CN104852806B - A kind of implementation method signed according to Key Tpe - Google Patents
A kind of implementation method signed according to Key Tpe Download PDFInfo
- Publication number
- CN104852806B CN104852806B CN201510247236.XA CN201510247236A CN104852806B CN 104852806 B CN104852806 B CN 104852806B CN 201510247236 A CN201510247236 A CN 201510247236A CN 104852806 B CN104852806 B CN 104852806B
- Authority
- CN
- China
- Prior art keywords
- key
- signature
- intelligent cipher
- current
- mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 65
- 238000004364 calculation method Methods 0.000 claims description 16
- 230000005540 biological transmission Effects 0.000 claims description 13
- 230000006399 behavior Effects 0.000 claims description 4
- 238000013500 data storage Methods 0.000 claims 1
- 238000007363 ring formation reaction Methods 0.000 description 4
- 235000013399 edible fruits Nutrition 0.000 description 3
- 230000001629 suppression Effects 0.000 description 3
- 238000001629 sign test Methods 0.000 description 2
- 230000007812 deficiency Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The present invention discloses a kind of implementation method signed according to Key Tpe, including:When receiving generation key to instruction, Key Tpe is identified, key ID and purposes mark write-in key description information, it is corresponding to generate key pair;When receiving signature packet, current hash algorithm, current signature algorithm, current key ID and current applications mark are set;If carrying out common signature, Key Tpe mark corresponding to acquisition, if corresponding key is the key for allowing to carry out common signature, the key according to corresponding to being obtained current key ID and current applications mark is signed to the first data to be signed, return signature result;If carry out review signature, Key Tpe mark corresponding to then obtaining, if corresponding key is to allow to carry out the key for checking signature, then message is carried out the second data to be signed are calculated, the key according to corresponding to obtaining the current key ID and current applications of storage mark is signed to the second data to be signed, returns to signature result.
Description
Technical field
The present invention relates to information security field, more particularly to a kind of implementation method signed according to Key Tpe.
Background technology
Digital signature technology can ensure that integrality in data transmission procedure, the identity to data sender are authenticated
And prevent denial behavior.Intelligent cipher key equipment is a kind of equipment that can be digitally signed, and can store the private of user
Key and digital certificate, the certification to user identity is realized using signature algorithm built-in in intelligent cipher key equipment.Prior art
In, intelligent cipher key equipment distinguishes common signature by different hash algorithms mostly and review is signed, so as to reach anti-cheat label
Purpose.But SM2 signature algorithms can only use with the collocation of SM3 hash algorithms at present, therefore the difference of hash algorithm can not be passed through
To distinguish different types of signature, the purpose of anti-cheat label can not be realized.
The content of the invention
The invention aims to overcome the deficiencies in the prior art, there is provided a kind of reality signed according to Key Tpe
Existing method, it is that each pair key in intelligent cipher key equipment sets Key Tpe, the purposes of key is limited according to Key Tpe, so as to
Different types of signature is distinguished, realizes the purpose of anti-cheat label.
A kind of method signed according to Key Tpe provided by the invention, including:
Step S1:When intelligent cipher key equipment receives the data of host computer transmission, the intelligent cipher key equipment judges number
According to type, if generation key then performs step S2 to instructing, if signature packet then performs step S3, if other are instructed
Corresponding operating is then performed, implementing result, return to step S1 are returned to the host computer;
Step S2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction
Mark write-in key description information, key pair is generated, and the key pair of generation and key description information is write into key storage area,
Return success to the host computer, return to step S1;
Step S3:The Hash that current hash algorithm is arranged to specify in the signature packet by the intelligent cipher key equipment
Algorithm, the signature algorithm that current signature algorithm is arranged to specify in the signature packet, store in the signature packet
Current key ID and current applications mark, perform step S4;
Step S4:Parameter of the intelligent cipher key equipment in the signature packet judges whether to review label
Name, it is then to perform step S7, otherwise performs step S5;
Step S5:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark
Key type identification, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is
Step S6 is then performed, otherwise returns to error message, return to step S1 to the host computer;
Step S6:It is to be signed that first Hash of the intelligent cipher key equipment in the signature packet is worth to first
Data, the key according to corresponding to obtaining the current key ID and current applications of storage mark, using the key, according to current label
Name algorithm is signed to first data to be signed, is returned to signature result and successful information to the host computer, is removed phase
Cyclization border is set, return to step S1;
Step S7:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark
Key type identification, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is
Step S8 is then performed, otherwise returns to error message, return to step S1 to the host computer;
Step S8:The intelligent cipher key equipment parses to the message in the signature packet, obtains explicit message,
Display caching area is arrived into explicit message storage, according to current hash algorithm, the message in the signature packet carried out
Hash calculation, the second cryptographic Hash is obtained, the second data to be signed are worth to according to second Hash, perform step S9;
Step S9:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button quilt
Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage
Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to described
Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return
Return step S1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes storage
Current key ID, current applications mark and the display caching area in data.
A kind of method signed according to Key Tpe that the present invention provides again, including:
Step A1:When intelligent cipher key equipment receives the data of host computer transmission, the intelligent cipher key equipment judges number
According to type, if generation key then performs step A2 to instructing, if the instruction of the first common signature then performs step A3, if the
One review signature command then performs step A6, if other instructions then perform corresponding operating, is returned to the host computer and performs knot
Fruit, return to step A1;
Step A2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction
Mark write-in key description information, key pair is generated, and the key pair of generation and key description information write-in is close
Key memory block, return success to the host computer, return to step A1;
Step A3:Current hash algorithm is arranged to specify in the first common signature instruction by the intelligent cipher key equipment
Hash algorithm, the signature algorithm that current signature algorithm is arranged to specify in first common signature instruction, described in storage
Current key ID and current applications mark in the instruction of first common signature;
Step A4:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark
Key type identification, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is
Step A5 is then performed, otherwise returns to error message, return to step A1 to the host computer;
Step A5:The first Hash during the intelligent cipher key equipment instructs according to first common signature is worth to first
Data to be signed, the key according to corresponding to being obtained current key ID and current applications mark, using the key, according to current label
Name algorithm is signed to first data to be signed, is returned to signature result and successful information to the host computer, is removed phase
Cyclization border is set, return to step A1;
Step A6:Current hash algorithm is arranged to specify in the first review signature command by the intelligent cipher key equipment
Hash algorithm, current signature algorithm is arranged to the signature algorithm specified in the first review signature command, described in storage
Current key ID and current applications mark in first review signature command;
Step A7:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark
Key type identification, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is
Step A8 is then performed, otherwise returns to error message, return to step A1 to the host computer;
Step A8:The intelligent cipher key equipment parses to the message in the described first review signature command, is shown
Show message, display caching area is arrived into explicit message storage, according to current hash algorithm, to the described first review signature command
In message carry out Hash calculation, obtain the second cryptographic Hash, the second data to be signed be worth to according to second Hash, perform
Step A9;
Step A9:The intelligent cipher key equipment is shown to the explicit message in the display caching area, and is waited and being pressed
Key is pressed, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment according to
Key corresponding to current key ID and current applications the mark acquisition of storage, using the key, according to current signature algorithm pair
Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set
Put, return to step A1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes storage
Current key ID, current applications mark and the display caching area in data.
A kind of method signed according to Key Tpe that the present invention provides again, including:
Step B1:When intelligent cipher key equipment receives the data of host computer transmission, the intelligent cipher key equipment judges number
According to type, if generation key then performs step B2 to instructing, if first sets instruction then to perform step B3, if second is general
Logical signature command then performs step B4, if the second review signature command then performs step B6, if other instructions then perform phase
It should operate, implementing result, return to step B1 are returned to the host computer;
Step B2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction
Mark write-in key description information, key pair is generated, and the key pair of generation and key description information write-in is close
Key memory block, return success to the host computer, return to step B1;
Step B3:The Kazakhstan that current hash algorithm is arranged to specify in the first setting instruction by the intelligent cipher key equipment
Uncommon algorithm, the signature algorithm that current signature algorithm is arranged to specify in the first setting instruction, storage described first are set
Current key ID and current applications mark in instruction, return success, return to step B1 to the host computer;
Step B4:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark
Key type identification, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is
Step B5 is then performed, otherwise returns to error message, return to step B1 to the host computer;
Step B5:The first Hash during the intelligent cipher key equipment instructs according to second common signature is worth to first
Data to be signed, the key according to corresponding to obtaining the current key ID and current applications of storage mark, use the key, basis
Current signature algorithm is signed to first data to be signed, and signature result and successful information are returned to the host computer,
Remove relevant environment to set, return to step B1;
Step B6:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark
Key type identification, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is
Step B7 is then performed, otherwise returns to error message, return to step B1 to the host computer;
Step B7:The intelligent cipher key equipment parses to the message in the described second review signature, obtains display report
Text, display caching area is arrived into explicit message storage, according to current hash algorithm, to the message in the described second review signature
Hash calculation is carried out, obtains the second cryptographic Hash, the second data to be signed are worth to according to second Hash, perform step B8;
Step B8:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button quilt
Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage
Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to described
Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return
Return step B1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes storage
Current key ID, current applications mark and the display caching area in data.
