A method and system for implementing mobile phone tokens based on key splitting

A mobile phone token and mobile phone technology, applied in the field of information security, can solve problems such as the inability of USBKey to adapt to the inconvenient application environment of mobile phone terminals, and achieve the effect of improving security and preventing cheating.

Active Publication Date: 2020-05-26
北京信任度科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical task of the present invention is to address the above deficiencies and provide a method for realizing mobile phone tokens based on key splitting to solve the problem that USB Key cannot adapt to the application environment of mobile phone terminals and is inconvenient to carry when adapting to other types of hardware devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for implementing mobile phone tokens based on key splitting
  • A method and system for implementing mobile phone tokens based on key splitting
  • A method and system for implementing mobile phone tokens based on key splitting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] like figure 1As shown in the figure, a method for realizing a mobile phone token based on key splitting of the present invention utilizes a cryptographic machine and an authentication server in the cloud, and uses a mobile phone as a terminal carrier to realize the mobile phone as a token (Mobile AS Token) to sign or encrypt data. ; The cipher machine used to generate the key is a cipher machine that improves the security of the key based on the key splitting technology. The cipher machine has the functions of key splitting, remote storage, multi-point authentication and key destruction after use; including the following step:

[0051] (1) Registration process: After the encryption machine generates the key, it divides the key to generate key segments, and then double-encrypts the segmented key segments and outputs them to the mobile phone and the authentication server;

[0052] (2) Authentication process: When using a mobile phone to sign or encrypt data, the authenti...

Embodiment 2

[0056] A method for realizing a mobile phone token based on key segmentation of the present invention utilizes a cryptographic machine and an authentication server in the cloud, and uses a mobile phone as a terminal carrier to realize the mobile phone as a token (Mobile AS Token) for signing or encryption; The cipher machine of the key is a cipher machine that improves the security of the key based on the key splitting technology. The cipher machine has the functions of key splitting, remote storage, multi-point authentication and key destruction after use; it includes the following steps:

[0057] (1) Registration process: After the encryption machine generates the key, it divides the key to generate key segments, and then double-encrypts the segmented key segments and outputs them to the mobile phone and the authentication server; including the following steps:

[0058] 1. The private key Mkey of the mobile phone is generated on the mobile phone, and the mobile phone device c...

Embodiment 3

[0077] like figure 1 As shown in the figure, a system for realizing mobile phone token based on key splitting of the present invention includes a cryptographic machine in the cloud, an authentication server and a mobile phone as a terminal carrier; Cipher machine, the cipher machine has the functions of key segmentation, remote storage, multi-point authentication and key destruction after use; the cipher machine is used to complete key generation, key segmentation, key encryption output, authentication of mobile phones, Key decryption, key synthesis, key use and key destruction; the mobile phone acts as a token to sign or encrypt data; the authentication server authenticates the mobile phone through a cipher machine.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for realizing a mobile phone token based on key division, and belongs to the technical field of information security. The problems that a USB Key cannot adapt to the application environment of mobile phone terminals and that other adaptive hardware devices are inconvenient to carry are solved. The adopted technical scheme is as follows: the method for realizing the mobile phone token based on key division comprises the following steps: after a cipher machine generates a key, dividing the key to generate key segments, performing dual encryption on the divided key segments, and outputting the key segments to a mobile phone and an authentication server; authenticating the mobile phone by the authentication server through the cipher machine; after the authentication, separately decrypting the key segments by the cipher machine, integrating the key segments into a complete key, and signing or encrypting the data; and after the key is used once, destroying the key by the cipher machine. The system for realizing the mobile phone token based on key division comprises a cloud cipher machine, an authentication server and a mobile phone serving as a terminal carrier.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for realizing a mobile phone token based on key segmentation. Background technique [0002] A digital certificate is a series of numbers that mark the identity information of all parties in the Internet communication, and provides a way to verify the identity of the communication entity on the Internet. A stamp or seal (or a signature added to a digital ID). A digital certificate is a file that is digitally signed by a Certificate Authority (Certificate Authority, CA for short) and contains information about the owner of the public key and the public key. People can use digital certificates to identify each other online. [0003] In the PC environment, USB Key is widely used in the field of identity authentication, such as online banking, online tax declaration, etc. USBKey is a hardware device with USB interface. It has a built-in smart card ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/085H04L9/0863H04L9/0891H04L9/3247H04L63/067H04L63/08H04L63/083
Inventor 马臣云
Owner 北京信任度科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products