Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Digital signing method based on mobile phone intelligent card

A digital signature and smart card technology, applied in the field of mobile smart cards, can solve the problems of mobile phone number forgery, security risks in business processing methods, cloning, etc., and achieve the effects of strong compatibility, great practical value, and high security.

Inactive Publication Date: 2010-07-28
SHANGHAI COS SOFTWARE CO LTD
View PDF1 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the above-mentioned prior art realizes the digital signature authentication of the remote service business, in the process, the user needs to submit the required business to the remote service center at the service request terminal, and it does not disclose whether the user can support and receive the service in any place. Passive digital signature and authentication initiated in different places. At the same time, mobile phone number forgery and cloning technologies have appeared in the binding of mobile phone accounts. Therefore, this business processing method of one-time signature verification has potential security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signing method based on mobile phone intelligent card
  • Digital signing method based on mobile phone intelligent card
  • Digital signing method based on mobile phone intelligent card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] Combine below figure 2 Specifically describe the process of the user actively initiating banking business without being in any UnionPay business location. Such as figure 1 and Figure 4 As shown, this embodiment specifically includes the following steps:

[0026] Step 1: Various banking platforms send the data to be signed to the bank's front-end computer;

[0027] Step 2: The front-end computer of the bank forwards the data to be signed to the mobile authentication platform;

[0028] Step 3: The mobile authentication platform organizes the data to be signed, and forwards the organized data to be signed to the user's mobile phone in the form of a short message containing 3DES encryption and MAC verification mechanism;

[0029] Step 4: The STK menu in the smart card with RSA encryption module and storage computing communication function displays text content, reminding the user to confirm the specific data in the banking business submitted by the user. If the user c...

Embodiment 2

[0046] Combine below image 3 It specifically describes how the user receives and executes the received banking business processing request when the user is not in each business point of the bank. Such as figure 2 and Figure 4 As shown, this embodiment specifically includes:

[0047]Step 1: The user's smart card receives the data to be signed sent by various banking platforms;

[0048] Step 2: The user clicks to view the data to be signed. The data to be signed is the key element of the specified transaction (such as the target account number, amount)

[0049] Step 3: The user confirms the data to be signed. If the user does not confirm, the banking business will not be executed, otherwise enter step 4;

[0050] Step 4: The smart card calculates the data to be signed

[0051] Step 5: The user signs the data and sends the result to the mobile authentication platform. If the user refuses to sign, the banking business will not be executed;

[0052] Step 6: The mobile auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a digital signing method based on a mobile phone intelligent card, which belongs to the technical field of mobile phone intelligent cards. The method comprises the following steps of: sending service information to a mobile authentication platform by a bank platform through a special network interface; sending data to be signed to an authentication terminal by the mobile authentication platform in a data short message mode; confirming the signature by hands or refusing to confirm the signature by a user through the authentication terminal, wherein when the signature is confirmed by hands, the intelligent card carries out encryption on the data to be signed, and sends a signing result to the mobile authentication platform, or else, the authentication process fails; after the mobile authentication platform receives the signing result, then forwarding to a digital certification authentication center to carry out signature verification processing; directly sending a signature verification result to the mobile authentication platform by the digital certification authentication center, and forwarding the signature verification result to the bank platform through the mobile authentication platform, and processing the services and authentication process results by the bank platform according to the signing result. The invention can use mobile phone short messages to realize safe and reliable digital signing authentication; and the method is simple and convenient and has high security.

Description

technical field [0001] The invention relates to a method in the technical field of smart cards for mobile phones, in particular to a digital signature method based on smart cards for mobile phones. Background technique [0002] With the rapid development of computer network javascript:; technology javascript:; and the vigorous promotion of information construction, more and more processing modes have begun to be electronic and networked, thus greatly improving efficiency and saving costs. Compared with the traditional face-to-face manual processing, the network-based electronic business processing system must solve the following problems: how to identify the real identity of the user on the network; how to ensure that the business data transmitted on the network is not tampered with; how to ensure that the network upload Confidentiality of business data sent; how to make user behavior on the network undeniable. Nowadays, more and more users have used mobile phones to surf t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04L9/32H04W12/069
Inventor 吴俊
Owner SHANGHAI COS SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products