Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Signature verification method

A signature verification and pre-signature technology, applied in the field of computer security, can solve problems such as insufficient security, transaction information forgery, key leakage, etc., to reduce the risk of key leakage, improve signature security, and solve the problem of key leakage. Effect

Inactive Publication Date: 2015-11-11
TONGJI UNIV
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to this feature, if the common signature algorithm is used, the signature key needs to be carried during the migration process, so that the signature key can easily be stolen by malicious hosts, so the credibility of the signature is greatly reduced
At the same time, on ordinary PCs, due to insufficient security, it is easy to be maliciously invaded, causing the key to be leaked, and then the transaction information is forged, which in turn causes great losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature verification method
  • Signature verification method
  • Signature verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0023] It should be noted that the diagrams provided in this embodiment are only schematically illustrating the basic idea of ​​the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and shape of the components in actual implementation. Dimensional drawing, the type, quantity and proportion of each component can be changed arbitrarily during actual impleme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a signature verification method. The signature verification method comprises steps that: a trusted authority generates public key shared information and generates a corresponding initial private key for each terminal based on the public key shared information, and each terminal obtains the corresponding initial private key and stores the initial private key in a safety device of the terminal, wherein data in the safety devices cannot be changed by the terminals; each safety device periodically updates the current key of each terminal based on the initial private key and a set signature key generation algorithm; a pre-signature function is obtained based on a set pre-signature function generation algorithm, a current key and transaction demand information; a signature is obtained based on a set signature algorithm, the pre-signature function and to-be-signed information, wherein the to-be-signed information comprises the transaction demand information; the signature key generation algorithm, the pre-signature function generation algorithm and the signature algorithm are set based on the public key shared information. According to the scheme of the signature verification method, the signature safety, in particular, the signature safety of mobile agents is improved greatly.

Description

technical field [0001] The invention relates to a computer security technology, in particular to a signature verification method. Background technique [0002] MobileAgent (Mobile Agent) refers to a program that completes tasks on behalf of users, and can move from one host to another autonomously in a distributed network environment. It has the characteristics of mobility, autonomy, and asynchronous computing, which can effectively use bandwidth, reduce network traffic, and improve response time, thus providing a new solution for distributed applications in environments with low bandwidth, high latency, and unstable network connections. It can be widely used in information retrieval, network management, e-commerce and other fields. When the mobile agent performs corresponding operations on behalf of the user, it needs to continuously migrate, complete the work, re-migrate, and finally reproduce the key. Due to this feature, if you use a common signature algorithm, you nee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/0823
Inventor 史扬韩景轩唐宇迪
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products