Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile electronic signature-based trusteeship key use method and system, computer equipment and storage medium

A mobile electronic and cryptographic device technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as private key leakage, private key loss, and repudiation, and achieve improved security, guaranteed security, and guaranteed non-repudiation Effect

Inactive Publication Date: 2021-08-17
福建瑞术信息科技有限公司
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this implementation method, the organization certificate and private key are handed over to authorized users for safekeeping, and there are several problems as follows: First, there is a risk that the private key may be leaked or used by an illegal user
Second, there is a risk of authorized users illegally using organization certificates and private keys and denying them afterwards
Third, there is a risk that the data encrypted using the agency certificate cannot be decrypted due to the loss of the private key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile electronic signature-based trusteeship key use method and system, computer equipment and storage medium
  • Mobile electronic signature-based trusteeship key use method and system, computer equipment and storage medium
  • Mobile electronic signature-based trusteeship key use method and system, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] like figure 2 Said is a flow chart of the steps of the method for using the escrow key based on the mobile electronic signature of the present invention, including the following steps:

[0063] Step S1, the mobile electronic signature client applies for an organization certificate from the RA system through the mobile electronic signature server, and hosts the organization certificate and its private key in the cloud encryption device.

[0064] In this application, a mobile electronic signature client refers to a functional entity that is installed on a mobile device and provides mobile electronic signature services to application providers and individual users. The mobile device here may be a mobile phone, a tablet computer, a notebook or other dedicated devices. The mobile electronic signature server is a server that provides various electronic signature business services for various business requests of the mobile electronic signature client. The business requests ...

Embodiment 2

[0097] like Figure 7 Shown is an architecture diagram of an escrow key usage system based on mobile electronic signatures in this application, including a mobile electronic signature client, a mobile electronic signature server, a cloud collaborative signature system, a cloud cryptographic device, and an RA system. Wherein, the mobile electronic signature client is deployed on the smart terminal used by the individual user, respectively connected with the mobile electronic signature server and the cloud collaborative signature system, and submits the organization certificate to the RA system through the mobile electronic signature server Applying, requesting verification of the agency certificate or private key authorization verification from the mobile electronic signature server; for submitting a personal certificate application to the RA system through the cloud collaborative signature system, and simultaneously saving the personal certificate and the first part of the user...

Embodiment 3

[0103] This embodiment also provides a computer device, such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a rack server, a blade server, a tower server, or a cabinet server (including an independent server, or A server cluster composed of multiple servers), etc. The computer device in this embodiment at least includes but is not limited to: a memory and a processor that can be communicatively connected to each other through a system bus. In some embodiments, the memory may be an internal storage unit of a computer device, such as a hard disk or memory of the computer device, or an external storage device of the computer device, such as a plug-in hard disk or a smart memory card equipped on the computer device. Wait. The processor may be a central processing unit (Central Processing Unit, CPU), a controller, a microcontroller, a microprocessor, or other data processing chips, and is used to control the overall operation of the computer device. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of PKI (Public Key Infrastructure), in particular to a mobile electronic signature-based trusteeship key use method and system, computer equipment and a storage medium. The method comprises the following steps: a mobile electronic signature client applies for an institution certificate, hosts the institution certificate and a private key in cloud password equipment, generates user private keys, dispersedly stores the user private keys in the mobile electronic signature client and a cloud collaborative signature system, and applies for a personal certificate; the mobile electronic signature client requests an institution certificate or a private key to authorize and verify; the mobile electronic signature server performs authority verification on the individual user, processes the service data by using an institution certificate or a private key, and returns a result; and the service processing record is digitally signed and stored by using the private key of the individual user. According to the method, the cloud password service technology is adopted to carry out centralized management on the secret keys, digital signature storage is carried out on log records while password services are provided for authorized users, and it is guaranteed that behaviors of the authorized users are not repudiated while the security of the private keys is guaranteed.

Description

technical field [0001] The present application relates to the technical field, in particular to a method, system, computer equipment and storage medium for using an escrow key based on a mobile electronic signature. Background technique [0002] With the continuous development of data informatization and Internet technology, encryption technology has played an increasingly important role in network and information security. Cryptography technology is a technology for encrypting, analyzing, identifying and confirming information, and managing keys. It can effectively guarantee user identity authentication in the network, the confidentiality of data messages is true and cannot be tampered with, and business behavior is undeniable. It is widely used in the network. in all levels. According to technical characteristics, modern cryptography algorithms are mainly divided into three categories: symmetric algorithms, asymmetric algorithms, and digest algorithms. Among them, asymmet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0894H04L9/3247H04L9/3263H04L63/0442H04L63/0823
Inventor 潘鸣华龚俊鹏
Owner 福建瑞术信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products