SM2 signature algorithm-based double-check signature method and digital signature equipment

An algorithm and signature value technology, applied in the field of information security, can solve problems such as remote control, transaction tampering, online banking transaction hijacking, etc., to achieve high realization efficiency, high security level, and the effect of solving transaction hijacking

Active Publication Date: 2014-04-02
WUHAN ARGUSEC TECH
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above deficiencies or improvement needs of the prior art, the present invention provides a review signature method and digital signature device based on the SM2 signature algorithm. , remote control, thus causing technical problems of user funds being stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2 signature algorithm-based double-check signature method and digital signature equipment
  • SM2 signature algorithm-based double-check signature method and digital signature equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0040] Such as figure 2 As shown, the present invention is based on the SM2 signature algorithm review signature method comprising the following steps:

[0041] (1) Receive the SM2 review signature request from the user, and the SM2 review signature request contains the message p1 of the user's bank transaction information;

[0042] (2) Verify whether the user is a legitimate user according t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SM2 signature algorithm-based double-check signature method. The method comprises the following steps: receiving an SM2 double-check signature request from a user, wherein the SM2 double-check signature request comprises a message p1 of bank transaction information of the user; analyzing the message p1 of the bank transaction information of the valid user to generate transaction information p2; displaying the analyzed transaction information p2 to the user for check and confirmation; detecting whether a confirmation signal from the user is received, if so, respectively calculating a hash value hash1=H(Z, p1) of the message p1 of the bank transaction information of the user and a hash value hash2=H(p2) of the transaction information p2 by using a hash algorithm, and generating a random number k which belongs to [1, n-1]; performing a point multiplication operation of an elliptic curve on a random number k and a base point G of the elliptic curve E to obtain a point kG on the elliptic curve E. By adopting the SM2 signature algorithm-based double-check signature method, the technical problem that user fund is stolen by online banking transaction hijacking, transaction manipulation and remote control which easily happen in the conventional method is solved.

Description

technical field [0001] The invention belongs to the field of information security, and more specifically, relates to a method for rechecking signatures based on an SM2 signature algorithm and a digital signature device. Background technique [0002] At present, most online banks use the public key infrastructure (PKI) system based on digital certificates to ensure the security of online banking data. Digital certificates are issued by banks themselves or by third-party CAs (Certificate Authority). The public key cryptography mechanism with the certificate as the core can encrypt and decrypt information transmitted on the network, digitally sign and verify, to ensure the confidentiality and integrity of messages transmitted on the network, the authenticity of transaction entities, and the non-repudiation of signatures, thereby Ensure the security of network applications. [0003] Elliptic Curve Cryptography (Elliptic Curve Cryptography, ECC) is a high-security, high-efficien...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06Q20/40
Inventor 王翊心胡进阳凌怡
Owner WUHAN ARGUSEC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products