Method for realizing signature based on secret key type
An implementation method and key technology, applied in the field of information security, can solve the problems of inability to distinguish between different types of signatures, inability to realize anti-spoofing signatures, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] Embodiment 1 of the present invention provides an implementation method of signing according to the key type, such as figure 1 shown, including:
[0055] Step S1: When the smart key device receives the data sent by the host computer, the smart key device judges the data type, if it is a command to generate a key pair, execute step S2, if it is a signed data packet, execute step S3, and if it is other instructions, execute Corresponding operations, return the execution result to the host computer, and return to step S1;
[0056] Step S2: The smart key device writes the key type identifier, key ID and purpose identifier in the key pair instruction into the key description information, generates a key pair, and writes the generated key pair and key description information Write into the key storage area, return success information to the upper computer, and return to step S1;
[0057] Step S3: The smart key device sets the current hash algorithm as the hash algorithm spe...
Embodiment 2
[0099] Embodiment 2 of the present invention provides an implementation method of signing according to the key type, such as Figure 2 to Figure 5 shown, including:
[0100] Step 201: The smart key device is powered on and initialized;
[0101] Step 202: The smart key device waits to receive the command sent by the host computer. When the smart key device receives the command, the smart key device judges the type of the command. If it is a command to generate a key pair, execute step 203. If it is the first setting command, then Execute step 208, if it is the third common signature instruction, then execute step 214, if it is the message parsing instruction, then execute step 222, if it is the third review signature instruction, then execute step 234, if it is other instructions, execute the corresponding operation, and return the execution result to the upper computer , return to step 202;
[0102] Step 203: The smart key device judges whether the security condition is sati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
