Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

41 results about "Digital signature forgery" patented technology

In a cryptographic digital signature or MAC system, digital signature forgery is the ability to create a pair consisting of a message, m, and a signature (or MAC), σ, that is valid for m, where m has not been signed in the past by the legitimate signer. There are three types of forgery: existential, selective, and universal.

Self-authentication of value documents using digital signatures

An encryption-free technique for enabling the self-authentication of value documents (including personal and commercial checks) presented at a point of purchase or financial institution. Certain data contained on the value document may be signed with a first digital signature and authenticated with a public key certificate issued from a trusted certificate authority. The signed data and public key certificate are stored on the value document, preferably in a two-dimensional bar code data format. In the case of certain personal value documents (such as checks, credit cards, passports, birth certificates, Social Security cards, etc.), a unique personal identification number (PIN) also may be included in the document data that is signed by a second digital signature. At a point of purchase, a merchant or teller can scan and read the data stored in the two-dimensional bar code and other magnetically recorded information, and together with the PIN the customer provides, can authenticate the value document thus presented using the second digital signature. Alternatively, if the customer is not present, if the personal value document contains the second digital signature, the document may be verified using a PIN-generating algorithm or other method that generates all permutations of PINs. The first digital signature alone may be used to authenticate selected data within the personal value document even when the PIN is not available. Similarly, in the case of a commercial value documents, authentication of pre-printed data may be based entirely upon only the first digital signature.
Owner:UNISYS CORP

Cloud storage data common auditing method possessing secret key leakage resistance characteristic

The invention belongs to the communication technology field and especially relates to a cloud storage data common auditing method possessing a secret key leakage resistance characteristic. The method mainly comprises the following steps of system initialization: blocking processing is performed on a data file so as to generate public and private key pairs of a cloud user and a cloud server; auditing identification generation: the cloud user sends the data file and a label, and a signature set of a data block to the cloud server; auditing challenge response: a third party auditor generates auditing challenge information and sends to the cloud server; the cloud server calculates combination information according to the auditing challenge information, gets signatures together and sends an auditing identification response information to the third party auditor; and the third party auditor verifies validity of the auditing identification response information. The method has advantages that a condition that digital signature forgery and auditing identification response information forgery caused by leakage of a user signature private key can be prevented; and a malicious cloud server is ensured not to generate the forged auditing identification response information to cheat a TPA and to pass through an auditing verification process.
Owner:SOUTHWEST PETROLEUM UNIV

Digital signature method, system and device

The invention relates to the technical field of cryptology, and particularly provides a digital signature method, system and device. The digital signature method is applied to a server, a second private key ciphertext is stored in the server, the second private key ciphertext comprises a first ciphertext fragment and a second ciphertext fragment, and the second ciphertext fragment is obtained by encrypting the first private key ciphertext according to user identification information input by a user. The first private key ciphertext is encrypted according to the user identification information;thus, the digital signature process is simplified; the second ciphertext fragment is decrypted according to a client decryption key generated by the client to obtain a first private key ciphertext; it is ensured that the second private key ciphertext can be decrypted only under the condition that the user participates in; therefore, the digital signature is completed according to the first private key ciphertext, a counterfeiter cannot forge the user signature singly, the use security of the user private key is improved, the second private key ciphertext is divided into a plurality of segments to be stored, and the security of the user private key is further improved.
Owner:信安神州科技(广州)有限公司

PDF signature method and system supporting SM3 password hash algorithm and SM2 digital signature algorithm

InactiveCN107947939ASolve the problem of signingSignature Efficiency LimitsUser identity/authority verificationDigital data protectionPasswordDigital Signature Algorithm
The invention discloses a PDF signature method and system supporting the SM3 password hash algorithm and the SM2 digital signature algorithm. The method comprises the following steps that a sending end sends a PDF document to be signed; a receiving end is provided with a digital certificate of a signer, the receiving end acquires the PDF document and checks the validity of the digital certificateof the signer; the SM3 password hash algorithm is used for carrying out abstract on the obtained PDF document, and an abstract message to be signed is generated; the SM2 digital signature algorithm and a private key are used for signing the abstract message to be signed, and a digital signature value is generated; the digital signature value is verified; and a signature body of the CAdES format isgenerated by using the generated digital signature value and the digital certificate of the signer, a PDF document containing the digital signature is synthesized, and the PDF signature is completed.According to the PDF signature method and system, the SM3 password hash algorithm and the SM2 digital signature algorithm are applied to the PDF signature, so that the digital signature is safer, fast and reliable.
Owner:杭州尚尚签网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products