CN102073977A - Methods and equipment for generating and authenticating digital signatures and digital signature system - Google Patents
Methods and equipment for generating and authenticating digital signatures and digital signature system Download PDFInfo
- Publication number
- CN102073977A CN102073977A CN 201010586845 CN201010586845A CN102073977A CN 102073977 A CN102073977 A CN 102073977A CN 201010586845 CN201010586845 CN 201010586845 CN 201010586845 A CN201010586845 A CN 201010586845A CN 102073977 A CN102073977 A CN 102073977A
- Authority
- CN
- China
- Prior art keywords
- text
- characteristic information
- dimension code
- character string
- digital signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 230000007613 environmental effect Effects 0.000 claims abstract description 39
- 238000012795 verification Methods 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 claims description 4
- 230000000694 effects Effects 0.000 abstract description 10
- 238000010586 diagram Methods 0.000 description 8
- 230000000875 corresponding effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides methods and equipment for generating and authenticating digital signatures and a digital signature system. The method for generating digital signatures comprises the following steps: encrypting and/or coding text characteristic information and environmental data to generate character strings; coding the character strings with two-dimension codes to generate two-dimension code pictures; and using the two-dimension code pictures as digital signatures and sending the two-dimension code pictures together with the text to be sent. The method for authenticating digital signatures comprises the following steps: reducing the received two-dimension code pictures into the character strings through scanning; decrypting the character strings to obtain the environmental data and the text characteristic information; and checking the received text according to the text characteristic information. Compared with the prior art using the character strings as the digital signatures, the invention can realize more effective signature effect by using the two-dimension codes as the digital signatures.
Description
Technical field
The present invention relates to the communication technology, relate in particular to a kind of generation and verification method, equipment and system of digital signature.
Background technology
Digital signature be by an one-way function to the message that will transmit handle obtain in order to message identifying source and examine the number of characters word string whether message changes.
Problems such as digital signature can solve and deny, forges, distorts and pretend to be, specific requirement: message signature, the recipient that the sender can not deny sending afterwards can examine that message signature that the sender sends, message signature, recipient that the recipient can not forge the sender can not carry out that part is distorted to sender's message, a certain user in the network can not pretend to be another user as sender or recipient.
In realizing process of the present invention, the inventor finds that there are the following problems at least in the prior art: adopt character string as digital signature in the prior art usually, effect is outstanding inadequately.
Summary of the invention
The embodiment of the invention provides a kind of generation and verification method, equipment and system of digital signature, in order to solve the problem that causes as digital signature with character string in the prior art, realizes that the digital signature effect is more outstanding.
On the one hand, the embodiment of the invention provides a kind of generation method of digital signature, comprising:
Text characteristic information and environmental data are encrypted and/or encoded, generate character string;
Adopt two-dimension code to encode to described character string, generate two-dimension code image;
Described two-dimension code image as digital signature, is sent with text to be sent.
On the other hand, the embodiment of the invention provides a kind of verification method of digital signature, comprising:
The two-dimension code image that receives scanned be reduced into character string;
Described character string is decrypted, obtains environmental data and text characteristic information;
Check the text that receives according to described text characteristic information.
On the one hand, the embodiment of the invention provides a kind of generation equipment of digital signature, comprising:
The information encryption module is used for text characteristic information and environmental data being encrypted and/or being encoded, and generates character string;
Two-dimensional code generation module is used for adopting two-dimension code to encode to described character string, generates two-dimension code image;
Sending module is used for described two-dimension code image sending with text to be sent as digital signature.
On the other hand, the embodiment of the invention provides a kind of Authentication devices of digital signature, comprising:
Two-dimension code scan module, the two-dimension code image that is used for receiving scan and are reduced into character string;
The decrypts information module is used for described character string is decrypted, and obtains environmental data and text characteristic information;
The text authentication module is used for checking the text that receives according to described text characteristic information.
The embodiment of the invention provides the system of digital signature, comprising: the generation equipment of above-mentioned digital signature and the Authentication devices of digital signature.
As shown from the above technical solution, the generation of the digital signature of the embodiment of the invention and verification method, equipment and system, by with two-dimension code as digital signature, because picture has the visual sense feeling more formal than character string, so the effect that adopts two-dimension code more can push oneself to the front and sign as digital signature.
