Digital signature method based on CSK
A digital signature and digital technology, applied in the field of information security, can solve the problems of slow speed and high cost of digital signature and signature file verification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The following describes the implementation steps for users to digitally sign files and verify signatures with reference to the accompanying drawings:
[0038] figure 1 : Explain the process of the user digitally signing the file. First, the user J inserts the cryptographic key hardware device on the client side, clicks the button of digitally signing the file on the client computer, and the client computer generates a time stamp 1 and a random number 1. Input the file, time stamp 1 and random number 1 together into the chip of the password key, and use the "digest" algorithm such as: HASH function to "digest" the file to obtain the digital "fingerprint 1" of the file, and the client computer in the password key chip Based on the combined symmetric key generation algorithm composed of timestamp 1 and random number 1, the terminal encryption system selects N elements from the "key seed" table of user J, and synthesizes a set of symmetric keys K1, using the symmetric key ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com