Method and system for realizing mobile phone token based on key division
A mobile phone token and key technology, applied in the field of information security, can solve problems such as the inability of USBKey to adapt and the inconvenient application environment of mobile phone terminals, and achieve the effect of improving security and preventing cheating.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] Such as figure 1As shown, a method of realizing mobile phone tokens based on key splitting in the present invention uses a cloud cipher machine and an authentication server to use a mobile phone as a terminal carrier to implement a mobile phone as a token (Mobile AS Token) to sign or encrypt data ; The cipher machine used to generate the key is a cipher machine based on the key split technology to enhance the security of the key. The cipher machine has the functions of key splitting, remote storage, multi-point authentication and key destruction after use; including the following step:
[0051] (1) Registration process: After the encryption machine generates the key, it divides the key to generate key fragments, and then double-encrypts the divided key fragments and outputs them to the mobile phone and the authentication server;
[0052] (2) Authentication process: when using a mobile phone to sign or encrypt data, the authentication server authenticates the mobile pho...
Embodiment 2
[0056] A method for realizing mobile phone tokens based on key division in the present invention uses a cloud-based cipher machine and an authentication server, and uses a mobile phone as a terminal carrier to realize signing or encrypting a mobile phone as a token (Mobile AS Token); The key encryption machine is a encryption machine based on key splitting technology to improve key security. The encryption machine has the functions of key splitting, remote storage, multi-point authentication and key destruction after use; it includes the following steps:
[0057] (1) Registration process: After the encryption machine generates the key, it divides the key to generate key fragments, and then double-encrypts the divided key fragments, and outputs them to the mobile phone and the authentication server; including the following steps:
[0058] ①. Generate the private key Mkey of the mobile phone on the mobile phone, and apply for the mobile device certificate MCert from the certifica...
Embodiment 3
[0077] Such as figure 1 As shown, a system for implementing mobile phone tokens based on key splitting in the present invention includes a cloud cipher machine, an authentication server, and a mobile phone as a terminal carrier; the cipher machine is a system that improves key security based on key splitting technology Cipher machine, the cipher machine has the functions of key division, remote storage, multi-point authentication and key destruction; the cipher machine is used to complete key generation, key division, key encryption output, mobile phone authentication, Key decryption, key synthesis, key use, and key destruction; the mobile phone acts as a token to sign or encrypt data; the authentication server authenticates the mobile phone through a cipher machine.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com