CN105049213A - File signature method and device - Google Patents
File signature method and device Download PDFInfo
- Publication number
- CN105049213A CN105049213A CN201510446709.9A CN201510446709A CN105049213A CN 105049213 A CN105049213 A CN 105049213A CN 201510446709 A CN201510446709 A CN 201510446709A CN 105049213 A CN105049213 A CN 105049213A
- Authority
- CN
- China
- Prior art keywords
- digest value
- file destination
- encryption
- file
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 73
- 238000004364 calculation method Methods 0.000 claims abstract description 31
- 230000005540 biological transmission Effects 0.000 abstract description 11
- 230000000694 effects Effects 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 16
- 238000012545 processing Methods 0.000 description 12
- 238000004891 communication Methods 0.000 description 9
- 230000008569 process Effects 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 8
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000000712 assembly Effects 0.000 description 3
- 238000000429 assembly Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000009467 reduction Effects 0.000 description 3
- 230000011664 signaling Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The disclosure relates to a file signature method. The method is applied to a client and the method comprises the steps as follows: performing abstract calculation on a target file to obtain an abstract value of the target file; transmitting the abstract value to a server, wherein the abstract value is used by the server to encrypt the abstract value; receiving an encrypted abstract value from the server; and combining the encrypted abstract value into the target file. Therefore, the problem that the client needs to upload the whole target file to the server for file signature is solved, and the effects of reducing the information transmission amount between the client and the server and improving signature efficiency are achieved.
Description
Technical field
The disclosure relates to computer realm, particularly relates to file signature method and device.
Background technology
File signature technology can strengthen integrality and the fail safe of file transfer, has been widely used in the fields such as information transmission, information security, transactional services.File signature technology is based on client/server (C/S) framework.In correlation technique, client needs to upload whole file to be signed, to be signed by server to server.Because whole file to be signed uploaded by needs, thus cause the transmission speed between client and server slow, signature efficiency is low.
Summary of the invention
For overcoming Problems existing in correlation technique, the disclosure provides a kind of file signature method and device.
According to the first aspect of disclosure embodiment, provide a kind of file signature method, described method is applied to client, and described method comprises: carry out digest calculations to file destination, draws the digest value for described file destination; Send described digest value to server, described digest value is used for described server and is encrypted described digest value; The digest value after encryption is received from described server; And the digest value after described encryption is merged in described file destination.
In some possible execution modes of first aspect, described file destination comprises file to be signed and the information relevant with described file to be signed.
In some possible execution modes of first aspect, described digest calculations is carried out to file destination, draw the digest value for described file destination, comprising: utilize SHA-256 algorithm to carry out digest calculations to described file destination, generate the cryptographic Hash of 256 bytes; And the cryptographic Hash of described 256 bytes is defined as being the digest value for described file destination.
In some possible execution modes of first aspect, described digest value after described encryption to be merged in described file destination, to comprise: the afterbody digest value after described encryption being added to described file destination.
In some possible execution modes of first aspect, described method also comprises: receive public key information from described server, and described public key information is used for being decrypted the digest value after described encryption.
According to the second aspect of disclosure embodiment, provide a kind of file signature method, described method is applied to server, and described method comprises: receive the digest value for file destination from client; Described digest value is encrypted; And sending the digest value after encryption to described client, the digest value after described encryption is used for described client and is merged in described file destination by the digest value after described encryption.
In some possible execution modes of second aspect, described digest value is the cryptographic Hash of 256 bytes for described file destination.
In some possible execution modes of second aspect, described described digest value to be encrypted, to comprise: utilize the private key of described server to be encrypted described digest value; And described method also comprises: send public key information to described client, described public key information is used for being decrypted the digest value after described encryption.
According to the third aspect of disclosure embodiment, there is provided a kind of file signature device, described device is configured at client, and described device comprises: digest calculations module, be configured to carry out digest calculations to file destination, draw the digest value for described file destination; First sending module, is configured to send described digest value to server, and described digest value is used for described server and is encrypted described digest value; First receiver module, is configured to receive the digest value after encryption from described server; And summary merges module, is configured to the digest value after by described encryption and is merged in described file destination.
In some possible execution modes of the third aspect, described file destination comprises file to be signed and the information relevant with described file to be signed.
In some possible execution modes of the third aspect, described digest calculations module comprises: digest calculations submodule, is configured to utilize SHA-256 algorithm to carry out digest calculations to described file destination, generates the cryptographic Hash of 256 bytes; Summary determines submodule, is configured to the cryptographic Hash of described 256 bytes to be defined as being the digest value for described file destination.
