the information of a certificate issuer, confirms that the certificate is legal, takes out a public key from the national secret certificate to decrypt the signature data by using an SM2 algorithm, calculates a main body domain in the PDF document according to the SM3 algorithm to generate a new abstract, compares the decryption result with the new abstract, and when the comparison result is consistent, indicates that the signature verification is successful, and performs filing processing.
The invention has the following advantages:
1. in the whole signature process, the SM2 public and private key pair is generated by the equipment end, so that the terminal does not need to issue a private key as the equipment end additionally, and the secret key is ensured not to be leaked;
2. the display, signature, synthesis and digital signature are integrated at the equipment end, so that the signature data is guaranteed not to be tampered to the maximum extent;
3. the output document is digitally signed by a national secret certificate and can be verified, and the requirement of a person on using a domestic encryption algorithm for encrypting and decrypting the financial data is met;
4. the server can check the final document, ensure that the document is generated by a specified device end, reduce the participation of the terminal, reduce the performance pressure of the terminal on one hand, and put an end to the risk that sensitive data is stolen or tampered in the transmission process or the local caching process on the other hand.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
FIG. 1 is a flow chart of the method of the present invention.
Fig. 2 is a schematic flow chart of PDF digital signature according to the present invention.
Fig. 3 is a schematic flow chart of PDF signature verification according to the present invention.
Detailed Description
Referring to fig. 1 to 3, the method for implementing bank counter electronic signature based on the national cryptographic algorithm of the present invention needs to provide an equipment end, a terminal (teller operating terminal) and a server end, where the equipment end may be an equipment outside the counter, the equipment end may be provided with an electromagnetic screen with a national cryptographic chip, and a signature track data source is collected by the electromagnetic screen, so as to eliminate the possibility of track falsification by application layer software, and the equipment end employs a hard encryption chip conforming to the national cryptographic certification, so as to reduce the intervention of software application encryption and decryption results, and the method includes the following steps:
step S1, the terminal issues an instruction to the equipment terminal;
step S2, after receiving the instruction of the terminal, the device generates a SM2 secret key pair for storage, and sends the public key to the terminal, and the terminal forwards the public key to the server;
step S3, after receiving the public key, the server side obtains the national password certificate through the public key, stores the national password certificate, issues the national password certificate to the terminal, and forwards the national password certificate to the equipment side through the terminal; specifically, the public key and the information of the bank party can be submitted to a CA by the server to apply for obtaining the national secret certificate, and the CA may be a third party CA or a local bank CA. Wherein, the CA is a Certificate Authority (Certificate Authority) or Certificate Authority;
step S4, the device terminal analyzes the received national secret certificate, judges whether the public key carried by the certificate is consistent with the public key stored by the device terminal, and reports the matching result to the terminal;
step S5, when the matching results are consistent, the terminal issues the PDF document to the equipment terminal to be displayed to the client;
step S6, after the client reads and submits the handwritten signature, the device side synthesizes the handwritten signature of the client into the current PDF document, and the synthesizing process specifically includes: acquiring a dictionary object of a current signature page to be signed of a currently displayed PDF, calculating the coordinates of an area to be signed, and finally synthesizing a signature track into a specified position in a watermark form; after the synthesis operation is completed, the equipment terminal uses the stored national secret certificate and the SM2 private key to digitally sign the synthesized PDF document, sends the digitally signed PDF to the terminal, and forwards the PDF to the server terminal; the process of the digital signature specifically comprises the following steps: calculating a PDF main body domain by using an SM3 algorithm to obtain an abstract, then carrying out private key encryption (signature) on the abstract by using an SM2 algorithm, forming a PKCS7 data stream by using an encrypted result and a national secret certificate, and synthesizing the data stream into a signature domain of a PDF document to obtain a PDF subjected to digital signature;
step S7, after receiving the digitally signed PDF, the server side performs archive processing after confirming the validity of the PDF document by using the national secret certificate and the public key, where the step S7 specifically is: after the server side receives the PDF after digital signature, a PKCS7 stream is taken out from a signature domain, a national secret certificate and signature data are split, then information of a certificate issuer is compared, after the certificate is confirmed to be legal, a public key is taken out from the national secret certificate, signature data are decrypted (signature verification) by using an SM2 algorithm, a main body domain in the PDF document is calculated according to the SM3 algorithm to generate a new digest (digest 1), a decryption result (digest 2) is compared with the new digest (digest 1), when the comparison result is consistent, signature verification is successful, and filing processing is carried out.
