Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Digital signature supporting personal trusted device and its method for implementing signature

A digital signature and device technology, applied in the field of information security, can solve the problems of attacking signature software, unable to directly provide digital signature services, attacking smart card drivers, etc., to achieve the effect of convenient use and portability

Active Publication Date: 2010-05-12
BEIJING WATCH DATA SYST
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] (4) Attack signature software;
[0013] (5) attack smart card driver;
[0015] (7) Tampering with the output to deceive the user's eyes
[0025] However, existing handheld devices are mainly designed for purposes such as calls and memos, and cannot directly provide digital signature services by themselves.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature supporting personal trusted device and its method for implementing signature
  • Digital signature supporting personal trusted device and its method for implementing signature
  • Digital signature supporting personal trusted device and its method for implementing signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] As mentioned above, information security includes the security of data storage, computing, and data transmission. These security needs to be guaranteed by the hardware and software that constitute the computing environment. Although the existing smart card or USB KEY can guarantee the security of data storage and data calculation, it can realize a personal security environment in a certain sense. However, since it does not have a keyboard and display screen, its storage and calculation functions depend on the data interaction between them and the personal computer, so it is difficult to ensure the security of data transmission. Though personal computer has keyboard and display screen, is convenient for people to carry out corresponding computing work, but the security of itself lacks guarantee.

[0063] The inventor has analyzed the deficiencies of the above-mentioned smart card and personal computer, and thinks that it is necessary to combine the safety and reliability...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a personal credit device which supports the digital sign and a method for signing. Said device comprises a communication interface and a user interface, as well as a communication data processing module, a communication data analyzer and a safety element. Wherein, the communication data processing module is connected to the communication data analyzer; the communication data processing module via the interface of safety element is connected to the safety element. Said personal credit device can be GSM mobile telephone and the safety element can be PKSIM card. With saidinvention, the safety of key storage of digital signal and the data transmission can be conformed. The invention has wider application prospect.

Description

technical field [0001] The invention relates to a personal trusted device (Personal Trusted Device, PTD) that supports digital signatures, and also relates to a method for using the personal trusted device to perform digital signatures, belonging to the technical field of information security. Background technique [0002] At present, with the deepening of the informatization process and the rapid development of the Internet, people's work, study and lifestyle are undergoing tremendous changes, work efficiency has been greatly improved, and information resources have been shared to the greatest extent. But at the same time, it must be noted that the information security problem following the development of informatization is becoming more and more prominent. If this problem is not solved well, the process of informatization development will be hindered. [0003] Personal computer is currently the most commonly used information processing terminal equipment, but due to its ow...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 高翔雷继业
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products