Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

PDF signature method and system supporting SM3 password hash algorithm and SM2 digital signature algorithm

A technology of digital signature and hash algorithm, which is applied in the direction of digital transmission system, transmission system, digital data protection, etc., can solve the problem of unrecognizable SM2 algorithm, etc., and achieve the effect of strong security performance

Inactive Publication Date: 2018-04-20
杭州尚尚签网络科技有限公司
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Adobe and other PDF software providers currently only support signing with RSA certificates, and cannot recognize the SM2 algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PDF signature method and system supporting SM3 password hash algorithm and SM2 digital signature algorithm
  • PDF signature method and system supporting SM3 password hash algorithm and SM2 digital signature algorithm
  • PDF signature method and system supporting SM3 password hash algorithm and SM2 digital signature algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] This example supports the PDF signature method of SM2 such as figure 1 As shown, it includes the sending and receiving process at the sending end and the signing process at the receiving end.

[0067] The sending and receiving process of the sending end includes the following steps:

[0068] S1. The sender sends the PDF document to be signed.

[0069] S2. Receive the signed PDF document;

[0070] The signature process at the receiving end includes the following steps:

[0071] S1. The digital certificate of the signer exists at the receiving end, and the receiving end obtains the PDF document. The digital certificate includes a private key and a public key certificate. The public key certificate contains information such as the public key of the identity owner, the name, the name of the issuing authority, the digital ID number, and the digital signature of the issuing authority. Digital identity can be issued by a trusted digital certificate certification center. Call SSQ-GM t...

Embodiment 2

[0080] Such as figure 2 As shown, this embodiment provides a PDF signature system supporting SM3 cryptographic hash algorithm and SM2 digital signature algorithm, and the system includes a sending end and a receiving end. The overall process is as image 3 As shown, the sender sends a PDF document, and the signature certificate and signature certificate chain are signed by the receiver and embedded in the PDF and then sent back to the sender.

[0081] The sending end includes a sending module and a receiving module, and the specific functions of each module are as follows:

[0082] The sending module is used to send the PDF document to be signed.

[0083] The receiving module is used to obtain the PDF document signed by the receiving end.

[0084] The receiving end includes an acquisition module, a summary module, a signature module, a verification module, a synthesis module, a time stamp module, and a sending module. The specific functions of each module are as follows:

[0085] The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a PDF signature method and system supporting the SM3 password hash algorithm and the SM2 digital signature algorithm. The method comprises the following steps that a sending end sends a PDF document to be signed; a receiving end is provided with a digital certificate of a signer, the receiving end acquires the PDF document and checks the validity of the digital certificateof the signer; the SM3 password hash algorithm is used for carrying out abstract on the obtained PDF document, and an abstract message to be signed is generated; the SM2 digital signature algorithm and a private key are used for signing the abstract message to be signed, and a digital signature value is generated; the digital signature value is verified; and a signature body of the CAdES format isgenerated by using the generated digital signature value and the digital certificate of the signer, a PDF document containing the digital signature is synthesized, and the PDF signature is completed.According to the PDF signature method and system, the SM3 password hash algorithm and the SM2 digital signature algorithm are applied to the PDF signature, so that the digital signature is safer, fast and reliable.

Description

Technical field [0001] The invention relates to the technical field of PDF signature methods, in particular to a PDF signature method and system supporting SM3 cryptographic hash algorithm and SM2 digital signature algorithm. Background technique [0002] PDF English is called Portable Document Format, which is translated into portable document format, which is an electronic file format. This file format has nothing to do with the operating system platform, that is, PDF files are universal in Windows, Unix or MacOS operating systems. This feature makes it an ideal file format for electronic document distribution and digital information dissemination. PDF format files have become a de facto industry standard for digital information. [0003] With the Internet and smart phones entering millions of households, people use the Internet in more and more scenarios, and corresponding e-commerce and e-government affairs can already be carried out on the Internet. As a result, a huge elec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G06F21/64
CPCG06F21/645H04L9/3236H04L9/3252H04L9/3263
Inventor 钱之光吕涛
Owner 杭州尚尚签网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products