[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN111698093B - Digital timestamp issuing and verifying method based on PKI system - Google Patents

Digital timestamp issuing and verifying method based on PKI system Download PDF

Info

Publication number
CN111698093B
CN111698093B CN202010531678.8A CN202010531678A CN111698093B CN 111698093 B CN111698093 B CN 111698093B CN 202010531678 A CN202010531678 A CN 202010531678A CN 111698093 B CN111698093 B CN 111698093B
Authority
CN
China
Prior art keywords
timestamp
digital
tsa
digital certificate
digital signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010531678.8A
Other languages
Chinese (zh)
Other versions
CN111698093A (en
Inventor
张恒
廖大见
于洋
张键
李宏然
袁冬青
焦文明
徐伟伟
朱雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Marine Resources Development Institute Of Jiangsu (lianyungang)
Jiangsu Ocean University
Original Assignee
Marine Resources Development Institute Of Jiangsu (lianyungang)
Jiangsu Ocean University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Marine Resources Development Institute Of Jiangsu (lianyungang), Jiangsu Ocean University filed Critical Marine Resources Development Institute Of Jiangsu (lianyungang)
Priority to CN202010531678.8A priority Critical patent/CN111698093B/en
Publication of CN111698093A publication Critical patent/CN111698093A/en
Application granted granted Critical
Publication of CN111698093B publication Critical patent/CN111698093B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a digital timestamp issuing and verifying method based on a PKI system, which comprises the following specific steps of: acquiring a digital certificate and a timestamp service provided by an authentication center; creating a message digest value of the medical record document based on a hash function; carrying out encryption operation on the message digest value by using private key data in the digital certificate according to an encryption principle to create a digital signature and sending the digital signature to a timestamp authority; decrypting the digital signature by using public key data in the digital certificate, and encrypting additional timestamp information in combination with private key data corresponding to the digital certificate to generate a new digital signature; the timestamp authority sends the new digital signature back to the sender along with its own digital certificate. The invention fully considers the time stamp authentication requirement of the medical record document digital signature, can better solve the problem that the time stamp authority possibly exists in the digital signature process and the user communicates with each other to change the credibility of the signature, and enhances the non-repudiation of the data.

