Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system with protection digital signature mechanism and server

A technology for protecting digital and servers, applied in digital transmission systems, transmission systems, user identity/authority verification, etc., can solve problems such as long time consumption of storage components, and achieve the effect of improving system security

Active Publication Date: 2021-10-15
VTEAM FINANCIAL TECH SERVICE
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In some cases, the delivery of storage components will take a long time, for example, the company and the customer are located in different countries

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system with protection digital signature mechanism and server
  • Method and system with protection digital signature mechanism and server
  • Method and system with protection digital signature mechanism and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following specific embodiments will further illustrate the present disclosure in conjunction with the above-mentioned drawings.

[0026] The following description will refer to the accompanying drawings to more fully describe the present disclosure. Illustrated in the drawings are exemplary embodiments of the present disclosure. This disclosure may, however, be embodied in many different forms and should not be construed as limited to the exemplary embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art. Like reference numerals designate the same or similar components.

[0027] The terminology used herein is for the purpose of describing particular exemplary embodiments only and is not intended to limit the present disclosure. As used herein, the singular forms "a", "an" and "the" are intended to include the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method with a mechanism for protecting digital signatures, comprising: when a server receives a signature request from a client device, uses one of the unmarked random codes stored in a random code list of the server, and according to the Using the random code and the second part of the digital private key data stored in the server to generate and transmit a signature reply, so that the client device generates a private key to digitize the target data when receiving the signature reply signature; wherein, the private key is determined by the client device when the random code used by the server matches one of the unmarked random codes stored in the random code list of the client device , generated using the second part of the digital private key data and the first part of the digital private key data stored in the client device.

Description

technical field [0001] The present disclosure relates to a method, system and server for protecting a digital signature mechanism, in particular to a method, system and server for protecting a digital signature mechanism using random codes. Background technique [0002] In some digital signature (Digital Signature, DS) programs, the transmitter calculates the information through a hash algorithm to obtain a hash value, and then uses the private key of the transmitter to encrypt the hash value to form a digital signature. Then, attach the digital signature to the message and send it out together. After receiving the information, the receiving end uses the public key of the transmitting end to decrypt the digital signature to obtain the hash value of the transmitting end. Since the pairing relationship between the public key and the private key is confirmed, the "non-repudiation" of the received information can be determined. Then, the receiving end calculates the hash value ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3247
Inventor 温峰泰
Owner VTEAM FINANCIAL TECH SERVICE