Description of drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the invention, the accompanying drawing of required use is done an introduction simply in will describing embodiment below, apparently, accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the generation method flow synoptic diagram of first embodiment of the invention;
Fig. 2 is the verification method schematic flow sheet of second embodiment of the invention;
Fig. 3 is the generation device structure synoptic diagram of third embodiment of the invention;
Fig. 4 is the Authentication devices structural representation of fourth embodiment of the invention;
Fig. 5 is the system architecture synoptic diagram of fifth embodiment of the invention;
Fig. 6 is the method flow synoptic diagram of sixth embodiment of the invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer, below in conjunction with the accompanying drawing in the embodiment of the invention, technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
Fig. 1 is the generation method flow synoptic diagram of first embodiment of the invention, comprising:
Step 11: text characteristic information and environmental data are encrypted and/or encoded, generate character string;
Wherein, the text characteristic information can obtain in the following way:
Text to be sent is encoded, generate described text characteristic information, the algorithm of described coding comprises hashing algorithm.
Environmental data comprises at least: the apparatus characteristic information of user name, transmitting time and the information of transmission;
Described apparatus characteristic information comprises at least one in following: the network interface card identification number of machine, IP address, machine name.
Particularly, text characteristic and environmental data are encrypted and/or the algorithm of encoding can adopt rivest, shamir, adelman, also can be adopted the high symmetric encipherment algorithm of Cipher Strength.
Step 12: adopt two-dimension code to encode to described character string, generate two-dimension code image;
Wherein, the algorithm of two-dimension code coding can be PDF417, QRCode, Code49, code16K or CodeOne.
Step 13: described two-dimension code image as digital signature, is sent with text to be sent;
For example, can be with the annex of described two-dimension code image as mail, the perhaps signature of delivering as forum's speech sends after being attached to described text together.
This forum includes but not limited to: internet forum, news analysis, Web Community etc.
Further, present embodiment can also send user name with above-mentioned two-dimension code, text to be sent.Since expressly carry user name, can be so that the effect of digital signature be more outstanding.
Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Fig. 2 is the verification method schematic flow sheet of second embodiment of the invention, comprising:
Step 21: the two-dimension code image that receives scanned be reduced into character string;
For example, be reduced into character string after can adopting existing two-dimensional code reading equipment with the scanning of the two-dimension code image that receives.
Step 22: described character string is decrypted, obtains environmental data and text characteristic information;
Particularly, can decipher character string, obtain environmental data and text characteristic information by the key and the decipherment algorithm of making an appointment.
Described environmental data comprises at least: the apparatus characteristic information of user name, transmitting time, transmission information; Described apparatus characteristic information comprises at least one in following: the network interface card identification number of machine, IP address, machine name.
Step 23: check the text that receives according to described text characteristic information.
Particularly,,, environmental data expressly can be obtained, the evidence that send related data of this environmental data as transmit leg the denial of transmit leg can be avoided afterwards through deciphering to character string for environmental data.Perhaps, if comprise environmental data expressly in the data that send, the environmental data that the environmental data after then can relatively deciphering expressly carries, whether legal to check the source that sends data.For example,, then can compare the user name and this user name of expressly carrying that obtain after the deciphering, if both unanimities show that then the source of data of this reception is effectively legal if the data that transmit leg sends further comprise user name.For the text characteristic information, can be in the following way:
Adopt hashing algorithm to encode to the text that receives, generate the text characteristic information;
If the text characteristic information of described generation is identical with the text characteristic information that receives (i.e. the text characteristic information that obtains by the deciphering character string), then checked result is that text is effective.Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Fig. 3 is the generation device structure synoptic diagram of third embodiment of the invention, comprises information encryption module 31, two-dimensional code generation module 32 and sending module 33; Information encryption module 31 is used for text characteristic information and environmental data being encrypted and/or being encoded, and generates character string; Two-dimensional code generation module 32 is used for adopting two-dimension code to encode to described character string, generates two-dimension code image; Sending module 33 is used for described two-dimension code image sending with text to be sent as digital signature.
Further, present embodiment can also comprise text eigenwert generation module 34, and text eigenwert generation module 34 is used for text to be sent is encoded, and generates described text characteristic information, and the algorithm of described coding comprises hashing algorithm.
