[go: up one dir, main page]

CN101661573A - Method for producing electronic seal and method for using electronic seal - Google Patents

Method for producing electronic seal and method for using electronic seal Download PDF

Info

Publication number
CN101661573A
CN101661573A CN200810119065A CN200810119065A CN101661573A CN 101661573 A CN101661573 A CN 101661573A CN 200810119065 A CN200810119065 A CN 200810119065A CN 200810119065 A CN200810119065 A CN 200810119065A CN 101661573 A CN101661573 A CN 101661573A
Authority
CN
China
Prior art keywords
seal
information
data
related data
specific
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200810119065A
Other languages
Chinese (zh)
Other versions
CN101661573B (en
Inventor
王东临
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sursen Electronic Technology Co., Ltd.
Original Assignee
BEIJING SURESENSE INTERNATIONAL INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING SURESENSE INTERNATIONAL INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING SURESENSE INTERNATIONAL INFORMATION TECHNOLOGY Co Ltd
Priority to CN2008101190652A priority Critical patent/CN101661573B/en
Publication of CN101661573A publication Critical patent/CN101661573A/en
Application granted granted Critical
Publication of CN101661573B publication Critical patent/CN101661573B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a method for producing an electronic seal and a method for using the electronic seal. The method for producing the electronic seal comprises the following steps of: confirming information on a specific location having the permission to use the electronic seal; and binding the confirmed information on the specific location with related data of the electronic seal. The method for using the electronic seal comprises the following steps of: acquiring the information on the current location of the electronic seal; confirming whether the information on the current location is in accordance with the information on the specific location bound with the related data of the electronic seal; and when the information on the current location is confirmed to be in accordance with the information on the specific location bound with the related data of the electronic seal, permitting the current location to use the electronic seal, and otherwise, rejecting thecurrent location to use the electronic seal. By using the method for producing the electronic seal and the method for using the electronic seal provided by the embodiment of the invention, the use location of the electronic seal can be restricted, and the use safety of the electronic seal is improved.

Description

Producing electronic seal method and E-seal using method
Technical field
The present invention relates to the E-seal technology, particularly a kind of producing electronic seal method and a kind of E-seal using method.
Background technology
E-seal is the application and the form of expression of electronic signature, and and if only if with electronic signature technology when verifying that certain part of e-file is authentic and valid, just normal demonstration/printing E-seal.The E-seal technology is simulated traditional seal in kind with advanced person's digital technology, cannot see, impalpable electronic signature become the seal/signature that meets traditional habit and experience, the e-file of adding a cover E-seal has similar validity to the paper document of adding a cover seal in kind/signature.Generally, E-seal take the form of figure, the image that official seal, signature etc. are used to confirm file availability traditionally, its management, use-pattern meet the custom and the experience of seal in kind.
At present the E-seal technology usually use the mode of digital signature guarantee data file integrality, authenticity and can not distorting property.Each E-seal corresponding one unique based on international public key architecture (Public Key Infrastructure, PKI) digital certificate of standard, this digital certificate is equivalent to this E-seal user's I.D., identity that can this E-seal of unique identification user.
When needs show or print through the data file of affixing one's seal, at first the authenticity and integrity of data document is verified, after checking is passed through, just in data file, show or print E-seal.Show E-seal user's identity through the data file of affixing one's seal by this E-seal, and guarantee data file integrality, authenticity and can not distorting property.
But existing E-seal technology only limits the rights of using of E-seal by the digital certificate of E-seal, and the field of employment to E-seal does not limit.If the carrier of electronic seal data is stolen, be stolen such as the USB flash disk of having stored electronic seal data, anyone who has then stolen this carrier can utilize the electronic seal data of this carrier stored arbitrarily to add a cover E-seal, thereby the legitimacy and the security that make E-seal use can't guarantee.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of producing electronic seal method and E-seal using method, to improve the safety in utilization of E-seal.
The producing electronic seal method that the embodiment of the invention provides comprises:
Define authority and use the particular place information of E-seal;
Related data binding with determined particular place information and described E-seal.
The E-seal using method that the embodiment of the invention provides comprises:
Obtain the current place information of E-seal;
Determine whether described current place information is with consistent with the particular place information of E-seal related data binding;
Determine described current place information with and the E-seal related data particular place information of binding when consistent, allow current place to use described E-seal; Otherwise refuse current place and use described E-seal.
The embodiment of the invention is by particular place information and the binding of E-seal related data with E-seal, when using E-seal, whether the place information of verifying current E-seal is consistent with the particular place information of this E-seal binding, only when unanimity, just allow current place to use described E-seal, thereby limited the field of employment of E-seal, improved the safety in utilization of E-seal.Producing electronic seal method and the using method of utilizing the embodiment of the invention to provide can limit validated user and use E-seal in illegal place, have improved the safety in utilization of E-seal greatly.
Description of drawings
Fig. 1 is the process flow diagram of producing electronic seal method in the embodiment of the invention.
Fig. 2 is the process flow diagram of E-seal using method in the embodiment of the invention.
Fig. 3 is the process flow diagram of E-seal using method in the embodiment of the invention.
Embodiment
In the producing electronic seal process that the embodiment of the invention provides, at first define the particular place information that authority is used E-seal; The authority that has that to determine is then used the particular place information and the binding of E-seal related data of E-seal.Correspondingly, in the E-seal use that the embodiment of the invention provides, at first determine the current place information of E-seal, verify then whether the current place information of determining is with consistent with the particular place information of E-seal related data binding, when determining that particular place information that described current place information and E-seal related data are bound is consistent, allow current place to use described E-seal; Otherwise refuse current place and use described E-seal.
Fig. 1 is the process flow diagram of producing electronic seal method in the embodiment of the invention.As shown in Figure 1, this method may further comprise the steps:
Step 101: define the particular place information that authority is used E-seal.
Particular place information can comprise specific use facility information and/or the specific carrier information of depositing.
Determine the method for particular place information, directly reflected the restriction of system Zhang Fang the E-seal particular place.Chapter side wishes that any user can use this E-seal on specific use equipment when system, and then particular place information comprises specific use facility information.E-seal is specific deposits the carrier holder can use this E-seal on any apparatus when system chapter side wishes to have only, and then particular place information comprises the specific carrier information of depositing.E-seal is specific deposits the carrier holder when using this E-seal on specific use equipment when system chapter side wishes to have only, and then particular place information comprises specific use facility information and the specific carrier information of depositing.
Wherein specific use facility information can obtain according to one or more characterization information of specific use equipment.The specific carrier information of depositing can obtain according to specific one or more characterization information of depositing carrier.
Specifically, a string serial data of one or more characterization information combination generations with specific use equipment obtains specific use facility information according to serial data; Specific one or more characterization information combinations of depositing carrier are generated a string serial data, obtain the specific carrier information of depositing according to serial data.
More specifically, one or more characterization information of specific use equipment directly can be made up a string serial data of generation; Also can adopt preset algorithm respectively each characterization information of specific use equipment to be calculated digest value, the digest value combination that generates is respectively generated a string serial data.Specific one or more characterization information of depositing carrier directly can be made up and generate a string serial data; Also can adopt preset algorithm respectively specific each characterization information of depositing carrier to be calculated digest value, the digest value combination that generates is respectively generated a string serial data.
In addition, can be directly with the serial data that obtains as specific use facility information or the specific carrier information of depositing.Also can adopt preset algorithm that serial data is handled, with the serial data after handling as specific use facility information or the specific carrier information of depositing.Wherein preset algorithm can be a hash algorithm, and said processing is the calculating digest value.
Illustrate below and how to determine specific use facility information.All characterization information of selected specific use equipment are formed a string data, adopt the summary of hash algorithm, should make a summary as using facility information with a regular length of this string data generation.Perhaps, each characterization information of the specific use equipment that employing hash algorithm will be selected generates a summary, and then the summary that will generate is formed a string data, handle summary of generation by this string data that the hash algorithm will generate, this that generates at last made a summary as this specific use facility information.
Use equipment can be conventional equipment or safety equipment, and depositing carrier can be general carrier or safety barrier.Wherein conventional equipment can be computing machine, portable terminal etc.; General carrier can be movable storage devices such as USB Key, USB flash disk, portable hard drive, IC-card.
When using equipment to be computing machine, then use the characterization information of equipment can be one of the following or combination arbitrarily: the sequence number of the MAC Address of the hard reel number of computing machine, CPU sequence number, network interface card, mainboard sequence number, internal memory sequence number, this computer specialized equipment etc.
When using equipment to be portable terminal, then use the characterization information of equipment can be one of the following or combination arbitrarily: the MAC Address of the SIM card of portable terminal number, IMEI, Equipment Serial Number, CPU sequence number, network interface card etc.
When depositing carrier is USB flash disk, and the characterization information of then depositing carrier can be with the sequence number of this USB flash disk.
When carrying the right digital certificate of the PKI key that meets the PKI system in conventional equipment or the general carrier, these conventional equipments or general carrier just can be described as safety equipment or safety barrier.As the computing machine that carries private key is safety equipment; The secure hardware carrier that carries private key is a safety barrier.When using equipment or deposit carrier as safety equipment or safety barrier, it is right as the PKI key then to use equipment or deposit the characterization information of carrier.
Step 102: the authority that has that will determine is used the particular place information and the binding of E-seal related data of E-seal.
Wherein, the E-seal related data can be electronic seal data itself, also can be the data relevant with E-seal, as: the usefulness Zhang Jilu of E-seal, the timestamp of E-seal, the pattern of E-seal, the digital certificate of E-seal etc.
Concrete binding mode can be: the authority that has that will determine uses the particular place information of E-seal to append in the E-seal related data.
Binding mode can also be: utilizing has authority to use the particular place information of E-seal that the E-seal related data is encrypted.Cryptographic algorithm can be general symmetric encipherment algorithm, and this algorithm is this area common technology means, repeats no more here.
When the particular place information of same of E-seal, comprise specific use facility information and specific when depositing carrier information, when the particular place information of E-seal and E-seal relevant data are bound, both can bind specific use facility information and E-seal related data earlier, bind specific carrier information and the E-seal related data deposited again; Also can bind specific carrier information and the E-seal related data deposited earlier, bind specific use facility information and E-seal related data again.But when using E-seal, whether the process consistent with described particular place information has fixing order to the current place information of checking E-seal, and this order is by the order decision of system chapter process.
Illustrate above-mentioned producing electronic seal method, suppose system Zhang Fang being restricted to the E-seal particular place: the holder of safety equipment can use this E-seal on any use equipment.Concrete system chapter process is: utilize the disclosed development interface of safety equipment key manufacturer to obtain the PKI of the PKI system cipher key pair of safety equipment key, adopt the PKI that obtains that the E-seal related data is encrypted.
Need to prove that can limit E-seal can only use, and also can limit E-seal and use on selected a plurality of specific use equipment on a selected specific use equipment.If selected E-seal can use on a plurality of specific use equipment, then need to generate a plurality of specific use facility informations, then the particular place information of this E-seal is combined by each specific use facility information.
Fig. 2 is the process flow diagram of E-seal using method in the embodiment of the invention.As shown in Figure 2, this method may further comprise the steps:
Step 201: obtain the current place information of E-seal, comprise the current use facility information and/or the current carrier information of depositing that obtain E-seal.
Current use facility information can obtain according to one or more characterization information of current use equipment.Wherein the step of " the one or more characterization information according to current use equipment obtain current use facility information " is similar with the step of " the one or more characterization information according to specific use equipment obtain specific use facility information " in the system chapter process.
The current carrier information of depositing can obtain according to current one or more characterization information of depositing carrier.Wherein the step that " according to current one or more characterization information of depositing carrier, obtains the current carrier information of depositing " is similar with the step of " according to specific one or more characterization information of depositing carrier, obtaining the specific carrier information of depositing " in the system chapter process.
Step 202: whether the current place information of determining E-seal is with consistent with the particular place information of E-seal related data binding; If it is consistent; Execution in step 203; Otherwise execution in step 204.
When system chapter side adopts the mode that directly particular place information is appended to the E-seal related data to bind particular place information and E-seal related data, the current place information of determining E-seal with and the whether consistent process of the particular place information of E-seal related data binding be: compare the current place information of E-seal whether with the E-seal related data in the particular place information unanimity of carrying.
When system chapter side adopts the mode that the E-seal related data is encrypted to bind particular place information and E-seal related data, the current place information of determining E-seal with and the whether consistent process of the particular place information of E-seal related data binding be: use current place information that the E-seal related data is decrypted, if successful decryption, then prove current place information with consistent with the particular place information of E-seal related data binding, promptly current place has the authority of using this E-seal.
The current place information of determining E-seal with and the E-seal related data particular place information of binding whether consistent before, can also at first carry out the user validation inspection.
In addition, if at first will be in the system chapter process by specific use facility information and electronic seal data binding, and then deposit the binding of carrier information and electronic seal data with specific, then in proof procedure, need at first verify and currently deposit carrier information to deposit carrier information consistent with E-seal specific, if it is consistent, further whether the current use facility information of checking is consistent with the specific use facility information of E-seal again, if it is consistent, then allow current place to use this E-seal, carry out follow-up operation, as affix one's seal, check seal information etc.; Otherwise refuse current place and use this E-seal.
Step 203: allow current place to use this E-seal.
When adding a cover E-seal, can further use the characteristic and the binding of E-seal related data of the file of being affixed one's seal, comprise: all or part of data of extracting the file of being affixed one's seal, adopt preset algorithm such as hash algorithm that data are handled, data after handling as secret key encryption E-seal related data, are kept at the E-seal related data after encrypting in the file of being affixed one's seal.So correspondingly, the affixed one's seal method of the E-seal that file covered of checking comprises: adopt method identical when affixing one's seal, the affixed one's seal all or part of data of file of extraction, adopt preset algorithm that data are handled, the E-seal related data that the data after handling are encrypted when affixing one's seal as key is decrypted.
The affixed one's seal method of the characteristic of file and the binding of E-seal related data of use can also be: all or part of data of extracting the file of being affixed one's seal, adopt preset algorithm that data are handled, after data after handling and E-seal related data synthesized, use the private key or the unique identification of E-seal correspondence that the data after synthetic are signed electronically, E-seal related data and electronic signature are saved in the file of being affixed one's seal.So correspondingly, the affixed one's seal method of the E-seal that file covered of checking comprises: adopt method identical when affixing one's seal, the affixed one's seal all or part of data of file of extraction, adopt preset algorithm that data are handled, data after handling and the synthetic back of E-seal related data are verified whether the electronic signature that generates when affixing one's seal is effective.
Step 204: refuse current place and use this E-seal.
Illustrate the described E-seal using method of the embodiment of the invention below.
Suppose that the use scene that system chapter side limits is to have only E-seal to deposit the carrier holder to use on specific use equipment, and the E-seal related data is an electronic seal data itself.This moment, the E-seal using method can be as shown in Figure 3.Fig. 3 is the process flow diagram of E-seal using method in the embodiment of the invention.As shown in Figure 3, this method may further comprise the steps: step 301: the current use equipment of E-seal obtains the electronic seal data head by disclosed development interface.
Step 302: whether judge the electronic seal data head that obtains by the specific public key encryption of depositing carrier of E-seal, if encrypt, then execution in step 303; Otherwise, execution in step 305.
Here, judge whether encrypted method is the electronic seal data head: judge whether the electronic seal data head meets the form of the electronic seal data head of definition, if it is not meet, then encrypted; If it is do not meet, then encrypted.
Step 303: by disclosed development interface, obtain the key supplier that current E-seal is deposited carrier, if obtain success, execution in step 304; Otherwise, show that the current carrier of depositing is not that legal E-seal is deposited carrier, do not support to use under this mode this E-seal, process ends.
Step 304: by disclosed development interface, use from current and deposit the key supplier who obtains the carrier electronic seal data is deciphered, if successful decryption, execution in step 305; Otherwise currently deposit the specific carrier of depositing that carrier is not an E-seal, do not support to use E-seal under this mode, process ends.
Step 305: judge after the current deciphering the electronic seal data head whether with the specific use apparatus bound of E-seal, if binding, then execution in step 308; Otherwise execution in step 306.
Step 306: utilize with system chapter process in the identical mode of the specific use facility information of generation, according to one or more characterization information of current use equipment, generate current use facility information.
Step 307: judge whether the current use facility information that generates is consistent with the specific use facility information of electronic seal data binding, if consistent, then execution in step 308; Otherwise, determine that the current use equipment of E-seal does not have authority to use this E-seal, refuse current use equipment and use this E-seal, and process ends.
Step 308: utilize the electronic seal data obtain to carry out subsequent operation, as: use E-seal on document, to affix one's seal, check E-seal information, and check E-seal with Zhang Jilu etc.
Suppose that use scene that system chapter side limits can be at a certain specific use equipment for anyone---computing machine is using this E-seal, and particular place information is generated through the hash algorithm by the hard reel number and/or the internal memory sequence number of computing machine in the system chapter process.Then before using E-seal, at first carry out the user validation inspection,, then refuse current place and use this E-seal if inspection is not passed through; If check and pass through, then need to obtain current use facility information, as hard reel number and internal memory sequence number, adopt the hash algorithm identical to generate the current use facility information of E-seal with system chapter side according to current use equipment.Adopt the current use facility information that generates that the E-seal related data is decrypted, if successful decryption, then current use equipment place has authority to use this E-seal, otherwise, refuse current place and use this E-seal.
Suppose that the use scene that system chapter side limits is: the holder of safety equipment can use this E-seal on any use equipment.Before using E-seal, at first carry out the user validation inspection, validity checking can have multiple mode, for example checks the hash of decruption key; If check and do not pass through, then refuse current place and use this E-seal; If check and to pass through, then need to obtain the private key of the cipher key pair of current safety equipment key, utilize the private key that obtains that the E-seal related data is decrypted then, if successful decryption proves that then current place has authority to use this E-seal; Otherwise, refuse current field of employment and use this E-seal.In addition, above-mentioned user validation inspection also can be omitted, and promptly directly is decrypted.
Usually, for safety, private key in the E-seal safety equipment can not be obtained by miscellaneous equipment, for the E-seal related data of encrypting is decrypted, the current use equipment of E-seal needs at first to obtain by the disclosed development interface of safety equipment key manufacturer the key supplier of E-seal safety equipment, by disclosed development interface, utilize the key supplier who obtains that the E-seal related data of encrypting is decrypted then.Here, the key supplier is the standard processing mode that E-seal safety equipment manufacturer provides, and is techniques well known, repeats no more here.
By above embodiment as seen, by in system chapter process with the E-seal related data with there is authority to use the particular place information of this E-seal to bind together, limited the field of employment of E-seal, further improved the security that E-seal uses.Such as, when E-seal is stolen, can also guarantee the security of E-seal by the particular place information of E-seal binding.Therefore, the field of employment that producing electronic seal method that the embodiment of the invention provides and using method can limit E-seal, realization improves the goal of the invention of E-seal safety in utilization.
In a word, the above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (20)

1, a kind of producing electronic seal method is characterized in that, comprising:
Define authority and use the particular place information of E-seal;
Related data binding with determined particular place information and described E-seal.
2, method according to claim 1 is characterized in that, described related data binding with determined particular place information and E-seal comprises:
Determined particular place information is appended in the related data of described E-seal; Or
Utilize determined particular place information that the related data of described E-seal is encrypted.
3, method according to claim 1 and 2 is characterized in that, the described particular place information of having the right to use E-seal comprises: the specific use facility information of described E-seal and/or the specific carrier information of depositing.
4, method according to claim 3 is characterized in that, the specific use facility information of described E-seal is determined according to one or more characterization information of the specific use equipment of described E-seal;
The specific carrier information of depositing of described E-seal is determined according to specific one or more characterization information of depositing carrier of described E-seal.
5, method according to claim 4 is characterized in that, the serial data that the specific use facility information of described E-seal generates for one or more characterization information of the specific use equipment that uses described E-seal;
The specific carrier information of depositing of described E-seal is for using the specific serial data of depositing one or more characterization information generations of carrier of described E-seal.
6, method according to claim 4, it is characterized in that the specific use facility information of described E-seal is for adopting the serial data after preset algorithm is handled the serial data of one or more characterization information generations of the specific use equipment of described E-seal; Or
The specific carrier information of depositing of described E-seal is for adopting the serial data after preset algorithm is handled the specific serial data of depositing one or more characterization information generations of carrier of described E-seal.
7, according to claim 5 or 6 described methods, it is characterized in that, the serial data that the one or more characterization information of the specific use equipment of the described E-seal of described use generate is: the serial data that one or more characterization information of the specific use equipment of described E-seal are arranged in, or the serial data that is arranged in of each digest value that adopts preset algorithm respectively each characterization information of the specific use equipment of described E-seal to be calculated;
The described E-seal of described use specific deposited the serial data that one or more characterization information of carrier generate: the serial data that specific one or more characterization information of depositing carrier of described E-seal are arranged in, or the serial data that is arranged in of each digest value that adopts preset algorithm respectively specific each characterization information of depositing carrier of described E-seal to be calculated.
8, method according to claim 7 is characterized in that, described preset algorithm is a hash algorithm.
According to claim 4,5 or 6 described methods, it is characterized in that 9, the specific equipment that uses of described E-seal is computing machine; One or more characterization information of the specific use equipment of described E-seal are: the sequence number of the specialized equipment of the MAC Address of the hard reel number of computing machine, CPU sequence number, network interface card, mainboard sequence number, internal memory sequence number, computing machine; Or
The specific equipment that uses of described E-seal is portable terminal; One or more characterization information of the specific use equipment of described E-seal are: the MAC Address of the SIM card of portable terminal number, IMEI, Equipment Serial Number, CPU sequence number, network interface card.
According to claim 4,5 or 6 described methods, it is characterized in that 10, the specific carrier of depositing of described E-seal is a USB flash disk; Specific one or more characterization information of depositing carrier of described E-seal are: the Equipment Serial Number of described USB flash disk.
11, method according to claim 1 and 2, it is characterized in that described E-seal related data comprises one of the following or combination arbitrarily: the usefulness Zhang Jilu of electronic seal data itself, E-seal, the timestamp of E-seal, the pattern of E-seal, the digital certificate of E-seal.
12, a kind of E-seal using method is characterized in that, comprising:
Obtain the current place information of E-seal;
Determine whether described current place information is with consistent with the particular place information of E-seal related data binding;
Determine described current place information with and the E-seal related data particular place information of binding when consistent, allow current place to use described E-seal; Otherwise refuse current place and use described E-seal.
13, method according to claim 12 is characterized in that, the current place information of described E-seal comprises the current use facility information of described E-seal, and/or the described current carrier information of depositing.
14, method according to claim 13 is characterized in that, the current use facility information of described E-seal is determined according to one or more characterization information of the current use equipment of described E-seal;
The current carrier information of depositing of described E-seal is determined according to current one or more characterization information of depositing carrier of described E-seal.
15, method according to claim 12, it is characterized in that the method for the related data of determined particular place information and E-seal being bound as system Zhang Fang is when utilizing determined particular place information that the related data of described E-seal is encrypted; Described determine current place information with and the E-seal related data particular place information of binding consistent comprising whether:
Utilize described current place information that the E-seal related data is decrypted;
If described current place information can be deciphered described E-seal relevant information, show that described place information is consistent with the particular place information of E-seal related data binding.
16, method according to claim 12 is characterized in that, when system Zhang Fang is when determined particular place information being appended in the related data of described E-seal with the method for the related data of determined particular place information and E-seal binding; Described determine described current place information with and the E-seal related data particular place information of binding consistent comprising whether:
Whether more current place information is with consistent with the particular place information of E-seal related data binding.
17, method according to claim 12 is characterized in that, use after the described E-seal in the current place of described permission, further comprises:
When adding a cover E-seal, the characteristic of the file of will being affixed one's seal and the binding of E-seal related data.
18, method according to claim 17 is characterized in that, further comprises:
The checking E-seal that file covered of being affixed one's seal.
19, method according to claim 18 is characterized in that, the characteristic of the described file of will being affixed one's seal and the binding of E-seal related data comprise:
The all or part of data that file is affixed one's seal in extraction adopt preset algorithm that data are handled, and the data after handling as secret key encryption E-seal related data, are kept at the E-seal related data after encrypting in the file of being affixed one's seal;
The affixed one's seal method of the E-seal that file covered of described checking comprises:
The affixed one's seal all or part of data of file of extraction, adopt preset algorithm that data are handled, the E-seal related data that data after handling are encrypted when affixing one's seal as key is decrypted, the E-seal related data that checking institute encrypted when counting key and whether can decipher described affixing one's seal.
20, method according to claim 19 is characterized in that, the characteristic of the described file of will being affixed one's seal and the binding of E-seal related data comprise:
The affixed one's seal all or part of data of file of extraction, adopt preset algorithm that data are handled, after data after handling and E-seal related data synthesized, use the private key or the unique identification of E-seal correspondence that the data after synthetic are signed electronically, E-seal related data and electronic signature are saved in the file of being affixed one's seal;
The affixed one's seal method of the E-seal that file covered of described checking comprises:
The all or part of data that file is affixed one's seal in extraction adopt preset algorithm that data are handled, and data after handling and the synthetic back of E-seal related data are verified whether the electronic signature that generates when affixing one's seal is effective.
CN2008101190652A 2008-08-28 2008-08-28 Method for producing electronic seal and method for using electronic seal Active CN101661573B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101190652A CN101661573B (en) 2008-08-28 2008-08-28 Method for producing electronic seal and method for using electronic seal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101190652A CN101661573B (en) 2008-08-28 2008-08-28 Method for producing electronic seal and method for using electronic seal

Publications (2)

Publication Number Publication Date
CN101661573A true CN101661573A (en) 2010-03-03
CN101661573B CN101661573B (en) 2013-03-27

Family

ID=41789581

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101190652A Active CN101661573B (en) 2008-08-28 2008-08-28 Method for producing electronic seal and method for using electronic seal

Country Status (1)

Country Link
CN (1) CN101661573B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761641A (en) * 2011-03-08 2014-04-30 天津书生软件技术有限公司 Electronic-seal using method and device
CN104698887A (en) * 2015-02-12 2015-06-10 西安印艺苑实业有限公司 Method and device for recording stamp use information and querying method and device
CN110955921A (en) * 2019-12-09 2020-04-03 中国移动通信集团江苏有限公司 Electronic signature method, device, equipment and storage medium
CN116842582A (en) * 2023-07-06 2023-10-03 上海朗晖慧科技术有限公司 Intelligent analysis and identification system and method based on data anti-counterfeiting technology

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1838163A (en) * 2006-01-17 2006-09-27 沈前卫 A General Electronic Seal System Based on PKI
CN1882962A (en) * 2003-11-21 2006-12-20 松下电器产业株式会社 License Acquisition Systems, Servers and Endpoints
CN101241569A (en) * 2008-03-07 2008-08-13 北京华大恒泰科技有限责任公司 Electronic signature method and device and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183439A (en) * 2006-11-14 2008-05-21 中国民生银行股份有限公司 Electronic bill processing system and processing method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1882962A (en) * 2003-11-21 2006-12-20 松下电器产业株式会社 License Acquisition Systems, Servers and Endpoints
CN1838163A (en) * 2006-01-17 2006-09-27 沈前卫 A General Electronic Seal System Based on PKI
CN101241569A (en) * 2008-03-07 2008-08-13 北京华大恒泰科技有限责任公司 Electronic signature method and device and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761641A (en) * 2011-03-08 2014-04-30 天津书生软件技术有限公司 Electronic-seal using method and device
CN103761641B (en) * 2011-03-08 2017-02-15 天津书生软件技术有限公司 Electronic-seal using method and device
CN104698887A (en) * 2015-02-12 2015-06-10 西安印艺苑实业有限公司 Method and device for recording stamp use information and querying method and device
CN110955921A (en) * 2019-12-09 2020-04-03 中国移动通信集团江苏有限公司 Electronic signature method, device, equipment and storage medium
CN116842582A (en) * 2023-07-06 2023-10-03 上海朗晖慧科技术有限公司 Intelligent analysis and identification system and method based on data anti-counterfeiting technology
CN116842582B (en) * 2023-07-06 2024-04-23 上海朗晖慧科技术有限公司 Intelligent analysis and identification system and method based on data anti-counterfeiting technology

Also Published As

Publication number Publication date
CN101661573B (en) 2013-03-27

Similar Documents

Publication Publication Date Title
CN102271042B (en) Certificate authorization method, system, universal serial bus (USB) Key equipment and server
CN107742212B (en) Asset verification method, device and system based on block chain
JP3902440B2 (en) Cryptographic communication device
CN107146120B (en) Electronic invoice generation method and generation device
CN113128999B (en) Block chain privacy protection method and device
CN104463554A (en) Electronic seal achieving method and device
JPH10308732A (en) Access right authenticating device and method therefor
JP2002259605A (en) Device and method for information processing and storage medium
CN106953732B (en) Key management system and method for chip card
JPH11231775A (en) Device and method for conditional authentication
CN101789067A (en) Electronic document signature protecting method and system
CN1925392A (en) Method for identification of equipment validity
CN101465728A (en) Method, system and device for distributing cipher key
CN104322003A (en) Cryptographic authentication and identification method using real-time encryption
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
JPH09282155A (en) How to equip cryptographic authentication function
CN116155496B (en) National soil transformation investigation data transmission method and device based on national secret algorithm
CN102270285B (en) Key authorization information management method and device
CN101661573B (en) Method for producing electronic seal and method for using electronic seal
CN101369296A (en) Method and system for implementing off-line printing limitation
CN119363343A (en) A medical service management system based on national secret key splitting algorithm
CN112559979B (en) Method for protecting software library authorized use on POS machine through hardware security chip
CN103577966A (en) Electronic seal manufacturing method
CN111369332B (en) Data processing method and device based on blockchain
CN105873043B (en) Method and system for generating and applying network private key for mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: BEIJING SURSEN ELECTRONIC TECHNOLOGY CO., LTD. BEI

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100089 5/F, NORTHERN REAL ESTATE BUILDING, NO.81, ZIZHUYUAN ROAD, HAIDIAN DISTRICT, BEIJING TO: 100191 ROOM 408, TAIXING BUILDING, NO.11, HUAYUAN EAST ROAD, HAIDIAN DISTRICT, BEIJING

TA01 Transfer of patent application right

Effective date of registration: 20101027

Address after: 100191, Room 408, Taixing building, 11 Garden East Road, Beijing, Haidian District

Applicant after: Beijing Suresense International Information Technology Co., Ltd.

Co-applicant after: Beijing Sursen Electronic Technology Co., Ltd.

Co-applicant after: Beijing Sursen Network Technology Co., Ltd.

Co-applicant after: Beijing Sursen Digital Library Software Technology Co., Ltd.

Address before: North real estate building 81 No. 100089 Beijing Haidian District Zizhuyuan Road 5 layer

Applicant before: Beijing Suresense International Information Technology Co., Ltd.

ASS Succession or assignment of patent right

Owner name: TIANJIN SHUSHEN SOFTWARE TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: BEIJING SURSEN ELECTRONIC CO., LTD. BEIJING SURSEN NETWORK TECHNOLOGY CO., LTD. BEIJING SURSEN DIGITAL LIBRARY SOFTWARE TECHNOLOGY CO., LTD.

Effective date: 20120509

Owner name: BEIJING SURSEN ELECTRONIC CO., LTD.

Free format text: FORMER OWNER: BEIJING SURESENSE INTERNATIONAL INFORMATION TECHNOLOGY CO., LTD.

Effective date: 20120509

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20120509

Address after: 100191, room 4, 407 floor, Taixing building, 11 Garden East Road, Beijing, Haidian District

Applicant after: Beijing Sursen Electronic Technology Co., Ltd.

Co-applicant after: Tianjin Scholar Software Technology Co., Ltd.

Address before: 100191, Room 408, Taixing building, 11 Garden East Road, Beijing, Haidian District

Applicant before: Beijing Suresense International Information Technology Co., Ltd.

Co-applicant before: Beijing Sursen Electronic Technology Co., Ltd.

Co-applicant before: Beijing Sursen Network Technology Co., Ltd.

Co-applicant before: Beijing Sursen Digital Library Software Technology Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20181126

Address after: 100029 Changxin Building 408-409, 39 Anding Road, Chaoyang District, Beijing

Patentee after: Beijing Sursen Electronic Technology Co., Ltd.

Address before: Room 407, 4th floor, Taixing Building, 11 Garden East Road, Haidian District, Beijing, 100191

Co-patentee before: Tianjin Scholar Software Technology Co., Ltd.

Patentee before: Beijing Sursen Electronic Technology Co., Ltd.

TR01 Transfer of patent right