Method for obtaining digital siguature and realizing data safety

A digital signature and data security technology, which is applied in the direction of electronic digital data processing, security devices, digital transmission systems, etc., can solve problems such as long calculation time, key leakage, and loss of both parties in the transaction, so as to reduce CA authentication links and avoid Private key management, the effect of reducing the implementation process

Inactive Publication Date: 2004-09-29
DATANG MICROELECTRONICS TECH CO LTD
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, simply using the 3DES algorithm for encryption and decryption has the following problems: First, the sending and receiving parties of the transaction information must use a unique and unchanged transmission key, which puts forward very high requirements for key management, often because of the key. Inadvertent management causes the key to be leaked, resulting in data insecurity; secondly, if the same key is shared for a long time, once the transmission key is reversely deduced by the exhaustive method, the security and confidentiality of the information will be difficult to guarantee; thirdly, the lack of digital The signature mechanism cannot prevent the possibility of users denying a certain transaction, and it is also difficult to guarantee the integrity of the data, causing immeasurable losses to both parties of the transaction
At the same time, the private key management mechanism of the RSA algorithm needs to issue a digital certificate through an authoritative CA (Certification Authority, that is, a certification center), which makes the operation and management complicated.
[0007] In mobile e-commerce applications, it is the Subscriber Identification Module (SIM (Subscriber Identify Module, i.e. Subscriber Identification Module) card for the GSM network; for the CDMA network, the UIM (User Identify Module, That is, the Subscriber Identity Module (SIM) card), the CPU processing speed and data processing capacity of the chip are relatively low
Using the RSA encryption algorithm takes too long to calculate and cannot meet the basic visual effect requirements of mobile phone menu operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for obtaining digital siguature and realizing data safety
  • Method for obtaining digital siguature and realizing data safety
  • Method for obtaining digital siguature and realizing data safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] An embodiment of the application of the present invention in the mobile transaction process is described below with reference to the accompanying drawings.

[0045] The following comparison figure 1 Explain the principle of registering the initial session key in the method for realizing data security.

[0046] In the initial stage of information interaction with the trading platform, the SIM card or UIM card must first register the initial session key. The session key is the common encryption and decryption key adopted by both parties of data exchange.

[0047] ①The card end generates the initial data A of the Hash data chain

[0048] The initial data A of the Hash data chain is composed of 16 bytes, including the last 8 bytes of ICCID (Integrated Circuit Card Identifier, that is, the integrated circuit card user identification number) and 8 bytes of random numbers. The ICCID of each card guarantees The digital signatures and session keys generated by all SIM cards o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method of obtain digital signature and realizing data safety used especially in mobile communication system to ensure safe data transmission includes: adopting one-way inreversible predication algorithm to generate one-way inreversible data chain for cipher key management and to make the conversation cipher key for enciphering and deciphering changeable; adopting the one-way inreversible predication algorithm for digital signature of the conservation cipher key generated dynamically; and adopting symmetrical enciphering algorithm and verifying code confirming process in verifying the enciphered information to further ensure the security and integrality of the information. The method has lowered requirement in the data processing speed and capacity of the processor and is especially suitable for the application field with relatively high safety and speed requirement in mobile communication system.

Description

technical field [0001] The invention relates to a method for obtaining a digital signature and realizing data security, in particular to a method for obtaining a digital signature and realizing data security based on digital mobile communication technology. Background technique [0002] With the rapid development of the mobile communication market, the competition among mobile operators is becoming more and more fierce. And they are also facing the same problem: on the one hand, the number of mobile phone users is growing rapidly, while on the other hand, ARPU (Average Revenue Per User is the average revenue per user) is declining. In order to increase ARPU, mobile operators are committed to providing more value-added services to stimulate user consumption. In recent years, data value-added services based on SMS (Short Message Service) and WAP (Wireless Application Protocol) have made great progress, and the most profitable one is mobile commerce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F7/58G06F17/00H04L9/00H04W12/02
Inventor 王建徐璐
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products