Method for importing secret keys safely, electronic signature tool, authentication device and system

An electronic signature tool and a technology for authentication equipment, applied in the field of electronic technology applications, can solve problems such as high security requirements and inconvenience, and achieve the effects of simple processing and improved security and convenience.

Active Publication Date: 2011-03-23
TENDYRON CORP
View PDF2 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current practice is based on the completion of writing the private key to the electronic signature tool in a safe environment. The private key is written in plain text or simply encrypted and then written into the electronic signature tool. This has high requirements for the security of the environment. In addition, if the private key is replaced, It is very inconvenient to replace the private key only after recycling the electronic signature tool in a specific safe environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for importing secret keys safely, electronic signature tool, authentication device and system
  • Method for importing secret keys safely, electronic signature tool, authentication device and system
  • Method for importing secret keys safely, electronic signature tool, authentication device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] This embodiment provides a method for securely importing a key, which is used to securely import a working key to an electronic signature tool (such as a USBKey device), such as figure 1 As shown, the method includes:

[0049] Step 1, the electronic signature tool pre-writes the public key of the dedicated public key K0, and generates a protection key pair K1, saves the private key of the protection key pair K1, and transmits the public key of the protection key pair K1 To the authentication device pre-stored with the private key of the dedicated public key K0;

[0050] Step 2: Generate a random number R1, encrypt the random number R1 with the pre-written public key of the dedicated public key K0 to obtain encrypted data, and use the pre-generated and saved protection key to calculate the signature with the private key of K1 Get the signature result data;

[0051] Step 3, send the signature result data and identification information (which can be the serial number of ...

Embodiment 2

[0058] This embodiment provides a method for securely importing a key, which is used to securely import a working key into an electronic signature tool, such as figure 2 As shown, the method includes:

[0059] Step 21, the authentication device receives the public key of the protection key pair K1 sent by the electronic signature tool, the signature result data and the identification information of the electronic signature tool; wherein, the public key of the protection key pair K1 is: generated by the electronic signature tool The public key of the protected key pair K1; the signature result data is: the random number R1 is generated by the electronic signature tool, and after the random number R1 is encrypted with the public key of the pre-written special public key K0, it is encrypted with The signature result data obtained by calculating and signing the private key of K1 with the pre-generated protection key;

[0060] Step 22: The authentication device retrieves the pre-...

Embodiment 3

[0074] This embodiment provides an electronic signature tool, which can communicate with the authentication device of the background system, and use the network to safely import the work key, such as image 3 As shown, the electronic signature tool includes: a key storage module 31, a key generation module 32, a random number generation module 33, a signature processing module 34, a sending module 35 and a receiving processing module 36;

[0075] Wherein, the key storage module 31 is used to save the public key of the dedicated public key K0 written in advance, and save the private key of the protection key pair K1 generated by the key generation module 32, and save the receiving processing module 36 to receive The working key Ks obtained after processing the signature data replied by the authentication device;

[0076] The key generation module 32 is configured to generate a protection key pair K1, and store the private key of the protection key pair K1 in the key storage mod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for importing secret keys safely, an electronic signature tool, an authentication device and an authentication system. The method comprises the following steps: generating a random number R1, encrypting the random number R1 by a public key of pre-written special public keys K0 so as to obtain encrypted data, and carrying out calculated signature on the encrypted data by a private key of pre-generated and stored protection secret key pair K1 so as to obtain signature result data; transmitting the signature result data and identification information to an authentication device, wherein the private key of the special public key K0 and the public key of the protection secret key pair K1 are stored in the authentication device; after carrying out validity authentication by the authentication device according to the signature result data, the identification information, the stored private key of the special public key K0 and the stored public key of the protection secret key pair K1, encrypting and signing a working secret key Ks to be imported so as to form signature data for response; and receiving and decrypting the signature data replied by the authentication device so as to obtain imported working secret key Ks. The method for importing the secret keys safely is not dependent on specific security environments; and by using the method for importing the secret keys safely, the working secret keys can be imported into electronic signature tools via Internet.

Description

technical field [0001] The invention relates to the application field of electronic technology, in particular to a method for safely importing a key into an electronic signature tool, an electronic signature tool, an authentication device and a system. Background technique [0002] With the development and application of identity authentication technology, electronic signature tools are more and more applied to the field of identity authentication. At present, there are two main application fields: the financial field and government agencies. For application in the financial field, according to the requirements of the "Electronic Signature Law of the People's Republic of China", as an authentication tool for personal identity, the private key in the electronic signature tool is required not to be read out, modified, etc.; for applications in government agencies, in order to facilitate Supervision requires that the private key (that is, the working key) in the electronic sign...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products