Particularly, described information encryption module 31 specifically is used for text characteristic information and environmental data are adopted rivest, shamir, adelman, perhaps adopts the high symmetric encipherment algorithm of Cipher Strength, encrypts and/or encodes, and generates character string; And/or described two-dimensional code generation module 32 specifically is used for described character string is adopted PDF417, QRCode, Code49, code16K or CodeOne algorithm, encodes, and generates two-dimension code image; And/or described sending module 33 specifically is used for the annex of described two-dimension code image as mail, and the perhaps signature of delivering as forum's speech sends after being attached to described text together.
Perhaps, the sending module of present embodiment can also specifically be used for user name with described two-dimension code image and described environmental data as digital signature, sends with text to be sent.
Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Fig. 4 is the Authentication devices structural representation of fourth embodiment of the invention, comprises two-dimension code scan module 41, decrypts information module 42 and text authentication module 43; The two-dimension code image that two-dimension code scan module 41 is used for receiving scans and is reduced into character string; Decrypts information module 42 is used for described character string is decrypted, and obtains environmental data and text characteristic information; Text authentication module 43 is used for checking the text that receives according to described text characteristic information.
Wherein, described decrypts information module 42 specifically is used to adopt key and corresponding decipherment algorithm that described character string is decrypted, and obtains environmental data and text characteristic information.
Obtain environmental data expressly after the described character string deciphering, the environmental data that described text authentication module 43 can be used for specifically that deciphering is obtained sends the evidence of related data as transmit leg, avoid the denial of transmit leg, perhaps, if transmit leg has carried user name simultaneously when sending data, the user name that obtains after the user name that also can expressly carry by comparison and the deciphering then, if both unanimities, then checked result for the source effectively.
Perhaps, present embodiment can also comprise text eigenwert generation module 44, and described text eigenwert generation module 44 is used for adopting hashing algorithm to encode to the text that receives, and generates the text characteristic information; If it is identical with the text characteristic information that receives that described text authentication module 43 specifically is used for the text characteristic information of described generation, then checked result is that text is effective.
Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Fig. 5 is the system architecture synoptic diagram of fifth embodiment of the invention, comprise the generation equipment 51 of digital signature and the Authentication devices 52 of digital signature, wherein, the generation equipment 51 of digital signature can be specifically as shown in Figure 3, and the Authentication devices 52 of digital signature can be specifically as shown in Figure 4.
Correspondingly, corresponding to this system, the method for execution as shown in Figure 6, Fig. 6 is the method flow synoptic diagram of sixth embodiment of the invention, comprising:
Step 61: the generation equipment of digital signature is encrypted text characteristic information and environmental data and/or is encoded, and generates character string;
Step 62: the generation equipment of digital signature adopts two-dimension code to encode to described character string, generates two-dimension code image;
Step 63: the generation equipment of digital signature as digital signature, sends described two-dimension code image with text to be sent;
Step 64: the Authentication devices of digital signature scans the two-dimension code image that receives and is reduced into character string;
Step 65: the Authentication devices of digital signature is decrypted described character string, obtains environmental data and text characteristic information;
Step 66: the Authentication devices of digital signature is checked the text that receives according to described text characteristic information.
The particular content of above steps can be referring to the various embodiments described above.
Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Be understandable that the reference mutually of the correlated characteristic in said method and the equipment.In addition, " first " in the foregoing description, " second " etc. are to be used to distinguish each embodiment, and do not represent the quality of each embodiment.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be finished by the relevant hardware of programmed instruction, aforesaid program can be stored in the computer read/write memory medium, this program is carried out the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
It should be noted that at last: above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of various embodiments of the present invention technical scheme.
Claims (19)
1. the generation method of a digital signature is characterized in that, comprising:
Text characteristic information and environmental data are encrypted and/or encoded, generate character string;
Adopt two-dimension code to encode to described character string, generate two-dimension code image;
Described two-dimension code image as digital signature, is sent with text to be sent.
2. method according to claim 1 is characterized in that, also comprises:
Text to be sent is encoded, generate described text characteristic information, the algorithm of described coding comprises hashing algorithm.
3. method according to claim 1 is characterized in that, described environmental data comprises at least:
The apparatus characteristic information of user name, transmitting time and the information of transmission.
