A method and system for implementing mobile phone tokens based on key splitting
A mobile phone token and mobile phone technology, applied in the field of information security, can solve problems such as the inability of USBKey to adapt to the inconvenient application environment of mobile phone terminals, and achieve the effect of improving security and preventing cheating.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] like figure 1As shown in the figure, a method for realizing a mobile phone token based on key splitting of the present invention utilizes a cryptographic machine and an authentication server in the cloud, and uses a mobile phone as a terminal carrier to realize the mobile phone as a token (Mobile AS Token) to sign or encrypt data. ; The cipher machine used to generate the key is a cipher machine that improves the security of the key based on the key splitting technology. The cipher machine has the functions of key splitting, remote storage, multi-point authentication and key destruction after use; including the following step:
[0051] (1) Registration process: After the encryption machine generates the key, it divides the key to generate key segments, and then double-encrypts the segmented key segments and outputs them to the mobile phone and the authentication server;
[0052] (2) Authentication process: When using a mobile phone to sign or encrypt data, the authenti...
Embodiment 2
[0056] A method for realizing a mobile phone token based on key segmentation of the present invention utilizes a cryptographic machine and an authentication server in the cloud, and uses a mobile phone as a terminal carrier to realize the mobile phone as a token (Mobile AS Token) for signing or encryption; The cipher machine of the key is a cipher machine that improves the security of the key based on the key splitting technology. The cipher machine has the functions of key splitting, remote storage, multi-point authentication and key destruction after use; it includes the following steps:
[0057] (1) Registration process: After the encryption machine generates the key, it divides the key to generate key segments, and then double-encrypts the segmented key segments and outputs them to the mobile phone and the authentication server; including the following steps:
[0058] 1. The private key Mkey of the mobile phone is generated on the mobile phone, and the mobile phone device c...
Embodiment 3
[0077] like figure 1 As shown in the figure, a system for realizing mobile phone token based on key splitting of the present invention includes a cryptographic machine in the cloud, an authentication server and a mobile phone as a terminal carrier; Cipher machine, the cipher machine has the functions of key segmentation, remote storage, multi-point authentication and key destruction after use; the cipher machine is used to complete key generation, key segmentation, key encryption output, authentication of mobile phones, Key decryption, key synthesis, key use and key destruction; the mobile phone acts as a token to sign or encrypt data; the authentication server authenticates the mobile phone through a cipher machine.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com