[go: up one dir, main page]

CN115496492A - UKey-based digital signature method - Google Patents

UKey-based digital signature method Download PDF

Info

Publication number
CN115496492A
CN115496492A CN202211109770.0A CN202211109770A CN115496492A CN 115496492 A CN115496492 A CN 115496492A CN 202211109770 A CN202211109770 A CN 202211109770A CN 115496492 A CN115496492 A CN 115496492A
Authority
CN
China
Prior art keywords
ukey
user
transaction
digital signature
cfca
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211109770.0A
Other languages
Chinese (zh)
Inventor
钟鸿敏
石标
孔彪
徐�明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Simple Information Technology Guangzhou Co ltd
Original Assignee
Simple Information Technology Guangzhou Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Simple Information Technology Guangzhou Co ltd filed Critical Simple Information Technology Guangzhou Co ltd
Priority to CN202211109770.0A priority Critical patent/CN115496492A/en
Publication of CN115496492A publication Critical patent/CN115496492A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a digital signature method based on UKey. The method comprises the following steps: before a system carries out transaction operation, binding a user of the system and a UKey used by the user; when the user carries out transaction operation through a UKey, firstly checking whether the user and the UKey used by the user are in a binding relationship, if so, checking to pass and allowing the user to carry out transaction operation, and if not, checking to fail and not allowing the user to carry out transaction operation; and analyzing a digital certificate in the UKey used by the user through the CFCA control at the front end of the system, and carrying out digital signature on the transaction operation of the user according to the digital certificate. The technical scheme of the invention realizes that not only can the real intention of the transaction operation of the user be verified, but also the digital signature can be carried out according to the real intention of the transaction.

