Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Digital signature verification method and system

A technology of digital signature and verification method, applied in the direction of digital transmission system, transmission system, user identity/authority verification, etc., can solve the problems of low strength of file protection PIN code and easy cracking of digital signature, and improve the resistance to PIN code. The ability to guess attacks, the effect of simplifying complexity

Active Publication Date: 2017-06-27
SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a digital signature verification method and system to solve the problem that the digital signature is easily cracked due to the low strength of the file protection PIN code during the process of keeping the private key of the digital signature file private and using it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature verification method and system
  • Digital signature verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0058] refer to figure 1 , the embodiment of the present invention proposes a digital signature verification method, comprising the following steps:

[0059] Step A: generating a master key, a first parameter set and a second parameter set;

[0060] Step B: Obtain the identification ID_A of the signing terminal, and generate the identification private key S_A according to the master key, the first parameter group, the second parameter group and the identification ID_A;

[0061] Step C: Send the identification private key S_A and the first parameter group to the signing terminal;

[0062] Step D: Sign the message M through the signing terminal, and the signing terminal obtains a digital signature Q;

[0063] Step E: Receive a request from the verification terminal, and send the first parameter group and the second p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a digital signature verification method and system. The user identity is used as the public key of the user, the private key is calculated by the trusted third party using the identity private key generation method, and the user does not need to apply for and exchange the certificate, thus greatly simplifying the complexity of cryptographic system management. The generated identity private key is protected using the PIN code and system features at the signature terminal. The signature terminal signatures information using the protected identity private key and a part of identity cryptographic system parameters, so that the digital signature function is achieved, and the ability to resist the PIN code guessing attack is effectively improved.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to a digital signature verification method and system. Background technique [0002] A digital signature (also known as a public key digital signature, electronic signature) is a method similar to an ordinary physical signature written on paper, but it uses the technology in the field of public key encryption to identify digital information. A set of digital signatures usually defines two complementary operations, one for signing and the other for verification. [0003] The signing process means that the signing user uses the private key to transform the signed message to generate a digital signature. The verification process refers to verifying the user's digital signature using the public key and the message to be signed. Users need to protect the signature private key to prevent key leakage. Keys stored in files are easy to be stolen by attackers. The generally adopted protecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0861H04L9/3247
Inventor 程朝辉杜峰吴福印周枭淳
Owner SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products