Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for realizing mobile signature

An implementation method and technology of a mobile terminal, which are applied in security devices, transmission systems, public keys for secure communication, etc., can solve problems such as limited processing capability, inability to be processed correctly, and inability to display SD content to users, and achieve enhanced security. Effect

Active Publication Date: 2011-05-04
CHINA MOBILE COMM GRP CO LTD
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When MSCA is a terminal application, the interaction between MSCA and the mobile signature generation device, that is, the Subscriber Identity Module (SIM) in the 2G mobile terminal or the Universal Subscriber Identity Module (USIM) in the 3G mobile terminal is A problem, the reason is that this needs to expand the interaction instruction set between the terminal and SIM / USIM, and there is currently a lack of relevant standards in this regard; when MSCA is a card application, the processing capacity of the card is very limited, and often cannot handle SD that may have a complex format , such as eXtensible Markup Language (eXtensible Markup Language, XML) is a file format often used by APs, and this file format cannot be processed correctly on the SIM / USIM, so the SD content cannot be displayed to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for realizing mobile signature
  • Method, device and system for realizing mobile signature
  • Method, device and system for realizing mobile signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Embodiments of the present invention provide a method for implementing a mobile signature, a corresponding device and a system, and implement an end-to-end protected mobile signature based on a SIM / USIM in a mobile terminal.

[0043] The method, device and system provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0044] see figure 1 , which is a flowchart of a method for implementing a mobile signature provided in an embodiment of the present invention, including:

[0045] Step S101, the business application system accepts user access and generates data to be signed;

[0046] Step S102, the business application system generates a representation of data to be signed and data to be displayed according to the data to be signed;

[0047] Step S103, the business application system uses the user's public key to encrypt the data to be displayed; and sends the user's mobile terminal identity, the data to be signe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing mobile signature, which comprises that: a service application system allows for the access by a user, generates data to be signed representation and data to be displayed, encrypts the data to be displayed by using the public key of the user and sends the data to a mobile signature server; the mobile signature server sends the data to be signed representation and the encrypted data to be displayed to the mobile terminal of a user; subscriber identity module (SIM) / universally (USIM) in the mobile terminal uses the private key of the user to decryptthe received encrypted data to be displayed and shows the data to the user for confirmation; after a confirmation instruction of the user is acquired, the SIM / USIM uses the private key of the user toperform signature calculation on the data to be signed representation and forwards the signature result obtained after signature calculation to a service application system through the mobile signature server. The service application system uses the public key of the user to perform signature verification on the result of the signature. The invention also discloses a corresponding device and a system. When the method, device and system are used, the mobile signature of end-to-end protection is realized on the basis of the SIM / USIM in the mobile terminal.

Description

technical field [0001] The invention relates to a wireless network and a data service, in particular to a method for realizing a mobile signature, a corresponding device and a system. Background technique [0002] The digital signature technology based on the public key system can provide authenticity and integrity protection for the data message of the electronic transaction, and can prevent the trader from denying his transaction behavior afterwards, so it is relatively popular in the electronic transaction with high security requirements. Wide range of applications, such as online banking, online payment, etc. [0003] The premise of using digital signatures to protect messages is that each entity must have a pair of public and private keys, the private key is kept secret, the public key is made public, and a binding relationship between the public key and the identity of the entity must be established. In practical operation, this binding relationship is accomplished by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04L9/32H04L9/30H04L29/06H04W12/069
Inventor 刘海龙柏洪涛粟栗刘斐陆鸣涂晓强左敏
Owner CHINA MOBILE COMM GRP CO LTD