4. method according to claim 3 is characterized in that, described apparatus characteristic information comprises at least one in following: the network interface card identification number of machine, IP address, machine name.
5. according to each described method of claim 1 to 4, it is characterized in that, describedly text characteristic information and environmental data are encrypted and/or encoded, generate character string, comprising:
Text characteristic information and environmental data are adopted rivest, shamir, adelman, perhaps adopt the high symmetric encipherment algorithm of Cipher Strength, encrypt and/or encode, generate character string.
6. according to each described method of claim 1 to 4, it is characterized in that, describedly adopt two-dimension code to encode, generate two-dimension code image, comprising described character string:
Described character string is adopted PDF417, QRCode, Code49, code16K or CodeOne algorithm, encode, generate two-dimension code image.
7. according to each described method of claim 1 to 4, it is characterized in that, described with described two-dimension code image as digital signature, send with text to be sent, comprising:
With the annex of described two-dimension code image as mail, the perhaps signature of delivering as forum's speech sends after being attached to described text together.
8. the verification method of a digital signature is characterized in that, comprising:
The two-dimension code image that receives scanned be reduced into character string;
Described character string is decrypted, obtains environmental data and text characteristic information;
Check the text that receives according to described text characteristic information.
9. method according to claim 8 describedly is decrypted described character string, obtains environmental data and text characteristic information, comprising:
Adopt key and corresponding decipherment algorithm that described character string is decrypted, obtain environmental data and text characteristic information.
10. according to Claim 8 or 9 described methods, it is characterized in that described environmental data comprises at least: the apparatus characteristic information of user name, transmitting time and the information of transmission.
11. method according to claim 10 is characterized in that, described apparatus characteristic information comprises at least one in following:
The network interface card identification number of machine, IP address, machine name.
12. according to Claim 8 or 9 described methods, it is characterized in that, also comprise:
Adopt hashing algorithm to encode to the text that receives, generate the text characteristic information;
Describedly check the text that receives, comprising according to described text characteristic information:
If the text characteristic information of described generation is identical with the text characteristic information that receives, then checked result is that text is effective.
13. the generation equipment of a digital signature is characterized in that, comprising:
The information encryption module is used for text characteristic information and environmental data being encrypted and/or being encoded, and generates character string;
Two-dimensional code generation module is used for adopting two-dimension code to encode to described character string, generates two-dimension code image;
Sending module is used for described two-dimension code image sending with text to be sent as digital signature.
14. equipment according to claim 13 is characterized in that, also comprises:
Text eigenwert generation module is used for text to be sent is encoded, and generates described text characteristic information, and the algorithm of described coding comprises hashing algorithm.
15. according to claim 13 or 14 described equipment, it is characterized in that,
Described information encryption module specifically is used for text characteristic information and environmental data are adopted rivest, shamir, adelman, perhaps adopts the high symmetric encipherment algorithm of Cipher Strength, encrypts and/or encodes, and generates character string;
And/or,
Described two-dimensional code generation module specifically is used for described character string is adopted PDF417, QRCode, Code49, code16K or CodeOne algorithm, encodes, and generates two-dimension code image;
And/or,
Described sending module specifically is used for the annex of described two-dimension code image as mail, and the perhaps signature of delivering as forum's speech sends after being attached to described text together.
16. the Authentication devices of a digital signature is characterized in that, comprising:
Two-dimension code scan module, the two-dimension code image that is used for receiving scan and are reduced into character string;
The decrypts information module is used for described character string is decrypted, and obtains environmental data and text characteristic information;
The text authentication module is used for checking the text that receives according to described text characteristic information.
17. equipment according to claim 16 is characterized in that, described decrypts information module specifically is used to adopt key and corresponding decipherment algorithm that described character string is decrypted, and obtains environmental data and text characteristic information.
18. equipment according to claim 16 is characterized in that, also comprises:
Text eigenwert generation module is used for adopting hashing algorithm to encode to the text that receives, and generates the text characteristic information;
If it is identical with the text characteristic information that receives that described text authentication module specifically is used for the text characteristic information of described generation, then checked result is that text is effective.
