Signing method
A well-known and legal technology, applied in the field of information security, can solve the problem that KSP and CSP cannot realize intercommunication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0073] Embodiment 1 of the present invention provides a signature method, including:
[0074] In this embodiment, after the smart key device is connected to the host, select the CSP implemented by the manufacturer to apply for a certificate;
[0075] Using the selected CSP, a container object and a key object are generated inside the smart key device, and a key object is established according to the attributes of the container object and the incoming key parameters;
[0076] Step 101: When the first CSP interface function is called, create a container object inside the smart key device, and return the handle of the container object;
[0077] The first CSP interface function is:
[0078]
[0079] Wherein, pszProvider is the name of the CSP; the attribute of the container object includes the container name, and the value of pszContainer is the address of the first preset buffer where the container name is located;
[0080] The content in the first preset buffer is composed ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com