Description

Digital timestamp issuing and verifying method based on PKI system
Technical Field
The invention relates to the field of digital signature information security, in particular to a digital timestamp issuing and verifying method based on a PKI system.
Background
With the increasing popularization of internet concepts in recent years, on the basis of meeting all diagnosis, treatment, laws and management requirements, the electronic medical records gradually replace the traditional paper medical records, and electronic management of personal health states and medical health care information is realized. The development of digital signature technology has been progressed, wherein the undeniability of the digital signature by the physician is one of the important roles of the digital signature. When a medical dispute occurs, evidence is necessary to verify the identity of the party or medical technician, but identity information alone is not sufficient because the responsible party or medical technician may tamper with the medical record content afterwards, and to prevent this, time stamp information approved by law and third parties must be added at the time of signature.
Much work has been focused on the process of issuing and verifying timestamps. For example, a simple time stamp issuing step includes three steps: the user sends a medical record document W to the timestamp authority TSA, which appends the current time T after W and the document' S unique identification ID to form a new electronic signature S, TSA and sends S to the user. However, the timestamp protocol is not feasible in implementation, and relates to the confidentiality problem of medical record documents W, the file integrity problem in the uploading and storing processes, the resource utilization problem caused by overlarge files, and the signature credibility problem that TSA and a user are fraudulently communicated possibly; based on the steps, relevant scholars improve, a TSA credible timestamp scheme is provided, the abstract value H of the document replaces the original medical record document W, and a digital signature technology is applied in the transmission process, so that the problems of confidentiality, integrity and resource utilization rate are solved well, but the problem that the credibility of the signature is changed due to the fact that a timestamp authority mechanism and a user are communicated in the digital signature process is not solved technically.
Disclosure of Invention
The invention aims to solve the problems in the prior art by providing a digital timestamp issuing and verifying method based on a PKI system.
In order to achieve the purpose, the invention provides the following technical scheme: a digital timestamp issuing and verifying method based on a PKI system comprises the following steps:
step (1): acquiring a digital certificate provided by a PKI (public key infrastructure) certification center CA and a timestamp service provided by a timestamp authority TSA (certificate of authority);
step (2): creating a message digest value h of the XML medical record document W based on a hash function;
step (1 a): a doctor applies for a digital certificate from a certificate authority CA to obtain a legal identity;
step (1 b): the CA center authorizes the TSA to provide a time stamp service, issues a digital certificate for the TSA and supervises the action of the TSA (the digital certificate of the TSA can be revoked if necessary);
and (3): encrypting the message digest value h by using private key data in the digital certificate according to an encryption principle to create a digital signature s ═ SIGDOctor (h), and sending (s, h) and the digital certificate to the TSA;
and (4): the TSA decrypts the digital signature S by using the public key data in the digital certificate, and adds timestamp information to encrypt the digital signature S in combination with the private key data corresponding to the digital certificate to generate a new digital signature S;
step (4 a): the TSA decrypts the received digital signature by using public key data in the digital certificate of the sender in combination with an encryption algorithm to obtain a message digest value H;
step (4 b): comparing the decrypted message digest value H with the original message digest value H; if not, sending error information to the requester; if the time t is equal to the time t, the serial number ID of the timestamp request and the message digest H, the whole data block formed by the accurate time t when the request is received, the serial number ID of the timestamp request and the message digest H is combined with a private key corresponding to the digital certificate to be encrypted to form a new digital signature S ═ SIGTSA(ID,H,t);
And (5): the TSA sends the new digital signature S and the digital certificate of the TSA back to the sender, and performs local saving and backup;
and (6): the sender verifies the credibility of the TSA digital timestamp through a PKI mechanism;
step (6 a): the sender verifies the credibility of the TSA digital certificate through a PKI mechanism, if the TSA digital certificate passes the verification, the credibility of the digital timestamp is verified, and the digital signature S with the timestamp is stored;
step (6 b): when the sender needs to verify the time when the XML medical record document W was produced, the PKI certificate authority CA can verify the authenticity of the timestamp using the public key in the TSA digital certificate to see if the document W is legally valid.
The invention has the beneficial effects that: the digital timestamp issuing and verifying method based on the PKI system fully considers the timestamp authentication requirement of medical record document digital signature, can better solve the problem that the credibility of signature is changed by the fact that a timestamp authority TSA communicates with a user in a digital signature process, and enhances the non-repudiation of data.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The following detailed description of the preferred embodiments of the present invention is provided to enable those skilled in the art to more readily understand the advantages and features of the present invention and to clearly and clearly define the scope of the invention.
Example 1: referring to fig. 1, the present invention provides a technical solution: a digital time stamp issuing and verifying method based on a PKI system comprises the following steps: the invention has the following implementation steps:
(1) acquiring a digital certificate provided by a PKI (public key infrastructure) certification center CA and a timestamp service provided by a timestamp authority TSA (certificate authority);
(1a) a doctor applies for a digital certificate to a certification authority CA to obtain a legal identity;
(1b) the CA center authorizes the TSA to provide a time stamp service, issues a digital certificate for the TSA and supervises the behavior of the TSA (the digital certificate of the TSA can be revoked if necessary);
(2) establishing a message abstract value h of the XML medical record document W based on a hash function;
(3) encrypting the message digest value h by using private key data in the digital certificate according to an encryption principle to create a digital signature s ═ SIGdotor (h), and sending (s, h) and the digital certificate to the TSA;
(4) the TSA decrypts the digital signature S by using the public key data in the digital certificate, and adds timestamp information to encrypt the digital signature S in combination with the private key data corresponding to the digital certificate to generate a new digital signature S;
(4a) the TSA decrypts the received digital signature by using public key data in the digital certificate of the sender in combination with an encryption algorithm to obtain a message digest value H;
(4b) comparing the decrypted message digest value H with the original message digest value H; if not, sending error information to the requester; if the time t is equal to the time t, the serial number ID of the timestamp request and the message digest H, the whole data block formed by the accurate time t when the request is received, the serial number ID of the timestamp request and the message digest H is combined with a private key corresponding to the digital certificate to be encrypted to form a new digital signature S ═ SIGTSA(ID,H,t);
(5) The TSA sends the new digital signature S and the digital certificate of the TSA back to the sender, and performs local saving and backup;
(6) the sender verifies the credibility of the TSA digital timestamp through a PKI mechanism;
(6a) the sender verifies the credibility of the TSA digital certificate through a PKI mechanism, if the verification is passed, the credibility of the digital timestamp is proved, and the digital signature S with the timestamp is stored;
(6b) when the sender needs to verify the time when the XML medical record document W is produced, the PKI certificate authority CA can verify the authenticity of the timestamp using the public key in the TSA digital certificate to see if the document W is legally valid.
In order to verify the effectiveness of the method in the patent, based on the digital timestamp issuing and verifying process, a medical record timestamp issuing and verifying system is designed by depending on a C # development environment and a Visual Studio2010 operation environment, and the core of the medical record timestamp issuing and verifying system is to provide timestamp service for medical staff and facilitate the timestamp adding of medical record documents. And the medical record timestamp adopts a streaming Socket as a transmission basis and performs packaging transmission on the information of the request and the response. The medical record timestamp system adopts a client/server structure, and medical staff can access a TSA service program of a server side through an IP address of a login server to obtain a signature timestamp or check the authenticity and the validity of the timestamp online.
The client program mainly provides an interface convenient for medical staff to operate so as to complete the request of the timestamp service and the processing of the timestamp response information. The medical record document to be stamped is subjected to abstract operation firstly, in order to ensure the transmission safety of data, an abstract value is signed, correct timestamp service request format data is formed finally and is sent to a server side, and then the medical record document is waited for processing. When the response information is returned, the correctness analysis and the integrity verification of the result data and the verification of the certificate credibility and the validity of the timestamp server are required, and finally the obtained data is correspondingly processed according to different applications.
The server-side program, i.e., the timestamp server, is the core of the whole system, so the system functions are mainly concentrated on the server side, and mainly include functions of responding to a client-side timestamp request, issuing a timestamp, storing timestamp information, and the like. The server side receives a plurality of users who receive the time stamp requests, and for safety, the server side has a plurality of keys for signature, and the key management module can safely and effectively manage the keys. The database module is used for saving the time stamp and other relevant information for receiving the request of the client time stamp verification in the future. The time source module can provide accurate and trusted time. The verification service module is responsible for verifying the identity of the requester and the like.
NET has been implemented to provide great convenience to encoding personnel, the namespace for implementing these algorithms is System security. The implementation of the hash function maps binary strings of arbitrary length to small binary strings of fixed length. The hash value is a unique and compact numerical representation of a piece of data, and if a piece of plaintext is hashed, one punctuation mark in the plaintext is changed, and the subsequent hash values generate different values. Therefore, it is computationally almost impossible to find two different inputs that are hashed to the same value. Therefore, the hash value of the data can verify the integrity of the data.
Public key cryptography uses a private key that is kept secret from unauthorized users and a public key. Data encrypted with the public key can only be decrypted with the private key, while data signed with the private key can only be verified with the public key. The public key can be used by anyone; the key is used to encrypt data to be sent to the holder of the private key.
The medical record timestamp issuing and verifying system mainly realizes the following functions. First, the use of a hash function to randomly generate a public key and a private key, the key being in the form of an XML extensible markup language, which identifies a document by dividing it into many parts, is a way to store data in a simple text format, meaning that it can be read by any computer, and returns a string of characters. Second, the required message digest MD is generated for the plaintext information to be encrypted. Thirdly, the generated private key d is used for carrying out encryption operation on the generated message digest according to the encryption principle of the SA algorithm, and a digital signature is obtained. Fourth, the identity of another entity is verified and the integrity of the data is protected. That is, when a message is digitally signed using public key data, the sender first applies a hash function to the message to create a digest of the message. The sender then encrypts the message digest using the sent private key to create a sender's personal signature, since this private key uniquely identifies the sender, and upon receipt of the message and signature, the recipient decrypts the signature using the sender's public key to recover the message digest and hashes the message using a uniform hashing algorithm used by the sender. If the message digest computed by the recipient exactly matches the message digest received from the sender, the recipient may determine that the message is from the sender.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention.

