Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Signature realization method and signature realization device

A technology for signing data and signing keys, applied in the field of information security, which can solve the problems of high memory space occupation, low recognizability, and large amount of computation.

Active Publication Date: 2012-07-11
FEITIAN TECHNOLOGIES
View PDF1 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the present invention provides a signature implementation method and device to solve the shortcomings of the current public key system signature, which have relatively large amount of calculation, high memory space occupation, and low identifiability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature realization method and signature realization device
  • Signature realization method and signature realization device
  • Signature realization method and signature realization device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] Embodiment 1 provides a signature implementation method, including the following steps:

[0086] Step A: receiving the signature request command sent by the host, and analyzing the signature request command according to preset rules, and determining the header preset length data, data field length value and data field;

[0087] In this embodiment, before parsing, it also includes: judging whether the signature request command can be parsed according to the second preset format, and if so, parsing the signature request command according to the preset rules, otherwise returning an error to the host Prompt information.

[0088] Step B: judging whether the header preset length data matches the first preset character string, if yes, execute step C, otherwise, judge whether the header preset length data matches the second preset character string, if yes, execute step B E, if the first preset length data does not match the first preset character string and the second preset c...

Embodiment 2

[0099] see figure 1 , which is a flow chart of a method for implementing a signature provided in Embodiment 2; specifically includes the following steps:

[0100] Step 100: Receive the signature request instruction sent by the host, and judge whether the signature request instruction can be parsed according to the second preset format, if yes, perform step 101, otherwise stop the operation;

[0101] Preferably, in this embodiment, the stop operation specifically includes: sending a pre-agreed error code to the host, and returning error prompt information to the host.

[0102] After stopping the operation, if a new command is received from the host, it will continue to be operated accordingly.

[0103] The method for judging whether the signature request instruction can be parsed according to the second preset format is specifically:

[0104] Step 2'-1: judging whether the data length of the signature request instruction reaches the preset length; if yes, proceed to the next ...

Embodiment 3

[0152] Embodiment 3 of the present invention is based on Embodiment 2, taking the data type to be signed as the original text data to be signed as an example, and introduces the implementation process of preprocessing and signing in detail, as figure 2 shown, including:

[0153] This embodiment will be described in detail by taking the signature request instruction data sent by the analyzed host as the following specific data as an example: 80740100 00001C 0001 0002 00000006 313233343536 6D657373 61676520 64696765 7374 000000;

[0154] Step 201: Obtain the first parameter, the second parameter, the third parameter, and the fourth parameter, and at the same time obtain the signature public key according to the container object, and convert the above values ​​into byte type data of a preset length;

[0155] Wherein, the first parameter, the second parameter and the fourth parameter are respectively one-dimensional arrays; the third parameters are respectively two-dimensional ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a signature realization method and a signature realization device. The method comprises the following steps that: a receiving host machine sends signature request instructions, and in addition, the analysis is carried out according to preset rules; the type of data to be signed is detected according to the first part preset length, if the data to be signed is original text data to be signed, the storage position of a signature key, a signature mark and the original text data to be signed are determined according to data obtained through the analysis, the preprocessing is carried out on the user mark value and the user mark length in a data domain and the original text data to be signed according to the algorithm corresponding to the signature mark, and data to be signed is generated; if the data to be signed is pretreated data, when the data domain length value of the signature request instruction conforms to the preset vale, the storage position of the signature key and the data to be signed are determined according to the data domain; and the data to be signed is signed to generate signature results, and the signature results are sent to the host machine according to a first preset format. In the realization scheme of the method and the device provided by the invention, the safety and the identifiability of the signature are improved because of the participation of a signature public key and a user mark.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a method and device for realizing a signature. Background technique [0002] At present, with the rapid development of network technology, information security has become an urgent problem to be solved. In the public key cryptography system, the keys used in the decryption and encryption processes are different, and the decryption and encryption can be separated. The communication parties can establish confidential communication without exchanging keys in advance, which better solves the problem of traditional cryptography in network communication. question. In addition, with the development of e-commerce, the electronic transactions of funds on the network are becoming more and more frequent, and how to prevent information forgery and deception has become a very important issue. [0003] Digital signature can play the role of identity authentication and approval of data int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products