In some possible execution modes of the third aspect, described summary merges module and comprises: summary merges submodule, is configured to the afterbody that the digest value after by described encryption adds described file destination to.
In some possible execution modes of the third aspect, described device also comprises: the second receiver module, is configured to receive public key information from described server, and described public key information is used for being decrypted the digest value after described encryption.
According to the fourth aspect of disclosure embodiment, provide a kind of file signature device, described device is configured at server, and described device comprises: the 3rd receiver module, is configured to receive for the digest value of file destination from client; Encrypting module, is configured to be encrypted described digest value; And second sending module, be configured to send the digest value after encryption to described client, the digest value after described encryption is used for described client and is merged in described file destination by the digest value after described encryption.
In some possible execution modes of fourth aspect, described digest value is the cryptographic Hash of 256 bytes for described file destination.
In some possible execution modes of fourth aspect, described encrypting module comprises: encryption submodule, is configured to utilize the private key of described server to be encrypted described digest value; And described device also comprises: the 3rd sending module, be configured to send public key information, described public key information is used for being decrypted the digest value after described encryption.
According to the 5th aspect of disclosure embodiment, provide a kind of file signature device, described device comprises: processor; For the memory of storage of processor executable instruction; Wherein, described processor is configured to: carry out digest calculations to file destination, draws the digest value for described file destination; Send described digest value to server, described digest value is used for described server and is encrypted described digest value; The digest value after encryption is received from described server; And the digest value after described encryption is merged in described file destination.
According to the 6th aspect of disclosure embodiment, provide a kind of file signature device, described device comprises: processor; For the memory of storage of processor executable instruction; Wherein, described processor is configured to: receive the digest value for file destination from client; Described digest value is encrypted; And sending the digest value after encryption to described client, the digest value after described encryption is used for described client and is merged in described file destination by the digest value after described encryption.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect:
By client, digest calculations is carried out to file destination, draw the digest value for described file destination, described digest value is sent to server, to be encrypted described digest value by described server, the digest value after encryption is received from described server, and the digest value after described encryption is merged in described file destination, client can be solved need to upload whole file destination to carry out the problem of file signature to server, reach the transmission of messages amount between reduction client and server, improve the effect of efficiency of signing.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in specification and to form the part of this specification, shows and meets embodiment of the present disclosure, and is used from specification one and explains principle of the present disclosure.
Fig. 1 is the structural representation of a kind of implementation environment according to an exemplary embodiment.
Fig. 2 is the flow chart of a kind of file signature method according to an exemplary embodiment.
Fig. 3 is the flow chart of a kind of file signature method according to another exemplary embodiment.
Fig. 4 is the flow chart of a kind of file signature method according to another exemplary embodiment.
Fig. 5 is the flow chart of a kind of file signature method according to another exemplary embodiment.
Fig. 6 is the flow chart of a kind of file signature method according to an exemplary embodiment.
Fig. 7 is the flow chart of a kind of file signature method according to another exemplary embodiment.
Fig. 8 is client according to an exemplary embodiment and the Signalling exchange figure between server.
Fig. 9 is the block diagram of a kind of file signature device according to an exemplary embodiment.
Figure 10 is the block diagram of a kind of file signature device according to another exemplary embodiment.
Figure 11 is the block diagram of a kind of file signature device according to another exemplary embodiment.
Figure 12 is the block diagram of a kind of file signature device according to another exemplary embodiment.
Figure 13 is the block diagram of a kind of file signature device according to an exemplary embodiment.
Figure 14 is the block diagram of a kind of file signature device according to another exemplary embodiment.
Figure 15 is the block diagram of a kind of file signature device according to an exemplary embodiment.
Figure 16 is the block diagram of a kind of file signature device according to an exemplary embodiment.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Execution mode described in following exemplary embodiment does not represent all execution modes consistent with the disclosure.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present disclosure are consistent.
Fig. 1 is the structural representation of a kind of implementation environment according to an exemplary embodiment.This implementation environment can comprise client 110, server 120 and user terminal 130.
Client 110 can be to provide information to be signed to server 120 and the information after signature is supplied to the computing equipment of user terminal 130, is that computer is illustrated with client 110 in Fig. 1.Server 120 can be that the information to be signed that can provide client 110 is encrypted and the information after encryption is returned to the computing equipment of client 110.User terminal 130 can be to obtain the information after signing from client 110 and the information after signature to be carried out to the electronic equipment of any type that signature identifies.In the disclosure, user terminal 130 can be such as smart mobile phone, panel computer, PC, notebook computer etc.That smart mobile phone is illustrated with user terminal 130 in Fig. 1.