Claims (1)

1. A digital timestamp issuing and verifying method based on a PKI system is characterized by comprising the following steps:
step (1): acquiring a digital certificate provided by a PKI (public key infrastructure) certification center CA and a timestamp service provided by a timestamp authority TSA (certificate of authority);
step (1 a): a doctor applies for a digital certificate to a certification authority CA to obtain a legal identity;
step (1 b): the CA center authorizes the TSA to provide a timestamp service, issues a digital certificate for the TSA, and supervises the behavior of the TSA;
step (2): establishing a message abstract value h of the XML medical record document W based on a hash function;
and (3): encrypting the message digest value h by using private key data in the digital certificate according to an encryption principle to create a digital signature s ═ SIGdotor (h), and sending (s, h) and the digital certificate to the TSA;
and (4): the TSA utilizes public key data in the digital certificate to decrypt the digital signature S, and adds timestamp information to generate a new digital signature S by combining with the encryption of private key data corresponding to the digital certificate;
step (4 a): the TSA decrypts the received digital signature by using the public key data in the digital certificate of the sender in combination with an encryption algorithm to obtain a message digest value H;
step (4 b): comparing the decrypted message digest value H with the original message digest value H; if not, sending error information to the requester; if the time t is equal to the time t, the serial number ID of the timestamp request and the message digest H, the whole data block formed by the accurate time t when the request is received, the serial number ID of the timestamp request and the message digest H is combined with a private key corresponding to the digital certificate to be encrypted to form a new digital signature S ═ SIGTSA(ID,H,t);
And (5): the TSA sends the new digital signature S and the digital certificate of the TSA back to the sender, and performs local saving and backup;
and (6): the sender verifies the credibility of the TSA digital timestamp through a PKI mechanism;
step (6 a): the sender verifies the credibility of the TSA digital certificate through a PKI mechanism, if the verification is passed, the credibility of the digital timestamp is proved, and the digital signature S with the timestamp is stored;
step (6 b): when the sender needs to verify the time when the XML medical record document W was produced, the PKI certificate authority CA can verify the authenticity of the timestamp using the public key in the TSA digital certificate to see if the document W is legally valid.
CN202010531678.8A 2020-06-11 2020-06-11 Digital timestamp issuing and verifying method based on PKI system Active CN111698093B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010531678.8A CN111698093B (en) 2020-06-11 2020-06-11 Digital timestamp issuing and verifying method based on PKI system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010531678.8A CN111698093B (en) 2020-06-11 2020-06-11 Digital timestamp issuing and verifying method based on PKI system

