Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication system realizing method supporting exclusive control of digital signature key

A digital signature and authentication system technology, applied in the field of information security, can solve problems such as not being able to meet the digital signature key, and achieve the effects of simple scheme, wide application range, and convenient operation and use

Inactive Publication Date: 2011-08-31
北京联合智华微电子科技有限公司
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The above method seems rigorous, but there are actually two key problems: First, although the signature private key and the key generation process appear to be in the hands of the user, the real role of trust guarantee is that the CA uses its root key to verify the public key. digital signature
However, the system is currently based on the Key Management Center (KMC) as the root of trust. KMC can calculate the private keys of all users through the seed private key it holds, which cannot meet the requirements of relevant laws. The digital signature key is provided by the user himself. control requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system realizing method supporting exclusive control of digital signature key
  • Authentication system realizing method supporting exclusive control of digital signature key
  • Authentication system realizing method supporting exclusive control of digital signature key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments.

[0041] 1. Construct seed key and seed public key set

[0042] The seed key is the calculation base used by the CPK system to calculate the identification key. It is composed of the seed public key seedPK and the seed private key seedsk. The seed private key seedsk is secretly kept by the key management center KMC and used to generate the user identification private key isk: The seed public key seedPK can be made public and is used to calculate the user's identification public key iPK.

[0043] The seed public key set referred to in the present invention is composed of a set of two seed public keys, one of which is used to calculate the digital signature public key cPK, and the other is used to calculate the identification public key for key exchange. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, in particular to an authentication system supporting exclusive control of a digital signature key on the basis of a combined public key. A seed key consisting of multiple key sections is constructed and comprises a seed public key and a seed private key; by using a user identifier, a key management centre generates a user identifier private key through the seed private key and writes the user identifier private key into a key device; the key device starts an initialization program to automatically generate a composite private key for digital signature and a random public key digitally signed by the user identifier private key while used for the first time; and the composite private key and the digitally signed random public key are written into a secure storage area of the key device, and the user identifier private key and process data are destructed. The digital signature key is automatically produced and controlled by the user so that regulations of relevant laws are satisfied; furthermore, the exclusive control of the digital signature key by the user is assured through a third party of register link; and one-way key exchange, key escrow and key recovery are realized through providing the identifier key for the key exchange.

Description

Technical field [0001] The present invention relates to the technical field of information security, in particular to a method for implementing an authentication system based on a combined public key (CPK) supporting exclusive control of a digital signature private key. Background technique [0002] As the network and information technology gradually enter people’s production and life, protecting the authenticity, security, and responsibility (non-repudiation) of information has become a common concern for the government and society. To solve the above problems, authentication systems are needed to provide support. Around the construction of the authentication system, two major technical systems have been formed. One is certificate authentication based on traditional public key cryptography, such as public key infrastructure (PKI) authentication system, and the other is identification authentication based on public key cryptography for identification, such as combined public key c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 赵建国
Owner 北京联合智华微电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products