Signature method, device and system thereof

A technology of digital signature and intelligent key device, which is applied in the field of information security and can solve the problems of data has been tampered with and intercepted, digital signature fraudulently used, and the security of data and information cannot be guaranteed.

Active Publication Date: 2012-08-08
FEITIAN TECHNOLOGIES
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the above-mentioned signature process, the inventor found that at least the following problems exist in the prior art: before the data is signed inside the smart key device, the data is still processed by the host and then sent to the smart key device. If the host is invaded by hackers or viruses at this time, there is still the possibility that the data sent by the host to the smart key device has been tampered with and intercepted, which will easily lead to fraudulent use of the user's digital signature, so that the data cannot be guaranteed information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature method, device and system thereof
  • Signature method, device and system thereof
  • Signature method, device and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0119] In this embodiment, a signature method is specifically described by taking the case where the smart key device is a USB Key as an example. In the embodiment of the present invention, the review information identifier is pre-agreed among the client host, the USB Key and the server, wherein the above-mentioned USB Key has an output device and buttons, wherein the output device can be a liquid crystal display or can be It's a voice announcer.

[0120] Such as figure 1 As shown, the method includes:

[0121] 101. The client host establishes a connection with the USB Key, and waits for the transaction information input by the user.

[0122] 102. The client host receives the transaction information input by the user, and uses key fields in the transaction information to form review information.

[0123] In this embodiment, the key fields are: the account number, account name and amount transferred in the business data.

[0124] 103. The client host generates a transaction...

Embodiment 2

[0164] Corresponding to the method in Embodiment 1 above, this embodiment provides a client host to facilitate the implementation of the above method. Such as figure 2 As shown, the client host includes: connection module 21, receiving module 22, review information generating module 23, message generating module 24, sending module 25, review receiving module 26, signature sending module 27, error receiving module 28, cancel operation The sending module 29 verifies the receiving module 210 .

[0165] The connection module 21 is used to establish a connection with the smart key device, i.e. the USB Key; the receiving module 22 is used to receive the transaction information input by the user, and the transaction information contains key fields; the review information generation module 23 is used to The key field in the information generates review information; message generation module 24 is used for generating transaction message with described review information, review ...

Embodiment 3

[0182] This embodiment discloses a signature system, such as image 3 As shown, the system includes: client host 20 , USB Key 30 and server 40 .

[0183] After the above-mentioned client host 20, USB Key30 and server 40 have pre-agreed on the review information identifier, the client host 20 is used to establish a connection with the USB Key30 and receive the transaction information input by the user. The information contains key fields, after receiving the transaction information, generating review information according to the key fields in the transaction information, using the review information, review information identifier and transaction information to generate a transaction message, and then, Send the generated transaction message to USB Key30, and wait to receive the review feedback sent by USB Key30; USB Key30 is used to receive the transaction message sent by client host 20, and extract the review in the transaction message information, after extracting the re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a signature method, a device and a system thereof. The invention relates to the field of information safety, and settles a technical problem that the digital signature of the subscriber is pirated by other person in the prior art. In the embodiment of the invention, after a host computer receives the transaction information input by the user, the validation information is generated, the transaction message is generated with the validation information, etc. and furthermore the transaction message is transmitted to the USB Key. The USB Key receives the transactionmessage transmitted from the host computer, extracts the validation information in the transaction message and informs the user for checking the validation information. When a confirming signal transmitted from the user is received, the USB Key executes digital signature to the transaction message and transmits the digital signature to the host computer. A server is used for receiving the digitalsignature and the transaction message transmitted from the host computer and checks the digital signature. When the checking is successful, the server extracts the validation information from the transaction message and checks the extracted validation information. The embodiment of the invention is mainly applied for the aspect of information safety.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a signature method, device and system. Background technique [0002] At present, network file transmission and online banking transactions have become a part of people's life or work. Therefore, the security of the network has become the focus of people's attention. [0003] In order to ensure that network data will not be maliciously modified during transmission, digital signature technology has emerged. Digital signature technology is the technology for identity authentication. With the development and application of this technology, especially in the process of conducting transactions in online banking, the process of signing data has been developed to be carried out in an intelligent key device. The process of signing data in the smart key device mainly includes: before sending the data to the server, the host sends the data to the inside of the smart key device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56G06Q20/42G06Q40/02
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products