19. the system of consistent digital signature is characterized in that, comprising:
Generation equipment as each described digital signature of claim 13-15; And,
Authentication devices as each described digital signature of claim 16-18.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010586845 CN102073977A (en) | 2010-12-13 | 2010-12-13 | Methods and equipment for generating and authenticating digital signatures and digital signature system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010586845 CN102073977A (en) | 2010-12-13 | 2010-12-13 | Methods and equipment for generating and authenticating digital signatures and digital signature system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102073977A true CN102073977A (en) | 2011-05-25 |
Family
ID=44032508
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201010586845 Pending CN102073977A (en) | 2010-12-13 | 2010-12-13 | Methods and equipment for generating and authenticating digital signatures and digital signature system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102073977A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102270294A (en) * | 2011-08-12 | 2011-12-07 | 华南农业大学 | Bar code and two-dimension code hybrid coding and decoding methods and devices |
CN102724668A (en) * | 2012-06-15 | 2012-10-10 | 惠州Tcl移动通信有限公司 | Method and system for sharing WIFI (wireless fidelity) network information on basis of two-dimensional code graphs |
CN103226500A (en) * | 2012-01-31 | 2013-07-31 | 英飞凌科技股份有限公司 | System and method of computation by signature analysis |
CN103236929A (en) * | 2013-04-26 | 2013-08-07 | 天地融科技股份有限公司 | Information processing method and encryption device |
CN103248553A (en) * | 2012-02-07 | 2013-08-14 | 腾讯科技(深圳)有限公司 | Mail encryption method, mail decryption method and clients |
CN103532960A (en) * | 2013-10-21 | 2014-01-22 | 上海合合信息科技发展有限公司 | Text encryption interaction method, encryption method and device, decryption method and device |
CN104063779A (en) * | 2013-03-21 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Email box attachment downloading method and email box attachment downloading system thereof |
CN104966116A (en) * | 2015-07-14 | 2015-10-07 | 苏州奥莱维信息技术有限公司 | Encrypted electronic seal based on two-dimension code |
CN104993923A (en) * | 2015-07-02 | 2015-10-21 | 武汉大学 | Radar data protection method based on combination of information hiding and encryption techniques |
CN105844520A (en) * | 2015-01-13 | 2016-08-10 | 伍彬 | Electronic receipt generating and verifying method |
CN106033543A (en) * | 2015-03-11 | 2016-10-19 | 株式会社理光 | Document modification detecting method, original document manuscript providing device, duplicated document detecting device, and document modification detection system |
CN108632663B (en) * | 2018-06-19 | 2021-02-02 | 西安中科深度生态环境科技有限责任公司 | Method and system for processing digitized audio/video and subtitles |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004040506A1 (en) * | 2002-10-31 | 2004-05-13 | Iconlab, Inc. | Two-dimensional code having superior decoding property which is possible to control the level of error correcting codes, and method for encoding and decoding the same |
CN101645140A (en) * | 2008-08-06 | 2010-02-10 | 华为技术有限公司 | Two-dimensional code generation method, decoding method and device |
CN101834726A (en) * | 2010-03-19 | 2010-09-15 | 广州广大通电子科技有限公司 | Safe encryption method based on bi-dimensional codes |
-
2010
- 2010-12-13 CN CN 201010586845 patent/CN102073977A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004040506A1 (en) * | 2002-10-31 | 2004-05-13 | Iconlab, Inc. | Two-dimensional code having superior decoding property which is possible to control the level of error correcting codes, and method for encoding and decoding the same |
CN101645140A (en) * | 2008-08-06 | 2010-02-10 | 华为技术有限公司 | Two-dimensional code generation method, decoding method and device |
CN101834726A (en) * | 2010-03-19 | 2010-09-15 | 广州广大通电子科技有限公司 | Safe encryption method based on bi-dimensional codes |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102270294A (en) * | 2011-08-12 | 2011-12-07 | 华南农业大学 | Bar code and two-dimension code hybrid coding and decoding methods and devices |
CN103226500A (en) * | 2012-01-31 | 2013-07-31 | 英飞凌科技股份有限公司 | System and method of computation by signature analysis |
CN103226500B (en) * | 2012-01-31 | 2016-08-10 | 英飞凌科技股份有限公司 | The system and method calculated by signature analysis |
