Check patentability & draft patents in minutes with Patsnap Eureka AI!

Digital signature authentication method and device

A digital signature and authentication method technology, applied in the field of communication, can solve the problems of customer fund security, non-digital authentication, payment channel login password complexity, etc.

Inactive Publication Date: 2014-05-14
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has the following disadvantages: (1) Its basic security depends on who gets the USBKey and who knows the PIN code. Once the USBKey is lost and the PIN code is relatively simple, the safety of customer funds only depends on Complexity of payment channel login passwords
(2) Although the bank has added supplementary methods such as SMS confirmation, these supplements are plug-in and non-digital authentication methods, and cannot be integrated with the digital signature made by the existing USBKey device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature authentication method and device
  • Digital signature authentication method and device
  • Digital signature authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] like figure 1 As shown, the present invention provides a digital signature authentication method, said method comprising:

[0030] Step S101, receiving the protection factor of the user's private key;

[0031] Step S102, generating security authentication information when judging that the received user private key protection factor is consistent with the preset private key protection factor; in this embodiment, judging that the received user private ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a digital signature authentication method and device. The method comprises the steps of receiving user private key protective factors, generating safety certificate information when the fact that the received user private key protective factors are identical with preset user private key protective factors is judged, collecting user public key data, and generating authentication results according to the safety certificate information and the public key data. According to the digital signature authentication method, a multi-factor digital authentication scheme is provided, according to a public key cryptosystem theoretical principle and characteristics of specific application, existing double factors are extended to three or more factors, the number and the level of factors are given full play, and highest safety intensity is achieved.

Description

technical field [0001] The invention relates to communication technology, in particular to a digital signature authentication method and device. Background technique [0002] The public-key cryptosystem uses mathematical methods to theoretically enable both communication parties to meet the security requirements for authentication. In applications where the authentication parameters are initially placed in the browser, their security depends on the single factor of who knows the certificate password. In the prior art, the USBKey is used as the authentication medium, and the authentication parameter information is protected by entering and checking the PIN code, which reaches the level of two-factor authentication. For example, banks generally regard this two-factor authentication as the safest option and grant the largest payment amount. [0003] In the USBKey authentication method in the prior art, the private key cannot be exported in the medium, and the signature is per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
Inventor 李顺吉刘伟孙江涛张海英赵剑明张昆
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More