Can be communicated by any wired or wireless network between client 110 with server 120 and between client 110 with user terminal 130.
Although figure 1 illustrates implementation environment to comprise a client 110, but implementation environment also can comprise multiple client 110, each client 110 can communicate with server 120, server 120 may be used for being encrypted the information to be signed from multiple client 110, afterwards, the information after encryption is returned to corresponding client 110.
Fig. 2 is the flow chart of a kind of file signature method according to an exemplary embodiment, and the method can be applied in client, such as, and the client 110 shown in Fig. 1.As shown in Figure 2, the method can comprise the following steps:
In step s 201, digest calculations is carried out to file destination, draw the digest value for file destination.
In the disclosure, file destination can comprise file to be signed, and wherein, file to be signed can be the file of arbitrary format, such as, and document files, multimedia file, executable file etc.By digest calculations algorithm, the digest value of file destination can be calculated.The digest value of file has uniqueness, and namely, the digest value of different file is different.
In step S202, to server forward abstract value, this digest value is used for server and is encrypted this digest value.Wherein, this server is such as the server 120 shown in Fig. 1.This server, after receiving digest value, can be encrypted this digest value, and the digest value after encryption is returned to client.
In step S203, receive the digest value after encryption from server.
In step S204, the digest value after encryption is merged in file destination.Digest value after encryption can be merged in file destination, in many ways to form signature file.Thus, the signature process to file destination is just completed.
In sum, by client, digest calculations is carried out to file destination, draw the digest value for file destination, to server forward abstract value, to be encrypted digest value by server, the digest value after encryption is received from server, and the digest value after encryption is merged in file destination, client can be solved need to upload whole file destination to carry out the problem of file signature to server, reach the transmission of messages amount between reduction client and server, improve the effect of efficiency of signing.
After completing the signature process to file destination, the signature file obtained (being made up of the digest value after file destination and encryption) can be sent to user terminal (such as by client, user terminal 130 shown in Fig. 1), identify to carry out signature by user terminal to signature file.
As mentioned above, file destination can comprise file to be signed, such as, and document files to be signed, multimedia file to be signed, executable file etc. to be signed.In another embodiment, file destination can comprise file to be signed and the information relevant with this file to be signed.Wherein, relevant with file to be signed information such as can comprise mark (ID) information of the operation platform about file to be signed, the id information about the operation chip of file to be signed, the version number about file to be signed, descriptive information etc. about file to be signed.Client can be relevant with file to be signed using these information together with file to be signed as file destination, then calculate the digest value of this file destination.Like this, the digest value calculated is the digest value for the file destination including file to be signed and the information relevant with this file to be signed.Afterwards, client can receive the digest value after encryption from server, and is merged in file destination by the digest value after this encryption, forms signature file, completes signature process.Afterwards, signature file can be supplied to user terminal by client.After user terminal correctly completes the signature identification to signature file, it can get file to be signed and the information relevant with file to be signed, thus be convenient to user when using file to be signed, the information relevant with file to be signed can also be checked, like this, can use by assisted user better.
Fig. 3 is the flow chart of a kind of file signature method according to another exemplary embodiment, and the method can be applied in client, such as, and the client 110 shown in Fig. 1.As shown in Figure 3, described digest calculations is carried out to file destination, show that the digest value (that is, step S201) for file destination can comprise:
In step S301, utilize SHA-256 (SHA-256) algorithm to carry out digest calculations to file destination, generate the cryptographic Hash of 256 bytes.
In step s 302, the cryptographic Hash of 256 generated bytes is defined as being the digest value for file destination.
By this mode, no matter the file size of file destination is how many, and can be determined the cryptographic Hash of 256 bytes for this file by SHA-256 algorithm, namely, the size of digest value is 256 bytes.By transmitting the digest value of 256 bytes to server, compared to the whole file destination of transmission, significantly transmission quantity can be reduced.Such as, the file of normally a few MB of file destination or even tens of MB, transmits the time that whole file destination needs to spend a few minutes or even dozens of minutes usually.But only transmit the digest value of 256 bytes, the transmission time can be greatly reduced, whole signature process spends several seconds and just can complete, and thus, signature efficiency is likely to rise dramatically.Particularly when the file destination of server to multiple client is signed, signature efficiency obviously promotes.
