TW200826597A - System, apparatus, method, application program, and computer readable medium thereof for requesting a digital certificate and delivering a secret key for a mobile devices - Google Patents

System, apparatus, method, application program, and computer readable medium thereof for requesting a digital certificate and delivering a secret key for a mobile devices Download PDF

Info

Publication number
TW200826597A
TW200826597A TW95146905A TW95146905A TW200826597A TW 200826597 A TW200826597 A TW 200826597A TW 95146905 A TW95146905 A TW 95146905A TW 95146905 A TW95146905 A TW 95146905A TW 200826597 A TW200826597 A TW 200826597A
Authority
TW
Taiwan
Prior art keywords
electronic
signal
verification
secret
key
Prior art date
Application number
TW95146905A
Other languages
Chinese (zh)
Other versions
TWI340579B (en
Inventor
Jui-Ming Wu
Original Assignee
Inst Information Industry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inst Information Industry filed Critical Inst Information Industry
Priority to TW095146905A priority Critical patent/TWI340579B/en
Publication of TW200826597A publication Critical patent/TW200826597A/en
Application granted granted Critical
Publication of TWI340579B publication Critical patent/TWI340579B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

System, apparatus, method, application program, and computer readable medium thereof for assisting a mobile device to request a digital certificate and a secret key are provided. The system comprises the mobile device, a computer, and a server. Since the computer has better management of digital certificates and better network connections, the mobile device request the digital certificate and the secret key from the server through the computer. The computer generates a requesting signal. After receiving the requesting signal, the server transmits an identity requesting signal to the mobile device to confirm the identity, which can be achieved by various approaches. In addition, the generation and the delivery of the digital certificate can be achieved by various approaches as well.

Description

200826597 九、發明說明: 【發明所屬之技術領域】 本發明係關於一種為一電子行動裝置申請一電子憑證及 :秘密金鑰之裝置及方法;更詳細地說,係關於一種利用一電腦 為一電子行動裝置申請一電子憑證及傳遞一秘密金鑰之裝置及方 【先前技術】 近年來,由於電子商務技術快速發展,越來越多的商章夺县 ,網際網路上進行,也因此有關身份認料問題也越來越為重 A開金鑰密碼技術(pubHc Key 及電子ς噔 ifleate)是用來解決此—問題的—種方式。電腦申i憑 =壯技術已發展數年’故其技術較為成熟。然*,近年 ^ ,衣置(如手機、個人數位助理)越來越普及,這些電子行動 證因此,現今.些研究關於如何為電· 丰播機申請電子憑證之作法主要可分為三類。第一類係由 (與金證’第二_是將電腦上既有的憑證 金餘目λα部糾f子摘駭时機〉不具備 的憑證^法滿足手機HeetName)的憑證’亦即,電腦上既有 之間,若要隹高足m手山機订動應用需求。再者,電腦與電子行動裝ί 1右要進仃匯出/匯人彻,臟嶋卡、USB it 5 200826597 ί ⑽,細㈣子行_ 仍值得業界投注 【發明内容】 朽一目的在於提供一種令-電腦為一電子行動穿如 :1:==二秘;金_;= 用以產生-中“Ιΐϋ傳运介面。該電腦之該產生模組 秘密金錄。二;I::電子彳了動裝置申請該電子憑證及該 號進行數位ϊί r該;利用該秘密金鑰對該申請訊 伺服器,以通知該伺服哭該^子运傳送該中請訊號至該 密金錄。該伺服器包含二接收介:、子口 :秘 器之。該舰 置,以灰俄兮曾工〜^身驗㈣求喊至該電子行動裝 該身分驗:“ ’以及用以因; S電子mf 接收該身分驗證請求訊號,以及用以接 分驗偟該電子行動裝置之該傳送介面用以因應該身 電子行身分驗證回覆訊號’以通知該祠服器該 模組證者。該電子行動裝置之該掘取 子心也讯心中擷取該電子憑證及該秘密金鑰。 200826597 Γ 本务明之另一目的在於提供一種申請一電子憑證及傳遞一秘 密金鑰之系統。該系統包含一電腦、一伺服器及一電子行動裝置。 該電腦包含一產生模組、一簽章模組、一傳送介面以及一接收介 ,。ά亥伺服态包含一接收介面、一產生模組以及一傳送介面。該 電子行動裝置包含一接收介面、一傳送介面以及一擷取模組。該 電腦之該產生模組用以產生一申請訊號,以及用以產生一身分驗 ,,覆訊號。該電腦之該簽章模解用以利用該秘密金鑰對該申請 訊號進行數位簽章。該電腦之該彳|送介面用以傳送該申請訊號, 以及用以傳送該身分驗證回覆訊號。該電腦之該接收介面用以接 收二身,驗證請求訊號。該伺服器之該接收介面用以自該電腦接 收该Ϊ請訊號’以及用以自該電腦接收該身分驗證回覆訊號。該 ,服器之該產生模組用以因應該申請訊號產生該身分驗證請求訊 唬,=及用以因應該身分驗證回覆訊號產生一電子憑證訊息。該 伺服态之该傳送介面用以傳送該身分驗證請求訊號,以及用以因 應該身分驗證回覆訊號傳送該電子憑證訊息。該電子行動裝置之 該接收介面用以自該伺服器接收該身分驗證請求訊號以及用以自 该伺服器接收該電子憑證訊息。該電子行練置之該傳送介面用 =傳送該身條證請求職至腦。該電子行祕置之該操取 ^組用以自該電子憑魏息情_電子驗及娜較输。該 明减用以表㈣子行練置巾請該電子憑證及索取該秘密 钟請訊舰傳送至該舰如通知該舰韻電子行動 二fr㈣子憑證及索取娜密麵,該身分驗證回覆訊號用 ^ 4伺服W電子行動裝置確為巾請該電子憑證者,以及該 t驗證請求訊制以求證該電子行動裝置為t請該電子憑證 穷么i發$之另一目的在於提供一種中請—電子憑證及索取一秘 ^金,之電子行動裝置,該裝置包含—接收介面…傳送介面以 組:該接收介面用以自—伺服器接收—身分驗證請求 成就,其中該身分驗證請求減_應由_電腦_電子行動裝 7 200826597 ί申及,密金鑰而產生。因應該身分驗證請求訊 該°電;行ίΐ置確J申分驗證相關訊號,以通知該伺服器 電子。電子憑證者。隨後該接收介面接收一 及該秘密金…驗自該電子憑證訊息中擷取該電子憑證 穷全於提供—針請一電子憑證及傳遞-秘 =5。裝置之電腦。該電腦包含—產生模組以及一 中^電用以產生—中請訊號表示該電子行動裝置 二二、、'^及索取該秘密麵’以及用以產生—密錄加密金 二該‘子中請訊號至_伺服器,以通知該伺服 ;密鑰加密金匕 及’以及用以傳送 密錄加密麵處理該電子行動裝置利用該 ㈣另—目的在於提供—種傳遞—電子憑證及-秘密金 生模組以及之伺服器。該伺服器包含—接收介面、-產 ί秘訊=以表示該電子行練置中請該電子憑證工索取 署巧傳达介面用以傳綱身分驗證請求訊號至該電子 八面ί#’ ϊ求賴電子行純置射請闕傾證者。該接收 财分驗細覆訊朗以表示該 於確月電子憑證者。因應該身分驗證回覆訊 △ 一^ ϋ之又—目的在於提供—種令—電腦為—電子行動举署 ^^^申請―電子憑證及索取—秘密金瑜之方法。該方3 丄令該電腦產生一申請訊號,用以表示該電子行動ί »月μ屯子憑證及索取該秘密金鑰;令該電腦利用該秘密金^ 200826597 哭,令該電腦傳送該申請訊號至該伺服 i入i 行動農置中請該電子憑證及索取該秘 來自該電腦之該申請訊號;令該伺服器 八二身分驗證請求訊號;令該舰ϋ傳送該身 置,以求證該電子行動裝置為申 古主二啼,g二二=子行動裳置自該伺服器接收該身分驗證 二2子仃練置因應該身分驗證請求訊號,傳送一 覆為請求 ΐ ;:3二驗:覆#υ傳达—電子憑證訊息;令該電子行動裝妾 電子憑證訊息;以及令該電子行動裝置自 ^ 擷取該電子憑證及該秘密金鑰。 心也吼心中 本發明之又一目的在於提供一種申請一電子嗎 一 密金鑰之方法。該方法包含下列步驟:令一電腦產^_ &',、 示—電子行動裝置中請該電子憑證及索取該秘ί金"鑰、 δ亥電,利用該秘密金錄對該中請訊號進行數位 ^雷^ 至一伺服器,以通知·服器該電子行以工 S子憑證及索取該秘密麵;令服ϋ接收來自 ι;令該器因應該中請訊號產生 驗 ,該賴爾置為_電子憑證者;令蕊二 ,服器接收該身分驗證請求訊號;令該電子行裝3 因應該身分驗證請纽號,傳送射分驗證電, ; ^ ΐίί: 3身刀驗迅回覆訊號;令該伺服器因應該身分驗證 -電子憑證訊息;令該伺服器因應該身分驗證回覆訊^專=電 200826597 ίί證ίί;令該電子行動裝置接收該電子憑證訊息;以及令該 丛订動衣置自該電子憑證訊息中擷取該電子憑證及該秘密金 鐵0 奸在於提供’令—電子行動裝置中請一電 2 6.秘饴金鑰之方法。該方法包含下列步驟:自一伺 ίη: 驗證請求訊號’其中該身分驗證請求訊號係因應 電^行動裝置中請該電子憑證而產生;因應該身分驗 = 送—身分驗證相關訊號,以通知該伺顧該電子200826597 IX. Description of the Invention: [Technical Field] The present invention relates to an apparatus and method for applying for an electronic voucher and a secret key for an electronic mobile device; and more particularly, a method for utilizing a computer Electronic mobile device applying for an electronic voucher and transmitting a secret key device [previous technology] In recent years, due to the rapid development of e-commerce technology, more and more commercial chapters are seized in the county, on the Internet, and thus related The problem of replenishment is also becoming more and more important. The nick key cryptography technology (pubHc Key and electronic ς噔ifleate) is used to solve this problem. The computer application is based on the fact that Zhuang Technology has been developed for several years, so its technology is relatively mature. However, in recent years, clothing (such as mobile phones, personal digital assistants) is becoming more and more popular, these electronic action certificates, therefore, some of the research on how to apply for electronic voucher for electric and broadcast machines can be divided into three categories. . The first category consists of (with the certificate of the second certificate being the nickname of the voucher λα part of the computer, which is not available), the certificate that satisfies the mobile phone HeetName] There are both on the computer, if you want to squat high-handed mountain machine to order application requirements. In addition, the computer and electronic mobile device ί 1 right to enter the export / remittance, dirty 嶋 card, USB it 5 200826597 ί (10), fine (four) sub-row _ still worth the industry betting [invention content] A kind of computer-like electronic action wear: 1:== second secret; gold _;= used to generate - "small transport interface. The computer should produce a module secret gold record. II; I:: electronic The mobile device applies for the electronic voucher and the number is digitized; the secret server is used to notify the server to send the message to the crypto note. The server contains two receiving media: the sub-port: the secret device. The ship is set up by the gray Russians ~ ^ body test (four) seeking to call the electronic action to the body test: "' and the cause; S-electronics The mf receives the identity verification request signal and the communication interface for receiving the verification of the electronic mobile device for verifying the response signal by the electronic identity verification to notify the server of the module. The electronic mobile device also captures the electronic voucher and the secret key. 200826597 另一 Another purpose of this document is to provide a system for applying for an electronic voucher and delivering a secret key. The system includes a computer, a server and an electronic mobile device. The computer includes a production module, a signature module, a transmission interface, and a receiving medium. The servo state includes a receiving interface, a generating module and a transmitting interface. The electronic mobile device includes a receiving interface, a transmitting interface and a capture module. The generating module of the computer is configured to generate an application signal and to generate a sub-test, a reply signal. The signature of the computer is used to digitally sign the application signal using the secret key. The user interface of the computer transmits the application signal and transmits the identity verification reply signal. The receiving interface of the computer is used to receive the two bodies and verify the request signal. The receiving interface of the server is configured to receive the request signal from the computer and to receive the identity verification reply signal from the computer. The generating module of the server is configured to generate the identity verification request message according to the application signal, and to generate an electronic voucher message for the identity verification reply signal. The transmission interface of the servo state is used for transmitting the identity verification request signal and for transmitting the electronic voucher message according to the identity verification reply signal. The receiving interface of the electronic mobile device is configured to receive the identity verification request signal from the server and to receive the electronic voucher message from the server. The electronic interface of the electronic device is used to transmit the identity card to the brain. The operation of the electronic line is used to collect the electronic information from the electronic. The reduction is used for the table (4) sub-line training towel, please use the electronic voucher and request the secret clock to request the ship to be transmitted to the ship, notify the ship's electronic action two fr (four) sub-voucher and request Naomi face, the identity verification reply signal Using the ^ 4 servo W electronic mobile device to determine the electronic voucher, and the t-authentication request system to verify that the electronic mobile device is t, the electronic voucher is poor, and the other purpose is to provide a kind of request. - an electronic voucher and an electronic mobile device for requesting a secret, the device comprises a receiving interface ... a transmitting interface to the group: the receiving interface is for receiving from the server - the identity verification request achievement, wherein the identity verification request is reduced _ It should be generated by _ computer _ electronic mobile device 7 200826597 ί, the key. In response to the identity verification request, the device will verify the relevant signal to notify the server of the electronic. Electronic voucher. Then, the receiving interface receives the first and the secret gold... from the electronic voucher message, the electronic voucher is exhausted from the offer - the e-voucher and the pass-secret = 5. The computer of the device. The computer includes a generating module and a power generating unit for generating a signal indicating that the electronic mobile device is 22, '^ and requesting the secret surface, and for generating a secret recording encryption key. Please send a signal to the _server to notify the server; the key encryption key and 'and the transmission of the secret recording surface to handle the electronic mobile device using the (4) another - the purpose is to provide - delivery - electronic voucher and - secret gold model Group and server. The server includes a receiving interface, and a secret message = to indicate that the electronic voucher is required to request the electronic communication device to transmit the identity verification request signal to the electronic eight-sided ί#' ϊ Ask Lai Electronics to shoot purely. The receipt of the financial sub-review is to indicate the e-voucher. In response to the identity verification reply △ ^ ^ — — — — — — — — — — — — — — — — — — — — — — 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑The party 3 causes the computer to generate an application signal to indicate the electronic action and to request the secret key; the computer uses the secret gold ^ 200826597 to cry, and the computer transmits the application signal to The server i requests the electronic voucher and requests the secret application code from the computer; the server identifies the request signal; the ship transmits the body to verify the electronic action. The device is the second master of Shengu, and the second and second actions are received from the server. The identity verification is performed. The identity verification request signal is transmitted. The response is sent as a request. #υ传送—Electronic voucher message; causing the electronic action to install an electronic voucher message; and causing the electronic mobile device to retrieve the electronic voucher and the secret key. A further object of the present invention is to provide a method of applying for an electronic key. The method comprises the following steps: causing a computer to produce ^_ & ',, indicating - the electronic voucher in the electronic mobile device and requesting the secret gold " key, δ hai, using the secret gold record for the middle The signal is digitized by ^^^ to a server to inform the server of the electronic line to work for the sub-voucher and to request the secret face; the service is received from ι; the device is requested to generate the signal, Er is set as the _ e-voucher; Ling Rui, the server receives the identity verification request signal; so that the electronic device installed 3 due to identity verification, please send the score verification power; ^ ΐίί: 3 body knife inspection reply The signal is sent to the server for verification of the identity of the e-voucher; the server is required to verify the identity of the device; the electronic mobile device receives the electronic voucher message; The clothing is set in the electronic voucher message to retrieve the electronic voucher and the secret gold wire is provided by the method of providing the electronic key to the electronic device. The method comprises the following steps: from a server: verifying the request signal, wherein the identity verification request signal is generated according to the electronic certificate in the mobile device; the identity verification=send-identification verification related signal is notified to notify the Serving the electron

C 該電子憑證訊息中擷取該電子憑證及該秘=鑰' ^ 密金重申請-電子憑證及傳遞-秘 值電子行動裝置申請該電子憑證及索取該秘 《裝i申二 號至’服11,以通知_服器該電子行 鑰·、以及證及索取該秘密金鍮;產生一密餘加密金 密金鑰至該電子行絲置,以_電子行 "用該l鑰加岔金鑰處理以得該秘密金鑰。 及-供一齡-伺服器傳遞-細證 裳置申請該ϊ子&=中請訊號用以表示該電子行動 身分驗證請求訊ιϋ該^、錢;因_申請訊號產生-置,以求證闕子"行動證請求_至該電子行動裝 證回覆訊號,置i中請該電代證者;接收-身分驗 申請該電子瑪證者.漆=设而虎用以表不該電子行動!置確為 息;其中,該電子彳^動了H證回覆訊號傳送該電子憑證訊 證及該秘密麵。Α Ά由錢子憑證訊息轉該電子憑 200826597 本免明之再一目的在於提供一種^--雷_ 飼服器申請-電子憑上取!_:密=艺電子;= ΐΐ=:ΐ,之一產生模組產生-申請== -簽早模組利用該秘密金麟 = 腦之一傳送介面傳送辦請訊號至該伺服 電子行動I置巾請該電子蹲證及旁取魏、㊆」通知_服益5亥 -接收介面接收來自該電;之哕^嘖:二山3 ’令該伺服器之C. The electronic voucher message retrieves the electronic voucher and the secret key ^ ^ 密金重申请 - electronic voucher and delivery - secret value electronic mobile device to apply for the electronic voucher and request the secret "I am applying for the second to the service" 11. To notify the server of the electronic key, and to obtain the secret key; to generate a secret encryption key to the electronic line, to _ electronic line " use the key to crown The key is processed to obtain the secret key. And - for the first age - server delivery - the certificate of the application for the scorpion &= please signal to indicate the electronic action identity verification request message ϋ ^ ^, money; due to _ application signal generation - set to verify阙子"Action Certificate Request_to the electronic action certificate reply signal, set the request for the electricity certificate; receive-identity test application for the electronic certificate. Paint = set the tiger to use the electronic action ! The information is confirmed; wherein the electronic device transmits the H certificate reply signal to transmit the electronic voucher and the secret face. Α Ά 钱 钱 钱 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 A production module is generated - application == - early signing module uses the secret Jinlin = one of the brain's transmission interface to send the request signal to the servo electronic action I to place the towel, please use the electronic certificate and the next Wei and the seven" notice _ service benefits 5 hai - receiving interface received from the electricity; 哕 ^ 啧: two mountains 3 'order the server

C 電子行動輕為申魏電子㉟财·巧JJ動Ϊ置以求證5亥 介:自該伺服器接收該身分驗證請求;;: ^以通知該伺服器該電子行動裝置確為^ = 该伺服器之該接收介面接收該身 電子心也者,7 組因應該身分驗證回覆訊號ϊ生上電二=服;j 分驗證回覆訊號傳:二電;憑= 令該電子彳^ 接收該電子憑證訊息;以及 憑證及該31|她触自耗料觀μ娜該電子 電子憑證及-秘密;鑰it仃動裝置向—伺服器申請一 電腦,取髓,讀供-種 密金输之方法。兮提供—種中請-電子憑證及傳遞-秘 生一申請訊t用令—電腦之—產生模組產 該秘密金鑰;令該電動衣置帽該電子憑證及索取 號進行數位簽章;令_二早t、__秘密金鑰對該申請訊 -电驷之一傳送介面傳送該申請訊號至一伺 200826597 服裔’以通知該伺服器該電子行動罗 主 秘密金餘;令該錬器之—接收介面====== 號;令該伺服器之一產生模組因應該=申晴訊 求訊料該伺服器之一傳送介‘身 Ο 號;令該電子行動裝置之一傳赢分驗證請求訊 該電腦;令該電腦之—接收介面自驗證請求訊號至 證請求訊號;令該電腦之該產生置接收該身分驗 令該電腦之該傳送介面因應該身分驗nm回”號; 該訊 取該電子憑證及該秘密金鑰。 、μ電子芯祖吼息中擷 本發明之再一目的在於提供一種内 電備及一秘密金錄之方法二請: 電腦可讀取舰,儲存-麵程式峨行上述練供一種 本發明之再一目的在於提供一種令一 證請求訊號,傳送-身分驗證因應,身分驗 行動裝置確為申請該電子憑證者;^ 服$該電子 訊一該電子行動裝置之一操取;':== 200826597 擷取該電子憑證及該秘密金錄。 士發明之再一目的在於提供一種内儲於 用,式’使該電传喊置執行麵為 置之應 子憑證及-秘密金輪之方法。本發j又=衣置申請一電 腦可讀取媒體,儲存一應用程式以執行上述於提供一種電 本發明之再一目的在於提供一带/ 密金鑰予一電子行動裝置之方法。兮方u子心登及傳遞一秘 腦之-產生模組產生—申包含下列步驟:令-電 r 該電子憑證及*取該軸讀電子行姆置申請 請訊號至-伺服器,以偏面傳送該申 憑證及索取該秘密金鑰;令該產生置中請該電子 及令該傳送介面傳送該密餘加穷全餘至加密金錄;以 電子行f置利用該密餘加密金鎗處理;置。,以使該 使該電腦執行獄以:電腦之應用程式’ 密金錄之方法。本發明之 ^動衣置申^一電子憑證及-秘 體,儲存-朗程式以執行上述之H於提供—種電腦可讀取媒 ί, 及-秘密金錄至一電子行3一伺服器傳遞一電子憑證 訊號用以表示該電子行動壯末自^電細之一申請訊號,該申請 鑰;令該伺服器之一產味^置门申^該電子憑證及索取該秘密金 求訊號;令該應該申請訊號產生一身分驗證請 電子行動裝置,以i證該驗證請求訊號至該 該接收介面接收_身分^子=動衣置為中請該電子憑證者;令 表示該電子行動震置確為分,證回覆訊號用以 心面因應該身分驗證回覆訊號傳送該電;息⑦2 13 200826597 =订動裝置可經由該電子憑證訊息取得該電子憑證及該秘密金 “以之應方用法程==於提供-種電腦可讀 1料細钟·rtifleate Aut_,» Γ'C Electronic Action Light for Shen Wei Electronics 35 Finance · QJ JJ is set to verify that 5 Hai Jie: Receive the identity verification request from the server;;: ^ to inform the server that the electronic mobile device is indeed ^ = the server The receiving interface receives the electronic core of the body, and the seven groups are responsible for verifying the reply signal and generating the power-on two = service; j is verifying the reply signal transmission: the second power; by = let the electronic device ^ receive the electronic voucher message And the voucher and the 31|She touched the electronic material voucher and secrets; the key it squirting device to the server to apply for a computer, take the marrow, read the supply-type cipher.兮 提供 — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — Order _2 early t, __ secret key to the application message - one of the transmission interface to transmit the application signal to a server 200826597 service d' to inform the server that the electronic action Luo master secret gold surplus; Device-receiving interface ====== number; one of the servers generates a module due to = Shen Qingxun requesting one of the servers to transmit the 'body number'; one of the electronic mobile devices Passing the verification request to the computer; the computer-receiving interface self-verification request signal to the certificate request signal; causing the computer to receive the identity verification, the computer's transmission interface should be verified as nm No.; The e-voucher and the secret key are taken. The other purpose of the present invention is to provide a method for internal power preparation and a secret gold record. , storage - face program, the above practice for a hair A further object is to provide a request for a certificate request, a transmission-identification verification, and the identity verification action device is indeed applying for the electronic certificate; ^ serving the electronic message as one of the electronic mobile devices; ':= = 200826597 Capture the electronic voucher and the secret gold record. The other purpose of the invention is to provide a method for storing the use of the type, so that the telegram can be placed on the execution surface and the secret gold wheel. The present invention also applies a computer readable medium to store an application to perform the above-described method for providing an electronic invention. The other object is to provide a method for providing an electronic mobile device with a key/secret key. The sub-hearts pass and pass the secret brain-generating module generation--including the following steps: order-electricity r the electronic voucher and * take the axis to read the electronic line application request signal to the server, to transmit the Applying for the voucher and requesting the secret key; ordering the generation to request the electronic device and causing the transmission interface to transmit the secret to the encrypted account to the encrypted record; using the electronic bank f to use the secret encryption gun; To make the computer Prisoner: The application of the computer's method of 密金录. The invention of the mobile device sets the application of an electronic voucher and - secret body, storage - Lang program to perform the above-mentioned H to provide - a computer-readable medium ί, and - secret gold record to an electronic line 3 a server to pass an electronic voucher signal to indicate that the electronic action is from the end of the application request signal, the application key; one of the server produces the taste ^ Set the door to apply for the electronic voucher and request the secret gold request signal; order the application signal to generate an identity verification request for the electronic mobile device to verify the verification request signal to the receiving interface to receive _ identity ^ sub = clothes For the e-voucher, the e-voucher is confirmed to be a sub-distribution, and the replies are used to transmit the electricity due to the identity verification reply signal; interest 72 13 200826597 = the e-voucher can be sent via the e-Voucher Obtain the electronic voucher and the secret gold "According to the prescription process == provided - computer readable 1 fine clock · rtifleate Aut_, » Γ '

AuthGrity,難叫之功能。或 _迷接具有CA/RA功能之設備來達成相對應之功效。 、、工由上述之配置’電子行動裝置欲申請炊,AuthGrity, hard to call the function. Or _ faint a device with CA/RA function to achieve the corresponding effect. ,,,,,,,,,,,,

=使用較安全及較有效率之傳輸連線以得到電;:噔。若電: 取得電子憑證,亦可於伺㈣認證^J Γ另-功^腦端之電子憑證傳至該電子行域置,達成節省成本 腦 ,===_管理以及網路連線功能之-電 且^Ξ 4子(δ證之獨階段,可_不_方式實現。 該電子行二該伺服器可直接傳遞該電子憑證至 透過該伺服器傳給該電ϊ行有之該電子憑證 該秘密金龄之安全。心t对保雜蚊該電子憑證、 做不同的調整,達到透^排’本發明可針對實際環境 請該電子憑證及錄秘密;^目&线子行動裝置向該伺服器申 在參閱圖式及隨後描述之實施方式後,該技術領域具有通常 200826597 知識者便可瞭解本發明之其他目的,以及本發明之技術手段及實 施態樣。 【實施方式】 本發明提供系統、裝置、方法、應用程式及電腦可讀取記錄 媒體’使電子行動裝置可透過電腦向伺服器申請電子憑證,並使 電子行動裝置透過伺服器取得電腦所具有之秘密金鑰。為了便於 閱讀,本發明所使用之專有名詞之中英對照列於表一。 〇 技術 Public Key Cryptography 電子憑證 Digital Certificate 公開金餘 Public Key 密鑰加密金餘 Private Key -------- Key Encryption Key 密文 Ciphertext 密碼 Password Symmetric Algorithm Asymmetric Algorithm Short Message Service (簡 Universal Subscriber Identity Module (簡稱USIM)= Use a safer and more efficient transmission connection to get electricity;:噔. If the electricity: Obtain the electronic voucher, you can also send the electronic voucher to the electronic domain in the (4) certification ^J Γ - 功 脑 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , -Electric and ^Ξ 4 sub (the only stage of the delta card, can be _ not _ way to achieve. The electronic line 2 the server can directly pass the electronic voucher to the e-mail through the server to the e-mail The safety of the secret golden age. The heart t is the electronic voucher for the mosquito, making different adjustments, and achieving the transparency. The invention can be used for the actual environment, and the electronic voucher and the secret are recorded; The present invention will be understood by those skilled in the art with reference to the drawings and the embodiments described hereinafter. The other objects of the present invention, as well as the technical means and embodiments of the present invention. Providing systems, devices, methods, applications and computer-readable recording media to enable electronic mobile devices to apply for electronic voucher to the server via a computer and to enable the electronic mobile device to obtain the secret gold of the computer through the server For ease of reading, the Chinese and English versions of the proper nouns used in the present invention are listed in Table 1. PTechnical Public Key Cryptography Electronic Certificate Digital Certificate Public Golden Key Public Key Key Encryption Golden Key Private Key ------- - Key Encryption Key Ciphertext Ciphertext Password Symmetric Algorithm Asymmetric Algorithm Short Message Service (Universal Subscriber Identity Module (USIM))

里jfl服務 通用用戶識別模組 j^iform Resour^^2£ig^URL) 表一 及傳本義之第—實關,其係為—申請電子憑證 ΐ 1之线卜該祕1包含—電子行動m、一 病12以及-伺服器13,其中r電子行動裝置n與電腦 15 200826597 使用者所管理或擁有。電子行動裝^ 紅料魏科可 必衣f (例如一手機)欲向伺服器13申請電子憑證及索取秘资入 :。^電腦12具有較佳之電子憑證管理以及網路連線功能1 子j貫施1由電子行動裝置11透過電腦12向伺服器13申請ΐ 子憑證,域服ϋ 13向電腦索取秘密錄。 月包 電子行動裝置11包含一接收介面m、一傳送介自、一 產生Ϊ組114奴一解密馳115。電腦Μ 3產生m2卜-傳送介面122、—加密模組123、Jfl service universal user identification module j^iform Resour^^2£ig^URL) Table 1 and the original meaning of the original - the real customs, its system is - apply for electronic voucher ΐ 1 line of the secret 1 contains - electronic action m, a disease 12 and a server 13, wherein the r electronic mobile device n and the computer 15 200826597 are managed or owned by the user. Electronic mobile device ^ Red material Wei Ke can be a f (such as a mobile phone) to apply for electronic voucher to the server 13 and request secret funds into:. ^ The computer 12 has a better electronic credential management and network connection function. The electronic mobile device 11 applies for the dice certificate from the server 13 via the computer 12, and the domain service 13 requests the secret recording from the computer. The monthly package electronic mobile device 11 includes a receiving interface m, a transmitting medium, and a generating unit 114. The computer Μ 3 generates an m2 bu-transport interface 122, an encryption module 123,

C L二以及—接收介® 125。伺服器13包含一接收介® 131、」 產生模組132、一傳送介面133以及一驗證模組134。 、首先’使用者於電腦12上執行替電子行動裝置u巾 密金鑰之程式。亦即,於電腦12上執行之程式包會 。行動I置11申請電子憑證,並傳送秘密金鑰 置11。電腦12之產生模組121 _習知技術產生一公開金^^ 秘密金錄及-密鑰加密金鑰,其巾公開金鑰與秘密錢相對應。 接著,加密模組123 _該密餘加密金鑰加密該秘密金输 :秘密金鑰密文。具體而言,密鑰加密金鑰可以三種不同的 貝現·(1)¾碼(Password)、(¾對稱杜(Symmetric)金输或⑶非對猛 ^(Asymmetric)^^^ 〇 ^ 可分別使用對稱式演算法(Symmetric Algorithm)或非對稱式演算 法(Asymmetric Algorithm)加密該秘密金鑰。 〆、 之後,產生模組121再產生一申請訊號,表示電子行動轳置 11申請電子憑證及索取秘密金餘(即,向伺服器13申請電子^證 及透過伺服裔13向電腦索取秘密金鑰),其中,申請訊號包含該公 開金鑰、該秘密金鑰密文及電子行動裝置u之一手機號碼。簽 模組124利用該秘密金鑰對該申請訊號進行數位簽章,如何進 數位簽章為熟悉此領域之人之通常知識,故不贅述。電腦12之傳 200826597 至伺服器13。另-方面,傳 之密鑰墙_,ί電忿換前述 鑰152處理電子憑證及秘密金^動衣置11後績可利用錢加密金 及交換。第—種方式者11可利用三種不同的方式傳遞 以人工方式從時,該密碼可由電腦12產生,之後 裝置11中%li方iilwa取轉按鍵斷_輸入到電子行動 及電子行練置U ^麵可由電腦12 產生,協__資料可;^i=e_Hellman金鑰錢技術協商 或經由雷it由雙方與錬1113的連線管道轉送, 或USB連線)管道傳送^第之間的直接連線(如紅外線 =與對應的秘密金:方電 二 讀加密錢讀賴交齡錢_來_本發明之範圍过之 驗噔===^^31接收電腦12傳來之巾請訊號⑸。 驗戍杈組134使用申凊訊號⑸中y ^ niij 151 m秘密金鑛談電子物裝置之手舰碼。然而,在此 ^一步確認電子行動裝置η是否確為 ^ 主^、金餘的申請者。是故,舰器13之產生 151產生一身分驗證請求訊號,此身分驗 ctiuf ”模組132以隨機方式產生之—驗證請求 二-円1°的疋’產生驗證請求碼之方式,並賴來限制本發明 產生齡132亦可啡它方式產生驗證請求碼^時, 身为驗,求訊號亦包含-統一資源定位符(Unif_心職 =tor,_ URL) ’用以讓使用者在電子行動裝置u接收到身 为碰請求訊號後,可連結至此咖做認證之動作。接著,伺^ 200826597 器13透過傳送介面133經由行動電話網路的簡訊服務系統(short Message Service,簡稱SMS)以一簡訊之方式傳送前述之身分驗證 請求訊號153至該手機號碼(即電子行動裝置n)。 Ο 電子行動裝置11透過接收介面111接收來自伺服器13之身 分驗證請求訊號153,此時電子行動裝置η必須因應身分請求訊 號153向伺服器13作身份確認。其方式則是產生模組114因應身 分驗證請求訊號153產生一身分驗證相關訊號,再透過傳送介面 112傳送此身分驗證相關訊號154至伺服器13,使之確認電子行 動裝置11確為申請電子憑證者。此實施例產生身分驗證相關訊號 154的方式有二:第一種為擷取模纟且113自身分驗證請求訊號153 中擷取該驗證請求碼,產生模組114直接將該驗證請求碼載入身 分驗證相關訊號154巾。第二種需透過電腦12之協助,擷取模組 113自身为氣近凊求號153操取驗證請求碼、產生模組η*產生 證請求狀-驗輯求訊息、_傳送介面112傳送該驗 ΐ 15it電腦12。電腦12之接收介面125接收驗證請求 後,簽早权組124利用該秘密金鍮對驗證請求訊息155 Λί之驗·輯求概簽辆算,崎—麟喃碼,之後電腦 再透過傳达介面122將包含前述之驗證 電子行動裝置11:電子行練置u之】==玆 驗口兄回應妣息156,產生模組H4再將其所包含 炊 身分驗證侧碱154巾。 化3d回應碼載入 < . 前述J腦I2及電飾_置u _ 的傳送方式,可以用人工方式從一大沾放苗# % 般輪入,十去妳$的榮幕頃取再從另一方的鍵 或棘由兩者之間的直接連線(如紅外線或USB連線)管 包含之驗鋪摘 200826597 j為申請電子憑證及索取秘密金鑰者。具體而言,若身分驗證回 覆訊號154包含驗證請求碼,則祠服器13判斷此驗證請求碼是否 ,先前傳送之驗證請求碼相同。若身分驗證回覆訊號154包含驗 證回應碼’則伺服器13利用公開金鑰驗證驗證回應碼,以驗證是 】對應至先前傳送之驗證請求碼。若是,由於第一實施例之伺服 态13本身具有認證中心(Certiflcate Auth〇rity,簡稱CA)CA/註冊管 理中心(Registration Authority,簡稱ra)之功能,因此兼負CA/RA 任務之產生模組丨32利用習知技術產生電子行動裝置丨丨所申請之 =憑證,並_電子憑證與秘密金鑰密文—併載人—電子憑證 f' 中,再使用傳送介面133傳送前述之電子憑證訊息157至電 ^订動裝置1卜在此要強觸是,値器13本身不—定要具有 之功此’其亦可與一具有^CA/RA功能之電腦連線,由其 產生電子憑證,再將電子憑證傳至伺服器13。 置11職财接收介面111魏電子憑證訊息 餘。^έ If 113自電子憑證訊息157中娜電子憑證及秘密金 ί及擷取模組113自電子憑證訊息157擷取電子憑 鑛密該二;文用么前取得之密錄加密金 利用兮雷為山文 亥秘松金鑰。電子行動裝置11自此可 Q "奸&喊該概金输酬路上錢訊息的安全保護。 連線t電有5佳之電子理功能以及較快速之網路 is:: 11 施例提供了較切技麵。第一實 11申蜻帝;展吹文旯馬善之方式使電腦12爲電子行動裝置 確定電外八’第一實施例亦可利用不同的驗證方式以 、置之身77,更加強了第一實施例之安全性。 統(即本為子憑證及傳遞秘密金錄之系 索取秘密麵),電3證1透過飼服器向電腦 像已3电子仃動裝置、一電腦以及一伺服器。 19 200826597 一電子憑證,因此裝置間所傳送及已申睛 4、/心第n f由於電腦12已具有電子憑證、—公開金錄及-二^產峰-生從组121 *需要產生公開金餘及秘密金餘, 父1广"" 口袷金鑰。接著,加密模組123利用該密鑰加宓 ίίΐΐΪ:;金Ϊ :得到-秘密金鑰密文。之後,產生模組S 叙狀署11明L不申請將電子憑證及秘密金錄轉送給電子行 .?矾號包含秘密金鑰密文、電子行動裝置11之— ίϊίί二前申請之電子憑證。好模組124利用該秘穷 i錄if: μ訊號進行數位簽章。傳送介®122再傳送前述之ΐ 服ί i3。同樣地,傳送介面122亦傳送密錄加密 八铨1,使電伸動裝置11後續可利用密鑰 加始、金鑰152處理電子憑證及秘密金鑰。 〜 ^151 1S1”二士 虎巾之公開金输驗證申請訊號 151 H簽早’以確辨請訊號151之内容之正確性, 之秘街金職X、奸行練置之錢C L II and Receiver® 125. The server 13 includes a receiving medium 131, a generating module 132, a transmitting interface 133, and a verification module 134. First, the user executes a program for the electronic mobile device on the computer 12. That is, the package executed on the computer 12 will. Action I sets 11 to apply for an electronic voucher and transmits a secret key. The generating module 121 of the computer 12_the prior art generates a public gold ^^ secret gold record and a key encryption key, and the towel public key corresponds to the secret money. Next, the encryption module 123_ the secret encryption key encrypts the secret gold input: secret key ciphertext. Specifically, the key encryption key can be three different types of (1) 3⁄4 code (Password), (3⁄4 Symmetric gold input or (3) Asymmetric ^^^ 〇 ^ can be respectively The secret key is encrypted using a Symmetric Algorithm or an Asymmetric Algorithm. Then, the generating module 121 generates an application signal, indicating that the electronic action device 11 applies for an electronic certificate and requests The secret Jin Yu (ie, applying for the electronic certificate to the server 13 and requesting the secret key from the computer through the servant 13), wherein the application signal includes the public key, the secret key ciphertext and one of the electronic mobile devices u The mobile phone number. The signing module 124 uses the secret key to digitally sign the application signal, and how to enter the digital signature is the common knowledge of those familiar with the field, so it will not be described. The computer 12 transmits 200826597 to the server 13. On the other hand, the key wall _, ί 忿 忿 前述 前述 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 152 Way to pass When the manual mode is used, the password can be generated by the computer 12, and then the %li side iilwa of the device 11 is turned off and the key is turned off. The input to the electronic action and the electronic line can be generated by the computer 12, and the __ data can be obtained; =e_Hellman key money technology negotiation or direct connection between the two parties via the connection pipeline between the two sides and the 錬1113, or the USB connection) (such as infrared = with the corresponding secret gold: Fangdian II Read the encryption money to read the age of money _ to _ the scope of the invention 噔 = === ^ ^ 31 Receive the computer 12 from the towel please signal (5). 戍杈 戍杈 group 134 use Shen Hao signal (5) y ^ niij 151 m The secret gold mine talks about the hand ship code of the electronic device. However, it is here to confirm whether the electronic mobile device η is indeed the applicant of the main ^, Jin Jin. Therefore, the generation 151 of the ship 13 generates an identity verification request. The signal, the identity check ctiuf "module 132 is generated in a random manner - the verification request two - 円 1 ° 疋 'generates the request code, and relies on limiting the invention to produce the age of 132 enamel. When the code ^, as an inspection, the signal also contains - uniform resource locator (Unif_心职=tor, _ URL) 'This is used to allow the user to connect to the coffee server for authentication after receiving the request signal from the electronic mobile device u. Then, the device is transmitted through the transmission interface. 133 transmits the foregoing identity verification request signal 153 to the mobile phone number (ie, the electronic mobile device n) in a short message via a short message service (SMS) of the mobile phone network. Ο The electronic mobile device 11 receives the identity verification request signal 153 from the server 13 through the receiving interface 111, and the electronic mobile device η must confirm the identity of the server 13 in response to the identity request signal 153. In this manner, the generating module 114 generates an identity verification related signal according to the identity verification request signal 153, and transmits the identity verification related signal 154 to the server 13 through the transmission interface 112 to confirm that the electronic mobile device 11 is indeed applying for the electronic certificate. By. The embodiment generates the identity verification related signal 154 in two ways: the first is the capture module and the 113 self-verify verification request signal 153 retrieves the verification request code, and the generation module 114 directly loads the verification request code. Identity verification related signal 154 towel. The second type needs to be assisted by the computer 12, and the module 113 itself searches for the verification request code for the gas near request number 153, generates a module η*, generates a certificate request-test message, and transmits the message to the interface 112. Check 15it computer 12. After receiving the verification request by the receiving interface 125 of the computer 12, the signing early right group 124 uses the secret key to verify the verification request message 155 Λ · , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , 122 will include the aforementioned verification electronic mobile device 11: electronically practiced u === 验 口 妣 妣 妣 156 156 156 156 156 156 156 156 156 156 156 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 3d response code loading < . The above J brain I2 and electric decoration _ set u _ transmission method, you can manually enter from a large dip seed #% like, the ten to go to the $ glory will take From the other side of the key or spine by the direct connection between the two (such as infrared or USB connection) tube included in the inspection of the 200826597 j for the application of electronic voucher and request secret key. Specifically, if the identity verification reply signal 154 includes a verification request code, the server 13 determines whether the verification request code is the same as the previously transmitted verification request code. If the identity verification reply signal 154 includes an authentication response code ', the server 13 verifies the verification response code using the public key to verify that it corresponds to the previously transmitted verification request code. If the servo state 13 of the first embodiment has the function of a certificate center (CA) CA/Registration Authority (ra), the CA/RA task generation module is also used.丨32 using the prior art to generate the electronic voucher application 之 voucher, and _ electronic voucher and secret key ciphertext - and manned - electronic voucher f', and then use the transmission interface 133 to transmit the aforementioned electronic voucher message 157 To the electric device 1 to be strong, the device 13 itself does not have to do the same thing. It can also be connected to a computer with a CA/RA function, which generates an electronic voucher. The electronic voucher is then transmitted to the server 13. Set 11 business receipt interface 111 Wei electronic voucher message. ^έ If 113 from the electronic voucher message 157, the electronic voucher and the secret gold and the capture module 113 retrieve the electronic voucher from the electronic voucher message 157; the secret encrypted gold obtained before the use of the text For the mountain Wenhai secret pine key. Since then, the electronic mobile device 11 has been able to protect the security of money messages on the road. There are 5 best electronic functions and a faster network is:: 11 The example provides a more technical approach. The first real 11 Shen Sui Emperor; the exhibition Bianwen Ma Shanzhi way to make the computer 12 for the electronic mobile device to determine the electric outside eight 'the first embodiment can also use different verification methods to set the body 77, more strengthen the first The security of the embodiment. The system (that is, the sub-voucher and the secret secret record system to obtain the secret face), the electric 3 certificate 1 through the feeding device to the computer like a 3 electronic device, a computer and a server. 19 200826597 An electronic voucher, therefore transmitted between the devices and has been applied for 4, / heart nf because the computer 12 already has electronic voucher, - public record and - two ^ peak - born from group 121 * need to generate public gold And the secret Jin Yu, the father 1 wide "" mouth key. Then, the encryption module 123 uses the key to add 宓 ί ΐΐΪ:; 金Ϊ : get - secret key ciphertext. After that, the generating module S will not apply to transfer the electronic voucher and the secret gold record to the electronic bank. The nickname includes the secret key ciphertext, the electronic mobile device 11 - ίϊίί two applications for electronic voucher. The good module 124 uses the secret: i record if: μ signal for digital signature. The Media® 122 transmits the aforementioned device i i3. Similarly, the transport interface 122 also transmits the secret record encryption gossip 1, so that the power stick device 11 can subsequently process the electronic credential and the secret key using the key add-on, key 152. ~ ^151 1S1" 二士 Tiger towel's open gold output verification application signal 151 H sign early 'to confirm the correctness of the content of signal 151, the secret street gold job X, rape line practice money

U ^服,!3必須進-步確認電子行動裝置 =也 ii=;金,。是故,產生模組132因應申請訊二 ’此身分驗證請求訊號包含產生模組132 =機^式產生之-驗證請求碼。接著,伺服器13透 133經由行動電話網路的簡訊服&系統(Sh〇rtMessage ,簡 153 、仏ϊίί動裝置11透過接收介面111接收來自伺服器13之身 訊號153,,電子行_置U必須因應身分請求訊 號I53向舰益I3作身份確認,即傳送一身分驗證相關訊號至伺 20 200826597 =器13,其中身分驗證相關訊號包含身分驗證請求碼或一身分驗 u 旦回應碼’其具體達成之方式與第—實施例所描 同,故不贅述。 >伺服器13之接收介面131基k來自電子行動裝置n之身分 驗,覆tfl號(即身分驗證相關訊號1M)後,驗證模組134驗證此 驗證,覆訊號巾之驗證回應碼,即可麟電子行動裝置n是否確 為申凊電子憑證及索取秘密錄者。若是,產生模組132接著產 生一電子憑證訊息,其包含先前接收自電腦12之電子憑證及秘密 金鑰密文,傳送介面133傳送電子憑證訊息157至電$行動裝置 11電子行動裝置11則透過其接收介面ill接收電子;馬證訊_、 ,擷取模組H3再以如第—實施例中所述之方式自電;憑證;; 心157中擷取電子憑證及秘密金錄。電子行動裝置n自此可利用 該電子憑證及該秘密金鑰於網路上交換訊息的安全保護。 第二實施例除了具有第一實跑例之優點外,更具有重複利用 電子憑證之優點。亦即,當電腦已有了電子憑證,便可跟電子行 動裝置分享同一個電子憑證,以降低申請及維護之成本。 l 本發明之第二貫施例如第2圖所示,係為申請電子憑證及索 取秘密金鑰之系統2,包含-電子行動裝置2卜—電腦ϋ及二 伺服器23。電子行動裝f 21包含一接收介φ 211、 212、-娜模組213、-產生模組214以及-解密模組215。電 腦22包含一產生模組22卜一傳送介面222、一加密模缸η)、一 簽章模組224、一接收介面225、一擷取模組226以及'一 227。伺服器23包含一接收介面23卜一產生模組232、_关入 面233以及一驗證模組234。 、川 第三實施例與第一實施例之文要差異在於當電子行 自伺服器23接收一身分驗證請求訊號253後,電子行動^ 電腦22及伺服器23之後續動作。電子行動裝置21自\ μ 接收身分驗證請求訊號253後,傳送介面212傳送一身分^ 21 200826597 相關訊^ϋ54人電f22 f Γ接收介面225接收身分驗證 253 ^内1^ 身^驗證相關訊號254包含身分驗證請求訊號 身者/電腦22因應身分驗證相關峨254,傳送一 置;司服且言,圆電子行動裝 于心者具體而^,電腦22可利用如第一眚 之—種方式產生身分驗證回覆訊號255。亦即,第一種 證^碼取f組226自ί分驗證相關訊號254擷取一驗 以^一二哎取早杈,、且224利用秘密金鑰對驗證請求碼做簽章運瞀 證回覆訊號255直接包含驗證請求碼,^分驗 應碼是否故rH rf㈣射之驗輯求碼或驗證回 0 _ ώ _而a,若為驗證請求碼,則驗證模组234判 傳送之驗證請求_同。若為上證回應碼,則驗 :核二2,公開金鑰驗證此驗 ::果Ζ 233因應身分驗證回覆_ 255, :電電子行練置21之接收介面2芯收 金鑰密電子憑證及一秘密 錄密文以得此再利用其解密模組215解密此秘密金 之另述之配置,第三實施顺供取得電子憑證及秘密金錄 使具:較佳之理。換言之’第三實施例 腦22替電子行動梦^ 及較快速之網路連線能力之電 鑰,提供了較先前技術更為完月善請=憑:登及索取秘密金 利用不同的驗證方式以確定電 22 200826597 實施例之安全性。 本發明之第四實施例係為一 索取秘密金鑰之方法(即,電子叙=千仃動衣置申請電子憑證及 透過伺服器向電腦索取秘密全衣^^伺服态申請電子憑證及 中。該方法係由-電子行動此方法應用於前述之系統! 別執行,分別描緣於第3A及Ί 、:電腦12及一伺服器13分 塊排為三行,自左邊起算之第—行Θ ° ^Α^3Β圖中’流程方 驟’第二行為電腦12執行之步驟為仃置U執行之步 之動作。 辦而弟二仃則為伺服器13執行 首先,該電腦12之一產4楹& 一 加密金鑰。接著,該電腦12之」值執行步驟321產生一密鑰 送該密鑰加密金錄至該“ 執行步驟您以傳 著,該電腦12之產生模組及;f密金鑰。接 -秘密金鑰,再以-加密模組12 <行^生二公開金鑰及 密金鑰加麵《麵崎—_ f 密鑰加 置=于動裝置"產生-申請訊 文及與該秘密金鑰相對'-號碼、該秘密金鑰密 ί ·ίί i密金轉該中請訊號進行數位簽章。之 該伺服5^3、甬4#= ΐ 122執行步驟327以傳送該申請訊號至 13該電子行動裝置Μ請該電子憑 n 饲服f13之一接收介面131執行步驟341自該電腦 驟342^1 =ί:,著’該飼服器13之一驗證模多且134執行步 娜哭1;用“申睛訊號中之公開金输驗證該申請訊號。接著’該 益之-產生模組m執行步驟343,因應該申請訊號產生 23 200826597 一身分驗證請求訊辨,—#、、,* 身分驗證請求訊號至二再執二=4以傳送該 u為申請該電子憑證者,甘士動f置11求适该電子行動裝置 請求碼。 〜 一中,該身分驗證請求訊號包含一驗證 111 , 之-擷取触m執行步ϋ求=^ ’該電子行動裝置11 證請求碼,該電子&分驗證請求訊號擷取該驗 η υ 生包含該驗證請求碼之二驗咖if生模1114執行步驟319產 步驟313傳送今驗求讯息’一傳送介面U2再執行 125則執至該電腦12 °該電腦12之接收介面 執行步驟329以利用^$亥驗證請求訊息,並使簽章模組124 求碼ίΐ賴f崎求减所包含之驗證請 孙—止咖 于細口應碼。之後,該電腦12之傳送介而it? 行置含該驗證簡碼之一驗證回應訊息。該電子 訊息。、接著,該電子執^步?314,接收該驗證回應 驗證相關訊號(亦即驗證回覆③且^ 2顧證回應碼。接著,傳送介面112再執=== 提的心該電子行動裝置11亦可於t 時,該身分驗證相關訊’此 :以通知該鎌器13該電子行動裝i 11 i 驗m13之接收介面131執行步驟345接收一身分 ======⑼ =覆訊號中之驗證回應碼。接著,該伺服器13之傳^^二 仃步驟347以因應該身分驗證〒覆訊號傳送一電子憑^訊息, 24 200826597 其中’該電子憑魏息包含該電子憑證及娜綠錄密文。 一番^置11之接收介面111接著執行步驟317以接收 -^憑“息’擷取模組113再執行步驟318以自該電子❸登 ίΐίί取該電子憑證及該秘密金錄。具體而言,步驟⑽i包 12接收該密錄加密金繪;自該電子憑證訊息操取該秘 α及侧销杨密麵_姉密金前文以得 Γ 除了前述之步驟外,第四實_亦可執行第 g二常知識者可藉由第—實施_說明,明 故不再贊述。是故,第四實 之第五實施例係為—為電子行動I置中請-電子渴★登 之系統!中。該方法係由—電二二方置? /述第二實施例 器丨顧行。第五實施例二二-= 器13所執行之步驟與第四實施例類^置^^ 於㈣之訊狀内容。是故,在此述兩實蝴n僅在 第五實施例之情形為,該電應於先 故可將該電腦12之該電子憑證與該電子行^ 二 省成本。由於該電腦12已具有該電子馮嘹^刀子,以即 該電子憑證前已具有—公開麵及—秘;„腦12於申請 所執行之步驟325所產生之4^ =、麵。而該電腦12 該電子驗。另先前申請之 及電子行動裝置U所執行之步驟317^1 中3執驟=,以 包含之電子憑證係為該電腦12先前申請的。私子芯證讯心中所 除了前述之步驟外,第五實施例亦可執行第二實施例之所有 200826597 - 施例亦具有第二實施例所具有之優點。再头遠疋故弟五貫 本發明之第六實施例係為—為電子行主 ,-秘密金鑰之方法(即,電子行練置向 ==錢),此_ :編ί 裝置21、:電腦22及一伺服器23分 置2卜/電腦田22=伺服哭3 例之該電子行動裝 r似,是故,在此僅強調相^處3 _丁之步驟亦與第四實施例類 首先,該電腦22執行步驟切至% 執行步驟341至步驟344。之後,該電子行動^ ^月 器23使接收介面211執行步驟川以胁一 6置22因應箱服 ^ ιιζτ,ι 驟422’自該身分驗證相關訊號擷取—驗證 並 驗證請求碼進行數 傳送一身分驗證^^至2t田執行步驟424以 ϊ^ίί該碼。於某些情況,該電腦22 “於Ϊ驟=22 執仃步驟424 ’此時,該身分驗證回覆訊號則是包含該驗 驗證=著使±接收介面231執行步驟345,接收一身分 徭亦即’來自該電腦22之該身分驗證回覆訊號。之 服益23之驗證模、组234驗證驗證回覆訊號中之驗證 26 200826597 回應碼。接著,該伺服哭 ; 送一電子憑證至該電子g動農m介面233再執行步驟347,傳 該電子行動裝置21則接病 電子憑證及該秘密金鑰。α執仃Y驟317及步驟318以得到該 除了前述之步驟外,裳丄每 作動,此技術領域且右、δ^、只把例亦可執行第三實施例之所有 瞭第四實施例之ί對^實_的說明,ϊ 施例亦具有第三實施例ί具;J之優點故不再贅述。是故,第六實 Γ 來執SiS:利::種電腦可讀取媒體,其儲存-電腦程式 及具有相同魏之儲存髓。讀庫或綠'此技術者可輕易思 功能管理以及網路連線 證及索取-秘密金鑰。於申,:電子憑 ΪΓίΓϊΐ:行動裝置’或透過該電:傳送:該電子行動 邊電子憑證、該秘密金鑰等之安全。藉由上述之安排, 針,實際環境做不同的調整,達到透過該電腦替該電弓 向该伺服器申請該電子憑證及索取秘密金鑰之目的。 達成。此外,該伺服器可直接傳遞 惟上述實施例僅為例示性說明本發明之原理及其功效,而 用於限制本發明。任何熟於此項技藝之人士均可在不違背本發明 之技術原理及精神的情況下,對上述實施例進行修改及變化:因 27 200826597 此本發明之權利保護範圍 應如後爽之申請專利範圍所列。 【圖式簡單說明】 第1圖係係贿本發明之第—及第二實施例; 第2圖係描繪本發明之第三實施例; 第3Α圖係描繪本發明第四及第五實施例之部分六 第3Β圖係描繪本發明第四及第五實施例之部^方^程圖; 第4Α圖係描繪本發明第六實施例之部分方法流程程圖; 第4B圖係描繪本發明第六實施例之部分方法流程&, ϋ 密鑰加密金輪 【主要元件符號說明】 1 ·糸統 12 :電腦 111 :接收介面 113 :擷取模組 115 ·解密模組 121 :產生模組 123 :加密模組 125 :接收介面 131 :接收介面 133 ·傳送介面 151 :申請訊號 153 :身分驗證請求訊號 155 :驗證請求訊息 157 :電子憑證訊息 2 =系統 22 :電腦 11 ·電子行動裳置 13 :伺服器 112 :傳送介面 114 :產生模組 122 :傳送介面 124 :簽章模組 132 :產生模組 134 :驗證模組 Γ52 154 :身分驗證相關轉 156 :驗證回應訊息 21 :電子行動裝置 23 :伺服器 28 200826597 211 : 接收介面 212 :傳送介面 213 擷取模組 214 :產生模組 215 解密模組 221 產生模組 公2 :傳送介面 223 加密模組 224 :簽章模組 225 接收介面 226 :擷取模組 227 解密模組 231 接收介面 232 :產生模組 233 傳送介面 234 :驗證模組 251 申請訊號 252 :密鑰加密金錄 253 身分驗證請求訊號 254 :身分驗證相關訊號 255 身分驗證回覆訊號 256 :電子憑證 257 :電子憑證訊息U ^ service,! 3 must step into the confirmation of the electronic mobile device = also ii =; gold,. Therefore, the generation module 132 responds to the application request. The identity verification request signal includes the generation verification module code generated by the module 132 = machine type. Then, the server 13 transmits 133 through the mobile phone network's SMS service system (Sh〇rtMessage, 153, 动 ί ί device 11 receives the signal 153 from the server 13 through the receiving interface 111, the electronic line _ set U must respond to the identity request signal I53 to identify the identity of the ship I3, that is, send a identity verification related signal to the server 20 200826597 = device 13, where the identity verification related signal contains the identity verification request code or a body test response code 'its The specific implementation manner is the same as that of the first embodiment, so it will not be described. > The receiving interface 131 of the server 13 is derived from the identity of the electronic mobile device n, and after tfl (ie, the identity verification related signal 1M), The verification module 134 verifies the verification, the verification response code of the coverage towel, and whether the mobile electronic device n is indeed an electronic voucher and a secret recorder. If so, the generation module 132 then generates an electronic voucher message. Including the electronic voucher and secret key ciphertext previously received from the computer 12, the transmission interface 133 transmits the electronic voucher message 157 to the mobile device 11 and the electronic mobile device 11 is connected thereto. The interface ill receives the electronic; the horse certificate _, , the capture module H3 is self-powered in the manner as described in the first embodiment; the voucher; the heart 157 retrieves the electronic voucher and the secret record. The electronic mobile device n The electronic certificate and the secret key can be used to exchange security information on the network. The second embodiment has the advantages of reusing the electronic certificate in addition to the advantages of the first running example. The electronic voucher is available to share the same electronic voucher with the electronic mobile device to reduce the cost of application and maintenance. The second implementation of the present invention, as shown in Figure 2, is to apply for an electronic voucher and request a secret gold. The key system 2 includes an electronic mobile device 2 - a computer and a second server 23. The electronic mobile device f 21 includes a receiving medium 211, 212, a -na module 213, a generating module 214, and a - decrypting module. The computer 22 includes a production module 22, a transmission interface 222, an encryption module η), a signature module 224, a receiving interface 225, a capture module 226, and a 227. The server 23 includes a receiving interface 23, a generating module 232, a blocking surface 233, and a verification module 234. The third embodiment differs from the first embodiment in that the electronic action is followed by the subsequent actions of the computer 22 and the server 23 after the electronic server 23 receives an identity verification request signal 253. After receiving the identity verification request signal 253 from the mobile device 21, the transmission interface 212 transmits a identity ^ 21 200826597 related information ^ 54 person power f22 f Γ receiving interface 225 receiving identity verification 253 ^ 1 ^ body ^ verification related signal 254 Including the identity verification request signal / computer 22 in response to the identity verification related 峨 254, send a set; the Secretary and the words, the round electronic action is installed in the heart of the specific ^, the computer 22 can be used as the first way The identity verification reply signal 255. That is, the first type of code is taken from the group 226, and the verification signal 254 is taken from the verification of the relevant signal 254 to take a check, and the 224 uses the secret key to sign the verification request code. The reply signal 255 directly includes the verification request code, and whether the verification code is rH rf (four) shot verification code or verification back 0 _ _ _ and a, if it is the verification request code, the verification module 234 determines the transmission verification request _with. If it is the SSE response code, then the test: Nuclear 2, public key verification of this test:: Ζ 233 responsive to the identity verification reply _ 255, : the electronic electronic line training 21 receiving interface 2 core receiving key secret electronic certificate and A secret ciphertext is used to decrypt the configuration of the secret gold by using the decryption module 215, and the third implementation is for obtaining the electronic vouchers and the secret transcript: preferably. In other words, the third embodiment of the brain 22 for the electronic action dream ^ and the faster network connection ability of the key, providing more than the previous technology, the end of the month please = by: boarding and requesting secret gold using different verification methods To determine the safety of the embodiment of the electricity 22 200826597. The fourth embodiment of the present invention is a method for requesting a secret key (ie, an electronic quotation is applied for an electronic voucher and a secret vouchers are obtained from a server via a server). This method is applied to the above system by the electronic action method. Do not perform, respectively, the 3A and Ί, respectively: the computer 12 and a server 13 are arranged in three rows, starting from the left - the first line ° ^ Α ^ 3 Β ' ' 流程 ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' '楹 & an encryption key. Then, the computer 12 value execution step 321 generates a key to send the key encryption record to the "execution step you pass, the computer 12 generation module and; f Secret key. Connected-secret key, and then - encryption module 12 < line ^ two public key and secret key plus face "Sakisaki - _ f key addition = in the device" Apply for the message and the relative key to the secret key, the secret key is ί · 转 转 转The line number signature. The servo 5^3, 甬4#= ΐ 122 performs step 327 to transmit the application signal to 13 the electronic mobile device, requesting the electronic device to perform the step 131 from the receiving device 131. The computer step 342^1 = ί:, 'the one of the feeding device 13 has more than one verification mode and 134 performs the stepping cry 1; the "application signal" is verified by the "opening in the eye" signal. Then the benefit is - The generating module m executes step 343, because the application signal is generated 23 200826597, an identity verification request is detected, -#,,, * the identity verification request signal is two to two = 4 to transmit the u as the application for the electronic certificate , the singer f is set to apply for the electronic mobile device request code. 〜1, the identity verification request signal includes a verification 111, and the 撷 触 m 执行 执行 = ^ 该 该 该 该 该 该 该 该 该Code, the electronic & sub-authentication request signal captures the test η 包含 包含 包含 包含 包含 包含 114 114 114 114 114 114 114 114 114 114 114 114 114 313 313 313 313 313 313 313 313 313 313 313 313 313 313 313 313 313 313 313 313 今 今 今 ' ' ' Go to the computer 12 ° the receiving interface of the computer 12 to perform step 329 Use ^$H to verify the request message, and make the signature module 124 ask for the code. 验证 f f 求 求 求 求 求 求 所 — — — — — — — — — — — — — — — — — — — — — — — — — — — — — Including one of the verification short codes, the verification response message is the electronic message. Then, the electronic execution step 314 receives the verification response and verifies the relevant signal (that is, the verification reply 3 and the ^2 verification response code. Then, the transmission The interface 112 is re-executed === the heart of the electronic mobile device 11 may also be at t, the identity verification related information 'this: to notify the device 13 the electronic mobile device i 11 i m13 receiving interface 131 to perform the steps 345 receives an identity ======(9) = verification response code in the reply number. Then, the server 13 transmits a message 347 to transmit an electronic message according to the identity verification, 24 200826597, wherein the electronic content includes the electronic certificate and the green record. The receiving interface 111 of the device 11 then performs step 317 to receive the electronic message and the secret record from the electronic device. Step (10) i package 12 receives the secret record encryption gold drawing; from the electronic voucher message, the secret alpha and the side pin Yang Mi face _ 姊 金 前 前 前 Γ Γ Γ Γ Γ Γ Γ Γ Γ Γ Γ Γ Γ Γ Γ Γ The g-th ordinary knowledge can be explained by the first-implementation_description, so it is no longer praised. Therefore, the fifth embodiment of the fourth reality is - for the electronic action I-in-the-electronic thirst ★ boarding system In the second embodiment, the method is performed by the second embodiment. The fifth embodiment of the second embodiment is executed in the same manner as the fourth embodiment. (4) The content of the message. Therefore, it is only in the case of the fifth embodiment that the power is used to save the electronic certificate of the computer 12 and the electronic line. Since the computer 12 already has the electronic Feng Xiao ^ knife, that is, the electronic voucher has already had - public face and secret - „ brain 12 at the application office Step 325 generates the row of 4 ^ = surface. And the computer 12 is the electronic test. In the previous step 317^1 executed by the electronic mobile device U, the execution of the electronic certificate is the previous application of the computer 12. In addition to the foregoing steps, the fifth embodiment can also perform all of the second embodiment of the second embodiment. 200826597 - The embodiment also has the advantages of the second embodiment. The sixth embodiment of the present invention is a method for an electronic owner, a secret key (ie, an electronic row of instructions == money), this _: ί device 21, : The computer 22 and a server 23 are separated by 2 discs/computer field 22=servo crying 3 cases of the electronic action device r, therefore, only the steps of the 3 _ ding are also emphasized here and the fourth embodiment Class First, the computer 22 performs steps to % to perform steps 341 through 344. After that, the electronic action device 23 causes the receiving interface 211 to execute the step of the chuanchuan yiyi 6 set 22 responsive box service ^ ιιζτ, ι 422 'from the identity verification related signal capture - verify and verify the request code for number transfer One identity verification ^^ to 2t field performs step 424 to ϊ^ίί the code. In some cases, the computer 22 "at step = 22 to perform step 424 ' at this time, the identity verification reply signal includes the verification verification = the receiving interface 231 performs step 345, and receives a body, that is, 'The identity verification reply signal from the computer 22. The verification model of the service benefit 23, the verification of the group 234 verification verification reply signal 26 200826597 response code. Then, the server cries; send an electronic certificate to the electronic g farm The m interface 233 then performs step 347, and the electronic mobile device 21 transmits the electronic voucher and the secret key. The α 仃 骤 317 and the step 318 are used to obtain the action except for the foregoing steps. The field and the right, δ^, and the example can also perform the description of all the fourth embodiment of the third embodiment, and the third embodiment is also provided; the advantage of J is not Again, the sixth reality is to implement SiS: Lee:: a kind of computer-readable media, its storage-computer program and the same Wei's storage marrow. Read library or green 'this technology can easily think about function management And the Internet connection certificate and the request-secret key. Yu Shen : Electronic ΪΓ Γϊΐ Γϊΐ: mobile device 'or through the power: transmission: the electronic action side electronic voucher, the secret key, etc.. With the above arrangement, the needle, the actual environment to make different adjustments, through the computer for The electric bow applies to the server for the purpose of requesting the electronic voucher and requesting the secret key. In addition, the server can directly transmit the above embodiments, but the above embodiments are merely illustrative of the principle and function of the present invention, and are used to limit The present invention can be modified and changed without departing from the technical spirit and spirit of the present invention: 27 200826597 The scope of protection of the present invention should be as cool as possible. BRIEF DESCRIPTION OF THE DRAWINGS [Brief Description] FIG. 1 is a first embodiment of the present invention; FIG. 2 is a third embodiment of the present invention; The sixth and fifth embodiments of the fourth and fifth embodiments depict the fourth and fifth embodiments of the present invention; and the fourth drawing depicts a portion of the method flow of the sixth embodiment of the present invention. Process diagram; FIG. 4B is a partial process flow diagram of the sixth embodiment of the present invention, ϋ Key encryption gold wheel [Main component symbol description] 1 • System 12: Computer 111: Receive interface 113: Capture module 115 · Decryption module 121 : generation module 123 : encryption module 125 : receiving interface 131 : receiving interface 133 · transmission interface 151 : application signal 153 : identity verification request signal 155 : verification request message 157 : electronic voucher message 2 = system 22: computer 11 · electronic action skirt 13 : server 112 : transmission interface 114 : generation module 122 : transmission interface 124 : signature module 132 : generation module 134 : verification module Γ 52 154 : identity verification related to 156 : Verification Response Message 21: Electronic Mobile Device 23: Server 28 200826597 211: Receiving Interface 212: Transport Interface 213 Capture Module 214: Generation Module 215 Decryption Module 221 Generation Module 2: Transmission Interface 223 Encryption Module 224: Signature Module 225 Receive Interface 226: Capture Module 227 Decryption Module 231 Receive Interface 232: Generation Module 233 Transport Interface 234: Verification Module 251 Application Signal 252: Key Plus密金录 253 Identity verification request signal 254: Identity verification related signal 255 Identity verification reply signal 256: Electronic voucher 257: Electronic voucher message

