Tag:digital signature
-
C# / VB. Net to obtain the digital signature information of PDF documents
The digital signature in the document has non repudiation and can effectively prevent counterfeiting and tampering. The existing digital signature information in the document can be obtained through certain methods. The following describes how to realize it through program code. In the program, theSpire.PDF.dll, version: 6.11.6, you can download the package on the official website […]
-
Cryptography — elliptic curve edcsa digital signature and go language application
1. Generate a secret key pair and write it to the disk file 1. Use ECDSA to generate secret key pairs 2. Write the private key to disk Deserialization using x509 Put the obtained slice string into PEM In block structure Using PEM encoding 3. Write public key to disk Get the public key from […]
-
[100 examples of blockchain] (1) introduce blockchain and realize simple blockchain through go language
catalogue 1. European Cup and blockchain 2. Introduction to blockchain 2.1 concept 2.2 basic technology 2.2.1 hash operation 2.2.2 digital signature 2.2.3 P2P network 2.2.4 consensus algorithm 2.2.5 smart contract 2.3 features 2.3.1 transparency and credibility 2.3.2 tamper proof traceability 2.3.3 privacy security 2.3.4 high reliability of the system 3. Implement blockchain with simple code […]
-
What should we pay attention to when implementing external interfaces
Problems to be considered when making interfacesWhat is an interface An interface is nothing more than that the client requests your interface address, passes in a pile of parameters defined by the interface, and returns the data agreed by the interface and the corresponding data format through the logical processing of the interface itself. How […]
-
Windows cannot verify the digital signature of the driver required for this device. Recent hardware or software changes installed files may not be properly signed or corrupted, or may be malware from an unknown source. (code 52)
Gossip: the recording sound quality of the notebook microphone is very poor. Download womic and use the mobile phone as the notebook microphone through Bluetooth, USB (the best in the test sound quality USB) and WiFi. It is found that the driver of the womic installed on the computer has an exclamation mark,Tips: Windows cannot […]
-
Why does the hardware driver have WHQL digital signature
The hardware driver must have WHQL digital signature to realize normal installation, startup and operation, and silent installation of the driver. In the current desktop operating system, the market share of windows system is dominant, and the systems of various versions of Windows account for almost most of the market. Therefore, many industrial and industrial […]
-
12 common problems of code signature and driver signature
What is a code signing certificate? Code signing certificateCode signing certificates is a certification service that provides code software digital signatures for software developers.The code signature certificate can identify the source of the software and the true identity of the software developer through the digital signature of the code, so that your customers can trust […]
-
What is WHQL Microsoft logo certification? Why is this certification required?
According to Microsoft’s latest regulations, Microsoft no longer accepts EV code signature certificate as driver digital signature, but requires driver developers to apply for WHQL certification to solve the problem of driver signature.Next, Xiaobian will elaborate with you on the specific scheme of WHQL Microsoft driver signature. What is WHQL certification? WHQL certification, also known […]
-
The main tasks of cryptography
A series of articles: The main tasks of cryptography The concept of cryptosystem Cryptography is not only a method to provide information security, but also a collection of mathematical techniques. There is no doubt that cryptography mainly deals with information security, but in general, in many aspects of information security, cryptography mainly provides the following […]
-
Implementation of adding digital signature to Java pdf
After the digital signature of the document, people other than the author can not modify it. Therefore, adding digital signature to PDF document can ensure its security and authenticity. At the same time, according to the difference of added content, digital signature can be divided into text digital signature, picture digital signature, picture and text […]
-
Read the certificate in cryptography
Read the certificate in cryptography In the previous article, we talked about digital signature, the role of digital signature is to prevent tampering and camouflage, and to prevent denial. But in order to use digital signature technology correctly, there is a very big premise, that is, the public key used to verify the signature must […]
-
Bitcoin Trading (1)
In the bitcoin white paper, there are three key words that explain what transactions are. Although digital signatures partly solve the problem of e-cash system, it still needs the support of the third party to prevent double payment, then the system will lose its value of existence. An electronic currency is defined as a chain […]