Signature verification method, device and system

A signature verification and equipment technology, applied in the field of communications, can solve the problems of inability to use high-performance processing hardware, consume CPU running time, and not have digital signatures, so as to ensure authenticity and integrity, improve security, and improve reliability. sexual effect

Active Publication Date: 2017-09-29
SHENZHEN GOODIX TECH CO LTD
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The digital signature algorithm is usually a large number operation, which consumes a lot of CPU running time
In order to reduce costs, embedded systems cannot use high-performance processing hardware and do not have the ability to execute digital signatures
In embedded systems that require reliability and security guarantees, in order to protect the authenticity and integrity of data, related security measures such as digital signatures and verifications need to be used, but this will inevitably require additional costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature verification method, device and system
  • Signature verification method, device and system
  • Signature verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] figure 1 A schematic flowchart of data transmission through digital signature technology is shown. figure 1 The digital signature algorithm used in the method of transmitting data is the RSA public key cryptography algorithm. In this method, both the sending end 10 and the receiving end 11 have the capability of digital signature, including:

[0043] S110, the sender 10 acquires the signature Sig of the data M to be transmitted M .

[0044] S120, the sending end 10 sends the data M and the signature Sig to the receiving end 11 M .

[0045] S130, the receiver 11 verifies the signature Sig M and data M.

[0046] Specifically, take Alice and Bob respectively using the sending end and the receiving end to perform identity authentication as an example for illustration. When Alice needs to send data M to Bob, she uses her own private key (SK) to sign the data M to get Sig M . Wherein, the data M is plaintext data. It should be noted that only Alice owns Alice's priv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the invention provide a signature verification method, device and system. The method here includes the following steps: a transmitting end determining a signature of a to-be-transmitted message based on a prive key and a digital signature algorithm; a console verifying the message and the signature based on a public key and the digital signature algorithm, if the public key and the private key correspond, the console determining the verification code of the message based on a preset secret key, wherein it is much easier to determine the algorithm used for the verification code than to determine the digital signature algorithm, the console and the transmitting end have digital signature functions; a receiving end verifies the message based on the verification code and acquiring the message, wherein the receiving end is an embedded system. According to the embodiments of the invention, the console replaces the receiving end to execute digital signature algorithm, such that the receiving end can verify data without having to use complex digital signagure algorithm. Therefore, according to the embodiments of the invention, the method here can guarantee that the data received by the low-cost hardware receiving end is genuine and complete.

Description

technical field [0001] The present application relates to the communication field, and more specifically, to a signature verification method, device and system in the communication field. Background technique [0002] Digital signature technology is widely used in the security field, which can enable the receiver to effectively verify the authenticity and non-repudiation of data. The digital signature algorithm may be, for example, an RSA public key cryptography algorithm, an elliptic curve cryptography (Elliptic curve cryptography, ECC) algorithm, and the like. And, because the hash Hash function can guarantee the integrity of the input data, usually digital signature technology combined with the Hash function can guarantee the integrity, authenticity and non-repudiation of the data. [0003] The digital signature algorithm is usually a large number operation, which consumes a lot of CPU running time. In order to reduce costs, embedded systems cannot use high-performance ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/3242H04L9/3249
Inventor 孔维国王兵孙文彬
Owner SHENZHEN GOODIX TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products