Secure digital signature method
A secure digital and digital signature technology, applied in the field of information security, can solve problems such as limiting the scope of application of usbkeys and English character sizes, and achieve the effect of improving security and maintainability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058]The usbkey in this embodiment has built-in SHA1 (Secure Hash Algorithm) and RSA algorithms. The usbkey receives instructions from the client host, and the received instructions are generally in APDU (Application Protocol Data Unit) format, and the usbkey completes various operations according to the instructions. The middleware used with the usbkey is installed in the client host, and it provides the Crypto API interface defined by Microsoft to upper-layer applications (such as IE browser). When the upper application program calls the interface, the middleware generates the corresponding APDU command and sends it to the usbkey to notify the usbkey to operate. see figure 1 , Embodiment 1 of the present invention provides a secure digital signature method, the method comprising:
[0059] Step 101. The client host sends a transaction request and transaction information to the transaction server;
[0060] In the embodiment of the present invention, the client host, as the...
Embodiment 2
[0130] The usbkey in this embodiment receives instructions from the client host, and the received instructions are generally in APDU (Application Protocol Data Unit) format, and the usbkey completes various operations according to the instructions. The middleware used with usbkey is installed in the client host, and it provides PKCS#11 interface to upper-level applications (such as FireFox). When the upper application program calls the interface, the middleware generates the corresponding APDU command and sends it to the usbkey to notify the usbkey to operate. see figure 1 , Embodiment 2 of the present invention provides a secure digital signature method, the method comprising:
[0131] Step 201. The upper application program in the client host sends a transaction request and transaction information to the transaction server;
[0132] In the embodiment of the present invention, the client host, as the transaction client, submits the user's transaction request and transaction...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 