Method for realizing electronic signature-stamp by secret key infrastructure (SKI typo) system
An electronic and key technology, applied in the transmission system, electrical components, user identity/authority verification, etc., can solve the problem of high cost and achieve the effect of taking into account both cost and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0063] The following is a preferred embodiment of the present invention, which will be described in detail in conjunction with the drawings.
[0064] see figure 1 , is a structural diagram of the signature verification method of the present invention. The method of the present invention is mainly implemented by a key registration center 1 , a signature verification key issuance center 2 , and a signature verification center 3 . The three centers are all trusted third parties (Trusted Third Party, TTP), and their impartiality is beyond doubt. Wherein, the key registration center 1 and the key issuance center 2 can be implemented by an existing Secret Key Infrastructure (SKI typo) system, such as a Kerberos system or a Radius system. But this is only a preferred embodiment of the present invention, and should not be limited thereto.
[0065] see image 3 , is a signature flow chart of the method for signing and verifying the seal of the present invention. Firstly, a signatu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 