Method and system for realizing mobile phone token based on key division

A mobile phone token and key technology, applied in the field of information security, can solve problems such as the inability of USBKey to adapt and the inconvenient application environment of mobile phone terminals, and achieve the effect of improving security and preventing cheating.

Active Publication Date: 2017-05-31
北京信任度科技有限公司
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical task of the present invention is to address the above deficiencies and provide a method for realizing mobile phone tokens based on key splitting to s...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing mobile phone token based on key division
  • Method and system for realizing mobile phone token based on key division
  • Method and system for realizing mobile phone token based on key division

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Such as figure 1As shown, a method of realizing mobile phone tokens based on key splitting in the present invention uses a cloud cipher machine and an authentication server to use a mobile phone as a terminal carrier to implement a mobile phone as a token (Mobile AS Token) to sign or encrypt data ; The cipher machine used to generate the key is a cipher machine based on the key split technology to enhance the security of the key. The cipher machine has the functions of key splitting, remote storage, multi-point authentication and key destruction after use; including the following step:

[0051] (1) Registration process: After the encryption machine generates the key, it divides the key to generate key fragments, and then double-encrypts the divided key fragments and outputs them to the mobile phone and the authentication server;

[0052] (2) Authentication process: when using a mobile phone to sign or encrypt data, the authentication server authenticates the mobile pho...

Embodiment 2

[0056] A method for realizing mobile phone tokens based on key division in the present invention uses a cloud-based cipher machine and an authentication server, and uses a mobile phone as a terminal carrier to realize signing or encrypting a mobile phone as a token (Mobile AS Token); The key encryption machine is a encryption machine based on key splitting technology to improve key security. The encryption machine has the functions of key splitting, remote storage, multi-point authentication and key destruction after use; it includes the following steps:

[0057] (1) Registration process: After the encryption machine generates the key, it divides the key to generate key fragments, and then double-encrypts the divided key fragments, and outputs them to the mobile phone and the authentication server; including the following steps:

[0058] ①. Generate the private key Mkey of the mobile phone on the mobile phone, and apply for the mobile device certificate MCert from the certifica...

Embodiment 3

[0077] Such as figure 1 As shown, a system for implementing mobile phone tokens based on key splitting in the present invention includes a cloud cipher machine, an authentication server, and a mobile phone as a terminal carrier; the cipher machine is a system that improves key security based on key splitting technology Cipher machine, the cipher machine has the functions of key division, remote storage, multi-point authentication and key destruction; the cipher machine is used to complete key generation, key division, key encryption output, mobile phone authentication, Key decryption, key synthesis, key use, and key destruction; the mobile phone acts as a token to sign or encrypt data; the authentication server authenticates the mobile phone through a cipher machine.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for realizing a mobile phone token based on key division, and belongs to the technical field of information security. The problems that a USB Key cannot adapt to the application environment of mobile phone terminals and that other adaptive hardware devices are inconvenient to carry are solved. The adopted technical scheme is as follows: the method for realizing the mobile phone token based on key division comprises the following steps: after a cipher machine generates a key, dividing the key to generate key segments, performing dual encryption on the divided key segments, and outputting the key segments to a mobile phone and an authentication server; authenticating the mobile phone by the authentication server through the cipher machine; after the authentication, separately decrypting the key segments by the cipher machine, integrating the key segments into a complete key, and signing or encrypting the data; and after the key is used once, destroying the key by the cipher machine. The system for realizing the mobile phone token based on key division comprises a cloud cipher machine, an authentication server and a mobile phone serving as a terminal carrier.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for realizing mobile phone tokens based on key division. Background technique [0002] A digital certificate is a string of numbers that marks the identity information of all parties in the Internet communication. It provides a way to verify the identity of the communication entity on the Internet. A stamp or seal (or a signature added to a digital ID card). A digital certificate is a file containing public key owner information and public key digitally signed by a certificate certification center (English full name Certificate Authority, referred to as CA). People can use digital certificates to identify each other on the Internet. [0003] In the PC environment, USB Key is widely used in the field of identity authentication, such as online banking, online tax declaration, etc. USBKey is a hardware device with USB interface. It has a built-in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/085H04L9/0863H04L9/0891H04L9/3247H04L63/067H04L63/08H04L63/083
Inventor 马臣云
Owner 北京信任度科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products