Novel identity identification and digital signature method
An identity authentication and identity technology, applied in the field of security authentication and digital signature, can solve the problem of limited capacity of K shield
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0039] According to the first embodiment of the present invention, a more secure digital signature method is as follows.
[0040] First of all, there is a cryptographically large composite number M in the K-shield 1 =P 1 *Q 1 where P 1 and Q 1 are strong primes, M 1 We call it the RSA number, P can be destroyed for safety 1 , Q 1 , that is, no one knows P 1 , Q 1 Make sure 1cannot be deciphered, we call this M 1 is the RSA password;
[0041] Personal random generation number K 1 , which can be recorded on paper or other hard-to-find places, or stored in different places using a secret sharing scheme; choose a key K that is relatively easy to remember 2 , which is equivalent to the password password that the current security system requires us to remember, we call K 1 and K 2 Master key seed; K is calculated from the master key seed 3 =K 1 K2 MOD M 1 , known K 1 , K 3 and M 1 ask for K 2 is a discrete logarithm problem. K 1 and K 2 It is the most import...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com