CN103248553A (en) * | 2012-02-07 | 2013-08-14 | 腾讯科技(深圳)有限公司 | Mail encryption method, mail decryption method and clients |
CN102724668A (en) * | 2012-06-15 | 2012-10-10 | 惠州Tcl移动通信有限公司 | Method and system for sharing WIFI (wireless fidelity) network information on basis of two-dimensional code graphs |
CN104063779A (en) * | 2013-03-21 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Email box attachment downloading method and email box attachment downloading system thereof |
CN103236929B (en) * | 2013-04-26 | 2016-09-14 | 天地融科技股份有限公司 | A kind of information processing method and deciphering device |
WO2014173233A1 (en) * | 2013-04-26 | 2014-10-30 | 天地融科技股份有限公司 | Information processing method and deciphering apparatus |
CN103236929A (en) * | 2013-04-26 | 2013-08-07 | 天地融科技股份有限公司 | Information processing method and encryption device |
CN103532960A (en) * | 2013-10-21 | 2014-01-22 | 上海合合信息科技发展有限公司 | Text encryption interaction method, encryption method and device, decryption method and device |
CN105844520A (en) * | 2015-01-13 | 2016-08-10 | 伍彬 | Electronic receipt generating and verifying method |
CN106033543A (en) * | 2015-03-11 | 2016-10-19 | 株式会社理光 | Document modification detecting method, original document manuscript providing device, duplicated document detecting device, and document modification detection system |
CN104993923A (en) * | 2015-07-02 | 2015-10-21 | 武汉大学 | Radar data protection method based on combination of information hiding and encryption techniques |
CN104993923B (en) * | 2015-07-02 | 2018-03-27 | 武汉大学 | The radar data guard method that a kind of Information hiding is combined with encryption technology |
CN104966116A (en) * | 2015-07-14 | 2015-10-07 | 苏州奥莱维信息技术有限公司 | Encrypted electronic seal based on two-dimension code |
CN104966116B (en) * | 2015-07-14 | 2018-08-07 | 苏州奥莱维信息技术有限公司 | The acquisition methods of encrypted electronic seal based on Quick Response Code |
CN108632663B (en) * | 2018-06-19 | 2021-02-02 | 西安中科深度生态环境科技有限责任公司 | Method and system for processing digitized audio/video and subtitles |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102073977A (en) | Methods and equipment for generating and authenticating digital signatures and digital signature system | |
CN105099692B (en) | Security verification method and device, server and terminal | |
CN101295343B (en) | Two-dimensional code multi-enciphering anti-fake printing method | |
US20110145576A1 (en) | Secure method of data transmission and encryption and decryption system allowing such transmission | |
CN105825257A (en) | Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof | |
CN101388776B (en) | Ciphering and deciphering method and device for printed written files | |
CN105450395A (en) | Information encryption and decryption processing method and system | |
WO2017016447A1 (en) | Two-dimensional code mask encryption and decryption method and system | |
CN112564906B (en) | Block chain-based data security interaction method and system | |
CN104052594A (en) | Bandwidth Efficient Method And System For Obscuring The Existence Of Encryption In A Communications Channel | |
CN104243149A (en) | Encrypting and decrypting method, device and server | |
CN102684877A (en) | Method and device for carrying out user information processing | |
JP2015213288A (en) | Optical code, information transmission method, and authentication method | |
Karthikeyan et al. | Enhanced security in steganography using encryption and quick response code | |
CN102404337A (en) | Data encryption method and device | |
CN1889419A (en) | Method and apparatus for realizing encrypting | |
CN102332978B (en) | Lottery ticket off-line verification system | |
CN110175471B (en) | File storage method and system | |
CN1949196A (en) | Method, device and system for storage data in portable device safely | |
CN109462620A (en) | One kind realizing password method for retrieving and system based on a variety of safety verification modes | |
Chaudhary et al. | An elucidation on steganography and cryptography | |
CN114936012A (en) | Method and device for realizing screen projection by encrypting and scanning two-dimensional code | |
KR101305576B1 (en) | Data transmission system and method and data decryption system and method for securely delivering of digital information | |
EP1691502A1 (en) | Information encryption transmission/reception method | |
WO2019066640A1 (en) | Method for secured offline transfer of documents via dynamic two-dimensional barcode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110525 |