Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information privacy and identity authentication method and digital signature program

A technology of information security and symmetric cryptographic algorithm, which is applied in the fields of computer software, network communication and information security, and can solve the problems of inability to cope with close voyeurism, low operation efficiency, and lack of consideration of hardware diversity support of cryptographic devices.

Inactive Publication Date: 2010-06-23
杨筑平
View PDF3 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This invention emphasizes the flexibility of selection, but there are several deficiencies: first, the operation efficiency is low, and after the selection, it needs to be marked and a password is set; The symmetric encryption algorithm AES is adopted, and the password is hidden in the ciphertext, so the risk of key leakage due to exchange is high
"Login authentication method" (Chinese Invention Patent Application No. 200810109084.7), proposed that under the challenge response mechanism, it is compatible with two methods of password authentication and signature authentication to allow users to choose independently. Hardware diversity support is not considered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information privacy and identity authentication method and digital signature program
  • Information privacy and identity authentication method and digital signature program
  • Information privacy and identity authentication method and digital signature program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] An embodiment of the information security method of the present invention. Compile a utility program with a Windows dialog box structure, named "information security program". The main operation interface structure of the program, such as image 3 Shown. The program integrates a cryptographic device product with a USB interface called "Crypt Golden Armor", loads its supporting API dynamic link library, and calls its programming interface functions to implement encryption and decryption functions. In response to equipment change messages, the program automatically detects the access and removal of the cryptographic device, and provides a criterion for the availability of the cryptographic device for encryption and decryption operations. Program function interface, refer to image 3 design. Program function flow processing, refer to figure 1 with figure 2 achieve. The symmetric algorithm for encrypting information uses AES; the asymmetric cryptographic algorithm for en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information privacy and identity authentication method and a digital signature program, which relate to the technical filed of computer software, network communication and information safety and are particularly used for the information privacy of instant messaging, electronic mails and file information. A symmetrical cryptographic algorithm and an unsymmetrical cryptographic algorithm are combined, and a key ciphertext and an information ciphertext form a complex ciphertext. The effect of text confidentiality and sharing is reached through the integration of effects of multiple keys, and the effect of text confidentiality interlocking is realized through the effect of the combination of multiple keys. The signature is used for challenging the response mechanism, more than two cipher devices are compatible, the effect of automatic identification distinction and / or self-customization by users can be realized, and the identity authentication is more flexible and complete. A convenient and practical data signature program is also designed, and the convenient and practical data signature program assists a target program for use and runs independently for realizing the instant signature and the instant verification on window text information.

Description

Technical field [0001] The invention relates to the technical fields of computer software, network communication and information security. Background technique [0002] Information often involves the confidentiality, privacy, and property of institutions and individuals; in the network environment, especially in the Internet environment, these important information can easily be stolen and leaked, leading to irreparable losses. Therefore, information confidentiality has become a common concern. The basic technical idea of ​​information confidentiality is to use a certain cryptographic algorithm combined with a key to encrypt the plain text of the information that needs to be kept secret, and generate garbled cipher text. There are many kinds of current practical cryptographic algorithms, some of which have already become technical standards, such as DES, AES, RSA, DSA, etc. Information is most likely to be leaked in the link of input, storage and transmission, and the encryptio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 杨霄杨筑平周跃平
Owner 杨筑平
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products