Digital signature method capable of being implemented on flow line
A digital signature and algorithm technology, applied in the field of information security, can solve problems affecting production efficiency and low digital signature speed, and achieve the effect of ensuring effectiveness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] Using the electronic label as the electronic storage medium, the specific implementation method of the present invention is described in anticipation of its application in the anti-counterfeiting of large-scale assembly line products such as alcohol, tobacco, and medicine, as figure 2 shown.
[0019] When initializing, the electronic tag only has the chip's unique identification information TID, and the signature object is the TID, that is, m=TID. The electronic label in the production and circulation link is written into the unique code EPC of the product and the AD of the sales destination, m n =EPC||AD||TID, where the symbol || represents the concatenation of bit strings.
[0020] The digital signature algorithm is selected as the ECDSA signature algorithm, and the signature length is about 384 bits. The parameters (E, p, q, P, G) of the signature algorithm are suggested as follows:
[0021] E: y 2 =x 3 +ax+b, where
[0022] a=-3
[0023] b=6723678989789545453...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
