Mobile phone and Bluetooth key signature verification ciphertext communication method

A technology of signature verification and communication method, applied in the service field, can solve the problems of inconvenience or loss of mobile phone users, high cost of sd card digital authentication, leakage and other problems

Active Publication Date: 2015-01-21
浪潮(青岛)科技集团有限公司
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Smartphones are no longer just a tool for calling and sending text messages. They have been widely used in life and work like personal computers. Due to their easy portability, they have gradually become a necessary tool for personal mobile office and work. A series of corresponding security issues have also given rise to Mobile phone users bring confusion and worry, such as mobile phone loss, information leakage, virus invasion, information fraud, etc., will bring inconvenience or loss to mobile phone users
Especially in mobile banking, mobile payment, mobile transfer, and mobile shopping, account information leaks frequently cause financial losses. Mobile phone use rights and information protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone and Bluetooth key signature verification ciphertext communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0022] The following describes the content of the present invention through a simple mobile phone and Bluetooth key authentication process, but it does not constitute a limitation to the present invention.

[0023] according to figure 1 The authentication establishment process between the mobile phone and the Bluetooth key shown:

[0024] Step 1. The mobile phone user opens the Bluetooth settings, searches for the Bluetooth device, and finds the Bluetooth ukey device name (such as Ukey8001000123). If the Bluetooth device is not paired, please pair it. If it is already paired, the Bluetooth channel of the phone and the Bluetooth key has been connected.

[0025] Step 2: The mobile phone user obtains the Bluetooth key user certificate and registers it in the mobile browser.

[0026] Step 3: The mobile phone user automatically obtains the random numbers rd1 and rd2 of the Bluetooth key, and then encrypts rd2 with rd1 to obtain rdm.

[0027] Step 4, the mobile phone automatically generates ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile phone and Bluetooth key signature verification ciphertext communication method. Mutual authentication is conducted on a mobile phone user and a Bluetooth key, the using identity of a Bluetooth key holder can be guaranteed, an established Bluetooth ciphertext channel is used for communication, so that Bluetooth communication is safe and reliable, the functions of ciphertext communication, encryption and decryption, electronic signature, signature verification and the like are achieved by signature authentication service on the mobile phone, safe and credible third party certification service is provided for the mobile phone user, and the difficult problem on the aspect of mobile phone service safety is truly solved.

Description

Technical field [0001] The invention relates to a mobile phone and a Bluetooth key signature verification ciphertext communication method, which is mainly used in the service fields of electronic government affairs, e-commerce, industry, ciphertext communication and the like. Background technique [0002] Smart phones are no longer simply tools for calling and texting. They have been widely used in life and work like personal computers. Because of their convenience to carry, they have gradually become a necessary tool for personal mobile office and work. The corresponding series of security issues are also given. The confusion and worries caused by mobile phone users, such as loss of mobile phone, information leakage, virus intrusion, information fraud, etc., will bring inconvenience or loss to mobile phone users. In particular, mobile banking mobile payment, mobile transfer and mobile shopping, etc., account information leakage has repeatedly caused financial losses. The use of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 李秀芳于治楼乔国凯
Owner 浪潮(青岛)科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products