Publications (2)

Publication Number Publication Date
CN111698093A CN111698093A (en) 2020-09-22
CN111698093B true CN111698093B (en) 2022-07-15

Family

ID=72480407

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010531678.8A Active CN111698093B (en) 2020-06-11 2020-06-11 Digital timestamp issuing and verifying method based on PKI system

Country Status (1)

Country Link
CN (1) CN111698093B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112465502A (en) * 2020-11-11 2021-03-09 中国农业银行股份有限公司上海市分行 Method for deploying digital time stamp offline
CN112395620B (en) * 2020-11-19 2024-01-30 四川泰富地面北斗科技股份有限公司 Trusted time stamp implementation method based on trusted time
CN113130031B (en) * 2021-05-18 2024-07-30 中南大学湘雅三医院 PKI-based inter-hospital electronic medical record interaction system, method, equipment and storage medium
CN113536391A (en) * 2021-06-29 2021-10-22 上海浩霖汇信息科技有限公司 Electronic certificate, digital certificate class black box authentication method, system and related products
CN114362955A (en) * 2021-12-01 2022-04-15 零信技术(深圳)有限公司 Software code cloud digital signature method, system, device and storage medium
CN114499875B (en) * 2021-12-31 2024-05-10 兴业消费金融股份公司 Service data processing method, device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375092A (en) * 2016-08-25 2017-02-01 杭州天谷信息科技有限公司 Digital certificate signature method for privacy protection
WO2017016318A1 (en) * 2014-11-05 2017-02-02 祝国龙 Credible label generation and verification method and system based on asymmetric cryptographic algorithm
CN106534115A (en) * 2016-11-10 2017-03-22 济南浪潮高新科技投资发展有限公司 Electronic medical record system design based on domestic cipher algorithm and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017016318A1 (en) * 2014-11-05 2017-02-02 祝国龙 Credible label generation and verification method and system based on asymmetric cryptographic algorithm
CN106375092A (en) * 2016-08-25 2017-02-01 杭州天谷信息科技有限公司 Digital certificate signature method for privacy protection
CN106534115A (en) * 2016-11-10 2017-03-22 济南浪潮高新科技投资发展有限公司 Electronic medical record system design based on domestic cipher algorithm and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于PKI技术的数字签名在办公网上的实现;袁珍珍等;《计算机与数字工程》;20100220(第02期);全文 *

Also Published As

Publication number Publication date
CN111698093A (en) 2020-09-22

Similar Documents

Publication Publication Date Title
CN111698093B (en) Digital timestamp issuing and verifying method based on PKI system
US12058115B2 (en) Systems and methods for Smartkey information management
US6819766B1 (en) Method and system for managing keys for encrypted data
US7702107B1 (en) Server-based encrypted messaging method and apparatus
WO2019052286A1 (en) User identity verification method, apparatus and system based on blockchain
WO2014086166A1 (en) Method and system for preventively preserving electronic data
US20100005318A1 (en) Process for securing data in a storage unit
US20070118732A1 (en) Method and system for digitally signing electronic documents
CN108924107B (en) Verifiable method for block chain remote medical data calling
CN109257180A (en) A kind of method and device for depositing card based on the intellectual property file of block chain
US20090254749A1 (en) Cooperation method and system of hardware secure units, and application device
JP2010148098A (en) Method and system for transient key digital stamp
KR20050037244A (en) Device authentication method using certificate and digital content processing device using the method
Dessy The code makers
CN112583772A (en) Data acquisition and storage platform
JP2007060352A (en) System, program, and method for managing document
WO2021027982A1 (en) System and method for electronic signature creation and management for long-term archived documents
CN115277093B (en) Tamper verification method, tamper verification system, tamper verification device and electronic equipment
CN113691495B (en) Network account sharing and distributing system and method based on asymmetric encryption
CN114117499A (en) Authority management based trusted data exchange method
Chokhani et al. PKI and certificate authorities
KR100654933B1 (en) System and its method for authenticating dynamically created certificate by user's password input
TWI311429B (en) System and method for signing electronic documents automatically
JP5159752B2 (en) Communication data verification device and computer program therefor
Akshaya et al. Preserving and Sharing Of Medical Data Using Blockchain Technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant