Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile phone shield signed key protection method

A signature key and mobile phone shield technology, applied in the field of information security, can solve the problems of increased risk, security dependence of signature fragment transmission, and inability to guarantee, and achieve the effect of exemption from dependence

Active Publication Date: 2017-10-24
四川思安特科技有限公司
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The frequent use of the mobile shield signature key is likely to cause leakage
In particular, malware has the potential to hijack certain apps installed on the phone
[0003] At present, in the storage process of the general mobile phone shield signature key, although there is also a method of shard storage, it cannot be guaranteed that the shards held by the key shard holder cannot synthesize a complete key during the storage process. The communication link of key shards has the risk of being hijacked by malware. Among them, the risk of core signature shards, especially the shard holders who interact with the server, is further increased. Therefore, the transmission security of signature shards depends on the security of the channel. safe, not guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone shield signed key protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] A mobile phone shield client signature method provided by the embodiment of the present invention, the process is as follows figure 1 shown, including the following steps:

[0028] Step1. The mobile shield client pre-creates a set number of processes participating in the signature, and sets the processes to be executed by the server. In this field, the concept of process refers to the execution entity routine of the shard signature algorithm in the threshold signature process. Except for the processes executed by the server, other processes are executed by the Mobile Shield client.

[0029] According to the preset threshold (T, N), create N processes that may participate in the signature; by default, process 1 will be run by the server, and the rest of the processes will be in the mobile shield client. It is also assumed that, only and only during the execution of the algorithm, the channel between No. 2 to No. N processes and the parent process, that is, the mobile s...

Embodiment 2

[0052] An embodiment of the present invention based on elliptic curves (refer to commercial secret standard SM2) is given below.

[0053] Algorithm 1. System setup Algorithm Setup, executed by the server, is used to select appropriate system parameters and system master keys according to the requirements of the system security level (characterized by the key length L by default). The algorithm consists of the following steps:

[0054] Step 1: Select elliptic curve parameters p, a, b, n (refer to standard SM2);

[0055] Step 2: Select the x-coordinate Gx and y-coordinate Gy of the elliptic curve generation point G (refer to standard SM2);

[0056] Step 3: Select a L-bit random number s as the master key, and calculate the public point PP=[s]G, where [s]G represents s times of self-addition of G (refer to standard SM2 for the fast calculation process).

[0057] Step 4: Output system public parameters (p, a, b, n, Gx, Gy, PP) and system master key s.

[0058] Algorithm 2. Blin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a mobile phone shield signed key protection method, comprising: creating by a mobile phone shield user terminal the signature involved processes with a certain quantity in advance and setting the server executed processes; acquiring by the mobile phone shield user terminal a signature key and segmenting the key to obtain key fragments, wherein each signature involved process is allocated with a key fragment correspondingly, and after the blindness of the key fragments corresponding to the server executed processes, sending the key fragments to the server; randomly activating a plurality of signature involved processes by the cell phone shield user terminal and using the activated processes to process the signature information to perform threshold signature on the to-be-signed information according to the corresponding key fragments to obtain the signature fragments; and performing signature combination on the plurality of signature fragments by the mobile phone shield user terminal to obtain a full signature for the to-be-signed signature information. The method can avoid the risk of hijacking a number of signature fragments by malicious software in the communication link and avoids the dependence of the core signature fragment transmission on a secure channel.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for protecting a mobile phone shield signature key. Background technique [0002] The frequent use of the mobile shield signature key may easily lead to leakage. In particular, malware has the potential to hijack certain apps installed on the phone. [0003] At present, in the storage process of the general mobile phone shield signature key, although there is also a method of shard storage, it cannot be guaranteed that the shards held by the key shard holder cannot synthesize a complete key during the storage process. The communication link of key shards has the risk of being hijacked by malware. Among them, the risk of core signature shards, especially the shard holders who interact with the server, is further increased. Therefore, the transmission security of signature shards depends on the security of the channel. Safety cannot be guaranteed. Contents...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/085
Inventor 黄晓芳宋鲁华
Owner 四川思安特科技有限公司