Movatterモバイル変換


[0]ホーム

URL:


CN111178010B - Method and system for displaying digital signature, data editing method and terminal - Google Patents

Method and system for displaying digital signature, data editing method and terminal
Download PDF

Info

Publication number
CN111178010B
CN111178010BCN201911328727.1ACN201911328727ACN111178010BCN 111178010 BCN111178010 BCN 111178010BCN 201911328727 ACN201911328727 ACN 201911328727ACN 111178010 BCN111178010 BCN 111178010B
Authority
CN
China
Prior art keywords
data
target
field
data content
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911328727.1A
Other languages
Chinese (zh)
Other versions
CN111178010A (en
Inventor
王鸿
孙永鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guojiu Big Data Co ltd
Original Assignee
Guojiu Big Data Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guojiu Big Data Co ltdfiledCriticalGuojiu Big Data Co ltd
Priority to CN201911328727.1ApriorityCriticalpatent/CN111178010B/en
Publication of CN111178010ApublicationCriticalpatent/CN111178010A/en
Application grantedgrantedCritical
Publication of CN111178010BpublicationCriticalpatent/CN111178010B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The embodiment of the invention relates to the technical field of data coding, in particular to a method for displaying a digital signature. In the method, the data editing terminal can edit the service requirement of the user to obtain target data content, and then a check field integrated with the decoding characteristics of the data field and the data source number is added into each target coding character of the target data content to obtain the coded target data content. In this way, when the display terminal decodes the encoded target data content, the data content according to the data field of each target encoded character and the digital signature obtained according to the check field can be displayed, and since the digital signature is used to represent the source of the data content, the source of the data content can be determined.

Description

Method and system for displaying digital signature, data editing method and terminal
Technical Field
The present invention relates to the field of data encoding technologies, and in particular, to a method and system for displaying a digital signature, a data editing method, and a terminal.
Background
Character encoding (Character encoding) is a technique for expressing specific characters using binary sequence strings. The character encoding technology converts information such as different letters, numbers or symbols into binary sequence strings, so that the binary sequence strings can be stored and transferred in a computer or a communication network, and the information such as different letters, numbers or symbols can be stored and transferred in the computer or the communication network.
Common character encoding systems are diverse, such as American Standard code for information interchange (American Standard Code for Information Interchange, ASCII), chinese character inner code extension Specification (Chinese Internal Code Specification, GBK), national Standard GB2312, and variable Length character encoding for Unicode (Unicode Transformation Format, UTF-8)
However, when the character encoding system is adopted for encoding and decoding, the source of the encoded and decoded data content cannot be determined.
Disclosure of Invention
In order to overcome at least the above-mentioned drawbacks of the prior art, one of the purposes of the present invention is to provide a method and system for displaying digital signatures, a data editing method and terminal.
In a first aspect of an embodiment of the present invention, a method for displaying a digital signature is provided, and is applied to a digital signature display system, where the digital signature display system includes a data editing terminal and a display terminal, and the method includes:
the data editing terminal edits the business requirement of the user by adopting a target coding character rule to obtain target data content, wherein the target data content comprises a plurality of target coding characters, and each target coding character comprises a data field for storing the data content;
The data editing terminal adds a check field integrated with the decoding characteristics of the data field and the data source number into each target coding character to obtain coded target data content;
the data editing terminal sends the coded target data content to the display terminal;
and the display terminal decodes the coded target data content and displays the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content.
In an alternative embodiment, the display digital signature system further includes a rule providing terminal; before the data editing terminal edits the business requirement of the user by adopting the target coding character rule, the method further comprises the following steps:
the rule providing terminal encodes a pre-stored character library, adds an identification field integrated with the data source number for the character library, and obtains the target encoding character rule;
and the rule providing terminal sends the target coding character rule to the data editing terminal.
In an alternative embodiment, the data editing terminal edits the service requirement of the user by using a target coding character rule to obtain a target data content, including:
The data editing terminal decodes the target coding character rule to obtain a character library carrying the data source number;
and the data editing terminal searches the conversion character of the service requirement from the character library, and obtains the target data content according to the conversion character.
In an alternative embodiment, the display terminal decodes the encoded target data content, displays the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content, and includes:
the display terminal judges whether a check field exists in each target coding character in the coded target data content;
when a check field exists in each target coding character in the coded target data content, the display terminal judges whether a mapping relation exists between the check field and the data field in each target coding character;
and when the mapping relation exists between the check field and the data field in each target coding character, the display terminal decodes each target coding character and displays the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content.
In an alternative embodiment, the display terminal determines whether a mapping relationship exists between the check field and the data field in each target coding character, including:
the display terminal determines a first bit with a mapping identifier from the check field;
the display terminal determines a second bit with the mapping identifier from the data field;
the display terminal judges whether a first value on the first bit is the same as a second value on the second bit;
and when the first value on the first bit is the same as the second value on the second bit, the display terminal determines that the mapping relation between the check byte and the data byte is met.
In an alternative embodiment, the display terminal decodes each target code character, displays the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content, and includes:
the display terminal decodes the data field in each target coding character to obtain data content for representing the service requirement;
The display terminal decodes the check field in each target coding character to obtain a digital signature for representing the source of the data content, wherein the digital signature comprises the decoding characteristics of the data field and the number of the data source;
the display terminal displays the data content added with the digital signature.
In a second aspect of the embodiment of the present invention, a system for displaying a digital signature is provided, including a data editing terminal and a display terminal;
the data editing terminal is used for editing the business requirement of a user by adopting a target coding character rule to obtain target data content, wherein the target data content comprises a plurality of target coding characters, and each target coding character comprises a data field for storing data;
the data editing terminal is used for adding a check field integrated with the data field decoding characteristics and the data source numbers into each target coding character to obtain coded target data content;
the data editing terminal is used for sending the coded target data content to the display terminal;
the display terminal is used for decoding the coded target data content and displaying the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content.
A third aspect of an embodiment of the present invention provides a data editing terminal, including:
the editing module is used for editing the business requirement of the user by adopting a target coding character rule to obtain target data content, wherein the target data content comprises a plurality of target coding characters, and each target coding character comprises a data field for storing data;
the coding module is used for adding a check field integrated with the decoding characteristics of the data field and the data source number into each target coding character to obtain coded target data content;
and the sending module is used for sending the coded target data content to the display terminal so that the display terminal decodes the coded target data content and displays the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content.
In a fourth aspect of the embodiment of the present invention, a data editing terminal is provided, including a processor, and a memory and a bus connected to the processor; wherein the processor and the memory complete communication with each other through the bus; the processor is used for calling the program instructions in the memory to execute the data editing method.
In a fifth aspect of the embodiments of the present invention, there is provided a readable storage medium having stored thereon a program which, when executed by a processor, implements the above-described method of displaying a digital signature.
According to the method and system for displaying the digital signature, the data editing method and terminal, the data editing terminal can edit the business requirements of users to obtain target data content, and then verification fields integrated with data field decoding characteristics and data source numbers are added into each target coding character of the target data content to obtain the coded target data content. In this way, when the display terminal decodes the encoded target data content, the data content according to the data field of each target encoded character and the digital signature obtained according to the check field can be displayed, and since the digital signature is used to represent the source of the data content, the source of the data content can be determined.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a system architecture diagram of a system for displaying digital signatures according to an embodiment of the present invention.
Fig. 2 is a flowchart of a method for displaying a digital signature according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of a target coding character according to an embodiment of the present invention.
Fig. 4 is a flowchart of a data editing method according to an embodiment of the present invention.
Fig. 5 is a block diagram of a data editing terminal according to an embodiment of the present invention.
Fig. 6 is a schematic diagram of a data editing terminal according to an embodiment of the present invention.
Icon:
100-a system for displaying digital signatures;
1-a data editing terminal; 11-an editing module; 12-an encoding module; 13-a transmitting module; 141-a processor; 142-memory; 143-a bus;
2-a display terminal;
3-rule providing terminal.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a method and a system for displaying a digital signature, a data editing method and a terminal, which are used for solving the technical problem that the source of the encoded and decoded data content cannot be determined when a common character encoding system is adopted for encoding and decoding.
In order to better understand the above technical solutions, the following detailed description of the technical solutions of the present invention is made by using the accompanying drawings and specific embodiments, and it should be understood that the specific features of the embodiments and the embodiments of the present invention are detailed descriptions of the technical solutions of the present invention, and not limiting the technical solutions of the present invention, and the technical features of the embodiments and the embodiments of the present invention may be combined with each other without conflict.
During data transmission, the current terminal device generally encodes the service requirement (service data) of the user to obtain encoded data, and then sends the encoded data to the target terminal device. Accordingly, the target terminal device decodes the encoded data to obtain service data.
For example, the service data "big data has gradually positively influenced the life of people" is encoded on the current terminal device, and the resulting encoded data "001001110101001" is transmitted to the target terminal device.
As another example, the target terminal device decodes the encoded data "001001110101001" so as to obtain service data "big data has gradually positively influenced the life of people".
Through the above-mentioned scene, it can be found that, through a common encoding and decoding method, the service data big data which cannot be decoded from the target terminal device has a positive influence on the life of people, and the source of the service data big data which has a positive influence on the life of people is determined, so that the piracy and illegal copying of the data are difficult to prevent.
In detail, assuming that the current terminal device only authorizes the target terminal device to obtain the service data, if the third party steals the encoded data "001001110101001" in the process of transmitting the encoded data "001001110101001" by the current terminal device, there is no difference between the service data obtained by the third party and the service data obtained by the target terminal device. In this case, the service data obtained by the third party and the source of the service data obtained by the target terminal device cannot be traced.
Therefore, the present embodiment provides a method for displaying a digital signature, in which a data editing terminal can edit a service requirement of a user to obtain a target data content, and then add a check field integrated with a data field decoding feature and a data source number into each target coding character of the target data content to obtain the coded target data content. In this way, when the display terminal decodes the encoded target data content, the data content according to the data field of each target encoded character and the digital signature obtained according to the check field can be displayed, and the digital signature is used to indicate the source of the data content, so that the source of the data content can be determined.
Taking the above example as an example, even if the third party steals the encoded data "001001110101001", when the third party decodes the encoded data "001001110101001" to obtain the service data "big data" that has gradually positively influenced the life of people, "the service data" big data "has gradually positively influenced the life of people" will carry a digital signature representing the source of the data. For example, the digital signature may be a device identification number of the current terminal device, or the like. This allows determining from the digital signature that the third party has the act of illegally obtaining the encoded data "001001110101001".
In detail, please refer to fig. 1 in combination, which is a system architecture diagram of a system 100 for displaying digital signatures according to one embodiment of the present invention. As can be seen from fig. 1, the system 100 for displaying a digital signature includes a data editing terminal 1, a display terminal 2, and a rule providing terminal 3.
In the present embodiment, the character encoder SCharset is configured in each of the data editing terminal 1, the display terminal 2, and the rule providing terminal 3.
In the present embodiment, the data editing terminal 1, the display terminal 2, and the rule providing terminal 3 may be electronic devices such as a computer, a PAD, a mobile phone, and the like, and are not limited herein. The data editing terminal 1 may communicate with a plurality of display terminals 2, and similarly, the rule providing terminal 3 may communicate with a plurality of data editing terminals 1.
In the present embodiment, the rule providing terminal 3 can be understood as a Data Provider (Data Provider), and the Data editing terminal 1 can be understood as a user (Customer).
It will be appreciated that the system for displaying digital signatures 100 shown in fig. 1 provides a set of codec schemes that enable the tagging of data signatures for service data, thereby ensuring the determination and traceability of the data sources of the service data.
Referring to fig. 2 in combination, a flowchart of a method for displaying a digital signature according to an embodiment of the present invention is provided, and the method is applied to the digital signature display system 100 in fig. 1, and the method may include the following:
and S21, the data editing terminal edits the business requirement of the user by adopting a target coding character rule to obtain target data content.
Step S22, the data editing terminal adds a check field integrated with the data field decoding characteristics and the data source numbers in each target coding character to obtain coded target data content.
And step S23, the data editing terminal sends the coded target data content to the display terminal.
And step S24, the display terminal decodes the coded target data content and displays the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content.
In step S21, the target data content includes a plurality of target encoding characters, each target encoding character including a data field storing the data content.
In step S21, the service requirement of the user may be text information, voice information, or video information that the user wants to transfer, for example, the service requirement may be text information. In detail, the text information may be a paper T.
In detail, the data editing terminal 1 edits the paper T by using a target coding character rule to obtain a target data content. In this embodiment, the target data content may be a binary sequence string. The binary sequence string includes a plurality of target encoding characters, each target encoding character including a data field storing data content. Referring to fig. 3 in combination, taking one of the target encoding characters as an example, the target encoding character includes data fields X1 and X2 for storing data contents and a field X3 for identifying the target encoding character.
In detail, in step S22, the data editing terminal 1 may add check fields C1 and C2, which are incorporated with the data field decoding feature and the data source number, to the target code character. In the present embodiment, the field C1, the field C2, and the field X3 can be understood as check fields.
In step S22, the data source number is acquired by a unique data source code service center, which is uniformly managed and issued by a root domain name authority like DNS.
The data editing terminal 1 can obtain the encoded target data content through step S22.
In step S24, the data content displayed by the display terminal 2 may be the paper T, and further, the display terminal 2 will display a digital signature indicating the source of the paper T. For example, the digital signature may be a digital number or a text signature.
In step S24, the digital signature may be added to the paper T in the form of a watermark, so that even if the encoded target data content is stolen by a third party, the third party decodes the encoded target data content and displays the paper T, the paper T carries the digital signature. The data source of the paper T can be determined and traced through the digital signature carried in the paper T.
It can be understood that, through steps S21-S24, the data editing terminal 1 can edit the service requirement of the user to obtain the target data content, and then add a check field integrated with the data field decoding feature and the data source number into each target coding character of the target data content to obtain the encoded target data content. In this way, when the display terminal 2 decodes the encoded target data content, the data content according to the data field of each target encoded character and the digital signature obtained according to the check field can be displayed, and since the digital signature is used to represent the source of the data content, the source of the data content can be determined.
In the specific implementation, the data editing terminal 1 edits the service requirement of the user by using the target coding character rule, and in some cases, the source of the target coding character rule also needs to be traced back. To this end, in an alternative embodiment, before step S21, the method may further comprise:
and S11, encoding a pre-stored character library by the rule providing terminal, and adding an identification field integrated with the data source number for the character library to obtain the target encoding character rule.
And step S12, the rule providing terminal sends the target coding character rule to the data editing terminal.
In step S11, the character library may be a character library corresponding to the GBK encoding scheme.
It will be appreciated that, through steps S11-S12, the data editing terminal 1 is able to obtain a character library carrying the data source number after decoding the obtained target encoded character rule. In this way, the rule providing terminal 3 can verify the validity of the source of the character library in the data editing terminal 1 based on the data source number.
For example, the rule providing terminal 3 only transmits the target encoding character rule to the data editing terminal 1, and if the character library adopted by the third party in encoding is found to carry the data source number, it can be determined that the character library of the third party is illegally acquired.
Through the above, the source of the character library can be determined and traced.
In an alternative embodiment, in step S21, the data editing terminal 1 edits the service requirement of the user by using the target coding character rule to obtain the target data content, which may specifically include the following contents:
step S211, the data editing terminal decodes the target coding character rule to obtain a character library carrying the data source number.
Step S212, the data editing terminal searches the conversion character of the service requirement from the character library, and obtains the target data content according to the conversion character.
In step S211, the character library carries the data source number, so that the source of the character library can be determined by tracing the data source number.
In practice, the display terminal 2 does not need to decode all the encoded target data content in order to increase the efficiency of determining the source of the data content. In detail, if the encoded target data content does not have the check byte, it may be considered that the encoded target data content is not encoded by the encoding method, that is, the source of the data content cannot be traced because the encoded target data content does not carry the corresponding digital signature, in which case decoding of the encoded target data content is not required. For this purpose, in step S24, the display terminal decodes the encoded target data content, and displays the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content, which may specifically include the following contents:
In step S241, the display terminal determines whether a check field exists in each target encoding character in the encoded target data content.
In step S242, when a check field exists in each target coding character in the coded target data content, the display terminal determines whether a mapping relationship exists between the check field and the data field in each target coding character.
Step S243, when the mapping relation exists between the check field and the data field in each target coding character, the display terminal decodes each target coding character, and displays the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content.
It can be understood that before decoding the encoded target data content, the display terminal 2 determines whether a check field exists in each target encoding character in the target data content, further determines whether a mapping relationship exists between the check field in each target encoding character and the data field, and decodes each target encoding character only when the check field exists in each target encoding character in the encoded target data content and the mapping relationship exists between the check field in each target encoding character and the data field, so as to display the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content.
In this way, by determining in step S241 to step S242, the display terminal 2 can be prevented from decoding all the encoded target data contents when tracing the source of the data, and the resource consumption of the display terminal 2 is reduced.
In an alternative embodiment, in step S242, the display terminal determines whether there is a mapping relationship between the check field and the data field in each target encoding character, which may specifically include the following:
in step S2421, the display terminal determines from the check field that the first bit of the mapping identifier exists.
In step S2422, the display terminal determines from the data field that the second bit of the mapping identifier exists.
In step S2423, the display terminal determines whether the first value on the first bit is the same as the second value on the second bit.
Step S2424, where the display terminal determines that the mapping relationship between the check byte and the data byte is satisfied when the first value on the first bit is the same as the second value on the second bit.
In detail, referring to fig. 3 in combination, values on bits in the data fields X1 and X2 may be mapped to corresponding bits in the check fields C1, C2, and X3. When the mapping relation is verified, a first value on a first bit with a mapping identifier can be determined from high bits of the verification fields C1, C2 and X3 respectively, and then a second value on a second bit can be determined from the data fields X1 and X2 according to the mapping identifier. Further, when the first value and the second value are the same, it may be determined that the mapping relationship between the check byte and the data byte is satisfied.
For example, the first bit of the check fields C1, C2, and X3 is the last bit of the eight-bit bits in each field. The first value of the first bit of the check field C1 is "0", the first value of the first bit of the check field C2 is "1", and the first value of the first bit of the check field X3 is "1".
In detail, the second value having a mapping relationship with the first value "0" of the first bit of the check field C1 is the value "0" on the second bit (fifth bit) of the data field X1, the second value having a mapping relationship with the first value "1" of the first bit of the check field C2 is the value "1" on the second bit (eighth bit) of the data field X2, and the second value having a mapping relationship with the first value "1" of the first bit of the check field X3 is the value "1" on the second bit (fifth bit) of the data field X2.
It can be understood that by judging whether the mapping relationship exists between the check field and the data field in each target coding character, the display terminal 2 can be prevented from decoding all the coded target data contents when tracing the data source, and the resource consumption of the display terminal 2 is reduced.
In detail, when tracing the data source, the display terminal 2 decodes the target character code only when the encoded target data content satisfies the check field detection condition and the mapping relation determination condition. And if the coded target data content does not meet the check field detection condition and the mapping relation determination condition at the same time, characterizing that the coded target data content does not have a digital signature after decoding. In this case, the display terminal 2 may not need to decode the encoded target data content. In this way, the resource consumption of the display terminal 2 is reduced.
It will be appreciated that the manner in which the display terminal 2 decodes each target code character is similar, and for ease of explanation, this embodiment will be described with one of the target code characters.
In an alternative embodiment, in step S243, the display terminal decodes each target code character, and displays the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content, which may specifically include the following contents:
and step S2431, the display terminal decodes the data field in each target coding character to obtain the data content for representing the service requirement.
And step S2432, the display terminal decodes the check field in each target coding character to obtain a digital signature for representing the source of the data content.
Step S2433, the display terminal displays the data content to which the digital signature is added.
In step S2432, the data field decoding feature and the data source number are included in the digital signature.
It is understood that the display terminal 2 can display the digital signature together when displaying the data content through steps S2431 to S2433. In this way, the source of the data content can be traced back through the digital signature.
On the basis of the foregoing, please refer to fig. 4 in combination, which is a flowchart of a data editing method according to an embodiment of the present invention, the digital signature processing method is applied to the data editing terminal 1 in fig. 1, and the method may include the following steps:
and S31, editing the business requirement of the user by adopting a target coding character rule to obtain target data content, wherein the target data content comprises a plurality of target coding characters.
And step S32, adding a check field integrated with the data field decoding characteristics and the data source numbers into each target coding character to obtain coded target data content.
And step S33, the coded target data content is sent to a display terminal, so that the display terminal decodes the coded target data content and displays the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content.
In step S31, each target encoding character includes a data field storing data.
It will be appreciated that the implementation principle of step S31-step S33 is similar to that of step S21-step S24 in fig. 2, and thus will not be described further herein.
On the basis of the above, the embodiment of the present invention provides a data editing terminal 1.
In detail, fig. 5 is a block diagram of a data editing terminal 1 according to an embodiment of the present invention, the data editing terminal 1 including:
the editing module 11 is configured to edit a service requirement of a user by using a target coding character rule to obtain a target data content, where the target data content includes a plurality of target coding characters, and each target coding character includes a data field for storing data.
The encoding module 12 is configured to add a check field integrated with the data field decoding feature and the data source number to each target encoding character, so as to obtain the encoded target data content.
And the sending module 13 is used for sending the encoded target data content to a display terminal so that the display terminal decodes the encoded target data content and displays the data content obtained according to the data field and the digital signature obtained according to the check field and used for representing the source of the data content.
Optionally, the data editing terminal 1 includes a processor and a memory, where the editing module 11, the encoding module 12, the transmitting module 13, and the like are stored as program units, and the processor executes the program units stored in the memory to implement corresponding functions.
The processor includes a kernel, and the kernel fetches the corresponding program unit from the memory. The kernel can be provided with one or more than one, and the data sources of the data contents displayed on different display terminals are determined by adjusting kernel parameters.
An embodiment of the present invention provides a readable storage medium having stored thereon a program which, when executed by a processor, implements the data editing method.
The embodiment of the invention provides a processor which is used for running a program, wherein the data editing method is executed when the program runs.
In the embodiment of the present invention, as shown in fig. 6, the data editing terminal 1 includes at least one processor 141, and at least one memory 142 and bus connected to the processor 141; wherein, the processor 141 and the memory 142 complete the communication with each other through the bus 143; processor 141 is operative to invoke program instructions in memory 142 to perform the method of displaying digital signatures described above.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, systems and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing data editing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing data editing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, the data editing terminal includes one or more processors (CPUs), memory, and a bus. The data editing terminal may also include input/output interfaces, network interfaces, and the like.
The memory may include volatile memory, random Access Memory (RAM), and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage data editing terminals, or any other non-transmission medium that can be used to store information that can be accessed by the computing data editing terminal. Computer-readable media, as defined herein, does not include transitory computer-readable media, such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or data editing terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or data editing terminal. Without further limitation, an element defined by the statement "comprising one … …" does not exclude that an additional identical element is present in a process, method, article or data editing terminal comprising the element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
In summary, according to the above scheme provided by the embodiment of the present invention, when the display terminal decodes the encoded target data content, the data content of the data field according to each target encoded character and the digital signature obtained according to the check field can be displayed, and since the digital signature is used for representing the source of the data content, the source of the data content can be determined.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.

Claims (10)

CN201911328727.1A2019-12-202019-12-20Method and system for displaying digital signature, data editing method and terminalActiveCN111178010B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201911328727.1ACN111178010B (en)2019-12-202019-12-20Method and system for displaying digital signature, data editing method and terminal

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201911328727.1ACN111178010B (en)2019-12-202019-12-20Method and system for displaying digital signature, data editing method and terminal

Publications (2)

Publication NumberPublication Date
CN111178010A CN111178010A (en)2020-05-19
CN111178010Btrue CN111178010B (en)2024-02-09

Family

ID=70650348

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201911328727.1AActiveCN111178010B (en)2019-12-202019-12-20Method and system for displaying digital signature, data editing method and terminal

Country Status (1)

CountryLink
CN (1)CN111178010B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113343639B (en)*2021-05-192023-10-03网易(杭州)网络有限公司Product identification code diagram generation and information query method based on product identification code diagram

Citations (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5883956A (en)*1996-03-281999-03-16National Semiconductor CorporationDynamic configuration of a secure processing unit for operations in various environments
EP1334472A2 (en)*2000-11-072003-08-13Unisys CorporationSelf-authentication of value documents using digital signatures
US6785815B1 (en)*1999-06-082004-08-31Intertrust Technologies Corp.Methods and systems for encoding and protecting data using digital signature and watermarking techniques
EP1509828A2 (en)*2002-05-102005-03-02Fraunhofer-Gesellschaft Zur Förderung Der Angewandten Forschung E.V.Method and device for producing coded data, for decoding coded data and for producing re-signed data
CN1777040A (en)*2005-12-142006-05-24北京北大方正电子有限公司 A method for encoding and decoding variable-length structured information
CN1926493A (en)*2004-04-082007-03-07国际商业机器公司Method and system for linking certificates to signed files
WO2007028407A1 (en)*2005-09-062007-03-15Nero AgMethod for signing a data package and signing apparatus
CN101133418A (en)*2004-10-122008-02-27阿诺托股份公司Method and a system for secure management of information from an electronic pen
CN101977319A (en)*2010-11-032011-02-16上海交通大学Method for generating and authenticating hidden video tags based on video characteristics and digital signatures
CN103310160A (en)*2013-06-202013-09-18北京神州绿盟信息安全科技股份有限公司Method, system and device for preventing webpage from being tampered with
CN103413227A (en)*2013-08-022013-11-27四川航天系统工程研究所Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof
CN104424579A (en)*2013-08-272015-03-18成都天钥科技有限公司Security traceability management system
CN109104723A (en)*2018-07-132018-12-28Oppo(重庆)智能科技有限公司A kind of network name display methods and relevant device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
AU2001275982A1 (en)*2000-07-202002-02-05Rodney D. JohnsonInformation archival and retrieval system for internetworked computers
US7058815B2 (en)*2001-01-222006-06-06Cisco Technology, Inc.Method and system for digitally signing MPEG streams
US9722776B2 (en)*2012-06-212017-08-01Microsoft Technology Licensing, LlcHomomorphic signatures and network coding signatures
US9282366B2 (en)*2012-08-132016-03-08The Nielsen Company (Us), LlcMethods and apparatus to communicate audience measurement information

