Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data signature method, system and device

A technology of data signature and algorithm, which is applied in the field of data security, can solve the problems of low difficulty in solving RSA algorithm and low security of data encryption

Active Publication Date: 2020-03-27
INSPUR BUSINESS MACHINE CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the more commonly used encryption algorithm is the RSA algorithm (proposed by Ron Rivest, Adi Shamir, and Leonard Adleman together, and RSA is composed of the initial letters of the three surnames). However, the RSA algorithm is less difficult to solve, resulting in data encryption security. lower sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data signature method, system and device
  • Data signature method, system and device
  • Data signature method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The core of the present invention is to provide a data signature method, system and device, which uses multiple operations of the SM2 algorithm and the SM3 algorithm to realize the signature encryption of the message to be signed. The algorithm is difficult to solve, thereby improving the security of data encryption.

[0050] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0051] Please re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data signature method. Firstly, an identity authentication file, a to-be-signed message and a public key and a private key which are generated by utilizing an SM2 algorithm are acquired; the identity authentication file and the public key are operated through an SM3 algorithm to obtain a first hash value, the first hash value and the to-be-signed message are operated to obtain a second hash value, and finally SM2 signature is conducted on the to-be-signed message according to the second hash value and the private key so that signature encryption can be conducted on the to-be-signed message. Visibly, the signature encryption of the to-be-signed message is realized by adopting multiple operations of the SM2 algorithm and the SM3 algorithm, and the solving difficultyof the algorithm is relatively high, so that the data encryption security is improved. The invention further discloses a data signature system and device which have the same beneficial effects as thedata signature method.

Description

technical field [0001] The invention relates to the field of data security, in particular to a data signature method, system and device. Background technique [0002] Due to the large amount of data and personal information transmitted on the Internet, it is very important to ensure the security of information during communication. In the prior art, in order to ensure the information security during the communication process, various encryption algorithms are usually used to encrypt the information during the communication process, so as to prevent the data from being illegally stolen and monitored. At present, the more commonly used encryption algorithm is the RSA algorithm (proposed by Ron Rivest, Adi Shamir, and Leonard Adleman together, and RSA is composed of the initial letters of the three surnames). However, the RSA algorithm is less difficult to solve, resulting in data encryption security. Sex is lower. [0003] Therefore, how to provide a solution to the above te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3247H04L9/3252H04L9/3066H04L2209/72
Inventor 齐煜
Owner INSPUR BUSINESS MACHINE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products