A kind of method signed according to Key Tpe that the present invention provides again, including:
Step C1:When intelligent cipher key equipment receives the instruction of host computer transmission, the intelligent cipher key equipment judges to refer to
Type is made, if generation key then performs step C2 to instructing, if first sets instruction then to perform step C3, if the 3rd is general
Logical signature command then performs step C4, if packet parsing instruction then performs step C6, if the 3rd review signature command is then held
Row step C8, if other instructions then perform corresponding operating, implementing result, return to step C1 are returned to the host computer;
Step C2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction
Mark write-in key description information, key pair is generated, and the key pair of generation and key description information write-in is close
Key memory block, return success to the host computer, return to step C1;
Step C3:The Kazakhstan that current hash algorithm is arranged to specify in the first setting instruction by the intelligent cipher key equipment
Uncommon algorithm, the signature algorithm that current signature algorithm is arranged to specify in the first setting instruction, storage described first are set
Current key ID and current applications mark in instruction, return success, return to step C1 to the host computer;
Step C4:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark
Key type identification, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is
Step C5 is then performed, otherwise returns to error message, return to step C1 to the host computer;
Step C5:The first Hash during the intelligent cipher key equipment instructs according to the 3rd common signature is worth to first
Data to be signed, the first obtained data to be signed are stored in memory block to be signed, return success to the host computer,
Return to step C1;
Step C6:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark
Key type identification, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is
Step C7 is then performed, otherwise returns to error message, return to step C1 to the host computer;
Step C7:Message during the intelligent cipher key equipment instructs to the packet parsing parses, and obtains display report
Text, display caching area is arrived into explicit message storage, according to current hash algorithm, to the message in packet parsing instruction
Hash calculation is carried out, the second cryptographic Hash is obtained, the second data to be signed is worth to according to second Hash, described second is treated
Signed data is stored in memory block to be signed, is return success to the host computer, return to step C1;
Step C8:The intelligent cipher key equipment judges whether the data to be signed in memory block to be signed are first to be signed
Data, it is then to perform step C9, otherwise performs step C10;
Step C9:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark
Key, the first data to be signed of storage are signed using the key, according to current signature algorithm, returned to the host computer
Signature result and successful information are returned, relevant environment is removed and sets, return to step C1;
Step C10:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button quilt
Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage
Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to storage
The second data to be signed signed, return to signature result and successful information to the host computer, remove relevant environment and set,
Return to step C1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes storage
Current key ID, current applications mark and the display caching area in data.
The present invention compared with prior art, has advantages below:
A kind of implementation method signed according to Key Tpe provided by the invention, it is each pair in intelligent cipher key equipment
Key sets Key Tpe, and the purposes of key is limited according to Key Tpe, for example, be served only for the key of common signature can not be multiple
Used in core signature process, being served only for the key of review signature can not use in process common signature, so as to distinguish inhomogeneity
The signature of type, realize the purpose of anti-cheat label.
Brief description of the drawings
Fig. 1 is a kind of flow chart for implementation method signed according to Key Tpe that the embodiment of the present invention 1 provides;
Fig. 2 to Fig. 5 is a kind of flow for implementation method signed according to Key Tpe that the embodiment of the present invention 2 provides
Figure.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Embodiment 1
Embodiments of the invention 1 provide a kind of implementation method signed according to Key Tpe, as shown in figure 1, bag
Include:
Step S1:When intelligent cipher key equipment receives the data of host computer transmission, intelligent cipher key equipment judges data class
Type, if generation key then performs step S2 to instructing, if signature packet then performs step S3, if other instructions are then held
Row corresponding operating, implementing result, return to step S1 are returned to host computer;
Step S2:Intelligent cipher key equipment identifies key is generated to Key Tpe mark, key ID and the purposes in instruction
Key description information is write, generates key pair, and the key pair of generation and key description information are write into key storage area, upwards
Position machine is return success, return to step S1;
Step S3:The hash algorithm that current hash algorithm is arranged to specify in signature packet by intelligent cipher key equipment, will
Current signature algorithm is arranged to the signature algorithm specified in signature packet, stores the current key ID in signature packet and works as
Preceding purposes mark, performs step S4;
Step S4:Parameter of the intelligent cipher key equipment in signature packet judges whether to review signature, is to hold
Row step S7, otherwise perform step S5;
Step S5:Intelligent cipher key equipment Key Tpe mark according to corresponding to being obtained current key ID and current applications mark
Know, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is then to perform step S6,
Otherwise error message, return to step S1 are returned to host computer;
Step S6:First Hash of the intelligent cipher key equipment in signature packet is worth to the first data to be signed, root
According to key corresponding to current key ID and current applications mark acquisition, wait to sign to first using key, according to current signature algorithm
Name data are signed, and signature result and successful information are returned to host computer, are removed relevant environment and are set, return to step S1;
Step S7:Intelligent cipher key equipment Key Tpe mark according to corresponding to being obtained current key ID and current applications mark
Know, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is then to perform step S8,
Otherwise error message, return to step S1 are returned to host computer;
Step S8:Intelligent cipher key equipment is parsed to the message in signature packet, obtains explicit message, and display is reported
Display caching area is arrived in text storage, according to current hash algorithm, carries out Hash calculation to the message in signature packet, obtains second
Cryptographic Hash, the second data to be signed are worth to according to the second Hash, and the second data to be signed are stored in into memory block to be signed, held
Row step S9;
Step S9:Intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button to be pressed,
When the button that intelligent cipher key equipment is judged to be pressed is acknowledgement key, intelligent cipher key equipment according to the current key ID of storage and
Second data to be signed are signed by key corresponding to current applications mark acquisition using key, according to current signature algorithm,
Signature result and successful information are returned to host computer, relevant environment is removed and sets, return to step S1.
In the present embodiment, the above method is completed to be carried out according to Key Tpe by generating key to instruction and signature packet
The operation of signature, in addition to this it is possible to the operation for completing to be signed according to Key Tpe by more MIMD, for example, logical
Cross generation key and that is signed according to Key Tpe is completed to instruction, the instruction of the first common signature and the first review signature command
Operation, it is specially:
Step S1:When intelligent cipher key equipment receives the data of host computer transmission, intelligent cipher key equipment judges data class
Type, if generation key then performs step S2 to instructing, if the instruction of the first common signature then performs step A3, if first is multiple
Core signature command then performs step A7, if other instructions then perform corresponding operating, returns to implementing result to the host computer, returns
Return step S1;
Step S2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction
Mark write-in key description information, key pair is generated, and the key pair of generation and key description information is write into key storage area,
Return success to the host computer, return to step S1;
Step A3:Current hash algorithm is arranged to specify in the first common signature instruction by the intelligent cipher key equipment
Hash algorithm, the signature algorithm that current signature algorithm is arranged to specify in first common signature instruction, described in storage
Current key ID and current applications mark in the instruction of first common signature;
Step A4:Intelligent cipher key equipment Key Tpe according to corresponding to being obtained current key ID and current applications mark
Mark, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to perform
Step A5, otherwise return to error message, return to step S1 to the host computer;
Step A5:The first Hash during the intelligent cipher key equipment instructs according to first common signature is worth to first
Data to be signed, the key according to corresponding to being obtained current key ID and current applications mark, using the key, according to current label
Name algorithm is signed to first data to be signed, is returned to signature result and successful information to the host computer, is removed phase
Cyclization border is set, return to step S1;
Step A6:Current hash algorithm is arranged to specify in the first review signature command by the intelligent cipher key equipment
Hash algorithm, current signature algorithm is arranged to the signature algorithm specified in the first review signature command, described in storage
Current key ID and current applications mark in first review signature command;
Step A7:Intelligent cipher key equipment Key Tpe according to corresponding to being obtained current key ID and current applications mark
Mark, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to perform
Step A8, otherwise return to error message, return to step S1 to the host computer;
Step A8:The intelligent cipher key equipment parses to the message in the described first review signature command, is shown
Show message, display caching area is arrived into explicit message storage, according to current hash algorithm, to the described first review signature command
In message carry out Hash calculation, obtain the second cryptographic Hash, the second data to be signed be worth to according to second Hash, by institute
State the second data to be signed and be stored in memory block to be signed, perform step A9;
Step A9:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button quilt
Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage
Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to described
Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return
Return step S1.
