Movatterモバイル変換


[0]ホーム

URL:


CN105095728A - Two-dimensional code identification method based on digital signatures and timestamps - Google Patents

Two-dimensional code identification method based on digital signatures and timestamps
Download PDF

Info

Publication number
CN105095728A
CN105095728ACN201510326825.7ACN201510326825ACN105095728ACN 105095728 ACN105095728 ACN 105095728ACN 201510326825 ACN201510326825 ACN 201510326825ACN 105095728 ACN105095728 ACN 105095728A
Authority
CN
China
Prior art keywords
information
quick response
response code
identified
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510326825.7A
Other languages
Chinese (zh)
Inventor
杜葵
张光云
曹志菲
陈晓娟
吴清
孙玉荣
蔡潇
桑菁华
李霞
顾颖
李正荗
黄佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU TRADING NETWORK ELECTRONIC BUSINESS CO Ltd
Nanjing Information Center
Original Assignee
JIANGSU TRADING NETWORK ELECTRONIC BUSINESS CO Ltd
Nanjing Information Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU TRADING NETWORK ELECTRONIC BUSINESS CO Ltd, Nanjing Information CenterfiledCriticalJIANGSU TRADING NETWORK ELECTRONIC BUSINESS CO Ltd
Priority to CN201510326825.7ApriorityCriticalpatent/CN105095728A/en
Publication of CN105095728ApublicationCriticalpatent/CN105095728A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses a two-dimensional code identification method based on digital signatures and timestamps. The two-dimensional code identification method comprises the steps of performing the digital signatures and stamping the timestamps. Because the timestamps are adopted in electronic identification of the two-dimensional code identification method disclosed by the invention, the signature time can be fixed; the integrity and the authenticity of a time stamp are ensured through the digital signatures; the backdating behaviour can be effectively prevented; the security protection to electronic identity information is enhanced; strong evidences can also be provided for related disputes; and the two-dimensional code identification method disclosed by the invention can be applicable to occasions, such as meeting signatures, entrance guards and payments.

Description

A kind of Quick Response Code personal identification method based on digital signature and timestamp
Technical field
The present invention relates to electronic identity recognition technology field, specifically a kind of Quick Response Code personal identification method based on digital signature and timestamp.
Background technology
Have a lot for the identification of Quick Response Code and Authentication Research in the market, today highly developed in internet, because its range of application is very extensive, this technology has become the popular research field of numerous researcher.Current research mainly concentrates on and utilizes merely digital signature to carry out in the identification of user.
On June 26th, 2014 announce publication No. be CN104113416A Chinese patent application disclose based on electronic signature 2 D code verification method and system, the cardinal principle of the method and system is: Quick Response Code generation side signs electronically to two-dimensional code data, and electronic signature is divided into the first and second signature blocks and sends it to Quick Response Code authenticating party; Quick Response Code authenticating party carries out certification to two-dimensional code data, the first and second signature blocks and generates witness data; Quick Response Code user scans Quick Response Code, and inquires about corresponding witness data and the first signature block according to scanning result from Quick Response Code authenticating party; Quick Response Code user verifies two-dimensional code data according to the first and second signature blocks and witness data.
Although said method can ensure the security in Quick Response Code use procedure to a certain extent, because its implementation is comparatively loaded down with trivial details, electronic signature characteristic in time can not be reflected simultaneously, there is larger restriction in actual use.In addition to the above methods, present other technologies also often adopt merely digital signature to carry out authenticating user identification, have ignored in authentication procedures time-related particular/special requirement.
Summary of the invention
The problem to be solved in the present invention is to provide a kind of Quick Response Code personal identification method based on digital signature and timestamp, and the method identifying is simple, can reflect electronic signature characteristic in time.
A kind of Quick Response Code personal identification method based on digital signature and timestamp disclosed by the invention, comprises active identification method and/or passive discerning method,
Described active identification method comprises the following steps:
11) side of being identified logs in the application of identification platform and creates Quick Response Code;
12) identification platform carries out digital signature to the personal information of the side of being identified and signing messages;
13) digital signature of identification platform to the side of being identified adds a cover timestamp;
14) identification platform is the Quick Response Code of the personal information of the side of being identified, signing messages and timestamp information in the lump the generating identification side of being identified unique identities;
15) Quick Response Code that creates of identification side's scanning side of being identified, the Quick Response Code of identification platform to the side of being identified is verified, first carries out sign test to 2 D code information, sign test successfully after, then carry out timestamp checking, all pass through rear display user's information above;
16) side's of being identified 2 D code information preserved by identification platform;
Described passive discerning method comprises the following steps:
21) identification side logs in identification platform, creates Quick Response Code;
22) Quick Response Code of scanning recognition side of the side of being identified generation, and upgrade personal information to identification platform;
23) identification platform carries out digital signature to the identity information of the side of being identified, signing messages;
24) identification platform adds a cover timestamp to the side's of being identified information;
25) carry out identity information, signing messages and the timestamp information of identification platform to the side of being identified is verified, first carries out sign test to digital signature information, after sign test success, then carries out timestamp checking, all passes through rear display user's information above;
26) side's of being identified information preserved by identification platform.
As the further improvement of technique scheme, described Quick Response Code is the matrix two-dimensional code adopting QR code system to generate.
Another kind as technique scheme improves, and described digital signature adopts digital envelope principle and symmetric cryptography to realize.
Another kind as technique scheme improves, described step 16) and step 26), after the side's of being identified information preserved by identification platform, also provide inquiry and printing function.
Quick Response Code personal identification method based on digital signature and timestamp of the present invention, the Quick Response Code wherein generated is the matrix two-dimensional code adopting QR code system, have that information capacity is large, reliability is high, can represent the advantages such as the kinds of words such as Chinese character and image information, identical content size is less than the advantages such as other code systems.
The digital signature technology that recognition methods of the present invention adopts mainly adopts digital envelope principle and symmetric cryptography to realize, the mode of online decoding is all adopt digital envelope principle to realize the Information Security Prevention of Quick Response Code, the symmetric encipherment algorithm that off line decoding process adopts completes generation and the parsing of Quick Response Code, the identity information that Quick Response Code comprises by resolving after checking, can only ensure that Quick Response Code comprises can not distorting of identity information.
Recognition methods of the present invention Quick Response Code has and only has unique identity information, greatly can improve discrimination.
Recognition methods of the present invention can in a lot of client complete operation, comprise the hardware device such as PC, notebook computer, smart mobile phone, panel computer of any support digital certificate, form environmental protection, fashion, efficient.
Recognition methods fault-tolerant ability of the present invention is strong, has error correction, two-dimensional bar code because of perforation, stained etc. cause local damage time, also can correctly be distinguished, damaged area reaches 50% still can recover information.
Recognition methods of the present invention have employed timestamp in electronic identity identification, the signature time is fixed up, and integrality and the authenticity of time mark is ensured by digital signature, effectively prevent the time behavior of falling label, strengthen the safety precaution to electronic identity information, also can provide strong evidence for associated issues.This recognition methods is applicable to the occasions such as Meeting Signature, gate inhibition, payment.
Accompanying drawing explanation
Fig. 1 is the passive identification process flow diagram of Meeting Signature system;
Fig. 2 is the active identification process flow diagram of Meeting Signature system.
Embodiment
Below in conjunction with accompanying drawing, a kind of Quick Response Code personal identification method based on digital signature and timestamp that the present invention proposes is described in detail.
Digital signature technology contains encryption and decryption technique, identity identifying technology, its effect be protection e-file or data integrality, can not tamper and non repudiation.Digital signature technology can provide the authenticity of the side's of being identified identity to prove, but because cannot define the time of origin of user behavior, it has it not enough in the non-repudiation identified.The proof that timestamp can provide data to exist sometime, TSA time-stamping service module is mainly used in externally providing accurate believable time-stamping service, with confirm system processes data sometime the existence of (before) and the relative chronological order of associative operation, for the non-repudiation realizing system data process provide basis.The TSA time-stamping service module of identification platform adds the time mark provided by trusted time source to target data, and ensures integrality and the authenticity of time mark by digital signature.
Based on a Quick Response Code personal identification method for digital signature and timestamp, it is characterized in that, comprise active identification method and/or passive discerning method,
Described active identification method comprises the following steps:
11) side of being identified logs in the application of identification platform and creates Quick Response Code; Quick Response Code is the matrix two-dimensional code adopting QR code system to generate;
12) identification platform adopts digital envelope principle and symmetric cryptography to carry out digital signature to the personal information of the side of being identified and signing messages;
13) digital signature of identification platform to the side of being identified adds a cover timestamp;
14) identification platform is the Quick Response Code of the personal information of the side of being identified, signing messages and timestamp information in the lump the generating identification side of being identified unique identities;
15) Quick Response Code that creates of identification side's scanning side of being identified, the Quick Response Code of identification platform to the side of being identified is verified, first carries out sign test to 2 D code information, sign test successfully after, then carry out timestamp checking, all pass through rear display user's information above;
16) side's of being identified 2 D code information preserved by identification platform, and provides inquiry and printing function.
Described passive discerning method comprises the following steps:
21) identification side logs in identification platform, creates Quick Response Code; Quick Response Code is the matrix two-dimensional code adopting QR code system to generate;
22) Quick Response Code of scanning recognition side of the side of being identified generation, and upgrade personal information to identification platform;
23) identification platform adopts digital envelope principle and symmetric cryptography to carry out digital signature to the identity information of the side of being identified, signing messages;
24) identification platform adds a cover timestamp to the side's of being identified information;
25) carry out identity information, signing messages and the timestamp information of identification platform to the side of being identified is verified, first carries out sign test to digital signature information, after sign test success, then carries out timestamp checking, all passes through rear display user's information above;
26) side's of being identified information preserved by identification platform, and provide inquiry and printing function.
The mode of online decoding adopts digital envelope principle to realize the Information Security Prevention of Quick Response Code, and off line decoding process adopts symmetric encipherment algorithm to complete generation and the parsing of Quick Response Code.
Below with Meeting Signature, gate inhibition, the payment recognition methods of the present invention for instantiation illustrates, but should be clear, and these examples are exemplary illustration, do not cause restriction to recognition methods usable range of the present invention.The identification of other occasions is identical with these example ultimate principles, also applicable recognition methods of the present invention.
1, Meeting Signature
Passive discerning:
As shown in Figure 1, describe participant in passive discerning mode and complete Meeting Signature by " my Nanjing " platform: organizer generates Meeting Signature Quick Response Code by " my Nanjing " platform, participant scans Meeting Signature Quick Response Code, upgrades personal information to " my Nanjing " platform." my Nanjing " platform carries out before numeral to the personal information of participant and signing messages and adds a cover timestamp, and information is verified, be verified rear meeting organizer and can check participant's information by " my Nanjing " platform, and participant's information can be derived.
Specifically, Meeting Signature passive discerning comprises the following steps:
111) meeting organizer logs in " my Nanjing " platform by client, creates Meeting Signature service, generates Meeting Signature Quick Response Code.
121) meeting organizer prints voluntarily or downloads Meeting Signature Quick Response Code.
131) participant uses terminal landing " my Nanjing " platform, uses the Meeting Signature Quick Response Code that scan function scanning meeting organizer shows.
141) participant upgrade oneself the user profile such as name, work unit in Meeting Signature Quick Response Code.
151) " my Nanjing " platform carries out digital signature to the information of participant and adds a cover timestamp.
161) " my Nanjing " platform carries out authentication to the information of participant, is verified rear display user's information.
171) meeting organizer can check or print by " my Nanjing " platform by participant's information of checking.
As shown in Figure 2, describe participant in initiative recognition mode and complete Meeting Signature by " my Nanjing " platform: participant logs in " my Nanjing " platform also applies for Quick Response Code, the personal information of participant and signing messages are carried out before numeral and are added a cover timestamp by " my Nanjing " platform, and by the Quick Response Code of digital signature information and timestamp information in the lump generating identification participant unique identities, meeting organizer scans the Quick Response Code of participant, " my Nanjing " platform is also verified participant's information, be verified rear meeting organizer and check participant's information by " my Nanjing " platform, and participant's information can be derived.
Specifically, Meeting Signature initiative recognition comprises the following steps::
211) participant logs in " my Nanjing " platform by client, application Quick Response Code.
221) " my Nanjing " platform carries out digital signature to the information of participant and adds a cover timestamp, and by the Quick Response Code of user profile, signing messages and timestamp information in the lump generating identification participant unique identities.
231) participant prints or downloads the Quick Response Code of its application voluntarily.
241) meeting organizer logs in " my Nanjing " platform by client, uses scan function scanning participant Quick Response Code.
251) " my Nanjing " platform carries out authentication to the Quick Response Code of participant, is verified rear display user's information.
261) meeting organizer can check or print by " my Nanjing " platform by participant's information of checking.
2, entrance guard management
Passive discerning:
112) entrance guard management person is by entrance guard management platform, creates entrance guard management service, generates entrance guard management Quick Response Code.
122) owner prints voluntarily or downloads entrance guard management Quick Response Code.
132) owner uses the scan function of entrance guard management terminal to scan the entrance guard management Quick Response Code having printed or downloaded.
142) owner upgrade oneself the user profile such as name, room number in entrance guard management Quick Response Code.
152) entrance guard management platform carries out digital signature to the information of owner and adds a cover timestamp.
162) entrance guard management platform carries out authentication to the information of owner, is verified rear display user's information.
172) entrance guard management platform stored user information, door control terminal controls to open gate inhibition.
Initiative recognition comprises the following steps::
212) owner is by entrance guard management platform, application Quick Response Code.
222) entrance guard management platform carries out digital signature to the information of owner and adds a cover timestamp, and by the Quick Response Code of user profile, signing messages and timestamp information in the lump generating identification owner unique identities.
232) owner prints or downloads the Quick Response Code of its application voluntarily.
242) entrance guard management person uses the scan function scanning owner Quick Response Code of entrance guard management terminal.
252) entrance guard management platform carries out authentication to the Quick Response Code of owner, is verified rear display user's information.
262) entrance guard management platform stored user information, door control terminal controls to open gate inhibition.
3, payment function
Passive discerning:
112) businessman is by payment platform, creates payment services, generates the payment Quick Response Code containing payment information.
122) consumer prints, downloads or scans payment Quick Response Code voluntarily.
132) consumer upgrade oneself the information such as name, account, password in payment Quick Response Code.
142) payment platform carries out digital signature to the information of owner and adds a cover timestamp.
152) payment platform carries out authentication to the information of consumer, is verified rear display user's information.
162) payment platform stored user information, and complete payment.
Initiative recognition comprises the following steps::
212) consumer is by payment platform, application Quick Response Code.
222) payment platform carries out digital signature to the information of consumer and adds a cover timestamp, and by the Quick Response Code of user profile, signing messages and timestamp information in the lump generating identification consumer unique identities.
232) consumer print voluntarily, person download or scan its application Quick Response Code.
242) businessman uses the scan function scanning consumer Quick Response Code of payment platform terminal, or Quick Response Code is uploaded to payment platform by consumer.
252) payment platform carries out authentication to the Quick Response Code of consumer, is verified rear display user's information.
262) payment platform stored user information, and complete payment.
Embody rule approach of the present invention is a lot, and the above is only the preferred embodiment of the present invention, should be understood that; for those skilled in the art; under the premise without departing from the principles of the invention, can also make some improvement, these improvement also should be considered as protection scope of the present invention.

Claims (4)

CN201510326825.7A2015-06-152015-06-15Two-dimensional code identification method based on digital signatures and timestampsPendingCN105095728A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201510326825.7ACN105095728A (en)2015-06-152015-06-15Two-dimensional code identification method based on digital signatures and timestamps

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201510326825.7ACN105095728A (en)2015-06-152015-06-15Two-dimensional code identification method based on digital signatures and timestamps

Publications (1)

Publication NumberPublication Date
CN105095728Atrue CN105095728A (en)2015-11-25

Family

ID=54576140

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201510326825.7APendingCN105095728A (en)2015-06-152015-06-15Two-dimensional code identification method based on digital signatures and timestamps

Country Status (1)

CountryLink
CN (1)CN105095728A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105513178A (en)*2015-12-072016-04-20天津博威动力设备有限公司Intelligent access control
CN105634741A (en)*2015-12-242016-06-01上海莱柏信息科技有限公司Identity authentication method based on trusted tag and identity authentication system based on trusted tag
CN106897650A (en)*2017-03-022017-06-27苏州钜立智能系统有限公司The scan method and its scanning device of Quick Response Code
CN106897307A (en)*2015-12-212017-06-27李凡A kind of method for obtaining electronic identity documents on mobile terminals
CN106897760A (en)*2017-03-022017-06-27苏州钜立智能系统有限公司Quick Response Code generates equipment
CN107392612A (en)*2017-06-052017-11-24广东工业大学A kind of method based on traffic Quick Response Code transaction verification
CN107682367A (en)*2017-11-142018-02-09北京酷我科技有限公司A kind of PC ends webpage login method and system
CN109242064A (en)*2018-09-112019-01-18杭州飞弛网络科技有限公司A kind of stranger's social activity method for organizing and system using barcode scanning realization
CN110022314A (en)*2019-03-252019-07-16浩云科技股份有限公司A kind of big data safe transmission method based on matrix two-dimensional code
CN110766831A (en)*2019-09-292020-02-07深圳深岚视觉科技有限公司Dynamic two-dimensional code generation method and device and storage medium
CN111243138A (en)*2020-01-132020-06-05上海威派格智慧水务股份有限公司Real-time access control authentication method
CN111770081A (en)*2020-06-282020-10-13广州知弘科技有限公司 Role-based authentication method for accessing confidential files in big data
CN112307495A (en)*2020-10-262021-02-02浪潮云信息技术股份公司Electronic certificate sharing application model and method based on certificate two-dimensional code
CN113468573A (en)*2021-07-212021-10-01广西盖德科技有限公司Method and system for carrying out digital signature by using printing mode
CN113609540A (en)*2021-08-032021-11-05深圳市闪联信息技术有限公司Trusted management method and system for USB interface of electronic equipment
CN115378609A (en)*2022-08-192022-11-22博雅中科(北京)信息技术有限公司Electronic certificate display method, verification method, terminal and server

Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090328162A1 (en)*2000-07-252009-12-31Mnemonic Security LimitedMutual for reporting a theft in an authentication system
CN101826227A (en)*2010-04-302010-09-08广州合立正通信息网络集成有限公司Triple-authentication gate control system and control method
CN102185839A (en)*2011-04-222011-09-14北京华玛科技有限公司Fraud-preventing registration system based on dynamic two-dimension codes or dynamic bar codes
CN103559526A (en)*2013-10-312014-02-05北京天威诚信电子商务服务有限公司Method and system for generation and verification of two-dimensional code
CN103714458A (en)*2013-12-202014-04-09江苏大学Two-dimension code-based mobile terminal transaction encryption method
CN104282050A (en)*2013-07-132015-01-14海南大学Attendance system based on smart phone digital certificates and time and position verification
CN104506562A (en)*2015-01-132015-04-08东北大学Two-dimension code and face recognition fused conference identity authentication device and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090328162A1 (en)*2000-07-252009-12-31Mnemonic Security LimitedMutual for reporting a theft in an authentication system
CN101826227A (en)*2010-04-302010-09-08广州合立正通信息网络集成有限公司Triple-authentication gate control system and control method
CN102185839A (en)*2011-04-222011-09-14北京华玛科技有限公司Fraud-preventing registration system based on dynamic two-dimension codes or dynamic bar codes
CN104282050A (en)*2013-07-132015-01-14海南大学Attendance system based on smart phone digital certificates and time and position verification
CN103559526A (en)*2013-10-312014-02-05北京天威诚信电子商务服务有限公司Method and system for generation and verification of two-dimensional code
CN103714458A (en)*2013-12-202014-04-09江苏大学Two-dimension code-based mobile terminal transaction encryption method
CN104506562A (en)*2015-01-132015-04-08东北大学Two-dimension code and face recognition fused conference identity authentication device and method

Cited By (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105513178A (en)*2015-12-072016-04-20天津博威动力设备有限公司Intelligent access control
CN106897307A (en)*2015-12-212017-06-27李凡A kind of method for obtaining electronic identity documents on mobile terminals
CN105634741A (en)*2015-12-242016-06-01上海莱柏信息科技有限公司Identity authentication method based on trusted tag and identity authentication system based on trusted tag
CN106897650A (en)*2017-03-022017-06-27苏州钜立智能系统有限公司The scan method and its scanning device of Quick Response Code
CN106897760A (en)*2017-03-022017-06-27苏州钜立智能系统有限公司Quick Response Code generates equipment
CN107392612A (en)*2017-06-052017-11-24广东工业大学A kind of method based on traffic Quick Response Code transaction verification
CN107682367A (en)*2017-11-142018-02-09北京酷我科技有限公司A kind of PC ends webpage login method and system
CN109242064B (en)*2018-09-112021-08-24杭州飞弛网络科技有限公司Stranger social activity organization method and system realized by code scanning
CN109242064A (en)*2018-09-112019-01-18杭州飞弛网络科技有限公司A kind of stranger's social activity method for organizing and system using barcode scanning realization
CN110022314A (en)*2019-03-252019-07-16浩云科技股份有限公司A kind of big data safe transmission method based on matrix two-dimensional code
CN110022314B (en)*2019-03-252021-07-27浩云科技股份有限公司Big data secure transmission method based on matrix two-dimensional code
CN110766831A (en)*2019-09-292020-02-07深圳深岚视觉科技有限公司Dynamic two-dimensional code generation method and device and storage medium
CN110766831B (en)*2019-09-292021-08-20深圳深岚视觉科技有限公司Dynamic two-dimensional code generation method and device and storage medium
CN111243138A (en)*2020-01-132020-06-05上海威派格智慧水务股份有限公司Real-time access control authentication method
CN111243138B (en)*2020-01-132022-04-19上海威派格智慧水务股份有限公司Real-time access control authentication method
CN111770081A (en)*2020-06-282020-10-13广州知弘科技有限公司 Role-based authentication method for accessing confidential files in big data
CN112307495A (en)*2020-10-262021-02-02浪潮云信息技术股份公司Electronic certificate sharing application model and method based on certificate two-dimensional code
CN113468573A (en)*2021-07-212021-10-01广西盖德科技有限公司Method and system for carrying out digital signature by using printing mode
CN113609540A (en)*2021-08-032021-11-05深圳市闪联信息技术有限公司Trusted management method and system for USB interface of electronic equipment
CN115378609A (en)*2022-08-192022-11-22博雅中科(北京)信息技术有限公司Electronic certificate display method, verification method, terminal and server

Similar Documents

PublicationPublication DateTitle
CN105095728A (en)Two-dimensional code identification method based on digital signatures and timestamps
US11336435B2 (en)Method, apparatus, and system for processing two-dimensional barcodes
CN111080295B (en)Electronic contract processing method and device based on blockchain
CN110276588B (en)Electronic signature authentication method and device and computer readable storage medium
US9378518B2 (en)Electronic signature security system
CN107493273A (en)Identity identifying method, system and computer-readable recording medium
CN107592308A (en)A kind of two server multiple-factor authentication method towards mobile payment scene
US11444784B2 (en)System and method for generation and verification of a subject's identity based on the subject's association with an organization
CN106790208A (en)A kind of communication encrypting method and device
CN114125158B (en)Anti-harassment method, device, equipment and storage medium based on trusted telephone
US8601270B2 (en)Method for the preparation of a chip card for electronic signature services
CN102711109A (en)Method for performing identity authentication on mobile terminal
CN105245342A (en)Smart phone-based electronic contract signing method and system
CN118074919A (en)Method, system and medium for establishing encrypted communication based on trusted hardware remote authentication
CN105281913B (en)Electronic evidence processing method, system and dynamic code service system for electronic signature
TW202022663A (en)Identity authentication system and method thereof
CN1956375A (en)Dynamic password identity authentication method and system based on network
US20200204377A1 (en)Digital notarization station that uses a biometric identification service
CN107920053B (en)Management device and method based on Internet of things
US20220191196A1 (en)System and method for securing, perfecting and accelerating biometric identification via holographic environmental data
CN116842579A (en)Handwriting electronic signature method
CN105429986B (en)A kind of system of genuine cyber identification verifying and secret protection
US10701105B2 (en)Method for website authentication and for securing access to a website
CN107947938A (en)SM3 algorithms and the verification method and system of SM2 algorithm digital signature are used for PDF
CN114743287B (en)Block chain attendance checking device and method thereof

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20151125


[8]ページ先頭

©2009-2025 Movatter.jp