Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Signing method and system thereof

An algorithm and client-side technology, applied in the field of information security, can solve problems such as damage to users' legitimate interests, and achieve the effect of increasing security

Active Publication Date: 2010-01-20
FEITIAN TECHNOLOGIES
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] To sum up, there are security loopholes in the existing smart key devices, hackers can pretend to be users to conduct transactions without the user's knowledge, which has caused great harm to the legitimate interests of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signing method and system thereof
  • Signing method and system thereof
  • Signing method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] This embodiment provides a signature method. In this embodiment, the online transaction process between the client computer (referred to as the client) and the server computer (referred to as the server) by the user using online banking is taken as an example. The USB Key connected to the client uses the method provided by the embodiment of the present invention to sign the transaction data involved in the process, so as to improve the security of network data transmission. Wherein, it is assumed that the client has pre-installed the online banking control corresponding to the used online banking, and the USB Key software used in conjunction with the USB Key. In this embodiment, preferably, a hash algorithm is used when calculating the digest during the signature process. see figure 1 , the method includes:

[0089] Step 101: When the user conducts an online transaction, the user initiates an online transaction through the client computer and receives a transaction me...

Embodiment 2

[0154] Referring to the description of method implementation in Embodiment 1, this embodiment provides a signature system, see figure 2 , the system includes: a client 201 and a smart key device 202 connected to the client 201 .

[0155] see image 3 , client 201 includes:

[0156] Obtaining module 201A, used to obtain the signature original package;

[0157] Judging module 201B, for judging whether there is second information in the signature original package;

[0158] A digest calculation module 201C, configured to calculate a digest for the first information to obtain a first digest value when the second information exists;

[0159] A sending module 201D, configured to send the second information and the first digest value to the smart key device;

[0160] The receiving module 201E is used to receive the signature result sent by the smart key device;

[0161] see Figure 4 , the smart key device 202 includes:

[0162] A receiving module 202A, configured to receive t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a signing method and a system thereof, belonging to the field of information security. The method comprises the following steps: a user terminal obtains a signing original packet, and judges whether the signing original packet has second information; when the signing original packet has second information, the user terminal computes and abstracts first information to obtain a first abstract value; the user terminal sends the second information and the first abstract value to intelligent key equipment connected therewith; the intelligent key equipment outputs the second formation to the user and judges whether receives confirm information of the user; and if the confirm information of the user is received in a preset time, the intelligent key equipment computes and abstracts the second information to obtain a second abstract value, combines and compensates the first abstract value with the second abstract value to obtain a date to be singed, returns a singing result which is obtained by signing the date to be singed back to the user terminal, and otherwise, ends the operation.

Description

technical field [0001] The invention relates to the field of information security, in particular to a signature method and system. Background technique [0002] With the great convenience brought to people by the rapid development of the network, people rely more and more on the network for various activities, such as the transmission of network files and online banking transactions, which have gradually become an indispensable part of people's life and work. Since the network is a virtual environment after all, there are too many insecure factors, and in the network environment, data interaction network activities are bound to be carried out, especially network activities such as online banking and confidential file transmission, which have a great impact on the network. Therefore, people began to vigorously develop network information security technology. [0003] Digital signature technology is a network information security technology to ensure that user data will not b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products