Similarly, instruction, the instruction of the second common signature and the second review is set to sign instruction, first by generating key
The operation signed according to Key Tpe is completed in instruction, is specially:
Step S1:When intelligent cipher key equipment receives the data of host computer transmission, intelligent cipher key equipment judges data class
Type, if generation key then performs step S2 to instructing, if first sets instruction then to perform step B3, if the second common label
Name instruction then performs step B4, if the second review signature command then performs step B6, if other instructions then perform corresponding behaviour
Make, implementing result, return to step S1 are returned to the host computer;
Step S2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction
Mark write-in key description information, key pair is generated, and the key pair of generation and key description information is write into key storage area,
Return success to the host computer, return to step S1;
Step B3:The Kazakhstan that current hash algorithm is arranged to specify in the first setting instruction by the intelligent cipher key equipment
Uncommon algorithm, the signature algorithm that current signature algorithm is arranged to specify in the first setting instruction, storage described first are set
Current key ID and current applications mark in instruction, return success, return to step S1 to the host computer;
Step B4:Intelligent cipher key equipment Key Tpe according to corresponding to being obtained current key ID and current applications mark
Mark, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to perform
Step B5, otherwise return to error message, return to step S1 to the host computer;
Step B5:The first Hash during the intelligent cipher key equipment instructs according to second common signature is worth to first
Data to be signed, the key according to corresponding to being obtained current key ID and current applications mark, using the key, according to current label
Name algorithm is signed to first data to be signed, is returned to signature result and successful information to the host computer, is removed phase
Cyclization border is set, return to step S1;
Step B6:Intelligent cipher key equipment Key Tpe according to corresponding to being obtained current key ID and current applications mark
Mark, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to perform
Step B7, otherwise return to error message, return to step S1 to the host computer;
Step B7:The intelligent cipher key equipment parses to the message in the described second review signature, obtains display report
Text, display caching area is arrived into explicit message storage, according to current hash algorithm, to the message in the described second review signature
Hash calculation is carried out, the second cryptographic Hash is obtained, the second data to be signed is worth to according to second Hash, described second is treated
Signed data is stored in memory block to be signed, performs step B6;
Step B8:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button quilt
Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage
Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to described
Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return
Return step S1.
Similarly, instruction, the 3rd common signature is set to instruct instruction, first by generating key, packet parsing instruction
The operation signed with the 3rd review signature command completion according to Key Tpe, it is specially:
Step S1:When intelligent cipher key equipment receives the instruction of host computer transmission, intelligent cipher key equipment decision instruction class
Type, if generation key then performs step S2 to instructing, if first sets instruction then to perform step C3, if the 3rd common label
Name instruction then performs step C4, if packet parsing instruction then performs step C6, if the 3rd review signature command then performs step
Rapid C8, if other instructions then perform corresponding operating, implementing result, return to step S1 are returned to the host computer;
Step S2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction
Mark write-in key description information, key pair is generated, and the key pair of generation and key description information is write into key storage area,
Return success to the host computer, return to step S1;
Step C3:The Kazakhstan that current hash algorithm is arranged to specify in the first setting instruction by the intelligent cipher key equipment
Uncommon algorithm, the signature algorithm that current signature algorithm is arranged to specify in the first setting instruction, storage described first are set
Current key ID and current applications mark in instruction, return success, return to step S1 to the host computer;
Step C4:Intelligent cipher key equipment Key Tpe according to corresponding to being obtained current key ID and current applications mark
Mark, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to perform
Step C5, otherwise return to error message, return to step S1 to the host computer;
Step C5:The first Hash during the intelligent cipher key equipment instructs according to the 3rd common signature is worth to first
Data to be signed, the first obtained data to be signed are stored in memory block to be signed, return success to the host computer,
Return to step S1;
Step C6:Intelligent cipher key equipment Key Tpe according to corresponding to being obtained current key ID and current applications mark
Mark, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to perform
Step C7, otherwise return to error message, return to step S1 to the host computer;
Step C7:Message during the intelligent cipher key equipment instructs to the packet parsing parses, and obtains display report
Text, display caching area is arrived into explicit message storage, according to current hash algorithm, to the message in packet parsing instruction
Hash calculation is carried out, the second cryptographic Hash is obtained, the second data to be signed is worth to according to second Hash, described second is treated
Signed data is stored in memory block to be signed, is return success to the host computer, return to step S1;
Step C8:The intelligent cipher key equipment judges whether the data to be signed in memory block to be signed are first to be signed
Data, it is then to perform step C9, otherwise performs step C10;
Step C9:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark
Key, using the key, first data to be signed are signed according to current signature algorithm, returned to the host computer
Result of signing and successful information, remove relevant environment and set, return to step S1;
Step C10:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button quilt
Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage
Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to described
Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return
Return step S1.
In the present embodiment, remove relevant environment set include initialize secure ID, remove current hash algorithm and currently
The setting of signature algorithm, the current key ID for removing storage, current applications mark and display caching data;
If the button that intelligent cipher key equipment is judged to be pressed is cancel key, intelligent cipher key equipment display suppression information,
Remove relevant environment to set, return success to host computer, return to step S1;
In the present embodiment, intelligent cipher key equipment needs to judge whether completely before common signature and/or review signature is carried out
Sufficient safety condition, it is to continue common signature and/or review signature, otherwise returns to error message to host computer, return to step
Rapid S1.
A kind of implementation method signed according to Key Tpe provided in the present embodiment, it is in intelligent cipher key equipment
Each pair key sets Key Tpe, and the purposes of key is limited according to Key Tpe, for example, be served only for the key of common signature can not
Used in signature process is checked, being served only for the key of review signature can not use in process common signature, so as to distinguish not
The signature of same type, realize the purpose of anti-cheat label.
Embodiment 2
Embodiments of the invention 2 provide a kind of implementation method signed according to Key Tpe, such as Fig. 2 to Fig. 5 institutes
Show, including:
Step 201:It is electric on intelligent cipher key equipment, initialized;
Step 202:The instruction that the host computer to be received such as intelligent cipher key equipment is sent, when intelligent cipher key equipment receives instruction
When, intelligent cipher key equipment decision instruction type, if generation key then performs step 203 to instructing, if first sets instruction
Step 208 is then performed, if the instruction of the 3rd common signature then performs step 214, if packet parsing instruction then performs step
222, if the 3rd review signature command then performs step 234, if other instructions then perform corresponding operating, returned to host computer
Implementing result, return to step 202;
Step 203:Intelligent cipher key equipment judges whether to meet safety condition, is then to perform step 204, otherwise to host computer
Return to error message, return to step 202;
Specifically, intelligent cipher key equipment judge secure ID whether set, be, determination meet safety condition, otherwise determine
It is unsatisfactory for safety condition;
In the present embodiment, to reset, the PIN code that intelligent cipher key equipment inputs to user is carried out the original state of secure ID
Checking, when the authentication succeeds by secure ID set;
Step 204:It is legal that intelligent cipher key equipment judges that generation key identifies whether to the Key Tpe in instruction, is to hold
Row step 205, otherwise return to error message, return to step 202 to host computer;
Specifically, intelligent cipher key equipment judges to generate whether the value that key identifies the Key Tpe in instruction is first pre-
If value, it is then to determine that Key Tpe mark is legal, otherwise determines that Key Tpe mark is illegal;
For example, generation key is 00 46 00 01 02 01 00 to instruction, wherein the data of the 4th byte are key class
Type identifies;First preset value is any one in 0x00,0x01 and 0x02;
In the present embodiment, if the value that generation key identifies to the Key Tpe in instruction is 0x00, intelligent cipher key equipment
The key of generation is mixed key;If it is 0x01 to generate the value that key identifies to the Key Tpe in instruction, intelligent key is set
The key of standby generation is common signature key;If it is 0x02 to generate the value that key identifies to the Key Tpe in instruction, intelligence
The key of key devices generation is review signature key;
Step 205:Intelligent cipher key equipment judges whether generation key is legal to the key length in instruction, is then to perform step
Rapid 206, otherwise return to error message, return to step 202 to host computer;
Specifically, intelligent cipher key equipment judges to generate whether key is preset length to the value of the key length in instruction
Value, it is then to determine that key length is legal, otherwise determines that key length is illegal;
For example, generation key is key length to the data of the 6th, 7 byte of instruction;Preset length value is 0x0100;
Step 206:Intelligent cipher key equipment identifies key is generated to Key Tpe mark, key ID and the purposes in instruction
Key description information is write, generates key pair, and the key pair of generation and key description information are write into key storage area;
Step 207:Effectively whether intelligent cipher key equipment judge the key of generation to, being to return to host computer and successfully believe
Breath, return to step 202, the key pair of generation is otherwise deleted, error message, return to step 202 are returned to host computer;
Specifically, intelligent cipher key equipment is judged whether using the key of generation to being signed to preset data and sign test
Success, be determine generation key to effective, otherwise determine generation key to invalid;
Step 208:Intelligent cipher key equipment judges itself whether support the hash algorithm that the first setting is specified in instructing, and is then
Step 209 is performed, otherwise returns to error message, return to step 202 to host computer;
Specifically, intelligent cipher key equipment judges whether the value of the hash algorithm mark in the first setting instruction is second default
Value, it is to determine itself to support that first sets the hash algorithm specified in instruction, otherwise determines that itself does not support the first setting to refer to
The hash algorithm specified in order;
For example, the first setting instruction is 00 22 41 B6 07 80 01 52 84 02 02 13, wherein the 8th byte
Data be hash algorithm mark;Second preset value is any in 0x12,0x32,0x52,0x72,0xF2,0xE2 and 0xC2
One;
Step 209:The hash algorithm that current hash algorithm is arranged to specify in the first setting instruction by intelligent cipher key equipment;
In the present embodiment, if first sets the hash algorithm in instruction to be identified as 0x12, specified in the first setting instruction
Hash algorithm be SHA-1 algorithms;If first sets the hash algorithm in instruction to be identified as 0x32, first sets instruction middle finger
Fixed hash algorithm is MD5 algorithms;If first sets the hash algorithm in instruction to be identified as 0x52, first sets instruction middle finger
Fixed hash algorithm is SM3 algorithms;If first sets the hash algorithm in instruction to be identified as 0x72, first sets instruction middle finger
Fixed hash algorithm is MD5 and SHA-1 algorithms;If first sets the hash algorithm in instruction to be identified as 0xF2, first is set
The hash algorithm specified in instruction is SHA-256 algorithms;If first sets the hash algorithm in instruction to be identified as 0xE2, first
It is SHA-512 algorithms to set the hash algorithm specified in instruction;If first sets the hash algorithm in instruction to be identified as 0xC2,
The hash algorithm specified in first setting instruction is SHA-384 algorithms;
Step 210:Intelligent cipher key equipment judges itself whether support the signature algorithm that the first setting is specified in instructing, and is then
Step 211 is performed, otherwise returns to error message, return to step 202 to host computer;
Specifically, intelligent cipher key equipment judges whether the value of the purposes mark in the first setting instruction is the 3rd preset value,
It is to determine itself to support that first sets the signature algorithm specified in instruction, otherwise determines in itself not supporting that the first setting instructs
The signature algorithm specified;
For example, first sets the data of the 12nd byte of instruction to be identified for hash algorithm;3rd preset value be 0x13,
Any one in 0x1B, 0x23 and 0x2B;
Step 211:The signature algorithm that current signature algorithm is arranged to specify in the first setting instruction by intelligent cipher key equipment;
In the present embodiment, if first sets the purposes in instruction to be identified as 0x13 or 0x1B, first sets instruction middle finger
Fixed signature algorithm is SM2 algorithms;If first sets the purposes in instruction to be identified as 0x23 or 0x2B, first is set in instruction
The signature algorithm specified is RSA Algorithm;
Step 212:Current key ID and current applications of the intelligent cipher key equipment in the first setting instruction are identified close
Key pair is obtained in key memory block, whether effectively the key for judging to get is then to perform step 213, otherwise removes related to
Environment is set, and error message, return to step 202 are returned to host computer;
For example, the data of the 11st byte of the first setting instruction are current key ID, the data of the 12nd byte are to work as
Preceding purposes mark;If current key ID is 0x02 to 0x03, current applications are identified as 0x13, then the key got is calculated for SM2
Method private key;If current key ID is 0x02 to 0x03, current applications are identified as 0x1B, then the key got is that SM2 algorithms are public
Key;If current key ID is 0x02 to 0x07, current applications are identified as 0x23, then the key got is RSA Algorithm private key;If
Current key ID is 0x02 to 0x07, and current applications are identified as 0x2B, then the key got is that RSA calculates public key;
Specifically, intelligent cipher key equipment using the key that gets to being signed to preset data and sign test, judgement are
No success, be the key for determining to get to effective, the key for otherwise determining to get is to invalid;
In the present embodiment, remove relevant environment set include initialize secure ID, remove current hash algorithm and currently
The setting of signature algorithm, the current key ID for removing storage and current applications mark;
Step 213:Intelligent cipher key equipment storage first sets current key ID and current applications mark in instruction, upwards
Position machine is return success, return to step 202;
Step 214:Intelligent cipher key equipment judges whether the parameter of the 3rd common signature instruction is correct, is to perform step
215, otherwise return to error message, return to step 202 to host computer;
For example, the instruction of the 3rd common signature is the 5D 77 of 00 2A, 90 81 20 22 3B of EC AA 6C D6 BE 83
AF BE 69 FE D1 86 A04C 04 C7 2E C7 40 69 F5 B1 CD 02 51 08 5D 52;
Step 215:Intelligent cipher key equipment judges whether to meet safety condition, is then to perform step 216, otherwise to host computer
Return to error message, return to step 202;
Specifically, intelligent cipher key equipment judge secure ID whether set, be, determination meet safety condition, otherwise determine
It is unsatisfactory for safety condition;
Step 216:Intelligent cipher key equipment is identified in key storage area according to the current key ID and current applications of storage
Key description information corresponding to acquisition;
Step 217:Intelligent cipher key equipment judges whether to get key description information, is then execution step 218, otherwise to
Host computer returns to error message, return to step 202;
Step 218:Intelligent cipher key equipment obtains Key Tpe mark from key description information;
Step 219:It is legal that the Key Tpe that intelligent cipher key equipment judges to get identifies whether, is then to perform step 220,
Otherwise error message, return to step 202 are returned to host computer;
Specifically, whether the value for the Key Tpe mark that intelligent cipher key equipment judges to get is the first preset value, is then
Determine that Key Tpe mark is legal, otherwise determine that Key Tpe mark is illegal;Wherein, the first preset value be 0x00,0x01 and
Any one in 0x02;
Step 220:Intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement is permission
The key of common signature is carried out, is then to perform step 221, otherwise returns to error message, return to step 202 to host computer;
Specifically, whether the value for the Key Tpe mark that intelligent cipher key equipment judges to get is the 4th preset value, is then
It is determined that corresponding key is the key for not allowing to carry out common signature, otherwise key corresponding to determination is to allow to carry out common signature
Key;For example, the 4th preset value is 0x02;In the present embodiment, mixed key and common signature key be allow to carry out it is general
The key of logical signature;
Step 221:Intelligent cipher key equipment obtains the first cryptographic Hash in the instruction of the 3rd common signature, and the first cryptographic Hash is entered
Row filling, obtains the first data to be signed, the first obtained data to be signed is stored in into memory block to be signed, returned to host computer
Return successful information, return to step 202;
Step 222:Intelligent cipher key equipment judges whether the parameter of packet parsing instruction is correct, is then to perform step 223, no
Then error message, return to step 202 are returned to host computer;
For example, packet parsing instruction is the 3E 3C 4D of 00 2A, 90 81 7E, 01 02 03 04 3C, 54 3E 3C 44
09 0A 3C 54 3E 3C 44 3E 3E 3C 44 3E 3C 4D 09 0A 3C 54 3E 3C 30 32 30 30 30 30
30 30 30 30 30 30 30 30 30 30 30 34 32 30 30 31 30 31 30 30 30 30 30 30 30 30
30 30 30 30 30 30 35 34 30 30 30 30 30 30 31 38 30 30 30 30 30 30 30 37 61 62
632E 74 78 74 61 62 63 30 30 30 30 30 30 32 30 30 30 30 30 30 30 30 38 74 65
73 74 2E 74 78 74 74 65 73 74;
Step 223:Intelligent cipher key equipment judges whether to meet safety condition, is then to perform step 224, otherwise to host computer
Return to error message, return to step 202;
Specifically, intelligent cipher key equipment judge secure ID whether set, be, determination meet safety condition, otherwise determine
It is unsatisfactory for safety condition;
Step 224:Intelligent cipher key equipment is identified in key storage area according to the current key ID and current applications of storage
Key description information corresponding to acquisition;
Step 225:Intelligent cipher key equipment judges whether to get key description information, is then execution step 226, otherwise to
Host computer returns to error message, return to step 202;
Step 226:Intelligent cipher key equipment obtains Key Tpe mark from key description information;
Step 227:It is legal that the Key Tpe that intelligent cipher key equipment judges to get identifies whether, is then to perform step 228,
Otherwise error message, return to step 202 are returned to host computer;
Specifically, whether the value for the Key Tpe mark that intelligent cipher key equipment judges to get is the first preset value, is then
Determine that Key Tpe mark is legal, otherwise determine that Key Tpe mark is illegal;Wherein, the first preset value be 0x00,0x01 and
Any one in 0x02;
Step 228:Intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement is permission
Check the key of signature, be then to perform step 229, otherwise return to error message, return to step 202 to host computer;
Specifically, whether the value for the Key Tpe mark that intelligent cipher key equipment judges to get is the 5th preset value, is then
It is determined that corresponding key is not allow to carry out the key for checking signature, otherwise key corresponding to determination is to allow to carry out review signature
Key;For example, the 5th preset value is 0x01;In the present embodiment, it is to allow to be answered to use key and review signature key with
The key of core signature;
Step 229:For intelligent cipher key equipment according to current hash algorithm, the message in being instructed to packet parsing carries out Hash meter
Calculate, obtain the second cryptographic Hash, and the message in packet parsing instruction is parsed;
Step 230:Intelligent cipher key equipment judges whether successfully resolved, is, obtains explicit message, and explicit message is stored
To display caching area, step 231 is performed, otherwise returns to error message, return to step 202 to host computer;
Specifically, intelligent cipher key equipment judge packet parsing instruction in message whether be preset format message, be then
Successfully resolved is determined, otherwise determines parsing failure;
Step 231:Intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement is only to permit
Permitted to carry out the key for checking signature, be then to perform step 232, otherwise perform step 233;
Specifically, whether the value for the Key Tpe mark that intelligent cipher key equipment judges to get is the 4th preset value, is then
It is determined that corresponding key is only to allow to carry out the key for checking signature, otherwise key corresponding to determination is not only to allow to be checked
The key of signature;For example, the 4th preset value is 0x02;
Step 232:Intelligent cipher key equipment is filled to the second cryptographic Hash, obtains the second data to be signed, by what is obtained
Second data to be signed are stored in memory block to be signed, are return success to host computer, return to step 202;
Step 233:According to current hash algorithm, the message in being instructed to packet parsing parses intelligent cipher key equipment,
Transaction Information is obtained, Hash calculation is carried out to Transaction Information, the 3rd cryptographic Hash is obtained, the second cryptographic Hash and the 3rd cryptographic Hash is entered
Row combination, and combined result is filled, the second data to be signed are obtained, the second obtained data to be signed are stored in and treated
Signature memory block, returns success, return to step 202 to host computer;
Step 234:Intelligent cipher key equipment judges whether the parameter of the 3rd review signature command is correct, is to perform step
235, otherwise return to error message, return to step 202 to host computer;
Step 235:Intelligent cipher key equipment judges currently whether the first data to be signed are signed, and is to perform step
236, otherwise perform step 237;
Specifically, in the present embodiment, also include in step 221, common signature is identified set by intelligent cipher key equipment, then is walked
Intelligent cipher key equipment judges that common signature identifies whether set in rapid 235, is, determines the number to be signed in memory block to be signed
According to for the first data to be signed, it is the second data to be signed otherwise to determine the data to be signed in memory block to be signed;
In addition to this it is possible to it is:Also include in step 229, intelligent cipher key equipment will check mark set of signing, then walks
Intelligent cipher key equipment judges that review signature identifies whether set in rapid 235, is to determine the number to be signed in memory block to be signed
According to for the second data to be signed, it is the first data to be signed otherwise to determine the data to be signed in memory block to be signed;
Step 236:Intelligent cipher key equipment key according to corresponding to obtaining the current key ID and current applications of storage mark,
Using the key got, the first data to be signed are signed according to current signature algorithm, signature knot is returned to host computer
Fruit and successful information, remove relevant environment and set, return to step 202;
In the present embodiment, remove relevant environment set include initialize secure ID, remove current hash algorithm and currently
The setting of signature algorithm, the current key ID for removing storage and current applications mark;
Step 237:Intelligent cipher key equipment is shown to the explicit message in display caching area;
Step 238:Intelligent cipher key equipment judges whether that a button is pressed, is then to perform step 240, otherwise performs step
239;
Step 239:Intelligent cipher key equipment judge button wait whether time-out, be then display suppression information, returned to host computer
Successful information is returned, relevant environment is removed and sets, return to step 202;Otherwise return to step 238;
In the present embodiment, remove relevant environment set include initialize secure ID, remove current hash algorithm and currently
The setting of signature algorithm, the current key ID for removing storage and current applications mark, display caching area data;
Step 240:Intelligent cipher key equipment judges the push-button type being pressed, if acknowledgement key then performs step 241;If
Then display suppression information, removing relevant environment set, return success to host computer, return to step 202 cancel key;
Step 241:Intelligent cipher key equipment key according to corresponding to obtaining the current key ID and current applications of storage mark,
Using the key got, the second data to be signed are signed according to current signature algorithm, signature knot is returned to host computer
Fruit and successful information, remove relevant environment and set, return to step 202;
In addition, in the present embodiment, step 221 can also be:Intelligent cipher key equipment obtains the instruction of the 3rd common signature
In the first cryptographic Hash, the first cryptographic Hash is filled, obtains the first data to be signed, according to the current key ID of storage and
Key corresponding to current applications mark acquisition, using the key got, according to current signature algorithm to the first data to be signed
Signed, signature result and successful information are returned to host computer, removed relevant environment and set, return to step 202;
Then intelligent cipher key equipment judges that the parameter of the 3rd review signature command correctly performs step 237 afterwards in step 234;
In the present embodiment, the above method by generate key to instruction, first set instruction, the 3rd common signature instruct,
The operation that packet parsing is instructed and the 3rd review signature command completion is signed according to Key Tpe, in addition to this it is possible to
The operation for completing to be signed according to Key Tpe by less instruction, for example, being set by generating key to instruction, first
Instruction, the instruction of the second common signature and the second review signature command complete the operation signed according to Key Tpe, i.e. in intelligence
After energy key devices receive the second review signature command, packet parsing operation and review signature operation are completed;For example, pass through life
The behaviour for completing to be signed according to Key Tpe to instruction, the instruction of the first common signature and the first review signature command into key
Make, i.e. after intelligent cipher key equipment receives the instruction of the first common signature, complete to set the operation of hash algorithm, signature algorithm
The operation identified with storage current key ID and current applications, and common signature operation is completed, received in intelligent cipher key equipment
After first review signature command, complete to set hash algorithm, the operation of signature algorithm and storage current key ID and current applications
The operation of mark, and complete to check signature operation;For example, instruction and signature packet are completed according to key by generating key
The operation that type is signed, i.e. after intelligent cipher key equipment receives signature packet, be configured hash algorithm, signature
The operation of algorithm and storage current key ID and current applications mark operation, and complete common signature operation or review signature
Operation.
A kind of implementation method signed according to Key Tpe provided in the present embodiment, it is in intelligent cipher key equipment
Each pair key sets Key Tpe, and the purposes of key is limited according to Key Tpe, for example, be served only for the key of common signature can not
Used in signature process is checked, being served only for the key of review signature can not use in process common signature, so as to distinguish not
The signature of same type, realize the purpose of anti-cheat label.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited thereto,
Any one skilled in the art is in technical scope disclosed by the invention, the change or replacement that can readily occur in,
It should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with scope of the claims
It is defined.
Claims (30)
1. a kind of implementation method signed according to Key Tpe, it is characterised in that methods described includes:
Step S1:When intelligent cipher key equipment receives the data of host computer transmission, the intelligent cipher key equipment judges data class
Type, if generation key then performs step S2 to instructing, if signature packet then performs step S3, if other instructions are then held
Row corresponding operating, implementing result, return to step S1 are returned to the host computer;
Step S2:The intelligent cipher key equipment identifies key is generated to Key Tpe mark, key ID and the purposes in instruction
Key description information is write, generates key pair, and the key pair of generation and key description information are write into key storage area, to institute
State host computer to return success, return to step S1;
Step S3:The intelligent cipher key equipment calculates the Hash that current hash algorithm is arranged to specify in the signature packet
Method, the signature algorithm that current signature algorithm is arranged to specify in the signature packet, store in the signature packet
Current key ID and current applications mark, perform step S4;
Step S4:Parameter of the intelligent cipher key equipment in the signature packet judges whether to review signature, is
Step S7 is then performed, otherwise performs step S5;
Step S5:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark
Type identifies, and whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to hold
Row step S6, otherwise return to error message, return to step S1 to the host computer;
Step S6:First Hash of the intelligent cipher key equipment in the signature packet is worth to the first number to be signed
According to the key according to corresponding to obtaining the current key ID and current applications of storage mark, using the key, according to current signature
Algorithm is signed to first data to be signed, and signature result and successful information are returned to the host computer, is removed related
Environment is set, return to step S1;
Step S7:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark
Type identifies, and whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to hold
Row step S8, otherwise return to error message, return to step S1 to the host computer;
Step S8:The intelligent cipher key equipment parses to the message in the signature packet, obtains explicit message, by institute
State explicit message storage and arrive display caching area, according to current hash algorithm, Hash is carried out to the message in the signature packet
Calculate, obtain the second cryptographic Hash, the second data to be signed are worth to according to second Hash, perform step S9;
Step S9:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button to be pressed,
When the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to the current of storage
Key corresponding to key ID and current applications mark acquisition, using the key, is treated according to current signature algorithm to described second
Signed data is signed, and signature result and successful information are returned to the host computer, is removed relevant environment and is set, return to step
S1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes working as storage
Data in preceding key ID, current applications mark and the display caching area.
2. according to the method for claim 1, it is characterised in that the intelligent cipher key equipment is according to the current key ID of storage
Key Tpe mark corresponding to obtaining is identified with current applications, is specially:The intelligent cipher key equipment is according to the current close of storage
Key ID and current applications mark the key description information corresponding to acquisition in the key storage area, from the key description information
It is middle to obtain the Key Tpe mark.
3. according to the method for claim 1, it is characterised in that described close according to corresponding to judging Key Tpe mark
Whether key is the key for allowing to carry out common signature, is specially:The intelligent cipher key equipment judges the Key Tpe mark
Whether value is the 4th preset value, is, key corresponding to determination is the key for not allowing to carry out common signature, is otherwise determined corresponding
Key be allow carry out common signature key.
4. according to the method for claim 1, it is characterised in that described close according to corresponding to judging Key Tpe mark
Whether key is to allow to carry out the key for checking signature, is specially:The intelligent cipher key equipment judges the Key Tpe mark got
Whether the value of knowledge is the 5th preset value, is, key corresponding to determination is not allow to carry out the key for checking signature, is otherwise determined
Corresponding key is to allow to carry out the key for checking signature.
5. according to the method for claim 1, it is characterised in that the intelligent cipher key equipment is in the signature packet
Message includes after being parsed:The intelligent cipher key equipment judges whether successfully resolved, is, obtains explicit message, otherwise to
The host computer returns to error message, return to step S1.
6. according to the method for claim 1, it is characterised in that described according to second Hash to be worth to second to be signed
Data, including:
Step S8-1:The intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement
Only to allow to carry out the key for checking signature, it is then to perform step S8-2, otherwise performs step S8-3;
Step S8-2:The intelligent cipher key equipment is filled to second cryptographic Hash, obtains second data to be signed;
Step S8-3:The intelligent cipher key equipment parses to the message, obtains Transaction Information, is calculated according to current Hash
Method, Hash calculation is carried out to the Transaction Information, the 3rd cryptographic Hash is obtained, to second cryptographic Hash and the 3rd cryptographic Hash
It is combined, and combined result is filled, obtains second data to be signed.
7. according to the method for claim 6, it is characterised in that the intelligent cipher key equipment judge corresponding to key whether be
Only allow to carry out the key for checking signature, be specially:The intelligent cipher key equipment judge Key Tpe mark value whether
For the 4th preset value, it is that key corresponding to determination is only to allow to carry out the key for checking signature, otherwise key corresponding to determination
It is not only to allow to carry out the key for checking signature.
8. a kind of implementation method signed according to Key Tpe, it is characterised in that methods described includes:
Step A1:When intelligent cipher key equipment receives the data of host computer transmission, the intelligent cipher key equipment judges data class
Type, if generation key then performs step A2 to instructing, if the instruction of the first common signature then performs step A3, if first is multiple
Core signature command then performs step A6, if other instructions then perform corresponding operating, returns to implementing result to the host computer, returns
Return step A1;
Step A2:The intelligent cipher key equipment identifies key is generated to Key Tpe mark, key ID and the purposes in instruction
Key description information is write, generates key pair, and the key pair of generation and key description information write-in key are deposited
Storage area, return success to the host computer, return to step A1;
Step A3:The Kazakhstan that current hash algorithm is arranged to specify in the first common signature instruction by the intelligent cipher key equipment
Uncommon algorithm, the signature algorithm that current signature algorithm is arranged to specify in the first common signature instruction, storage described first
Current key ID and current applications mark in common signature instruction;
Step A4:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark
Type identifies, and whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to hold
Row step A5, otherwise return to error message, return to step A1 to the host computer;
Step A5:First Hash of the intelligent cipher key equipment in first common signature instruction is worth to first and waits to sign
Name data, the key according to corresponding to being obtained current key ID and current applications mark, are calculated using the key, according to current signature
Method is signed to first data to be signed, is returned to signature result and successful information to the host computer, is removed correlative link
Border is set, return to step A1;
Step A6:The Kazakhstan that current hash algorithm is arranged to specify in the first review signature command by the intelligent cipher key equipment
Uncommon algorithm, the signature algorithm that current signature algorithm is arranged to specify in the first review signature command, storage described first
Check the current key ID and current applications mark in signature command;
Step A7:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark
Type identifies, and whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to hold
Row step A8, otherwise return to error message, return to step A1 to the host computer;
Step A8:The intelligent cipher key equipment parses to the message in the described first review signature command, obtains display report
Text, display caching area is arrived into explicit message storage, according to current hash algorithm, in the described first review signature command
Message carries out Hash calculation, obtains the second cryptographic Hash, is worth to the second data to be signed according to second Hash, performs step
A9;
Step A9:The intelligent cipher key equipment is shown to the explicit message in the display caching area, and waits button quilt
Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage
Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to described
Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return
Return step A1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes working as storage
Data in preceding key ID, current applications mark and the display caching area.
9. according to the method for claim 8, it is characterised in that the intelligent cipher key equipment is according to the current key ID of storage
Key Tpe mark corresponding to obtaining is identified with current applications, is specially:The intelligent cipher key equipment is according to the current close of storage
Key ID and current applications mark the key description information corresponding to acquisition in the key storage area, from the key description information
It is middle to obtain the Key Tpe mark.
10. according to the method for claim 8, it is characterised in that described according to corresponding to judging Key Tpe mark
Whether key is the key for allowing to carry out common signature, is specially:The intelligent cipher key equipment judges the Key Tpe mark
Value whether be the 4th preset value, be, determine corresponding to key be do not allow carry out common signature key, otherwise determine pair
The key answered is the key for allowing to carry out common signature.
11. according to the method for claim 8, it is characterised in that described according to corresponding to judging Key Tpe mark
Whether key is to allow to carry out the key for checking signature, is specially:The intelligent cipher key equipment judges the Key Tpe got
Whether the value of mark is the 5th preset value, is, key corresponding to determination is not allow to carry out the key for checking signature, otherwise really
Key corresponding to fixed is to allow to carry out the key for checking signature.
12. according to the method for claim 8, it is characterised in that the intelligent cipher key equipment is signed to the described first review
Message in instruction includes after being parsed:The intelligent cipher key equipment judges whether successfully resolved, is, obtains display report
Text, otherwise return to error message, return to step A1 to the host computer.