The signature domain PDF document synthesis of the invention is carried out uniformly at the equipment end, which ensures that the document and the data are matched one by one, namely, the document seen by a user and the document participating in the synthesis are the same data source, avoids the additional risk of data falsification caused by secondary data copying, simultaneously, the equipment end directly synthesizes the track data which is adopted by the first hand and processed by a national secret chip into the PDF document, avoids the risk of falsification of a signature track, digitally signs the synthesized PDF document by using the national secret certificate at the equipment end, ensures the legality of the final document, effectively prevents the document from being falsified, namely, the equipment needs to generate a private key pair in advance and report a public key to a server end to apply for a unique national secret certificate, generates a summary by using a national secret algorithm when carrying out digital signature, synthesizes the summary together with the certificate into the signature domain of the PDF document, and applies for the national secret certificate at the equipment end to a server background by the terminal, and finally, the document is sent to the server side to be subjected to digital signature verification, so that the document legality is further enhanced. The whole signature process has less terminal workload, and the performance pressure of the terminal is reduced.
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.
Claims (7)
1. A method for realizing bank counter electronic signature based on a state cryptographic algorithm is characterized by comprising the following steps: the method comprises the following steps:
step S1, the terminal issues an instruction to the equipment terminal;
step S2, after receiving the instruction of the terminal, the device generates a SM2 secret key pair for storage, and sends the public key to the terminal, and the terminal forwards the public key to the server;
step S3, after receiving the public key, the server side obtains the national password certificate through the public key, stores the national password certificate, issues the national password certificate to the terminal, and forwards the national password certificate to the equipment side through the terminal;
step S4, the device terminal analyzes the received national secret certificate, judges whether the public key carried by the certificate is consistent with the public key stored by the device terminal, and reports the matching result to the terminal;
step S5, when the matching results are consistent, the terminal issues the PDF document to the equipment terminal to be displayed to the client;
step S6, after the client reads and submits the handwritten signature, the device end synthesizes the handwritten signature of the client into the current PDF document, and uses the stored national secret certificate and the SM2 private key to digitally sign the synthesized PDF document, and sends the digitally signed PDF to the terminal, which is forwarded to the server end by the terminal; the step S6 of "digitally signing the synthesized PDF document with the saved domestic secret certificate and the SM2 private key" specifically includes: calculating a PDF main body domain by using an SM3 algorithm to obtain an abstract, then encrypting the abstract by using an SM2 algorithm through a private key, forming a PKCS7 data stream by using an encrypted result and a national secret certificate, and synthesizing the data stream into a signature domain of a PDF document to obtain a PDF after digital signature;
and step S7, after the server side receives the PDF after the digital signature, the server side uses the national secret certificate and the public key to confirm the legality of the PDF document and then carries out archiving processing.
2. The method for realizing bank counter electronic signature based on the cryptographic algorithm in the country as claimed in claim 1, wherein: the equipment end is an external cabinet cleaning device.
3. The method for realizing bank counter electronic signature based on the cryptographic algorithm in the country as claimed in claim 1, wherein: the equipment end adopts a hard encryption chip conforming to national password authentication.
4. The method for realizing bank counter electronic signature based on the cryptographic algorithm in the country as claimed in claim 1, wherein: the device end is provided with an electromagnetic screen with a national password chip, and signature track data sources are collected through the electromagnetic screen.
5. The method for realizing bank counter electronic signature based on the cryptographic algorithm in the country as claimed in claim 1, wherein: in step S3, the step of "obtaining the national secret certificate through the public key" is specifically that the server side submits the public key and the information of the bank party to the CA to apply for obtaining the national secret certificate.
6. The method for realizing bank counter electronic signature based on the cryptographic algorithm in the country as claimed in claim 1, wherein: the step S6, in which the device side synthesizes the handwritten signature of the client into the current PDF document, specifically includes: and acquiring a dictionary object of the current signature page of the currently displayed PDF, calculating the area coordinate to be signed, and finally synthesizing the signature track into the designated position in the form of the watermark.
7. The method for realizing bank counter electronic signature based on the cryptographic algorithm in the country as claimed in claim 1, wherein: the step S7 specifically includes: after receiving the digitally signed PDF, the server side takes out a PKCS7 stream from the signature domain, splits a national secret certificate and signature data, compares the information of a certificate issuer, confirms that the certificate is legal, takes out a public key from the national secret certificate to decrypt the signature data by using an SM2 algorithm, calculates a main body domain in the PDF document according to the SM3 algorithm to generate a new abstract, compares the decryption result with the new abstract, and when the comparison result is consistent, indicates that the signature verification is successful, and performs filing processing.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711415790.XA CN108111311B (en) | 2017-12-25 | 2017-12-25 | Method for realizing bank counter electronic signature based on state cryptographic algorithm |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711415790.XA CN108111311B (en) | 2017-12-25 | 2017-12-25 | Method for realizing bank counter electronic signature based on state cryptographic algorithm |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN108111311A CN108111311A (en) | 2018-06-01 |
| CN108111311B true CN108111311B (en) | 2021-11-19 |
Family
ID=62212649
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201711415790.XA Active CN108111311B (en) | 2017-12-25 | 2017-12-25 | Method for realizing bank counter electronic signature based on state cryptographic algorithm |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN108111311B (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110719162B (en) * | 2019-09-04 | 2022-08-09 | 浪潮金融信息技术有限公司 | Method for guaranteeing safety of bank self-service terminal system based on SM2 algorithm |
| CN111369364B (en) * | 2020-03-02 | 2024-02-23 | 中国农业银行股份有限公司 | Electronic signature method and device based on super counter |
| CN114499891B (en) * | 2022-03-21 | 2024-05-31 | 宁夏凯信特信息科技有限公司 | Signature server system and signature verification method |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN202677327U (en) * | 2011-12-13 | 2013-01-16 | 北京握奇数据系统有限公司 | Handwritten terminal for encrypting signatures |
| CN103338215A (en) * | 2013-07-26 | 2013-10-02 | 中金金融认证中心有限公司 | Method for establishing TLS (Transport Layer Security) channel based on state secret algorithm |
| CN103888260A (en) * | 2014-03-13 | 2014-06-25 | 北京数字认证股份有限公司 | Digital signature device corresponding to handwritten signature reliably |
| CN105007162A (en) * | 2015-07-01 | 2015-10-28 | 浪潮电子信息产业股份有限公司 | A trusted electronic signature system and electronic signature method |
| CN105162607A (en) * | 2015-10-12 | 2015-12-16 | 武汉瑞纳捷电子技术有限公司 | Authentication method and system of payment bill voucher |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2819050B1 (en) * | 2013-06-25 | 2019-12-25 | Aliaslab S.p.A. | Electronic signature system for an electronic document using a third-party authentication circuit |
-
2017
- 2017-12-25 CN CN201711415790.XA patent/CN108111311B/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN202677327U (en) * | 2011-12-13 | 2013-01-16 | 北京握奇数据系统有限公司 | Handwritten terminal for encrypting signatures |
| CN103338215A (en) * | 2013-07-26 | 2013-10-02 | 中金金融认证中心有限公司 | Method for establishing TLS (Transport Layer Security) channel based on state secret algorithm |
| CN103888260A (en) * | 2014-03-13 | 2014-06-25 | 北京数字认证股份有限公司 | Digital signature device corresponding to handwritten signature reliably |
| CN105007162A (en) * | 2015-07-01 | 2015-10-28 | 浪潮电子信息产业股份有限公司 | A trusted electronic signature system and electronic signature method |
| CN105162607A (en) * | 2015-10-12 | 2015-12-16 | 武汉瑞纳捷电子技术有限公司 | Authentication method and system of payment bill voucher |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108111311A (en) | 2018-06-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106452775B (en) | Method and device for realizing electronic signature and signature server | |
| CN107483212B (en) | Method for generating digital signature by cooperation of two parties | |
| KR100910378B1 (en) | System and method for issuing electronic certificate using encrypted image | |
| JP4870155B2 (en) | Electronic passport authentication protocol with enhanced privacy | |
| WO2022078367A1 (en) | Payment secret key encryption and decryption method, payment authentication method, and terminal device | |
| CN107508685B (en) | A realization method of applying electronic signature service system in cloud computing environment | |
| CN105635187B (en) | Method and device for generating electronic file with stamp and method and device for authenticating electronic file with stamp | |
| WO2015161689A1 (en) | Data processing method based on negotiation key | |
| CN104009842A (en) | Communication data encryption and decryption method based on DES encryption algorithm, RSA encryption algorithm and fragile digital watermarking | |
| TWI673626B (en) | Method for verifying electronic files using biometrics, terminal electronic device and computer readable recording medium | |
| CN108111311B (en) | Method for realizing bank counter electronic signature based on state cryptographic algorithm | |
| KR101113446B1 (en) | System and method for transmitting a certificate to a mobile device and system and method for transmitting and authenticating data using a multidimensional code | |
| CN116611082A (en) | A File Electronic Signature Algorithm That Can Improve the Security of Electronic Signature | |
| WO2018211475A1 (en) | Method for the creation of a document provided with a high-security digital signature | |
| CN107947939A (en) | Support the PDF endorsement methods and system of SM3 cryptographic Hash algorithm and SM2 Digital Signature Algorithms | |
| TWI734729B (en) | Method and device for realizing electronic signature and signature server | |
| WO2015109958A1 (en) | Data processing method based on negotiation key, and mobile phone | |
| JP2007060352A (en) | System, program, and method for managing document | |
| WO2023164616A1 (en) | Privacy-preserving data deduplication | |
| CN113300841B (en) | Identity-based collaborative signature method and system | |
| JP5159752B2 (en) | Communication data verification device and computer program therefor | |
| US12388624B2 (en) | Apparatus and method for sharing data | |
| CN114928469A (en) | IDaaS system for access control based on mutual authentication mechanism | |
| CN112380574A (en) | Data chaining method based on block chain and SE chip | |
| CN113497712A (en) | KGC data processing system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |