Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity key file signing and verifying method

A verification method and identification technology, which is applied in the field of signing documents with identification keys and verification, and can solve problems such as the inability to realize the originality verification of signed documents

Active Publication Date: 2018-06-29
XIAN HUIBOXIZHAO INFORMATION TECH CO LTD
View PDF6 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] For the current signing technology of electronic documents, its security depends on the third-party PKI asymmetric public key platform and CA, but the CA only verifies the user identity connoted in the public key, and cannot realize the originality verification of signed documents. The invention provides a method for signing documents with an identification key and a verification method, using the graphics converted from the identification key data in the identification key algorithm to sign the document, and using the identification key algorithm to identify the user's identity such as name and IP address , e-mail address, mobile phone number, etc. as the advantages of public keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity key file signing and verifying method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0100] Embodiment: use the identification key to sign the document and the verification method to form a system, the system is to sign the document part and the verification part of the signed document by the identification key graphic, and use the Internet electronic document security signature composed of the identification key sending and document verification part , sending system;

[0101] (1) The identification key signing and signing verification parts include:

[0102] 1) Signer: identify the signer disk, card hardware and embedded identification graphics encryption algorithm, time-controlled random function update algorithm and electronic evidence data storage program;

[0103] 2) Client: The client operates the computer hardware and the built-in identification key signing operation algorithm, signature electronic evidence generation, storage algorithm, and verification network data exchange program;

[0104] 3) Verification network: Sign the verification terminal ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity key file signing and verifying method. According to the identity key file signing and verifying method, identity data representing identity characteristics are operated through an identity password algorithm to generate asymmetric identity public and private key pairs, identity password data serving as a public key are converted into visual identity patterns forsigning files and registered and distributed to a signing end and a verification end. By encrypting and decrypting the files through the identity passwords, the identity key file signing and verifying method can ensure security of the files during transmission, and by signing the files through the visual patterns converted from the identity code data, ensures safety of the files during a signingprocess and is free from security assurance of a third party during transmission and verification; a verification algorithm with anti-counterfeit verification through electronic evidences generated during signing without inquiring original texts can protect privacy of users; encrypting and decrypting the files through the identity key data and signing the files through the identity key patterns achieve safety of electronic files and meanwhile simultaneously achieve connotation of law and culture of sign patterns and traditional written files such as seals or fingerprints.

Description

technical field [0001] The invention belongs to the technical field of anti-counterfeiting of electronic information technology, and relates to the application technology of information security for signing electronic documents with an identification key in e-government and e-commerce, in particular to a method for signing documents with an identification key and a verification method. Background technique [0002] At present, in order to meet the needs of e-government and e-commerce, technologies such as paper scanning, electronic seal signing and digital certificate signing are used to obtain electronically signed documents. [0003] 1. Paper scanning: The electronic version of the signed document obtained by scanning the signed paper document is the most used and relatively simple method. There are problems: After the file is converted into a graphic format, the basic function of "character search" of the document format file will be lost. This "electronic version" can be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/64H04L29/06
CPCG06F21/602G06F21/64H04L63/0442
Inventor 齐宇庆
Owner XIAN HUIBOXIZHAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products