13. according to the method for claim 8, it is characterised in that described to be worth to second according to second Hash and wait to sign
Name data, including:
Step A8-1:The intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement
Only to allow to carry out the key for checking signature, it is then to perform step A8-2, otherwise performs step A8-3;
Step A8-2:The intelligent cipher key equipment is filled to second cryptographic Hash, obtains second data to be signed;
Step A8-3:The intelligent cipher key equipment parses to the message, obtains Transaction Information, according to current hash algorithm
Hash calculation is carried out to the Transaction Information, the 3rd cryptographic Hash is obtained, second cryptographic Hash and the 3rd cryptographic Hash is entered
Row combination, and combined result is filled, obtain second data to be signed.
14. according to the method for claim 13, it is characterised in that whether key corresponding to the intelligent cipher key equipment judgement
Only to allow to carry out the key for checking signature, it is specially:The intelligent cipher key equipment judges that the value of the Key Tpe mark is
No is the 4th preset value, is, key corresponding to determination is only to allow to carry out the key for checking signature, otherwise close corresponding to determination
Key is not only to allow to carry out the key for checking signature.
15. a kind of implementation method signed according to Key Tpe, it is characterised in that methods described includes:
Step B1:When intelligent cipher key equipment receives the data of host computer transmission, the intelligent cipher key equipment judges data class
Type, if generation key then performs step B2 to instructing, if first sets instruction then to perform step B3, if the second common label
Name instruction then performs step B4, if the second review signature command then performs step B6, if other instructions then perform corresponding behaviour
Make, implementing result, return to step B1 are returned to the host computer;
Step B2:The intelligent cipher key equipment identifies key is generated to Key Tpe mark, key ID and the purposes in instruction
Key description information is write, generates key pair, and the key pair of generation and key description information write-in key are deposited
Storage area, return success to the host computer, return to step B1;
Step B3:Current hash algorithm is arranged to described first and sets the Hash specified in instruction to calculate by the intelligent cipher key equipment
Method, the signature algorithm that current signature algorithm is arranged to specify in the first setting instruction, storage described first set instruction
In current key ID and current applications mark, return success to the host computer, return to step B1;
Step B4:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark
Type identifies, and whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to hold
Row step B5, otherwise return to error message, return to step B1 to the host computer;
Step B5:First Hash of the intelligent cipher key equipment in second common signature instruction is worth to first and waits to sign
Name data, the key according to corresponding to obtaining the current key ID and current applications of storage mark, using the key, according to current
Signature algorithm is signed to first data to be signed, is returned to signature result and successful information to the host computer, is removed
Relevant environment is set, return to step B1;
Step B6:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark
Type identifies, and whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to hold
Row step B7, otherwise return to error message, return to step B1 to the host computer;
Step B7:The intelligent cipher key equipment parses to the message in the described second review signature, obtains explicit message, will
Display caching area is arrived in the explicit message storage, is carried out according to current hash algorithm, to the message in the described second review signature
Hash calculation, the second cryptographic Hash is obtained, the second data to be signed are worth to according to second Hash, perform step B8;
Step B8:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button to be pressed,
When the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to the current of storage
Key corresponding to key ID and current applications mark acquisition, is treated using the key, according to current signature algorithm to described second
Signed data is signed, and signature result and successful information are returned to the host computer, is removed relevant environment and is set, return to step
B1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes working as storage
Data in preceding key ID, current applications mark and the display caching area.
16. according to the method for claim 15, it is characterised in that the intelligent cipher key equipment is according to the current key of storage
ID and current applications identify Key Tpe mark corresponding to acquisition, are specially:The intelligent cipher key equipment is according to the current of storage
Key ID and current applications mark the key description information corresponding to acquisition in the key storage area, describe to believe from the key
The Key Tpe mark is obtained in breath.
17. according to the method for claim 15, it is characterised in that described according to corresponding to judging Key Tpe mark
Whether key is the key for allowing to carry out common signature, is specially:The intelligent cipher key equipment judges the Key Tpe mark
Value whether be the 4th preset value, be, determine corresponding to key be do not allow carry out common signature key, otherwise determine pair
The key answered is the key for allowing to carry out common signature.
18. according to the method for claim 15, it is characterised in that described according to corresponding to judging Key Tpe mark
Whether key is to allow to carry out the key for checking signature, is specially:The intelligent cipher key equipment judges the Key Tpe got
Whether the value of mark is the 5th preset value, is, key corresponding to determination is not allow to carry out the key for checking signature, otherwise really
Key corresponding to fixed is to allow to carry out the key for checking signature.
19. according to the method for claim 15, it is characterised in that the intelligent cipher key equipment is signed to the described second review
In message parsed after include:The intelligent cipher key equipment judges whether successfully resolved, is, obtains explicit message, no
Then error message, return to step B1 are returned to the host computer.
20. according to the method for claim 15, it is characterised in that described to be worth to second according to second Hash and wait to sign
Name data, including:
Step B7-1:The intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement
Only to allow to carry out the key for checking signature, it is then to perform step B7-2, otherwise performs step B7-3;
Step B7-2:The intelligent cipher key equipment is filled to second cryptographic Hash, obtains second data to be signed;
Step B7-3:The intelligent cipher key equipment root parses to the message, obtains Transaction Information, according to current hash algorithm
Hash calculation is carried out to the Transaction Information, the 3rd cryptographic Hash is obtained, second cryptographic Hash and the 3rd cryptographic Hash is entered
Row combination, and combined result is filled, obtain second data to be signed.
21. according to the method for claim 20, it is characterised in that whether key corresponding to the intelligent cipher key equipment judgement
Only to allow to carry out the key for checking signature, it is specially:The intelligent cipher key equipment judges that the value of the Key Tpe mark is
No is the 4th preset value, is, key corresponding to determination is only to allow to carry out the key for checking signature, otherwise close corresponding to determination
Key is not only to allow to carry out the key for checking signature.
22. a kind of implementation method signed according to Key Tpe, it is characterised in that methods described includes:
Step C1:When intelligent cipher key equipment receives the instruction of host computer transmission, the intelligent cipher key equipment decision instruction class
Type, if generation key then performs step C2 to instructing, if first sets instruction then to perform step C3, if the 3rd common label
Name instruction then performs step C4, if packet parsing instruction then performs step C6, if the 3rd review signature command then performs step
Rapid C8, if other instructions then perform corresponding operating, implementing result, return to step C1 are returned to the host computer;
Step C2:The intelligent cipher key equipment identifies key is generated to Key Tpe mark, key ID and the purposes in instruction
Key description information is write, generates key pair, and the key pair of generation and key description information write-in key are deposited
Storage area, return success to the host computer, return to step C1;
Step C3:Current hash algorithm is arranged to described first and sets the Hash specified in instruction to calculate by the intelligent cipher key equipment
Method, the signature algorithm that current signature algorithm is arranged to specify in the first setting instruction, storage described first set instruction
In current key ID and current applications mark, return success to the host computer, return to step C1;
Step C4:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark
Type identifies, and whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to hold
Row step C5, otherwise return to error message, return to step C1 to the host computer;
Step C5:First Hash of the intelligent cipher key equipment in the 3rd common signature instruction is worth to first and waits to sign
The first obtained data to be signed are stored in memory block to be signed, return success to the host computer by name data, are returned
Step C1;
Step C6:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark
Type identifies, and whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to hold
Row step C7, otherwise return to error message, return to step C1 to the host computer;
Step C7:Message during the intelligent cipher key equipment instructs to the packet parsing parses, and obtains explicit message, will
Display caching area is arrived in the explicit message storage, is carried out according to current hash algorithm, to the message in packet parsing instruction
Hash calculation, the second cryptographic Hash is obtained, the second data to be signed are worth to according to second Hash, it is to be signed by described second
Data storage is return success, return to step C1 to the host computer in memory block to be signed;
Step C8:The intelligent cipher key equipment judges whether the data to be signed in memory block to be signed are the first number to be signed
According to being then execution step C9, otherwise perform step C10;
Step C9:Intelligent cipher key equipment key according to corresponding to obtaining the current key ID and current applications of storage mark,
The first data to be signed of storage are signed using the key, according to current signature algorithm, returned to the host computer
Result of signing and successful information, remove relevant environment and set, return to step C1;
Step C10:The intelligent cipher key equipment shows to the explicit message in display caching area, and wait button by by
Under, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage
Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to storage
Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return
Return step C1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes working as storage
Data in preceding key ID, current applications mark and the display caching area.
23. according to the method for claim 22, it is characterised in that the intelligent cipher key equipment is according to the current key of storage
ID and current applications identify Key Tpe mark corresponding to acquisition, are specially:The intelligent cipher key equipment is according to the current of storage
Key ID and current applications mark the key description information corresponding to acquisition in the key storage area, describe to believe from the key
The Key Tpe mark is obtained in breath.
24. according to the method for claim 22, it is characterised in that described according to corresponding to judging Key Tpe mark
Whether key is the key for allowing to carry out common signature, is specially:The intelligent cipher key equipment judges the Key Tpe mark
Value whether be the 4th preset value, be, determine corresponding to key be do not allow carry out common signature key, otherwise determine pair
The key answered is the key for allowing to carry out common signature.
25. according to the method for claim 22, it is characterised in that described according to corresponding to judging Key Tpe mark
Whether key is to allow to carry out the key for checking signature, is specially:The intelligent cipher key equipment judges the Key Tpe got
Whether the value of mark is the 5th preset value, is, key corresponding to determination is not allow to carry out the key for checking signature, otherwise really
Key corresponding to fixed is to allow to carry out the key for checking signature.
26. according to the method for claim 22, it is characterised in that the intelligent cipher key equipment instructs to the packet parsing
In message parsed after include:The intelligent cipher key equipment judges whether successfully resolved, is, obtains explicit message, no
Then error message, return to step C1 are returned to the host computer.
27. according to the method for claim 22, it is characterised in that described to be worth to second according to second Hash and wait to sign
Name data, including:
Step C7-1:The intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement
Only to allow to carry out the key for checking signature, it is then to perform step C7-2, otherwise performs step C7-3;
Step C7-2:The intelligent cipher key equipment is filled to second cryptographic Hash, obtains second data to be signed;
Step C7-3:The intelligent cipher key equipment parses to the message, obtains Transaction Information, according to current hash algorithm
Hash calculation is carried out to the Transaction Information, the 3rd cryptographic Hash is obtained, second cryptographic Hash and the 3rd cryptographic Hash is entered
Row combination, and combined result is filled, obtain second data to be signed.
28. according to the method for claim 27, it is characterised in that whether key corresponding to the intelligent cipher key equipment judgement
Only to allow to carry out the key for checking signature, it is specially:The intelligent cipher key equipment judges that the value of the Key Tpe mark is
No is the 4th preset value, is, key corresponding to determination is only to allow to carry out the key for checking signature, otherwise close corresponding to determination
Key is not only to allow to carry out the key for checking signature.
29. according to the method for claim 22, it is characterised in that the step C5 includes:The intelligent cipher key equipment will
Common signature identifies set;
The intelligent cipher key equipment judges whether the data to be signed in memory block to be signed are the first data to be signed, specifically
For:The intelligent cipher key equipment judges that the common signature identifies whether set, is to determine to wait to sign in memory block to be signed
Name data are the first data to be signed, and it is the second data to be signed otherwise to determine the data to be signed in memory block to be signed.
30. according to the method for claim 22, it is characterised in that the step C7 includes:The intelligent cipher key equipment will
Review signature mark set;
The intelligent cipher key equipment judges whether the data to be signed in memory block to be signed are the first data to be signed, specifically
For:The intelligent cipher key equipment judges that the review signature identifies whether set, is to determine to wait to sign in memory block to be signed
Name data are not the first data to be signed, and it is the first data to be signed otherwise to determine the data to be signed in memory block to be signed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510247236.XA CN104852806B (en) | 2015-05-15 | 2015-05-15 | A kind of implementation method signed according to Key Tpe |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510247236.XA CN104852806B (en) | 2015-05-15 | 2015-05-15 | A kind of implementation method signed according to Key Tpe |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104852806A CN104852806A (en) | 2015-08-19 |
CN104852806B true CN104852806B (en) | 2018-01-05 |
Family
ID=53852176
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510247236.XA Active CN104852806B (en) | 2015-05-15 | 2015-05-15 | A kind of implementation method signed according to Key Tpe |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104852806B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105871557B (en) * | 2016-05-18 | 2019-04-16 | 飞天诚信科技股份有限公司 | Email signature method, apparatus and system |
CN110189125B (en) * | 2019-05-29 | 2021-04-27 | 飞天诚信科技股份有限公司 | Interactive digital signature method and system |
CN111049654B (en) * | 2019-11-11 | 2024-08-13 | 北京握奇智能科技有限公司 | Tamper-proof protection method and system for bank USBKey certificate application |
CN112771815B (en) * | 2020-03-31 | 2022-11-11 | 华为技术有限公司 | Key processing method and device |
CN117353926B (en) * | 2023-12-01 | 2024-02-27 | 苏州元脑智能科技有限公司 | SM2 algorithm password processing method, device and equipment based on chip |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101599836A (en) * | 2009-07-14 | 2009-12-09 | 北京坚石诚信科技有限公司 | A kind of endorsement method, signature device and system |
CN103532721A (en) * | 2013-10-23 | 2014-01-22 | 北京旋极信息技术股份有限公司 | Digital signature method, signature verification method, and method of distinguishing transaction signature and common signature |
CN103701598A (en) * | 2013-12-05 | 2014-04-02 | 武汉信安珞珈科技有限公司 | SM2 signature algorithm-based double-check signature method and digital signature equipment |
CN104579677A (en) * | 2014-11-18 | 2015-04-29 | 飞天诚信科技股份有限公司 | Secure and rapid data signature method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7779258B2 (en) * | 2006-09-22 | 2010-08-17 | International Business Machines Corporation | Method for controlling security function execution with a flexible, extendable, and non-forgable block |
-
2015
- 2015-05-15 CN CN201510247236.XA patent/CN104852806B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101599836A (en) * | 2009-07-14 | 2009-12-09 | 北京坚石诚信科技有限公司 | A kind of endorsement method, signature device and system |
CN103532721A (en) * | 2013-10-23 | 2014-01-22 | 北京旋极信息技术股份有限公司 | Digital signature method, signature verification method, and method of distinguishing transaction signature and common signature |
CN103701598A (en) * | 2013-12-05 | 2014-04-02 | 武汉信安珞珈科技有限公司 | SM2 signature algorithm-based double-check signature method and digital signature equipment |
CN104579677A (en) * | 2014-11-18 | 2015-04-29 | 飞天诚信科技股份有限公司 | Secure and rapid data signature method |
Also Published As
Publication number | Publication date |
---|---|
CN104852806A (en) | 2015-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104852806B (en) | A kind of implementation method signed according to Key Tpe | |
CN110932858B (en) | Authentication method and system | |
CN103081399B (en) | Authenticating device and system | |
CN102916963B (en) | Safe data exchange method, device, nodes and safe data exchange system | |
CN113014539B (en) | Internet of things equipment safety protection system and method | |
US9094823B2 (en) | Data processing for securing local resources in a mobile device | |
US9253162B2 (en) | Intelligent card secure communication method | |
CN101778099B (en) | Architecture accessing trusted network for tolerating untrusted components and access method thereof | |
CN107148019B (en) | It is a kind of for connecting the method and apparatus of wireless access point | |
US20120266167A1 (en) | Tenant Data Center for Establishing a Virtual Machine in a Cloud Environment | |
CN110737897B (en) | Method and system for starting measurement based on trusted card | |
CN105847247A (en) | Authentication system and working method thereof | |
CN106534086B (en) | A kind of equipment authentication method, terminal device, server and system | |
CN105320891B (en) | A kind of method and device of computer security loading system mirror image | |
WO2020035009A1 (en) | Authentication system and working method therefor | |
CN109729046A (en) | Two-dimensional code scanning method and terminal, authentication method and server and service system | |
CN106372487A (en) | Method and system for enhancing trust of server operating system | |
CA3184034A1 (en) | Software integrity protection method and apparatus, and software integrity verification method and apparatus | |
CN106156677A (en) | Identity card card reading method and system | |
CN111935191B (en) | Password resetting method, system and device and electronic equipment | |
WO2018166163A1 (en) | Pos terminal control method, pos terminal, server and storage medium | |
CN110190950A (en) | A kind of implementation method and device of security signature | |
CN106936797A (en) | The management method and system of magnetic disk of virtual machine and file encryption key in a kind of cloud | |
CN106027249A (en) | Identity card reading method and system | |
CN107342963A (en) | A kind of secure virtual machine control method, system and the network equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
OL01 | Intention to license declared | ||
OL01 | Intention to license declared |