Method and device for realizing built-in rsa key operation by calling cipher card by jce

A password card and key technology, applied in the field of information security, can solve problems such as being easily stolen, and achieve the effect of simple and convenient operation

Active Publication Date: 2018-09-18
Fisherman Information Technology Co Ltd
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, decryption and signature need to pass in the corresponding private key object to perform specific decryption and signature operations, but the private key object is the core of security and stored in the application memory, which is very easy to be stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing built-in rsa key operation by calling cipher card by jce
  • Method and device for realizing built-in rsa key operation by calling cipher card by jce
  • Method and device for realizing built-in rsa key operation by calling cipher card by jce

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0065] It should be noted that the subject of execution of the method in this embodiment is a terminal device, and the terminal may be a mobile phone, a tablet computer, a PDA, a notebook or a desktop computer, etc. Of course, it may also be other devices with similar functions. This embodiment is not limited.

[0066] like Figures 1 to 4 As shown, a device for JCE calling a cryptographic card to implement built-in RSA key operations includes a terminal device 10 and a cryptographic card 20; The encryption card management tool 103 for specifying the key number and film length of the key pair; the encryption card 20 is inserted on the terminal device 10, connected with the encryption card management tool 103 for generating and storing the speci...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for calling a cipher card by JCE (Java Cryptography Extension) to implement an internal RSA secret key operation. The device comprises terminal equipment and the cipher card; the terminal equipment comprises an application module, a JCE implementation module and a cipher card management tool; the cipher card is inserted on the terminal equipment, and is connected with the cipher card management tool for storing a generated RSA secret key pair; the application module is connected with the JCE implementation module for sending the RSA secret key pair lead-out or RSA secret key operation request; and the JCE implementation module is connected with the cipher card for sending the processed RSA secret key pair lead-out request or RSA secret key operation request to the cipher card, and the cipher card responds to the request of the JCE implementation module. The method and the device which are disclosed by the invention achieve an effect that the JCE calls an RSA secret key stored in the cipher card to carry out the secret key operation, and ensure safety storage of a private key and safety of communication.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and a device for JCE calling a cipher card to realize built-in RSA key calculation. Background technique [0002] Java is an object-oriented programming language that can write cross-platform application software. It is an assembly of the Java programming language and the Java platform launched by Sun Microsystems in May 1995. Java technology has excellent versatility, efficiency, platform portability and security, and is widely used in personal PCs, data centers, game consoles, scientific supercomputers, mobile phones and the Internet. In the industrial environment of global cloud computing and mobile Internet, Java has more significant advantages and broad prospects. [0003] The Java platform defines a set of APIs that span major security areas, including cryptography, public key infrastructure, authentication, secure communication, and access control. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08
CPCH04L9/0869H04L9/3006
Inventor 徐波郭刚宋志华
Owner Fisherman Information Technology Co Ltd
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products