Method and device for initializing electronic signature tool

An electronic signature tool and initialization technology, applied in the electronic field

Active Publication Date: 2013-10-09
TENDYRON CORP
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention aims to solve the above-mentioned problems existing in the initialization process of the existing electronic signature tool

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for initializing electronic signature tool
  • Method and device for initializing electronic signature tool
  • Method and device for initializing electronic signature tool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0112] figure 1 This is a flowchart of Embodiment 1 of the method for initializing an electronic signature tool of the present invention. Combine now figure 1 , the first embodiment of the method for initializing an electronic signature tool of the present invention is described, and the details are as follows:

[0113]Step 10: generate the first key information according to the key generation strategy and the asymmetric algorithm;

[0114] The first key information includes at least a public key and a private key; the public key included in the first key information includes at least two public key parameters, and the number of the public key parameters can be determined by the algorithm used to generate the first key information , the public key parameters that make up the public key are used as a public key in the process of encryption and signature verification; the key generation strategy is the asymmetric algorithm required to generate the public key and private key co...

Embodiment 2

[0134] figure 2 This is a flow chart of Embodiment 2 of the apparatus for initializing an electronic signature tool according to the present invention. Combine now figure 2 , the second embodiment of the device for initializing the electronic signature tool of the present invention will be described, and the details are as follows:

[0135] The apparatus for initializing the electronic signature tool of the second embodiment includes: a first chip 20 and a second chip 21 .

[0136] The first chip 20 generates the first key information according to the key generation strategy and the asymmetric algorithm; the first chip 20 generates the first key information according to the public key contained in the first key information, the public key contained in the second key information and its version information , the public key and its version information contained in the third key information, and the electronic signature tool information, generate initialization data and write...

Embodiment 3

[0150] image 3 This is a flowchart of Embodiment 3 of the apparatus for initializing an electronic signature tool according to the present invention. Combine now image 3 , the third embodiment of the device for initializing the electronic signature tool of the present invention will be described, and the details are as follows:

[0151] Step 30: Generate first key information according to the key generation strategy and the asymmetric algorithm;

[0152] The first key information includes at least a public key and a private key; the public key included in the first key information includes at least two public key parameters, and the number of the public key parameters can be determined by the algorithm used to generate the first key information , the public key parameters that make up the public key are used as a public key in the process of encryption and signature verification; the key generation strategy is the asymmetric algorithm required to generate the public key an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for initializing an electronic signature tool. The method comprises the steps of generating first secret key information according to a secret key generation strategy and an asymmetric algorithm; generating initialized data and writing the initialized data into the electronic signature tool according to a public key contained in the first secrete key information, a public key and the version information of the public key contained in the obtained second secrete key information, a public key and the version information of the public key contained in the obtained third secrete key information and the information of the electronic signature tool; utilizing a private key contained in the third secrete key information for conducting signature on the initialized data, generating the signature data of the initialized data and writing the signature data into the electronic signature tool. The invention further discloses a device for initializing the electronic signature tool. By the adoption of the method and device, the electronic signature tool is prevented from being counterfeited, and safety is improved.

Description

technical field [0001] The present invention relates to the field of electronic technology, and in particular, to a method and device for initializing an electronic signature tool. Background technique [0002] During the initialization process of the existing electronic signature tools, a single asymmetric algorithm is often used to generate multiple key pairs built into the electronic signature tools, and the above generated key pairs are used to generate signature data, which is used as a bank server to verify the electronic signature. However, the method of using a single asymmetric algorithm to generate a key pair has certain security risks, that is, the algorithm used in the key pair built in the electronic signature tool is easy to be cracked, and the electronic signature tool is easy to If it is counterfeited, the security of electronic signature tools needs to be further improved. SUMMARY OF THE INVENTION [0003] The present invention aims to solve the above pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products