Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure digital signature method

A secure digital and digital signature technology, applied in the field of information security, can solve problems such as limiting the scope of application of usbkeys and English character sizes, and achieve the effect of improving security and maintainability

Active Publication Date: 2012-06-27
FEITIAN TECHNOLOGIES
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are at least the following problems in this kind of usbkey now: the current usbkey with display function usually has a huge built-in font library to ensure that the transaction information can be completely and correctly output; at the same time, the usbkey may also be required to have some word processing functions, such as English Varying character sizes, word wrapping, etc.
These problems limit the scope of application of usbkey

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure digital signature method
  • Secure digital signature method
  • Secure digital signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058]The usbkey in this embodiment has built-in SHA1 (Secure Hash Algorithm) and RSA algorithms. The usbkey receives instructions from the client host, and the received instructions are generally in APDU (Application Protocol Data Unit) format, and the usbkey completes various operations according to the instructions. The middleware used with the usbkey is installed in the client host, and it provides the Crypto API interface defined by Microsoft to upper-layer applications (such as IE browser). When the upper application program calls the interface, the middleware generates the corresponding APDU command and sends it to the usbkey to notify the usbkey to operate. see figure 1 , Embodiment 1 of the present invention provides a secure digital signature method, the method comprising:

[0059] Step 101. The client host sends a transaction request and transaction information to the transaction server;

[0060] In the embodiment of the present invention, the client host, as the...

Embodiment 2

[0130] The usbkey in this embodiment receives instructions from the client host, and the received instructions are generally in APDU (Application Protocol Data Unit) format, and the usbkey completes various operations according to the instructions. The middleware used with usbkey is installed in the client host, and it provides PKCS#11 interface to upper-level applications (such as FireFox). When the upper application program calls the interface, the middleware generates the corresponding APDU command and sends it to the usbkey to notify the usbkey to operate. see figure 1 , Embodiment 2 of the present invention provides a secure digital signature method, the method comprising:

[0131] Step 201. The upper application program in the client host sends a transaction request and transaction information to the transaction server;

[0132] In the embodiment of the present invention, the client host, as the transaction client, submits the user's transaction request and transaction...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure digital signature method, belonging to the field of information security. The method comprises the following steps: a client host sends trading information to a trading server; the trading server generates video and / or audio trading confirmation data based on the trading information; the client host assigns a signature command and the trading confirmation data to a usbkey; the usbkey outputs the trading confirmation data, and waits for a confirmation signal; if the usbkey receives the confirmation signal, the digital signature operation is carried out on the trading confirmation data; and a digital signature result is returned to the trading server by the client host, and the trading server executes the trading operation after the digital signature result is verified to be accurate.

Description

technical field [0001] The invention relates to the field of information security, in particular to a secure digital signature method. Background technique [0002] The promotion of online banking has facilitated people's lives, but because online banking transactions need to be carried out through the network, there are security risks in online banking transactions, and criminals' attack methods against online banking are also varied. Therefore, the healthy development of online banking is the first solution. It's a security issue. [0003] In order to ensure the safety of users' funds, banks have taken various measures to improve the security of user identity authentication. At present, the most common use of online banking is the usbkey (smart key device) security digital certificate based on smart cards. usbkey combines smart card technology and PKI (Public Key Infrastructure, public key system) technology, uses the smart card chip with built-in operating system to pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06G06K9/00
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES