Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for enhancing security of electronic signature tool in use for computer

An electronic signature tool and electronic signature technology, applied in key distribution, can solve problems such as user loss, achieve the effect of enhancing security and preventing forged electronic signatures

Active Publication Date: 2010-08-25
TENDYRON CORP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After the user has finished using the electronic signature tool, he still connects it to the computer for a long time. Since the password verification has been carried out during the original use, the verification status is valid until the electronic signature tool is reset. In this way, if the hacker remotely controls the If you have stolen this computer, you can secretly use this electronic signature tool to perform some data signing, encryption and other operations, and forge the electronic signature of the user of the electronic signature tool without the user noticing it, which may cause losses to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for enhancing security of electronic signature tool in use for computer
  • Method for enhancing security of electronic signature tool in use for computer
  • Method for enhancing security of electronic signature tool in use for computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and two preferred embodiments.

[0056] The main idea of ​​the present invention is: perform security authorization before using the electronic signature tool, and only after security authorization can corresponding security operations be performed. The security authorization process includes the following steps:

[0057] A. The local computer sends data for security authorization to the peer computer;

[0058] B. The peer computer performs security operations on the data used for security authorization, and returns the operated security authorization data to the local computer;

[0059] C. The local computer sends the security authorization data to the electronic signature tool;

[0060] D. The electronic signature tool verifies the security authorization data, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Before local computer uses electronic signature tool to carry out security operation for data, the disclosed method executes following steps: (1) local computer sends data in use for security authorization to opposite terminal; (2) carrying out security operation on the said data in use for security authorization, the opposite terminal returns operated data of security authorization back to the local computer; (3) the local computer sends data of security authorization to electronic signature tool; (4) the electronic signature tool checks the data of security authorization; if the check is passed, security operation is carried out by local computer on data; otherwise, security operation is not carried out. When user uses electronic signature tool for long time, the invention prevents other persons from forging electronic signature or doing other operations. Features are: easy of implementation, high generality and practicability, low cost etc.

Description

technical field [0001] The invention relates to a security technology for transmitting signature data between networked computers, in particular to a method for enhancing the security of an electronic signature tool used on a computer. Background technique [0002] At present, many services are provided on the Internet, such as online shopping, online transactions, and online banking. In order to ensure the security of data transmission in these businesses, many electronic signature tools have appeared, such as USBKEY, identity authentication (IC) card, etc., and there are also many corresponding application solutions, such as identity recognition for online transactions, transaction signature calculation for online payment, etc. , improving the security and convenience of network applications. [0003] Electronic signature tools are mainly used to perform security operations such as calculating electronic signatures, encrypting data, and verifying electronic signatures. F...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products