Fig. 4 is the flow chart of a kind of file signature method according to another exemplary embodiment, and the method can be applied in client, such as, and the client 110 shown in Fig. 1.As shown in Figure 4, described digest value after encryption is merged into (that is, step S204) in file destination and can comprises: in step S401, the digest value after encryption is added to the afterbody of file destination.Like this, not only can so that the digest value after encryption and file destination carry out combining to form signature file by client, reduce the complexity of signature process, but also can carry out signing in the process of identification to signature file in subsequent user terminal, be convenient to user terminal split the digest value part after the encryption in signature file and file destination part, thus the signature identifying operation of user terminal can be simplified, reduce the complexity of signature identifying.
Fig. 5 is the flow chart of a kind of file signature method according to another exemplary embodiment, and the method can be applied in client, such as, and the client 110 shown in Fig. 1.As shown in Figure 5, on the basis of the file signature method shown in Fig. 2, the method can also comprise:
In step S205, receive public key information from server, this public key information may be used for the digest value after to encryption and is decrypted.
Server, when being encrypted digest value, can adopt asymmetric encryption techniques, that is, server can use the private key of this server to be encrypted digest value, and this private key is only known to server.In this case, the PKI of server can be adopted to be decrypted digest value.Client can receive public key information from server, and this public key information may be used for the digest value after to encryption and is decrypted.Afterwards, signature file can be sent to user terminal by client together with this public key information, to be used this public key information to be decrypted the digest value after encryption by user terminal, thus completes signature identifying.
Fig. 6 is the flow chart of a kind of file signature method according to an exemplary embodiment, and the method can be applied in server, such as, and the server 120 shown in Fig. 1.As shown in Figure 6, the method can comprise the following steps:
In step s 601, the digest value for file destination is received from client (client 110 such as, shown in Fig. 1).
In step S602, digest value is encrypted.In the disclosure, multiple encryption algorithms can be adopted to be encrypted digest value.
In step S603, send the digest value after encryption to client, the digest value after this encryption is used for client and is merged in file destination by the digest value after this encryption.Like this, complete signature file can be formed at client place, complete signature process.
In sum, by receiving the digest value for file destination from client, digest value is encrypted, and send the digest value after encryption to client, digest value after this encryption may be used for client and is merged in file destination by the digest value after this encryption, to form complete signature file, can need to receive whole file destination to carry out the problem of file signature from client by settlement server, reach the transmission of messages amount between reduction client and server, improve the effect of efficiency of signing.
As mentioned above, client can utilize SHA-256 algorithm to carry out digest calculations to file destination.In this case, the digest value that server receives can for the cryptographic Hash for 256 bytes of file destination.By receiving the digest value of 256 bytes from client, compared to the whole file destination of reception, significantly can reduce the transmission of messages amount between client and server and transmission time, and then promote signature efficiency.
Fig. 7 is the flow chart of a kind of file signature method according to an exemplary embodiment, and the method can be applied in server, such as, and the server 120 shown in Fig. 1.As shown in Figure 7, describedly (that is, step S602) is encrypted to digest value can comprises: in step s 701, utilize the private key of server to be encrypted digest value.Further, the method can also comprise: in step s 604, sends public key information to client, and this public key information may be used for the digest value after to encryption and is decrypted.
In this embodiment, server can adopt asymmetric encryption techniques to be encrypted digest value.The private key of server and PKI form a double secret key.Server can utilize private key to be encrypted (such as to digest value, be encrypted by using RSA Algorithm), afterwards, digest value after encryption can be sent to client together with public key information by it, public key information can be sent to user terminal together with signature file by client after completing signature process, thus public key information is utilized to be decrypted the summary after encryption by user terminal.
Fig. 8 is client according to an exemplary embodiment and the Signalling exchange figure between server.Wherein, client-side is as the client 110 shown in for Fig. 1, and server is such as the server 120 shown in Fig. 1.Fig. 8 relates to above for client with for the part or all of step in one or more methods of server, and thus, its concrete signalling interactive process is not described in detail herein.
Fig. 9 is the block diagram of a kind of file signature device according to an exemplary embodiment, and this device can be configured at client, such as, and the client 110 shown in Fig. 1.With reference to Fig. 9, this device can comprise: digest calculations module 901, is configured to carry out digest calculations to file destination, draws the digest value for file destination; First sending module 902, is configured to server forward abstract value, and this digest value is used for server and is encrypted this digest value; First receiver module 903, is configured to receive the digest value after encryption from server; And summary merges module 904, be configured to the digest value after by encryption and be merged in file destination.
In one embodiment, file destination such as can comprise file to be signed and the information relevant with this file to be signed.
