Check patentability & draft patents in minutes with Patsnap Eureka AI!

Digital signature method and system

A digital signature and signature generation technology, applied in the field of security verification, can solve the problems of less tampered content, transaction errors, and insufficient rigor in the signature process

Active Publication Date: 2019-08-02
SHENZHEN DTEC ELECTRONICS TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, there are certain loopholes in the above process. For example, a hacker can implant a Trojan horse program into the smart device. Then, the information displayed in step 2 is still normal information. The content sent to the digital signature device has been tampered with, but usually there is little tampered content, such as small-scale tampering such as changing the address information "ABCD" to "ABCB", and the symbols before and after the tampering are very similar, and it is usually difficult for users to Noticing such a small change, and then, after confirming it through a digital signature device, transfers funds to the wrong person
[0011] In summary, due to the fact that the current signature process is not rigorous enough when performing digital signatures, it leads to transaction errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature method and system
  • Digital signature method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0059] Digital signature technology can improve the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a digital signature method and system, and relates to the field of the safety verification. The method provided by the invention is configured to perform abstract calculation of the transaction information prior to the transaction information display so as to allow a smart terminal and a signature terminal to respectively calculate the feature information of the transaction information and allow the smart terminal and the signature terminal to display the feature information instead of plaintext transaction information. Even though a hacker only modifies little content in the transaction information, the calculated feature information can have great change to allow users to visually and accurately determine that the transaction information is tampered, and the users do not should perform digital signature so as to ensure that the users can timely find that the hacker tampers the transaction information and cannot have loss.

Description

technical field [0001] The invention relates to the field of security verification, in particular to a digital signature method and system. Background technique [0002] With the development of Internet technology, electronic information interaction technology has been popularized. From the perspective of information content, the transmitted information can be divided into two types, one type is information expressing a certain meaning, and the other type is funds. No matter what kind of information interaction, before the information interaction, the confirmation of the information provider is usually required to ensure the information security of the information provider. When information is exchanged, virtual information (data) is transmitted, and the confirmation of the information provider is realized through digital signature. The general digital signature process is as follows: [0003] 1. Smart devices (such as user mobile phones) receive / generate transaction info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06Q20/38
CPCG06Q20/3825H04L9/3226H04L9/3247
Inventor 王刚
Owner SHENZHEN DTEC ELECTRONICS TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More