Description

UKey-based digital signature method
Technical Field
The invention relates to the technical field of digital signatures, in particular to a UKey-based digital signature method.
Background
When the enterprise-level system performs transaction operation, the occurrence of transaction operation people who deny the transaction operation is often encountered, and the system does not leave evidence of the client transaction, so that legal disputes frequently occur. To ensure the security of enterprise-level system transactions, it is generally necessary to refer to a CA authentication tool to verify the true willingness of a customer to transact. The current enterprise-level CA authentication method comprises the following steps: the CA method can be only used as a certificate of a client's true intention, but cannot be used for digital signature, and has no evidence chain trace. Therefore, a technical scheme capable of ensuring the embodiment of the real desire of the transaction of the client and generating a transaction digital signature is urgently needed.
Disclosure of Invention
The invention provides a UKey-based digital signature method, which can verify the real intention of user transaction operation and carry out digital signature aiming at the real intention of the transaction.
An embodiment of the present invention provides a digital signature method based on a UKey, including the following steps:
before a system carries out transaction operation, binding a user of the system and a UKey used by the user;
when the user carries out transaction operation through a UKey, firstly checking whether the user and the UKey used by the user are in a binding relationship, if so, checking to pass and allowing the user to carry out transaction operation, and if not, checking to fail and not allowing the user to carry out transaction operation;
and analyzing a digital certificate in the UKey used by the user through the CFCA control at the front end of the system, and carrying out digital signature on the transaction operation of the user according to the digital certificate.
Further, the binding of the user of the system and the UKey used by the user specifically includes:
and implanting the digital certificate into the UKey of the user through the CFCA control, and storing the binding relationship between the user and the UKey into a CFCA database.
Further, the binding relationship includes a name of the enterprise of the user, an enterprise social credit code, a serial number of the UKey, and a CN code of the UKey.
Further, whether the user and the UKey used by the user are in a binding relationship or not is verified through a real name authentication interface of the CFCA control.
Further, the checking whether the user and the UKey used by the user are in a binding relationship includes the following steps:
acquiring the name and the social credit code of the enterprise of the user, and the serial number and the CN code of the UKey used by the user;
and inquiring the CFCA database according to the acquired enterprise social credit code, the serial number of the UKey and the CN code of the UKey, if a corresponding inquiry result exists, the verification is passed, and if a corresponding inquiry result does not exist, the verification is not passed.
Further, the step of digitally signing the current transaction operation of the user includes the following steps:
splicing the transaction data of the user at this time into plaintext information in a message mode, and digitally signing the plaintext information according to the digital certificate to generate an electronic signature string;
and binding the electronic signature string and the transaction data and then storing the bound electronic signature string and the transaction data into a transaction authentication table of the CFCA database.
Further, the transaction data includes a party involved in the transaction, a transaction time, a transaction scenario, and an authentication method.
Further, after the electronic signature string is generated, the transaction evidence chain information is stored in the CFCA database.
Further, the digital certificate digitally signs the plaintext information by using a sha256 algorithm and generates an electronic signature string.
The embodiment of the invention has the following beneficial effects:
the invention provides a digital signature method based on UKey, which uses UKey as CA tool, before transaction of user, binds UKey for user, and stores the binding relation between user and UKey into CFCA database (i.e. storing a binding record between user and UKey in CFCA database). When a user carries out transaction, a network real-name authentication interface of CFCA is utilized to verify whether the UKey is bound with the user, namely, in a transaction scene, only the UKey inserted in the transaction needs to be judged, whether the UKey is bound with a login user successfully or not, the UKey which is not bound successfully is directly subjected to transaction authentication interception, and the transaction message is digitally signed through a front-end CFCA control aiming at the real intention of the user during transaction. Therefore, the invention realizes that the real intention of the transaction operation of the user can be verified by checking the binding relationship between the user and the UKey during the transaction by establishing the binding relationship between the user and the UKey in advance, and then the digital certificate in the UKey used by the user is analyzed by the CFCA control to realize the digital signature aiming at the real intention of the transaction. The invention can verify the real willingness of the user to trade and can also digitally sign, thereby ensuring the safety of the trade, being traceable from the perspective of legal events and avoiding legal disputes and right maintenance cost. Meanwhile, the UKey tool is convenient for enterprise users to obtain, and the application cost of the technical scheme is reduced.
Drawings
Fig. 1 is a schematic flow chart of a digital signature method based on a UKey according to an embodiment of the present invention.
Detailed Description
The technical solutions in the present invention will be described clearly and completely with reference to the drawings in the present invention, and it should be apparent that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
As shown in fig. 1, a digital signature method based on a UKey according to an embodiment of the present invention includes the following steps:
step S101: before a system carries out transaction operation, the users of the system and UKey used by the users are bound.
As one embodiment, the binding the user of the system and the UKey used by the user specifically includes:
and implanting the digital certificate into the UKey of the user through the CFCA control, and storing the binding relationship between the user and the UKey into a CFCA database.
The binding relationship comprises the name of the user's enterprise, an enterprise social credit code, a UKey serial number, and a UKey CN code.
Step S102: when the user carries out transaction operation through the UKey, whether the user and the UKey used by the user are in a binding relationship is checked, if yes, the user is passed through the checking and allowed to carry out transaction operation, and if not, the user is not passed through the checking and not allowed to carry out transaction operation.
As one embodiment, whether the user and the UKey used by the user are in a binding relationship is checked through a real name authentication interface of the CFCA control.
The checking whether the user and the UKey used by the user are in a binding relationship comprises the following steps:
acquiring the name and the social credit code of the enterprise of the user, and the serial number of the UKey and the CN code of the UKey used by the user;
and inquiring the CFCA database according to the acquired enterprise social credit code, the serial number of the UKey and the CN code of the UKey, if a corresponding inquiry result exists, the verification is passed, and if a corresponding inquiry result does not exist, the verification is not passed.
Step S103: and analyzing a digital certificate in the UKey used by the user through the CFCA control at the front end of the system, and carrying out digital signature on the transaction operation of the user according to the digital certificate.
As an embodiment, the digitally signing the transaction operation of the user at this time includes the following steps:
splicing the current transaction data of the user into plaintext information in a message mode, and digitally signing the plaintext information according to the digital certificate to generate an electronic signature string; the digital certificate digitally signs the plaintext information by adopting a sha256 algorithm and generates an electronic signature string.
And binding the electronic signature string and the transaction data and then storing the bound electronic signature string and the transaction data into a transaction authentication table of the CFCA database. The transaction data comprises the participants of the transaction, the transaction time, the transaction scene and the authentication mode.
As an embodiment, after the electronic signature string is generated, the transaction evidence chain information is stored in the CFCA database. The evidence chain information of the transaction refers to plaintext information of transaction operation, and specifically includes enterprise, user, time, specific product, service scene, used authentication mode and authentication result corresponding to the transaction operation.
In order to provide a CA method which can verify the real intention of a client transaction operation and digitally sign the intention of the client transaction, a novel reference UKey is created by my company to solve the problem.
The UKey is used as a CA tool, before a user conducts transaction, the UKey is bound for the user, and the binding relation between the user and the UKey is stored in a CFCA database (namely, a binding record of the user and the UKey is stored in the CFCA database). When a user carries out transaction, a network real-name authentication interface of CFCA is utilized to verify whether the UKey is bound with the user, namely, in a transaction scene, only the UKey inserted in the transaction needs to be judged, whether the UKey is bound with a login user successfully or not, the UKey which is not bound successfully is directly subjected to transaction authentication interception, and the transaction message is digitally signed through a front-end CFCA control aiming at the real intention of the user during transaction. Therefore, the invention realizes that the real intention of the transaction operation of the user can be verified by checking the binding relationship between the user and the UKey during the transaction by establishing the binding relationship between the user and the UKey in advance, and then the digital certificate in the UKey used by the user is analyzed by the CFCA control to realize the digital signature aiming at the real intention of the transaction. The invention can verify the real willingness of the user to trade and can also digitally sign, thereby ensuring the safety of the trade, being traceable from the perspective of legal events and avoiding legal disputes and right maintenance cost. Meanwhile, the UKey tool is convenient for enterprise users to obtain, and the application cost of the technical scheme is reduced.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention.
It will be understood by those skilled in the art that all or part of the processes of the above embodiments may be implemented by hardware related to instructions of a computer program, and the computer program may be stored in a computer readable storage medium, and when executed, may include the processes of the above embodiments. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.