Figure 10 is the block diagram of a kind of file signature device according to another exemplary embodiment, and this device can be configured at client, such as, and the client 110 shown in Fig. 1.With reference to Figure 10, digest calculations module 901 can comprise: digest calculations submodule 1001, is configured to utilize SHA-256 algorithm to carry out digest calculations to file destination, generates the cryptographic Hash of 256 bytes; Summary determines submodule 1002, is configured to the cryptographic Hash of 256 generated bytes to be defined as being the digest value for file destination.
Figure 11 is the block diagram of a kind of file signature device according to another exemplary embodiment, and this device can be configured at client, such as, and the client 110 shown in Fig. 1.With reference to Figure 11, summary merges module 904 and can comprise: summary merges submodule 1101, is configured to the afterbody that the digest value after by encryption adds file destination to.
Figure 12 is the block diagram of a kind of file signature device according to another exemplary embodiment, and this device can be configured at client, such as, and the client 110 shown in Fig. 1.With reference to Figure 12, this device can also comprise: the second receiver module 905, is configured to receive public key information from server, and this public key information is used for the digest value after to encryption and is decrypted.
Figure 13 is the block diagram of a kind of file signature device according to an exemplary embodiment, and this device can be configured at server, such as, and the server 120 shown in Fig. 1.With reference to Figure 13, this device can comprise: the 3rd receiver module 1301, is configured to receive digest value for file destination from client; Encrypting module 1302, is configured to be encrypted digest value; And second sending module 1303, be configured to send the digest value after encryption to client, the digest value after this encryption is used for client and is merged in file destination by the digest value after this encryption.
In one embodiment, this digest value can be the cryptographic Hash of 256 bytes for file destination.
Figure 14 is the block diagram of a kind of file signature device according to another exemplary embodiment, and this device can be configured at server, such as, and the server 120 shown in Fig. 1.With reference to Figure 14, encrypting module 1302 can comprise: encryption submodule 1401, is configured to utilize the private key of server to be encrypted digest value; And this device can also comprise: the 3rd sending module 1304, be configured to send public key information to client, this public key information is used for the digest value after to encryption and is decrypted.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
Figure 15 is the block diagram of a kind of file signature device 1500 according to an exemplary embodiment.Such as, device 1500 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, flat-panel devices, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Figure 15, device 1500 can comprise following one or more assembly: processing components 1502, memory 1504, electric power assembly 1506, multimedia groupware 1508, audio-frequency assembly 1510, the interface 1512 of I/O (I/O), sensor cluster 1514, and communications component 1516.
The integrated operation of the usual control device 1500 of processing components 1502, such as with display, call, data communication, camera operation and record operate the operation be associated.Processing components 1502 can comprise one or more processor 1520 to perform instruction, to complete all or part of step of the above-mentioned file signature method for client side.In addition, processing components 1502 can comprise one or more module, and what be convenient between processing components 1502 and other assemblies is mutual.Such as, processing components 1502 can comprise multi-media module, mutual with what facilitate between multimedia groupware 1508 and processing components 1502.
Memory 1504 is configured to store various types of data to be supported in the operation of device 1500.The example of these data comprises for any application program of operation on device 1500 or the instruction of method, contact data, telephone book data, message, picture, video etc.Memory 1504 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, disk or CD.
The various assemblies that electric power assembly 1506 is device 1500 provide electric power.Electric power assembly 1506 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for device 1500 and be associated.
Multimedia groupware 1508 is included in the screen providing an output interface between described device 1500 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 1508 comprises a front-facing camera and/or post-positioned pick-up head.When device 1500 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 1510 is configured to export and/or input audio signal.Such as, audio-frequency assembly 1510 comprises a microphone (MIC), and when device 1500 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The audio signal received can be stored in memory 1504 further or be sent via communications component 1515.In certain embodiments, audio-frequency assembly 1510 also comprises a loud speaker, for output audio signal.
I/O interface 1512 is for providing interface between processing components 1502 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor cluster 1514 comprises one or more transducer, for providing the state estimation of various aspects for device 1500.Such as, sensor cluster 1514 can detect the opening/closing state of device 1500, the relative positioning of assembly, such as described assembly is display and the keypad of device 1500, the position of all right checkout gear 1500 of sensor cluster 1514 or device 1500 assemblies changes, the presence or absence that user contacts with device 1500, the variations in temperature of device 1500 orientation or acceleration/deceleration and device 1500.Sensor cluster 1514 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor cluster 1514 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor cluster 1514 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communications component 1516 is configured to the communication being convenient to wired or wireless mode between device 1500 and other equipment.Device 1500 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 1516 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communications component 1516 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 1500 can be realized, for performing the above-mentioned file signature method for client side by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as comprise the memory 1504 of instruction, above-mentioned instruction can perform the above-mentioned file signature method for client side by the processor 1520 of device 1500.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
Figure 16 is a kind of block diagram for file signature device 1600 according to an exemplary embodiment.Such as, device 1600 may be provided in a server.With reference to Figure 16, device 1600 comprises processing components 1622, and it comprises one or more processor further, and the memory resource representated by memory 1632, can such as, by the instruction of the execution of processing components 1622, application program for storing.The application program stored in memory 1632 can comprise each module corresponding to one group of instruction one or more.In addition, processing components 1622 is configured to perform instruction, to perform the above-mentioned file signature method for server side
Device 1600 can also comprise the power management that a power supply module 1626 is configured to final controlling element 1600, and a wired or wireless network interface 1650 is configured to device 1600 to be connected to network, and input and output (I/O) interface 1658.Device 1600 can operate the operating system based on being stored in memory 1632, such as WindowsServerTM, MacOSXTM, UnixTM, LinuxTM, FreeBSDTM or similar.
Those skilled in the art, at consideration specification and after putting into practice the disclosure, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Specification and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.
Claims (18)
1. a file signature method, is characterized in that, described method is applied to client, and described method comprises:
Digest calculations is carried out to file destination, draws the digest value for described file destination;
Send described digest value to server, described digest value is used for described server and is encrypted described digest value;
The digest value after encryption is received from described server; And
Digest value after described encryption is merged in described file destination.
2. method according to claim 1, is characterized in that, described file destination comprises file to be signed and the information relevant with described file to be signed.
3. method according to claim 1, is characterized in that, describedly carries out digest calculations to file destination, draws the digest value for described file destination, comprising:
Utilize SHA-256 algorithm to carry out digest calculations to described file destination, generate the cryptographic Hash of 256 bytes; And
The cryptographic Hash of described 256 bytes is defined as being the digest value for described file destination.
4. method according to claim 1, is characterized in that, is describedly merged in described file destination by digest value after described encryption, comprising:
Digest value after described encryption is added to the afterbody of described file destination.
5. the method according to claim arbitrary in claim 1-4, is characterized in that, described method also comprises:
Receive public key information from described server, described public key information is used for being decrypted the digest value after described encryption.
6. a file signature method, is characterized in that, described method is applied to server, and described method comprises:
The digest value for file destination is received from client;
Described digest value is encrypted; And
Send the digest value after encryption to described client, the digest value after described encryption is used for described client and is merged in described file destination by the digest value after described encryption.
7. method according to claim 6, is characterized in that, described digest value is the cryptographic Hash of 256 bytes for described file destination.
8. the method according to claim 6 or 7, is characterized in that, is describedly encrypted described digest value, comprising:
The private key of described server is utilized to be encrypted described digest value; And
Described method also comprises:
Send public key information to described client, described public key information is used for being decrypted the digest value after described encryption.
9. a file signature device, is characterized in that, described device is configured at client, and described device comprises:
Digest calculations module, is configured to carry out digest calculations to file destination, draws the digest value for described file destination;
First sending module, is configured to send described digest value to server, and described digest value is used for described server and is encrypted described digest value;
First receiver module, is configured to receive the digest value after encryption from described server; And
Summary merges module, is configured to the digest value after by described encryption and is merged in described file destination.
10. device according to claim 9, is characterized in that, described file destination comprises file to be signed and the information relevant with described file to be signed.
11. devices according to claim 9, is characterized in that, described digest calculations module comprises:
Digest calculations submodule, is configured to utilize SHA-256 algorithm to carry out digest calculations to described file destination, generates the cryptographic Hash of 256 bytes;
Summary determines submodule, is configured to the cryptographic Hash of described 256 bytes to be defined as being the digest value for described file destination.
12. devices according to claim 9, is characterized in that, described summary merges module and comprises:
Summary merges submodule, is configured to the afterbody that the digest value after by described encryption adds described file destination to.
13. devices according to claim arbitrary in claim 9-12, it is characterized in that, described device also comprises:
Second receiver module, be configured to receive public key information from described server, described public key information is used for being decrypted the digest value after described encryption.
14. 1 kinds of file signature devices, it is characterized in that, described device is configured at server, and described device comprise:
3rd receiver module, is configured to receive for the digest value of file destination from client;
Encrypting module, is configured to be encrypted described digest value; And
Second sending module, be configured to send the digest value after encryption to described client, the digest value after described encryption is used for described client and is merged in described file destination by the digest value after described encryption.
15. devices according to claim 14, is characterized in that, described digest value is the cryptographic Hash of 256 bytes for described file destination.
16. devices according to claims 14 or 15, it is characterized in that, described encrypting module comprises:
Encryption submodule, is configured to utilize the private key of described server to be encrypted described digest value; And
Described device also comprises:
3rd sending module, is configured to send public key information, and described public key information is used for being decrypted the digest value after described encryption.
17. 1 kinds of file signature devices, is characterized in that, described device comprises:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
Digest calculations is carried out to file destination, draws the digest value for described file destination;
Send described digest value to server, described digest value is used for described server and is encrypted described digest value;
The digest value after encryption is received from described server; And
Digest value after described encryption is merged in described file destination.
18. 1 kinds of file signature devices, is characterized in that, described device comprises:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
The digest value for file destination is received from client;
Described digest value is encrypted; And
Send the digest value after encryption to described client, the digest value after described encryption is used for described client and is merged in described file destination by the digest value after described encryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510446709.9A CN105049213A (en) | 2015-07-27 | 2015-07-27 | File signature method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510446709.9A CN105049213A (en) | 2015-07-27 | 2015-07-27 | File signature method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105049213A true CN105049213A (en) | 2015-11-11 |
Family
ID=54455436
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510446709.9A Pending CN105049213A (en) | 2015-07-27 | 2015-07-27 | File signature method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105049213A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105553651A (en) * | 2015-12-03 | 2016-05-04 | 小米科技有限责任公司 | Method and device for signature of disk mirror image files in Android system, and equipment |
CN105868647A (en) * | 2016-03-28 | 2016-08-17 | 乐视控股(北京)有限公司 | File signing system and method |
CN106685641A (en) * | 2016-12-23 | 2017-05-17 | 光锐恒宇(北京)科技有限公司 | Installation package signature method and device |
CN107204855A (en) * | 2017-07-14 | 2017-09-26 | 济南浪潮高新科技投资发展有限公司 | One kind is affixed one's seal method, service end, client and sealing system |
CN107391761A (en) * | 2017-08-28 | 2017-11-24 | 郑州云海信息技术有限公司 | A kind of data managing method and device based on data de-duplication technology |
CN107864039A (en) * | 2017-11-08 | 2018-03-30 | 深圳市金立通信设备有限公司 | A kind of application signature method, terminal and computer-readable recording medium |
CN107896151A (en) * | 2017-10-26 | 2018-04-10 | 方欣科技有限公司 | A kind of remote signing method and device |
CN108427888A (en) * | 2017-02-15 | 2018-08-21 | 阿里巴巴集团控股有限公司 | File signature method, file verification method and corresponding intrument and equipment |
CN109756344A (en) * | 2019-03-01 | 2019-05-14 | 广联达科技股份有限公司 | The digital signature and its verification method and device of a kind of document |
CN109981287A (en) * | 2019-03-14 | 2019-07-05 | 亚数信息科技(上海)有限公司 | A kind of code signature method and its storage medium |
CN111385101A (en) * | 2016-03-22 | 2020-07-07 | 阿里巴巴集团控股有限公司 | File transmission method and device |
CN113031626A (en) * | 2020-05-15 | 2021-06-25 | 东风柳州汽车有限公司 | Safety authentication method, device and equipment based on automatic driving and storage medium |
CN115987529A (en) * | 2023-01-31 | 2023-04-18 | 深圳市新国都支付技术有限公司 | APP signature method based on Hongmon system, electronic device and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020026583A1 (en) * | 2000-08-25 | 2002-02-28 | Harrison Keith Alexander | Document transmission techniques IV |
CN1445693A (en) * | 2002-03-19 | 2003-10-01 | 微软公司 | Safety digital data form and code forced implement policy |
US20040107348A1 (en) * | 2002-11-15 | 2004-06-03 | Canon Kabushiki Kaisha | Information processing apparatus, method therefor, computer program, and computer-readable storage medium |
CN1783781A (en) * | 2004-11-29 | 2006-06-07 | 株式会社日立制作所 | Digital-signed digital document exchange supporting method and information processor |
CN101364869A (en) * | 2007-08-09 | 2009-02-11 | 鸿富锦精密工业(深圳)有限公司 | Electronic document digital sign-off system and method |
-
2015
- 2015-07-27 CN CN201510446709.9A patent/CN105049213A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020026583A1 (en) * | 2000-08-25 | 2002-02-28 | Harrison Keith Alexander | Document transmission techniques IV |
