Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing electronic signature-stamp by secret key infrastructure (SKI typo) system

An electronic and key technology, applied in the transmission system, electrical components, user identity/authority verification, etc., can solve the problem of high cost and achieve the effect of taking into account both cost and security

Inactive Publication Date: 2010-09-29
ARES INT
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the cost of such a system is too high, and many businesses with insufficient funds often have to bear the risk and choose a relatively low confidentiality but cheaper authentication method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing electronic signature-stamp by secret key infrastructure (SKI typo) system
  • Method for realizing electronic signature-stamp by secret key infrastructure (SKI typo) system
  • Method for realizing electronic signature-stamp by secret key infrastructure (SKI typo) system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The following is a preferred embodiment of the present invention, which will be described in detail in conjunction with the drawings.

[0064] see figure 1 , is a structural diagram of the signature verification method of the present invention. The method of the present invention is mainly implemented by a key registration center 1 , a signature verification key issuance center 2 , and a signature verification center 3 . The three centers are all trusted third parties (Trusted Third Party, TTP), and their impartiality is beyond doubt. Wherein, the key registration center 1 and the key issuance center 2 can be implemented by an existing Secret Key Infrastructure (SKI typo) system, such as a Kerberos system or a Radius system. But this is only a preferred embodiment of the present invention, and should not be limited thereto.

[0065] see image 3 , is a signature flow chart of the method for signing and verifying the seal of the present invention. Firstly, a signatu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for realizing an electronic signature-stamp by a secret key infrastructure system. The method comprises the following steps of: using the secret key infrastructure system to resister for a secret key and issue a signature-stamp gold key respectively; after the signature is completed at one signature end, transmitting signature data, verification data and a stamp gold key encrypted by the secret key of a signature verifying unit to a receiving end; after the receiving end receives the data, if the trueness of the signature data needs to be confirmed, transmitting the verification data and the encrypted stamp gold key to the signature verifying unit which can decrypt the encrypted stamp gold key by using a secret key authorized by the SKI to obtain the stamp gold key, verifying the data by the stamp gold key so as to confirm whether the stamping deed of the stamp data actually exists and then further prove the trueness of the stamping data.

Description

technical field [0001] The present invention relates to an electronic signature, especially to an electronic signature established under a key infrastructure system. Background technique [0002] Today is a digital age, and the lives of the general public are filled with all kinds of electronic products that are quite convenient. With the development of the Internet, the electronic life has been pushed to another realm. [0003] Electronic products have really improved the convenience of users. Coupled with the use of the Internet, many things that could not be achieved in the past can be accomplished. The so-called "scholar can know the world without going out" is no longer a myth. In recent years, in addition to obtaining information through the Internet, it is also possible to perform actions involving confidential personal data such as electronic transactions and electronic signatures through the steps of registering and logging in to authenticate personal identity. Us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 洪伯岳林岱宏
Owner ARES INT