U 29U 29

Claims (1)

200826597 十、申請專利範圍: 1· 一種申請一電子憑證及索取一秘密金鑰之電子行動裝置,包 含: 、》田接收介面,用以自一饲服器接收一身分驗證請求訊號, 2一電子憑證訊息,其中該身分驗證請求訊號係因 μ一私恥為該電子行動裝置申請該電子憑證而產生; ί送介面,用以因應該身分驗證請求訊號,傳送一身分 Γ ΐϋΐ訊號’以通知該伺服器該電子行動裝置確為申請該電 于您彡豆者,以及 #4、/々,取杈組,用以自該電子憑證訊息中擷取該電子憑證及 琢秘禮、金錄*。 2·如請求項1所述之電子行動裝置,更包含: 自生包含—驗證請求碼之—驗證請求訊 〜ιφ 3一驗證回應碼之該身分驗證相關訊號; 收Γ面更用以自該電腦接收包含該驗證回應碼之- 腦利用該秘密金丄 却自麵赌心3而传,綱取模組更賴自該驗證回應 證言主2’,組更用以首該身分驗輯求訊號擷取一驗 .、,二从二./= 一 面更用以傳送該驗證請求訊息至該電腦, 3.如請求項1所述之電子行動裝置,更包含: 關喊產生模組’用以產生包含一驗證請求碼之該身分驗證相 證請3。°網果、且更用以自該身分驗輯求訊號擷取該驗 4·如清求項2或3所述之雷早 身分驗磴相關訊自?兮ί子動裝置’其中該傳送介面傳送該 身刀驗也相關n亥伺服器,該接收介面自該鑛器=該 30 200826597 電子憑證訊息。 5· 之電子行動裝置,射該傳送介輯送該身分 送:身分;:ίϊ電月Γ使該電腦因應該身分驗證相關訊號傳 動裳置確為服器’以通知該伺服器該電子行 6· 行動裝置,其中該電子憑證訊息包含該 Ο 、金餘密文,該秘密金絲文係以一密錄加 始、金鑰加密該秘密金鑰而得。 山&amp;刀 7. 如請^項巧述之電子行動裝置,更包含: 令二’用以利用該密餘加密金麟密該秘密金餘密 文以付该秘洽、金输; 、,a ίΓ ΐ接賴組更用以自該電腦接㈣歸加密金輪, ^。以称_缺帛以自該電刊證訊息擷_秘密金餘密 8. ίΐ求項1所述之電子行動裝置,其中該接收介面係透過簡訊 «J^Sho,Message Service ; 1fl, ^ ufl為邊身分驗證晴求訊號。 9 Ί巾凊Γ電子憑證及傳遞—秘密金鑰予—電子行動裝 電腦,包含 置之 …二ίί杈組’用以產生一申請訊號表示該電子行動裝置申 j電子憑證及索取姉々錢,以域生—密餘加 錄,以及 -傳送介面’用以傳賴巾請峨至—舰^, 伺服器該f子行動裝置巾請該轩憑證騎職減金輪^ 該密鑰加密麵至該f子行動H錢 動裝置利用該密鑰加密金鑰以得該秘密金鑰。 千仃 200826597 10.如請求項9所述之電腦,更包含: 得-文用以利用該密鑰加密金鑰加密該秘密金鑰以 人你請訊號包含該電子行動裝置之—號碼、該秘密 孟鑰讼文及與該秘密金鑰相對應之一公開金鑰。 11·如請求項10崎之賴,其巾該申請訊蚊包含贼子憑證。 12·如請求項1〇所述之電腦,更包含·· 簽章了簽章模組,用以利用該秘密金餘對該申請訊號進行數位 其中,該產生模組更肋產生該公開錢及娜密金鑰。 13·如請求項12所述之電腦,更包含: 訊息;面’用以接收來自該電子行動裳置之一驗證請求 取-驗證請求碼; 進行數位簽章以得:驗 ,回應碼之一驗證回應訊“·; 该驗翻應訊息至該電子行動裝置。面更用以傳达 Μ·如請求項12所述之電腦,更包含: 相關訊ί收^用以接收來自該電子行動裝置之一身分驗證 石馬;一摘取模組,用以自該身分驗證相關訊號擷取-驗證請求 進行數:簽驗證請求碼 该驗證回應碼之一身分驗哎二舜:核、、且更用以產生包含 傳送該身分驗證回覆訊號:該 32 200826597 行動裝置確為清求該電子憑證者。 15·如請求項12所述之電腦,更包含·· -接收介面,㈣滅來自魏子行 相關訊號;以及 裝置之身刀驗迅 碼; 一擷取模組,用以自該身分驗證相_細取—驗證請求 覆訊 16ς種電子憑證及-秘密金錄至-電子行動裝置之舰 -接收介面’用以接收來自一電腦之只 子4動4置:, 號用以;=子行“申二=證回覆訊 證訊息;以及、子心 、租及该秘密金鑰相關之一電子憑 因應=分=登:覆訊號傳送該電ί憑 憑證I該秘密金動裳置可經由該電子憑證訊息取得該電子 該i ϊ J動裝$工器及其口:請訊號包含-公開金鑰、 --密•密金 33 200826597 該秘密金鑰相對應。 18·,睛求項17所述之伺服器,其中該申請訊號更包含該 證0 屯卞 19·如請求項17所述之伺服器,更包含: 一驗證模組,用以利用該公開金鑰驗證該申請訊號。 2〇.ϋί 17所述之舰11 ’其中該身分驗證請求訊號包含- 氣迅%求碼,該身分驗證回覆訊號包含該驗證請求碼。 21·如請求項17所述之伺服器,更包含: 一驗證模組,用以利用該公開金鑰驗證包含於該身分 回覆訊號之一驗證回應碼; 口且 其中,該身分驗證請求訊號包含一驗證請求碼,該驗證回 應碼係以該秘密金鑰對該驗證請求碼進行數位簽章而得 22·如請求項16所述之伺服器,其中該身分驗證回覆訊號接收自 該電子行動裝置或該電腦。 1, 23·如請求項16所述之伺服器,其中該電子憑證訊息包含該秘密 金输密文及該電子憑證。 24.如請求項16所述之伺服器,其中該伺服器具有認證中心 (Certificate Authority,簡稱 CA)CA 及註冊管理中心(Registration Authority,簡稱ra)之功能0 25·如請求項16所述之伺服器,其中該傳送介面係透過簡訊服務 系統傳送一簡訊,該簡訊為該身分驗證請求訊號。 26· —種申請一電子憑證及傳遞一秘密金鑰之系統,包含: 一電腦,包含: 34 200826597 一產生模組,用以產生一申請訊號; 一簽章模組,用以利用該秘密金鑰對該申請訊號進 行數位簽章;以及 ^ —傳送介面,用以傳送該申清§孔號, 一伺服器,包含·· 一接收介面,用以自該電腦接收該申請訊號,以及 用以接收一身分驗證回覆訊號; f 一產生模組,用以因應該申請訊號產生一身分驗證 請求訊號,以及用以因應該身分驗證回覆訊號產生一電 子憑證訊息;以及 一傳送介面,用以傳送該身分驗證請求訊號,以及 用以因應該身分驗證回覆訊號傳送該電子憑證訊息;以 及 一電子行動裝置,包含·· ^ 一接收介面,用以自該伺服器接收該身分驗證請求 訊號,以及用以自該伺服器接收該電子憑證訊息; 一傳送介面,用以因應該身分驗證請求訊號,傳送 該身分驗證回覆訊號,以通知該伺服器該電子 確為請求該電子憑證者;以及 、200826597 X. Patent application scope: 1. An electronic mobile device for applying for an electronic voucher and requesting a secret key, comprising: , "Tian receiving interface for receiving a verification request signal from a feeding device, 2 electronic a voucher message, wherein the identity verification request signal is generated by applying for the electronic voucher to the electronic mobile device; and the sending interface is configured to transmit a bifurcation signal "in response to the identity verification request signal" to notify the The server is the electronic mobile device that is used to apply for the electricity to your Beans, and #4, /々, the 杈 group to retrieve the electronic vouchers and secrets, gold records* from the electronic voucher message. 2. The electronic mobile device according to claim 1, further comprising: the self-generated inclusion-authentication request code--authentication request message-ιφ3--the verification response code of the identity verification related signal; the receiving surface is further used from the computer Receiving the verification response code containing the verification - the brain uses the secret key but the self-gambling 3 is transmitted. The module is more dependent on the verification response testimony main 2', and the group is used to capture the signal. One test., two from the second. /= one side is used to transmit the verification request message to the computer. 3. The electronic mobile device according to claim 1, further comprising: a call generation module 'for generating Please verify the ID of the verification request code. ° Net fruit, and more to use the identity test to find the signal to take the test. 4. If the claim is as described in item 2 or 3, the early identification of the relevant information from the news?兮ί子动装置' where the transport interface transmits the knives and is also associated with the n-server, the receiving interface from the miner = the 30 200826597 e-voucher message. 5· The electronic mobile device sends the transmission media to send the identity: identity;: ϊ ϊ ϊ Γ 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该a mobile device, wherein the electronic voucher message includes the Ο and Jin ciphertext, and the secret koi text is obtained by encrypting the secret key with a secret record and a key. Mountain &amp; Knife 7. If you want to use the electronic mobile device, it also includes: The second is used to use the secret to encrypt the secret Jin Jin ciphery to pay the secret, gold loss; ,, a Γ The ΐ 组 组 group is used to connect to the computer (4) to encrypt the Golden Wheel, ^. The electronic mobile device described in claim 1 is hereinafter referred to as the electronic message device, wherein the receiving interface is transmitted through the newsletter «J^Sho, Message Service; 1fl, ^ ufl Verify the signal for the side identity. 9 Ί 凊Γ 凊Γ 凊Γ 凊Γ 传递 秘密 秘密 秘密 秘密 秘密 秘密 秘密 秘密 秘密 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子In the domain - the secret extra record, and - the transfer interface 'used to pass the towel, please go to the ship ^, the server, the f sub-action device towel, please the Xuan voucher ride the gold reduction wheel ^ the key encryption face to the The f-sub-action H-money device uses the key to encrypt the key to obtain the secret key.千仃200826597 10. The computer of claim 9, further comprising: the text used to encrypt the secret key by using the key encryption key, and the number of the electronic mobile device is included in the signal, the secret The key file of the key and the public key corresponding to the secret key. 11. If the request item 10 is saga, the application for the mosquito contains the thief certificate. 12. The computer of claim 1 further comprising: • signing a signature module for digitizing the application signal using the secret gold, wherein the generating module generates the public money and Naomi key. 13. The computer of claim 12, further comprising: a message; a face for receiving an authentication request from the electronic action set-acquisition request code; performing a digital signature to obtain: one of the response codes The verification response message "·; the verification response message to the electronic mobile device. The face is further used to convey the computer as described in claim 12, and further includes: the relevant message is received for receiving the electronic mobile device One of the identity verification stone horses; an extraction module for verifying the relevant signal acquisition from the identity-authentication request number: signing the verification request code, the verification response code is one of the verification indicators: nuclear, and more For generating and transmitting the identity verification reply signal: the 32 200826597 mobile device is indeed clearing the electronic certificate. 15. The computer according to claim 12, further comprising a receiving interface, (4) destroying the relevant signal from Wei Zixing And the device's knife inspection code; a capture module for verifying the phase from the identity_fine take--verification request response 16 kinds of electronic voucher and - secret gold record to - electronic mobile device ship-receiving interface 'use Receive only 4 from the computer 4 move 4:, the number is used; = sub-line "Shen 2 = card reply message information; and, the heart, rent and the secret key related to one electronic factor ===登: The signal is transmitted by the EV. The cryptory I can use the electronic voucher message to obtain the electronic device. The i ϊ 动 动 及其 及其 及其 : : : : : : : : : : : : : : : : : : : : : : : • 密金33 200826597 The secret key corresponds. 18. The server of claim 17, wherein the application signal further comprises the certificate. The server is as described in claim 17, and further comprises: a verification module for utilizing the disclosure The key verifies the application signal. 2舰.ϋί17, the ship 11 ’, wherein the identity verification request signal includes a gas speed % request code, and the identity verification reply signal includes the verification request code. The server of claim 17, further comprising: a verification module, configured to use the public key to verify a verification response code included in the identity reply signal; and wherein the identity verification request signal includes a verification request code, wherein the verification response code is digitally signed by the secret key to obtain a server according to claim 16, wherein the identity verification reply signal is received from the electronic mobile device. Or the computer. 1. The server of claim 16, wherein the electronic voucher message includes the secret ciphertext and the electronic voucher. The server of claim 16, wherein the server has a function of a certificate authority (CA) CA and a registration authority (ra), as described in claim 16. The server, wherein the transmission interface transmits a short message through the short message service system, and the short message is the identity verification request signal. 26. A system for applying for an electronic voucher and transmitting a secret key, comprising: a computer comprising: 34 200826597 a generating module for generating an application signal; and a signature module for utilizing the secret gold The key is digitally signed by the application signal; and the transmission interface is configured to transmit the application § hole number, a server, including a receiving interface for receiving the application signal from the computer, and Receiving a verification verification reply signal; f generating a module for generating an identity verification request signal for the application signal and for generating an electronic voucher message for the identity verification reply signal; and a transmission interface for transmitting the An identity verification request signal and a message for transmitting the electronic voucher for responding to the identity verification reply signal; and an electronic mobile device comprising: a receiving interface for receiving the identity verification request signal from the server, and for receiving the identity verification request signal from the server Receiving the electronic voucher message from the server; a transmission interface for authenticating the request signal Transmitting the identity verification reply signal to inform the server of the electronic document determined by the electronic request; and, 一擷取模組,用以自該電子憑證訊息中擷取該雷子 憑證及該秘密金鑰; 罨子 % 峨㈣表示該電子行練置巾請該電子瑪 „雜4、金繪,該申請域係 = 伺服器該電子行動裝置”該軒憑觀索取知该 身分驗證回覆訊號係接收自該電子行練置,以及=該 ^訊號峨爾子織以_為^|= 27·如請求項26所述之系統,其中: 該電子行動裝置更包含: 35 200826597 Ο 生模組,用以產生包含—驗證請求碼之-驗说 二=及用礙包含一驗證回應碼之該身= 其中,、该電子行動裝置之該擷取模組更用以身 分驗證請求減娜該驗證請求碼,該電子 ^ 該傳送介面更用以傳送該驗證請求訊息至該電腦衣^ ^行動裝置之該接收介面制以自該電 = 驗證回應碼之一驗證回應訊息; 匕3 ^ 該電腦更包含·· 一接收介面,用以接收來自該電子行 證請求訊息;以及 、 擷取模組,用以自該驗證請求訊息操取該驗證 之該驗 求碼 請 ▲其n電腦^該簽章模組更用以利用該秘密金瑜 對該驗輯求碼進彳了紐簽章以得雜證贿碼, 腦之該產生模組更用以產生包含該驗證回應碼之該驗 證回應訊息’該電腦之該傳送介面更用以傳送該驗證回 應訊息至該電子行動裝置;以及 該伺服器更包含: ϋ -驗證模Lx _ -公開金鑛證該驗證回應 碼; 其中,該公開金鑰與該秘密金鑰相互對應。 