Current location - Quotes Website - Signature design - How to sign online?
How to sign online?
technical realization of electronic signature

I. methods of realizing electronic signature

at present, electronic signature can be realized by various technical means. after confirming the exact identity of the signer, electronic signature admits that people can sign an electronic record in many different ways. The methods include: digital signature based on PKI public key cryptography; Identification mark based on biometric statistics; Identification of handprints, voice prints or retinal scans; A password code, password or personal identification PIN; that enables the recipient to identify the sender; Computers based on quantum mechanics and so on. However, it is mature, easy to use and operable, and the electronic signature technology widely used in advanced countries and China is based on PKI (Public Key Infrastructure).

1. Pattern recognition of handwritten signature or seal

Handwritten signature or seal is used as an image, which is converted by optical scanning and stored in the database. When this person is verified, it is input by optical scanning, and the corresponding image in the original database is called out, and compared by mathematical calculation method of pattern recognition to confirm the authenticity of the signature or seal. This method has been used in bank accounting counters, and it is proved that this method is not suitable for transmission on the Internet because of the need for large-capacity database storage and the difference of handwritten signature and seal every time.

2. Biometric technology

Biometric technology is a technology for identity authentication by using human biometrics. Biometrics is a unique representation that a person is different from others. It can be measured, automatically identified and verified. Biometric identification system samples biological features, extracts their unique features, digitizes them, converts them into digital codes, and further stores these codes into feature templates in the database. When people interact with the identification system for identity authentication, the identification system obtains their features and compares them with the feature templates in the database to determine whether they match or not, so as to decide whether to confirm or deny the person. Biometric technology mainly includes the following types:

(1) Fingerprint identification technology. Everyone's fingerprint skin lines are unique and will remain unchanged for life. By comparing his fingerprints with those stored in the database in advance, his true identity can be verified. On the premise of identity recognition, paper official documents or data messages can be signed by fingerprints or put in IC cards for signature. This kind of signature needs the support of large-capacity database, which is suitable for local face-to-face processing and not suitable for online transmission.

(2) retina recognition technology. Retinal recognition technology uses laser to illuminate the back of eyeball, scans and captures hundreds of retinal feature points, and forms a memory template after digital processing and stores it in the database for future comparison and verification. Retina is an extremely stable biological feature, and it is a highly accurate identification technology as identity authentication. However, it is difficult to use and is not suitable for direct digital signature and network transmission.

(3) voice recognition technology. Voice recognition technology is a kind of behavior recognition technology, which uses voice input equipment to measure and record the changes of voice waveform repeatedly, analyzes the frequency spectrum, and makes a voice template after digital processing and stores it. When in use, the sound collected in the field is accurately matched with the registered sound template to identify the identity. This technology is not suitable for direct digital signature and network transmission because of its poor accuracy and difficulty in use.

The above identification methods are suitable for face-to-face occasions, but not for remote network authentication and large-scale crowd authentication.