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5883956A (en)*1996-03-281999-03-16National Semiconductor CorporationDynamic configuration of a secure processing unit for operations in various environments
US6785815B1 (en)*1999-06-082004-08-31Intertrust Technologies Corp.Methods and systems for encoding and protecting data using digital signature and watermarking techniques
EP1334472A2 (en)*2000-11-072003-08-13Unisys CorporationSelf-authentication of value documents using digital signatures
EP1509828A2 (en)*2002-05-102005-03-02Fraunhofer-Gesellschaft Zur Förderung Der Angewandten Forschung E.V.Method and device for producing coded data, for decoding coded data and for producing re-signed data
CN1926493A (en)*2004-04-082007-03-07国际商业机器公司Method and system for linking certificates to signed files
CN101133418A (en)*2004-10-122008-02-27阿诺托股份公司Method and a system for secure management of information from an electronic pen
WO2007028407A1 (en)*2005-09-062007-03-15Nero AgMethod for signing a data package and signing apparatus
CN1777040A (en)*2005-12-142006-05-24北京北大方正电子有限公司 A method for encoding and decoding variable-length structured information
CN101977319A (en)*2010-11-032011-02-16上海交通大学Method for generating and authenticating hidden video tags based on video characteristics and digital signatures
CN103310160A (en)*2013-06-202013-09-18北京神州绿盟信息安全科技股份有限公司Method, system and device for preventing webpage from being tampered with
CN103413227A (en)*2013-08-022013-11-27四川航天系统工程研究所Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof
CN104424579A (en)*2013-08-272015-03-18成都天钥科技有限公司Security traceability management system
CN109104723A (en)*2018-07-132018-12-28Oppo(重庆)智能科技有限公司A kind of network name display methods and relevant device

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
digital color image watermarking by means of blind source seperation;sangeeta D. jadhav;《2009 international conference on control ,automation , communication and energy conservation》;全文*
关于信息隐藏于隐信道技术的应用研究;高华强;《中国优秀硕士论文全文数据库信息科技辑》;全文*
吴明华.《电子商务安全》.2017,全文.*
曹望 ; 尤志强 ; .基于数字证书的通用权限管理的设计与实现.《计算机系统应用》.2010,(第09期),全文.*
樊彦博.基于PKI和数字水印的电子签章系统的研究与实现.《中国优秀硕士论文全文数据库信息科技辑》.2012,全文.*

Also Published As

Publication numberPublication date
CN111178010A (en)2020-05-19

Similar Documents

PublicationPublication DateTitle
CN108681853B (en)Logistics information transmission method, system and device based on block chain
CN111191255B (en)Information encryption processing method, server, terminal, device and storage medium
CN104765999A (en)User resource information processing method, terminal and server
CN106027608B (en)A kind of picture upload method, client and server
WO2020233047A1 (en)Page test method and apparatus
CN107181714A (en)Verification method and device, the generation method of service code and device based on service code
CN106878367B (en)Method and device for realizing asynchronous call of service interface
US10536162B2 (en)Method and system to convert globally unique identifiers to electronic data interchange document identifiers
CN107766738A (en)A kind of binding method of smart machine, device and system, communication system
CN113254408B (en)Invisible mark adding method, device, medium and electronic equipment
CN112287372A (en)Method and apparatus for protecting clipboard privacy
CN105162604A (en)Feature image identification based verification method and system, and verification server
CN105450641A (en)Verification method, verification device and verification system
CN114020272A (en) A serialized encoding and decoding method, device and electronic device
CN111865616B (en)Method and device for generating key pair based on ECDSA algorithm
CN114626968A (en) Watermark embedding method, watermark extraction method and device
CN111178010B (en)Method and system for displaying digital signature, data editing method and terminal
CN104426657A (en)Service authentication method and system, server
CN108734149B (en)Text data scanning method and device
CN109525550B (en)Data message processing method, device and system
CN114297695B (en)Text encryption method, text decryption method and device
CN111385101A (en)File transmission method and device
CN112100666B (en)Text credit giving method, credit giving text checking method and system
CN117010330A (en)Two-dimensional code word generation method, two-dimensional code recognition method and two-dimensional code recognition device
CN115829817A (en)Watermark information adding method, watermark information extracting method, device and equipment

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp