Unlock instant, AI-driven research and patent intelligence for your innovation.

Digital signature method and device based on national secret algorithm

A national secret algorithm and digital signature technology, applied in the field of network security, can solve problems such as long response time, network resource occupation, low network transmission efficiency and reliability

Inactive Publication Date: 2017-05-31
北京信安世纪科技股份有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for massive data, a large amount of data that needs to be signed needs to be sent to the computing server through the network, which not only occupies a large amount of network resources and affects other online businesses, but also the efficiency and reliability of network transmission are relatively low, and operations often require a long response time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature method and device based on national secret algorithm
  • Digital signature method and device based on national secret algorithm
  • Digital signature method and device based on national secret algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0058] Such as figure 1 As shown, a system architecture applicable to the embodiment of the present invention includes a client and a computing server 101; wherein, the client is an application program (Application, APP for short). The client is connected to the calculation server 101 through TCP. The client is installed on the terminal 102, and the terminal 102 can be an electronic device with wireless communication function such as a mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the technical field of network security, and particularly relates to a digital signature method and device based on a national secret algorithm. The method comprises the following steps: a terminal receives a digital signature request, wherein the digital signature request comprises to-be-signed data; the terminal sends a signer feature data ZA request to a server, so that the server calculates a ZA value; the terminal receives the ZA value fed back by the server, and calculates an abstract of the to-be-signed data according to the ZA value and the to-be-signed data; and the terminal sends the abstract of the to-be-signed data to the server, so that the server calculate signature of the abstract of the to-be-signed data according to the national secret algorithm. By adoption of the digital signature method and device provided by the embodiment of the invention, network resources are saved, and the security and efficiency of digital signature are improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a digital signature method and device based on a national secret algorithm. Background technique [0002] A digital signature is some data attached to a data unit, or a cryptographic transformation of a data unit. This data or transformation allows the recipient of the data unit to confirm the origin and integrity of the data unit and protect the data from forgery by others. A digital signature generated by the sender of the information that others cannot forge is a digital signature. This digital string is also an effective proof of the authenticity of the information sent by the sender of the information. [0003] Digital signature is the application of asymmetric key encryption technology and digital abstract technology. Cryptographic algorithms are mathematical functions used for encryption and decryption, and are the basis of cryptographic protocols. Current crypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3249H04L9/3066
Inventor 陈程王翊心张庆勇
Owner 北京信安世纪科技股份有限公司