Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for safety protection

A technology for security protection and security information, applied in the computer field, can solve problems such as cumbersome operation steps and large differences in digital signatures

Active Publication Date: 2021-05-14
北京信安世纪科技股份有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, the control or plug-in for digitally signing the information to be processed has a greater correlation with the browser application. Therefore, there are large differences in the digital signature operation, and the operation steps are cumbersome, which brings great inconvenience to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for safety protection
  • A method and device for safety protection
  • A method and device for safety protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments of the present application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present application.

[0056] In order to reduce the difference in digital signature operations and simplify the cumbersome steps of digital signature operations when performing security protection on information, in the embodiment of this application, a method of security protection is designed, which allows any browser application to pass The specified protocol sends a digital signature command containing the information to be processed to the security protection a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application discloses a method and device for security protection. The method is that the security protection application program receives a digital signature command sent by any browser application program through a specified protocol, wherein the digital signature command contains information to be processed; The information to be processed included in the digital signature instruction, and the digital signature certificate specified by the user is determined; based on the key contained in the digital signature certificate, any control or plug-in is used to digitally sign the information to be processed to obtain the signature value of the information to be processed ; Send the security information including the signature value to the browser application, triggering the browser application to send the security information to the server. In this way, there is no need to judge the type, version, and number of browser application programs, and the security protection application program uniformly performs digital signatures on the information to be processed, which realizes the consistency of digital signature operation steps and simplifies digital signatures. tedious steps.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method and device for security protection. Background technique [0002] With the rapid development of computer technology, in order to improve the security of Internet information transmission, when a user logs in to the system or interacts with important business information, the key contained in the certificate issued by the server is usually used to digitally sign the interactive information , to protect the information security. [0003] The so-called digital signature is based on the local key, using the signature algorithm to calculate the characteristic data of the interactive information to obtain the signature value, so that the server can use the public key to verify the signature value and determine the authenticity and integrity of the user's information . [0004] Under the prior art, see figure 1 As shown, it is a flow chart of a security protectio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/32
CPCH04L9/3247H04L9/3263H04L63/0823H04L67/02H04L69/162
Inventor 沈奇张庆勇王翊心
Owner 北京信安世纪科技股份有限公司