CN1445693A (en) * | 2002-03-19 | 2003-10-01 | 微软公司 | Safety digital data form and code forced implement policy |
US20040107348A1 (en) * | 2002-11-15 | 2004-06-03 | Canon Kabushiki Kaisha | Information processing apparatus, method therefor, computer program, and computer-readable storage medium |
CN1783781A (en) * | 2004-11-29 | 2006-06-07 | 株式会社日立制作所 | Digital-signed digital document exchange supporting method and information processor |
CN101364869A (en) * | 2007-08-09 | 2009-02-11 | 鸿富锦精密工业(深圳)有限公司 | Electronic document digital sign-off system and method |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105553651A (en) * | 2015-12-03 | 2016-05-04 | 小米科技有限责任公司 | Method and device for signature of disk mirror image files in Android system, and equipment |
CN105553651B (en) * | 2015-12-03 | 2019-05-14 | 小米科技有限责任公司 | The endorsement method of disk mirroring file, device and equipment in Android system |
CN111385101A (en) * | 2016-03-22 | 2020-07-07 | 阿里巴巴集团控股有限公司 | File transmission method and device |
CN105868647A (en) * | 2016-03-28 | 2016-08-17 | 乐视控股(北京)有限公司 | File signing system and method |
WO2017166527A1 (en) * | 2016-03-28 | 2017-10-05 | 乐视控股(北京)有限公司 | File signature system and method |
CN106685641A (en) * | 2016-12-23 | 2017-05-17 | 光锐恒宇(北京)科技有限公司 | Installation package signature method and device |
CN108427888A (en) * | 2017-02-15 | 2018-08-21 | 阿里巴巴集团控股有限公司 | File signature method, file verification method and corresponding intrument and equipment |
CN107204855A (en) * | 2017-07-14 | 2017-09-26 | 济南浪潮高新科技投资发展有限公司 | One kind is affixed one's seal method, service end, client and sealing system |
CN107391761A (en) * | 2017-08-28 | 2017-11-24 | 郑州云海信息技术有限公司 | A kind of data managing method and device based on data de-duplication technology |
CN107391761B (en) * | 2017-08-28 | 2020-03-06 | 苏州浪潮智能科技有限公司 | Data management method and device based on repeated data deletion technology |
CN107896151A (en) * | 2017-10-26 | 2018-04-10 | 方欣科技有限公司 | A kind of remote signing method and device |
CN107864039A (en) * | 2017-11-08 | 2018-03-30 | 深圳市金立通信设备有限公司 | A kind of application signature method, terminal and computer-readable recording medium |
CN109756344A (en) * | 2019-03-01 | 2019-05-14 | 广联达科技股份有限公司 | The digital signature and its verification method and device of a kind of document |
CN109981287A (en) * | 2019-03-14 | 2019-07-05 | 亚数信息科技(上海)有限公司 | A kind of code signature method and its storage medium |
CN113031626A (en) * | 2020-05-15 | 2021-06-25 | 东风柳州汽车有限公司 | Safety authentication method, device and equipment based on automatic driving and storage medium |
CN115987529A (en) * | 2023-01-31 | 2023-04-18 | 深圳市新国都支付技术有限公司 | APP signature method based on Hongmon system, electronic device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105049213A (en) | File signature method and device | |
CN104243484B (en) | Information interacting method and device, electronic equipment | |
EP3151507A1 (en) | Methods and apparatuses for controlling device | |
CN104852911A (en) | Safety verification method, device and system | |
CN104955031A (en) | Information transmission method and device | |
CN104283876A (en) | Operation authorization method and device | |
CN104318741A (en) | Bluetooth device control method and device | |
CN104378801A (en) | Method and device for having access to wireless network | |
CN105119888A (en) | Plug-in installation package uploading method, plug-in installation package installing method and plug-in installation package uploading device | |
CN105471814A (en) | Account number management method and account number management device | |
CN105468767A (en) | Method and device for acquiring calling card information | |
CN104009837A (en) | Method and device for updating key and terminal | |
CN105208110A (en) | Resource control method and device | |
CN105138564A (en) | Data file reading method and apparatus | |
CN104766005A (en) | Management method and device for application software access authority | |
CN105162889A (en) | Device finding method and apparatus | |
CN104536935A (en) | Calculation displaying method, calculation editing method and device | |
CN103914541A (en) | Information search method and device | |
CN113868505A (en) | Data processing method, device, electronic device, server and storage medium | |
CN104837178A (en) | Network accessing method and device | |
CN105407070A (en) | Logging-in authorization method and device | |
CN104767857A (en) | Telephone calling method and device based on cloud name cards | |
CN104038537A (en) | Contact list information management method and device and mobile terminal | |
CN104869001A (en) | Short message authentication method and device | |
CN105282162A (en) | Processing method and device for account management business |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151111 |
|
RJ01 | Rejection of invention patent application after publication |