A key authorization method, device and digital signature system
A digital signature and key technology, applied in the field of information security, can solve problems such as insecure key authorization
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application.
[0038] It should be noted that like numerals and letters refer to like items in the following figures, so once an item is defined in one figure, it does not require further definition and explanation in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", etc. are only used to distinguish the description, and cannot be understood as indicating or implying relative importance.
[0039] In order to solve the problem of insecurity of key authorization in the prior art, the embodiment of the present application cleverly proposes a key authorization scheme, which generates a key application factor through the application device, and sends the key to the target device. key application factor, where the key application factor is used to app...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