Claims (9)

1. A UKey-based digital signature method is characterized by comprising the following steps:
before a system carries out transaction operation, binding a user of the system and a UKey used by the user;
when the user carries out transaction operation through a UKey, firstly checking whether the user and the UKey used by the user are in a binding relationship, if so, checking to pass and allowing the user to carry out transaction operation, and if not, checking to fail and not allowing the user to carry out transaction operation;
and analyzing a digital certificate in the UKey used by the user through the CFCA control at the front end of the system, and carrying out digital signature on the transaction operation of the user according to the digital certificate.
2. The UKey-based digital signature method according to claim 1, wherein the binding of the user of the system and the UKey used by the user is specifically:
and implanting the digital certificate into the UKey of the user through the CFCA control, and storing the binding relationship between the user and the UKey into a CFCA database.
3. The UKey-based digital signature method of claim 2, wherein the binding relationship comprises the name of the user's business, a business social credit code, a UKey serial number, and a UKey CN code.
4. The UKey-based digital signature method according to claim 3, wherein the real-name authentication interface of the CFCA control is used to verify whether the user and the UKey used by the user are in a binding relationship.
5. The UKey-based digital signature method according to claim 4, wherein the checking whether the user and the UKey used by the user are in a binding relationship comprises the following steps:
acquiring the name and the social credit code of the enterprise of the user, and the serial number of the UKey and the CN code of the UKey used by the user;
and inquiring the CFCA database according to the acquired enterprise social credit code, the serial number of UKey and the CN code of UKey, if corresponding inquiry results exist, the verification is passed, and if corresponding inquiry results do not exist, the verification is not passed.
6. A UKey-based digital signature method as defined in claim 5 in which the digital signature of the transaction operation of the user includes the following steps:
splicing the current transaction data of the user into plaintext information in a message mode, and digitally signing the plaintext information according to the digital certificate to generate an electronic signature string;
and binding the electronic signature string and the transaction data and then storing the bound electronic signature string and the transaction data into a transaction authentication table of the CFCA database.
7. The UKey-based digital signature method of claim 6, wherein the transaction data includes parties to a transaction, transaction time, transaction scenario and authentication method.
8. The UKey-based digital signature method according to claim 7, wherein after the electronic signature string is generated, transaction evidence chain information is saved in the CFCA database.
9. The UKey-based digital signature method of any one of claims 1 to 8, wherein the digital certificate digitally signs the plaintext information using the sha256 algorithm and generates an electronic signature string.
CN202211109770.0A 2022-09-13 2022-09-13 UKey-based digital signature method Pending CN115496492A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211109770.0A CN115496492A (en) 2022-09-13 2022-09-13 UKey-based digital signature method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211109770.0A CN115496492A (en) 2022-09-13 2022-09-13 UKey-based digital signature method

Publications (1)

Publication Number Publication Date
CN115496492A true CN115496492A (en) 2022-12-20

Family

ID=84468019

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211109770.0A Pending CN115496492A (en) 2022-09-13 2022-09-13 UKey-based digital signature method

Country Status (1)

Country Link
CN (1) CN115496492A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556449A (en) * 2004-01-08 2004-12-22 中国工商银行 Device and method for proceeding encryption and identification of network bank data
US20090198618A1 (en) * 2008-01-15 2009-08-06 Yuen Wah Eva Chan Device and method for loading managing and using smartcard authentication token and digital certificates in e-commerce
CN112905979A (en) * 2021-02-16 2021-06-04 中企云链(北京)金融信息服务有限公司 Electronic signature authorization method and device, storage medium and electronic device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556449A (en) * 2004-01-08 2004-12-22 中国工商银行 Device and method for proceeding encryption and identification of network bank data
US20090198618A1 (en) * 2008-01-15 2009-08-06 Yuen Wah Eva Chan Device and method for loading managing and using smartcard authentication token and digital certificates in e-commerce
CN112905979A (en) * 2021-02-16 2021-06-04 中企云链(北京)金融信息服务有限公司 Electronic signature authorization method and device, storage medium and electronic device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
薛光辉: "《区块链与人工智能的应用于发展路径研究》", 31 October 2020, 吉林科学技术出版社, pages: 121 - 4 *

Similar Documents

Publication Publication Date Title
CN110633963B (en) Electronic bill processing method, electronic bill processing device, computer readable storage medium and computer readable storage device
US9864983B2 (en) Payment method, payment server performing the same and payment system performing the same
KR101952498B1 (en) Loan service providing method using black chain and system performing the same
CN109547206B (en) Digital certificate processing method and related device
US9697519B2 (en) Multi-layer transaction tracking and encryption
CN106850693B (en) Real-name authentication method and real-name authentication system
US20120172067A1 (en) System and method for verifying a sender of an sms text message
CN107256479B (en) Transaction mode classification execution method and device
CN113592625A (en) Credit report generation method and device and electronic equipment
US20080162355A1 (en) System and method for helping and verifying a signer to sign electronic orders
CN106934621A (en) The examination & approval safety certifying method and system of payment funding
CN110889146B (en) Electronic signature method, device and storage medium
CN110955906A (en) Method and system for managing personal data authorization
US20150206143A1 (en) Line item processing in a multi-layer transaction tracking system
CN113221090A (en) Financial system digital certificate management method, device and system based on block chain
US20060021011A1 (en) Identity access management system
CN115496492A (en) UKey-based digital signature method
US9607300B2 (en) Multi-layer transaction tracking
CN112270416B (en) After-sales service information processing method and system
CN109327445A (en) Administrator's identity authentication method, device, server and storage medium
JP2024008654A (en) Program, information processing device, and information processing method
CN114549011A (en) Method and device for binding bank card
CN107483210B (en) Data verification method and system
CN111445336A (en) Data processing method and data processing system
CN117395664B (en) Method, system, device, electronic device and storage medium for establishing association relationship

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20221220

RJ01 Rejection of invention patent application after publication