Private key processing method, terminal and key center based on sm2 algorithm
A processing method and private key technology, applied in the field of information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.
[0041] The embodiment of the present invention is based on the SM2 elliptic curve public key algorithm. In order to facilitate understanding of the symbols or terms in the embodiment of the present invention, an explanation is given below:
[0042] E(F q ): F q The set of all rational points (including the point O at infinity) on the upper elliptic curve E;
[0043] f q : a finite field containing q elements;
[0044] O: A special point on the elliptic curve, called the infinity point or zero point, is the identity element of the additive group of elliptic curves;
[0045] G: A base point of an elliptic curve whose order is a prime number;
[0046] Hash():...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com