Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Digital signature method, system and device

A digital signature and signature data technology, applied in the field of cryptography, can solve problems such as forged user signatures, reduced security performance, inconvenient usability and portability, etc.

Active Publication Date: 2020-05-08
信安神州科技(广州)有限公司
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, this method is extremely inconvenient in terms of usability and portability. Users need to carry a USB shield at any time to complete the digital signature, and the user experience is poor
In order to solve the problem of portability, in related technologies, the private key is stored in the client in the form of software, so that the user does not need to carry a USB shield, but the security performance is greatly reduced, and it is entirely possible for the attacker to obtain the complete key from the client. Therefore, how to improve the security of digital signatures becomes an important issue

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature method, system and device
  • Digital signature method, system and device
  • Digital signature method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0127] The technical solutions of the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described implementations are part of the implementations of the present disclosure, but not all of them. Based on the implementation manners in the present disclosure, all other implementation manners obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present disclosure. In addition, the technical features involved in different embodiments of the present disclosure described below may be combined with each other as long as they do not constitute a conflict with each other.

[0128] In the first aspect, the method provided by the present disclosure is applicable to a digital signature system, figure 1 A digital signature system suitable for implementing the disclosed methods in some embodiments is shown in . Such as figure 1 As shown, the syst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cryptology, and particularly provides a digital signature method, system and device. The digital signature method is applied to a server, a second private key ciphertext is stored in the server, the second private key ciphertext comprises a first ciphertext fragment and a second ciphertext fragment, and the second ciphertext fragment is obtained by encrypting the first private key ciphertext according to user identification information input by a user. The first private key ciphertext is encrypted according to the user identification information;thus, the digital signature process is simplified; the second ciphertext fragment is decrypted according to a client decryption key generated by the client to obtain a first private key ciphertext; it is ensured that the second private key ciphertext can be decrypted only under the condition that the user participates in; therefore, the digital signature is completed according to the first private key ciphertext, a counterfeiter cannot forge the user signature singly, the use security of the user private key is improved, the second private key ciphertext is divided into a plurality of segments to be stored, and the security of the user private key is further improved.

Description

technical field [0001] The present disclosure relates to the technical field of cryptography, in particular to a digital signature method, system and device. Background technique [0002] At present, digital signatures based on public key cryptography are gradually applied to various fields with the development of the Internet. In order to improve the security of the user's private key, the traditional method is to combine PKI (Public Key Infrastructure) technology with commercial cryptographic chips, such as online banking. The banking system uses USB key (U-shield) to encrypt information to ensure the security of online transactions. Confidentiality and Authenticity. [0003] However, this method is extremely inconvenient in terms of usability and portability. Users need to carry a USB shield at any time to complete the digital signature, and the user experience is poor. In order to solve the problem of portability, in related technologies, the private key is stored in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3247H04L9/0866H04L9/0869H04L9/0822H04L9/3236
Inventor 陈壹鹏梁良兴刘镪
Owner 信安神州科技(广州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products