| With the rapid development and major change of international industrial structure,the trend of information technology innovation is more and more obvious.One of the most important fields of information technology innovation is information technology security.In the current market,the product model of information technology security is similar to build a wall outside the data assets and then use the wall to protect the data assets.Although this kind of product model could solve a large part of the problem at present,it does not resolve the issue fundamentally as it can't guarantee the security of the wall and not under attack.It is well known that integrity,availability,and confidentiality are the three key goals of computer system security,while integrity is the key to the three goals.Therefore,the digital signature system which based on block chain takes the integrity of data assets into consideration to ensure the safety of data assets by signing on it and verifying the signature.After fully understanding the process of digital signature and verification and also based on the results of previous research and communication with target user groups,the company developed a digital signature system based on block chain,which protects data assets through data signature and verification signature.Throughout the entire project,the author is mainly responsible for the collation of the needs of the project,to ensure the unity and integrity of the requirements.In addition,the author also controls the development and testing of center part function,the external provision of the SDK Java and the Web service,as well as the development and testing of Java between the core and other components of the interactive components.Among these jobs,the main focus is on the development and testing of control center functions,as well as the development and testing of the SDK Java and the Web Service,which provides external access.The system has reached the requirement of practical application.And multiple group of colleagues has been assigned in various companies for installation and configuration.As for March,according to the results of the reactions of various customer,there were no problems during operation and maintenance of the system.In addition,the configuration and logs file are clear.The operation is simple and conform to the habits of operators. |