Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method for realizing signature based on secret key type

An implementation method and key technology, applied in the field of information security, can solve the problems of inability to distinguish between different types of signatures, inability to realize anti-spoofing signatures, etc.

Active Publication Date: 2015-08-19
FEITIAN TECHNOLOGIES
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current SM2 signature algorithm can only be used in conjunction with the SM3 hash algorithm, so different types of signatures cannot be distinguished through different hash algorithms, and the purpose of anti-fraud signatures cannot be achieved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing signature based on secret key type
  • Method for realizing signature based on secret key type
  • Method for realizing signature based on secret key type

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] Embodiment 1 of the present invention provides an implementation method of signing according to the key type, such as figure 1 shown, including:

[0055] Step S1: When the smart key device receives the data sent by the host computer, the smart key device judges the data type, if it is a command to generate a key pair, execute step S2, if it is a signed data packet, execute step S3, and if it is other instructions, execute Corresponding operations, return the execution result to the host computer, and return to step S1;

[0056] Step S2: The smart key device writes the key type identifier, key ID and purpose identifier in the key pair instruction into the key description information, generates a key pair, and writes the generated key pair and key description information Write into the key storage area, return success information to the upper computer, and return to step S1;

[0057] Step S3: The smart key device sets the current hash algorithm as the hash algorithm spe...

Embodiment 2

[0099] Embodiment 2 of the present invention provides an implementation method of signing according to the key type, such as Figure 2 to Figure 5 shown, including:

[0100] Step 201: The smart key device is powered on and initialized;

[0101] Step 202: The smart key device waits to receive the command sent by the host computer. When the smart key device receives the command, the smart key device judges the type of the command. If it is a command to generate a key pair, execute step 203. If it is the first setting command, then Execute step 208, if it is the third common signature instruction, then execute step 214, if it is the message parsing instruction, then execute step 222, if it is the third review signature instruction, then execute step 234, if it is other instructions, execute the corresponding operation, and return the execution result to the upper computer , return to step 202;

[0102] Step 203: The smart key device judges whether the security condition is sati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing signature based on a secret key type. The method comprises: when a secret key pair generation instruction is received, a secret key type identifier, a secret key ID, and a purpose identifier are written into secret key description information and a secret key pair is generated correspondingly. When a signature data packet is received, a current Hash algorithm, a current signature algorithm, a current secret key ID, and a current purpose identifier are set; if common signature is carried out, a corresponding secret key identifier is obtained; if the corresponding secret key is one being allowed to carry out common signing, the corresponding secret key is obtained according to the current secret key ID and the current purpose identifier to carry out signature on first to-be-signed data and then a signature result is returned; if re-checking signing is carried out, a corresponding secret key type identifier is obtained; and if the corresponding secret key is one being allowed to carry out re-checking signing, a message is calculated to obtain second to-be-signed data, a corresponding secret key is obtained according to the stored current secret key ID and current purpose identifier so as to carry out signing on the second to-be-signed data, and a signature result is returned.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for implementing signature according to key type. Background technique [0002] Digital signature technology can ensure the integrity of the data transmission process, authenticate the identity of the data sender and prevent repudiation. The smart key device is a device capable of digital signature, which can store the user's private key and digital certificate, and use the built-in signature algorithm in the smart key device to authenticate the user's identity. In the prior art, most of the smart key devices use different hash algorithms to distinguish common signatures and double-check signatures, so as to achieve the purpose of anti-fraud signatures. However, currently the SM2 signature algorithm can only be used in conjunction with the SM3 hash algorithm, so different types of signatures cannot be distinguished through different hash algorithms, and the purpose o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0825H04L9/3247
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More