Method, device and system for realizing mobile signature
An implementation method and technology of a mobile terminal, which are applied in security devices, transmission systems, public keys for secure communication, etc., can solve problems such as limited processing capability, inability to be processed correctly, and inability to display SD content to users, and achieve enhanced security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] Embodiments of the present invention provide a method for implementing a mobile signature, a corresponding device and a system, and implement an end-to-end protected mobile signature based on a SIM / USIM in a mobile terminal.
[0043] The method, device and system provided by the present invention will be described in detail below with reference to the accompanying drawings.
[0044] see figure 1 , which is a flowchart of a method for implementing a mobile signature provided in an embodiment of the present invention, including:
[0045] Step S101, the business application system accepts user access and generates data to be signed;
[0046] Step S102, the business application system generates a representation of data to be signed and data to be displayed according to the data to be signed;
[0047] Step S103, the business application system uses the user's public key to encrypt the data to be displayed; and sends the user's mobile terminal identity, the data to be signe...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 