Signing method

A well-known and legal technology, applied in the field of information security, can solve the problem that KSP and CSP cannot realize intercommunication

Active Publication Date: 2013-10-23
FEITIAN TECHNOLOGIES
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing technology, KSP and CSP cannot realize intercommunicati

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signing method
  • Signing method
  • Signing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] Embodiment 1 of the present invention provides a signature method, including:

[0074] In this embodiment, after the smart key device is connected to the host, select the CSP implemented by the manufacturer to apply for a certificate;

[0075] Using the selected CSP, a container object and a key object are generated inside the smart key device, and a key object is established according to the attributes of the container object and the incoming key parameters;

[0076] Step 101: When the first CSP interface function is called, create a container object inside the smart key device, and return the handle of the container object;

[0077] The first CSP interface function is:

[0078]

[0079] Wherein, pszProvider is the name of the CSP; the attribute of the container object includes the container name, and the value of pszContainer is the address of the first preset buffer where the container name is located;

[0080] The content in the first preset buffer is composed ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a signing method, and belongs to the information security field. The method comprises the following steps of: when a first CSP (Cryptography Service Provider) interface function is called, returning back a container object handle; when a second CSP interface function is called, generating a key in an intelligent key device, creating a key object according to the attribute of the container object and the introduced key parameter; when a first KSP (Key Storage Provider) interface function is called, returning back a resource handle; when a second KSP interface function is called, returning back a key handle; when a third KSP interface function is called, returning back the needed key attribute; when a fourth KSP interface function is called, executing the signing operation by the key appointed by the key handle. By the technical scheme of the invention, interconnection of the KSP and the CSP can be realized, thus, the KSP can execute the signing operation by the key generated in the CSP.

Description

technical field [0001] The invention relates to the field of information security, in particular to a signature method. Background technique [0002] CSP (Cryptographic Service Provider) is a hardware and software component in the Windows operating system that provides general encryption functions, and a CSP can be written to provide various encryption and signature algorithms. [0003] KSP (Key storage provider) is one of the members of Microsoft's next-generation encryption architecture (CNG). Its main function is to communicate with encryption devices and provide external device-related encryption and decryption operations. [0004] In the process of realizing the present invention, the inventor finds that at least the following defects exist in the prior art: [0005] In the prior art, the KSP and the CSP cannot communicate with each other. Therefore, the KSP cannot use the key generated in the CSP for signature operations. Contents of the invention [0006] The purp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products