28·如請求項26所述之系統,其中,該電子行動裝置之該擷取模 組更用以自遠身分驗證睛求叙擷取一驗證請求碼,以及該電 子行動裝置之該產生模組更用以產生該身分驗證回覆訊號,其 中該身分驗證回覆訊號包含該驗證請求碼。 29.如請求項26所述之系統,其中: 該電腦更包含: 36 200826597 金餘巧用一密.密金•密該秘密 金鑰2電=腦之_生模組更用以產生該 ί該電傳送介面更用以傳送該密: 密金鑰處理‘電子行動裳置利用該密鑰加 該電子行動金 金鑰贱錄加冑錢解密該秘密a capture module for extracting the ray certificate and the secret key from the electronic voucher message; the %子% 峨(4) indicates that the electronic arranging towel should be the electronic 玛 杂 4, gold painted, Application domain system = server The electronic mobile device "The Xuan Jingguan request to know the identity verification reply signal is received from the electronic line practice, and = the ^ signal 峨尔子织 _ for ^|= 27 · as requested The system of item 26, wherein: the electronic mobile device further comprises: 35 200826597 a health module for generating an inclusion-verification request code-test two = and obstructing the body including a verification response code The capture module of the electronic mobile device is further configured to use the verification verification request to reduce the verification request code, and the electronic transmission interface is further configured to transmit the verification request message to the receiving device of the computer device. The interface system verifies the response message from one of the power = verification response codes; 匕 3 ^ the computer further includes a receiving interface for receiving the request message from the electronic certificate; and, the capturing module, for The verification request message fetches the Verify the verification code, please ▲ its n computer ^ The signature module is used to use the secret Jin Yu to search for the code to enter the new signature to obtain the certificate of bribe, the brain to generate the module Further, the verification response message including the verification response code is used to transmit the verification response message to the electronic mobile device; and the server further includes: ϋ - verification mode Lx _ - public The gold mine certificate verifies the response code; wherein the public key and the secret key correspond to each other. The system of claim 26, wherein the capture module of the electronic mobile device is further configured to obtain a verification request code from a remote identity verification method, and the generation module of the electronic mobile device The method further includes generating the identity verification reply signal, wherein the identity verification reply signal includes the verification request code. 29. The system of claim 26, wherein: the computer further comprises: 36 200826597 Jin Yuqiao uses a secret. The secret key of the secret key 2 electricity = brain _ raw module is used to generate the ί The electrical transmission interface is further used to transmit the secret: the secret key processing 'electronic action skirt uses the key plus the electronic action gold key record plus the money to decrypt the secret Ο 腦接該電子行練置之該魏介面更用以自該電 更用以ί 置之該掏取模組 I及鱼tif!子行動裝置之—號碼、該秘密金鑰密 又及/、4秘岔金鑰相對應之一公開金鑰。 Μ ’職1之·生模組更用以 產生該r金餘,該祠服器之該產生模組更用以 秘密金鋪ΓΓ ’該電子憑證訊息包含該電子憑證及該 31·如請求項3G崎m其巾翻職具tCA及^之功能。 32·如請求項26所述之系統,其中該申請訊息更包含該電子憑證。 33· ί ΐ求項26所述之系統,其中該身分驗證請求訊號為一簡訊, 该身分驗證請求訊號係透過簡訴服務系統傳送及接收。 34· 一種申請一電子憑證及傳遞一秘密金鑰之系統,包含: 一電腦,包含: 一產生模組,用以產生一申請訊號,以及用以產生 一身分驗證回覆訊號; 37 200826597 一簽章模組,用以利用該秘密金鑰對該申請訊號進 行數位簽章; 一傳送介面,用以傳送該申請訊號,以及用以傳送 該身分驗證回覆訊號η以及 一接收介面,用以接收一身分驗證請求訊號; 一伺服器,包含: 一接收介面,用以自該電腦接收該申請訊號,以及 用以自該電腦接收該身分驗證回覆訊號; 一產生模組,用以因應該申請訊號產生該身分驗證 請求訊號,以及用以因應該身分驗證回覆訊號產生一電 子憑證訊息;以及 一傳送介面,用以傳送該身分驗證請求訊號,以及 用以因應该身分驗證回覆訊號傳送該電子憑證訊息; 一電子行動裝置,包含: 一接收介面,用;自該伺服器接收該身分驗證請求 訊號以及用以自該伺服器接收該電子憑證訊息; 一傳送介面,用以傳送該身分驗證請求訊號至該電 腦;以及 一擷取模組,用以自該電子憑證訊息中擷取該電子 憑證及該秘密金鑰; 其中,a亥申睛訊號用以表示該電子行動裝置申請該電子憑 證及索取該秘密金鑰,該申請訊號係傳送至該伺服器以通知該 伺服器該電子行動裝置申請該電子憑證及索取該秘密金鑰,該 ,分驗證回覆訊號用以通知該伺服器該電子行動裝置確為申 凊該電子憑證者,以及該身分驗證請求訊號用以求證該電子 動裝置為申請該電子憑證者。 35·如請求項34所述之系統,其中: 該電腦更包含: 一操取模組,用以自該身分驗證請求訊號擷取一驗 38 200826597 證請求碼; θ舜,=,f電腦之該產生模組更用以產生該身分驗證 σ设4k ’该身分驗證回覆訊號包含該驗證請求碼。 36·如請求項34所述之系統,其中·· 該電腦更包含·· 證請求^秘組,加自料分驗轉求峨娜一驗 η 進行電腦之該簽章模組更用以對象驗證請求碼 更用以產ίίΓ寻一驗證回應碼,該電腦之該產生模組 包含該驗證證回覆訊號,該身分驗證回覆訊號 該伺服器更包含: 碼 驗證杈組’用以_—公開麵驗證該驗證回 應 37.如請求項34所述之系統,其中: 該電腦更包含: j 鑰 金j 更用以產生該密鑰加密金鑰,該 生桓組 至該電子=傳;= 動裝動裝置自該電腦接收‘行 ,鑰密文以得該秘鑰解密該秘密 掏取模組更用以自該電子憑證厂^子仃動裝置之該 , 文,該申請訊號包含該電子^于動穿n取f秘密金鑰密 金輪密文及與該秘密金輪相對應^ 一公、該秘密 39 200826597 38·如請求項37所述之系統,其中,該電腦之該產生模組更用以 產生該公開金鑰及該秘密金鑰,該伺服器之該產生模組更用以 產生該電子憑證,該電子憑證訊息包含該電子憑證及該秘密金 錄密文。 39·如請求項38所述之系統,其中該伺服器具有CA及^之功能。 40·如請求項34所述之系統,其中該身分驗證請求訊號一簡訊, 該身分驗證請求訊號係透過簡訊服務系統傳送及接收。 C 41·種々迅子行動裝置申請一電子憑證及索取一秘密金输之 方法,包含下列步驟: ^ 器接收一身分驗證請求訊號,其中該身分驗證請 ^«係因應-電腦為該電子行練置帽該電子憑證而產 生, 通知:請求訊號,傳送一身分驗證相_號,以 通知?舰减電子行動裝置確為申請該電子憑證者; 接收一電子憑證訊息;以及 自該電子憑魏息巾娜㈣子憑證及娜密金錄。 42·如請求,41所述之方法,更包含下列步驟·· f該身分驗證請求訊號娜-驗證請求碼; 值士it該驗證請求碼之—驗證請求訊息; 傳5f驗證請求訊息至該電腦; ^該電腦接收包含—驗證回 ;;係該電腦利用該秘密金— !2二回應讯息操取該驗證回應碼;以及 生已“亥驗證回應碼之該身分驗證相關訊號。 43.如請求項Μ所述之方法,更c含下列步驟: 200826597 自該身分驗證請求訊號擷取一驗證請求碼;以及 產生包含該驗證請求碼之該身分驗證相關訊號。 44·如請求項42或43所述之方法’其中該傳送該身分驗證相關訊 號之步驟係傳送該身分驗證相關訊號至該伺服器,且該電子憑 證訊息接收自該伺服器。 45·如請求項43所述之方法,其中該傳送該身分驗證相關訊號之 步驟係傳送该身分驗證相關eft藏至該電腦,使該電腦因應該身 分驗證相關訊號傳送一身分驗證回覆訊號至該伺服器。 46·如請求項41所述之方法,其中該電子憑證訊息包含該電子憑 證以及一秘密金鑰密文,該秘密金鑰密文係以一密鑰加密金^ 加密該秘密金錄而得。 w 47·如請求項46所述之方法,更包含下列步驟: 自該電腦接收該密鑰加密金鑰; 錄 自該電子憑證訊息擷取該秘密金餘密文·以及 利用該錄加密金鑰職姉密錢密文崎該秘密金 〇 48·如請求項41所述之方法,其中該接收牛 請求訊號係為透過簡訊服務系統所發之二簡訊。μ身分驗證 ΐ申及賴—秘密金料-電子行動装 49· 一 置之 方法,包含下列步驟: '該電子憑 產生一申請訊號,用以表示該雷 證及索取該秘密金錄; 子订動裳置申請 傳送該申請訊號至一伺服器,以 裝置申請該電子憑證及索取該秘密金鑰伺服器該電子行動 產生一密鑰加密金鑰;以及 ’ 41 200826597 傳送忒岔錄加岔金鑰至該電子行動裝置,以使該電子行動 裝置利用該密鍮加密金输處理以得該秘密金錄。 50·如請求項49所述之方法,更包含下列步驟: •利用該密鑰加密金鑰加密該秘密金鑰以得一秘密金鑰密 文, 其中,該申請訊號包含該電子行動裝置之一號碼、誃 至鑰密文及與該秘密金鑰相對應之一公開金鑰。 人山 〇 51 ·如印求項5〇所述之方法,其中該申請訊號更包含該電子憑證。 52·如叫求項5〇所述之方法,更包含下列步驟·· 產生该公開金餘及該秘密金鑰;以及 利用該秘密金鑰對該申請訊號進行數位簽章。 53·如明,項52所述之方法,$包含下列步驟·· =自該電子行_置之—驗證請求訊息; 自该驗證請求訊息擷取—驗證請求碼; 證回應ΐ《秘微金鑰龍驗證請求碼進行數位簽章以得-驗 裝,“及 如is自m更包含下列步驟: Sir “訊號隊 回應碼;’ 鑰對錢證請求碼進行數位簽章以得一 樣iSii:以㊁:二驗證回覆訊號;以及 電子行動農置碎為申^^虎至s亥飼服器,—t 54. 驗證 電子憑證者 器,以通知該伺服器該 200826597 Γ魏 The brain interface of the electronic device is used to extract the module I and the fish tif! sub-action device from the power, the secret key and/or 4 The secret key corresponds to one of the public keys. Μ 'The first module of the job 1 is used to generate the r gold balance, and the production module of the server is used for secret gold ΓΓ 'The electronic voucher message contains the electronic voucher and the 31. 3G Saki m its towel to turn over the function of tCA and ^. 32. The system of claim 26, wherein the application message further comprises the electronic voucher. 33. The system of claim 26, wherein the identity verification request signal is a short message, and the identity verification request signal is transmitted and received through the brief service system. 34. A system for applying for an electronic voucher and transmitting a secret key, comprising: a computer comprising: a generating module for generating an application signal and for generating an identity verification reply signal; 37 200826597 a signature a module for digitally signing the application signal by using the secret key; a transmission interface for transmitting the application signal, and for transmitting the identity verification reply signal η and a receiving interface for receiving an identity a verification request message; a server comprising: a receiving interface for receiving the application signal from the computer, and for receiving the identity verification reply signal from the computer; a generating module for generating the signal according to the application signal The identity verification request signal and an electronic voucher message generated by the identity verification reply signal; and a transmission interface for transmitting the identity verification request signal and for transmitting the electronic voucher message according to the identity verification reply signal; An electronic mobile device comprising: a receiving interface for use; The identity verification request signal and the electronic receipt message received from the server; a transmission interface for transmitting the identity verification request signal to the computer; and a capture module for extracting from the electronic voucher message Obtaining the electronic voucher and the secret key; wherein, the aforesaid eye signal is used to indicate that the electronic mobile device applies for the electronic voucher and requests the secret key, and the application signal is transmitted to the server to notify the server The electronic mobile device applies for the electronic voucher and requests the secret key, and the verification reply signal is used to notify the server that the electronic mobile device is indeed the electronic voucher, and the identity verification request signal is used to verify the electronic The mobile device is the one who applies for the electronic certificate. 35. The system of claim 34, wherein: the computer further comprises: a processing module for extracting an authentication request from the identity verification request signal; 200826597 certificate request code; θ舜,=,f computer The generating module is further configured to generate the identity verification σ4k'. The identity verification reply signal includes the verification request code. 36. The system of claim 34, wherein the computer further includes a certificate requesting a secret group, adding a self-contained inspection to the 峨娜一验 η, and the signature module of the computer is further used for the object The verification request code is further used to generate a verification response code. The generation module of the computer includes the verification reply signal, and the identity verification reply signal further includes: the code verification group 'for _-public surface Verification of the verification response 37. The system of claim 34, wherein: the computer further comprises: j key gold j is further used to generate the key encryption key, the production group to the electronic=pass; The mobile device receives a 'line from the computer, and the key ciphertext decrypts the secret key to decrypt the secret capture module, and the application signal includes the electronic device. The system of claim 37, wherein the generating module of the computer is further used to generate a system. The system of claim 37 is the same as the system of claim 37. The public key and the secret key, the servo This is the generation module for generating the electronic documents and more, the electronic message includes the electronic document and the Secret document recording ciphertext. 39. The system of claim 38, wherein the server has the functionality of CA and . 40. The system of claim 34, wherein the identity verification request signal is a short message, and the identity verification request signal is transmitted and received through the short message service system. C 41 · The method of applying for an electronic voucher and requesting a secret gold loss device includes the following steps: ^ The device receives a verification request signal, wherein the identity verification is required to be The cap is generated by the electronic voucher, and the notification: the request signal is transmitted, and the identity verification phase_ is transmitted to notify the ship electronic reduction mobile device that the electronic voucher is applied for; the electronic voucher message is received; and the electronic message is received from the electronic device. Towel Na (four) sub-vouchers and Naomi Jinlu. 42. The method of claim 41, further comprising the steps of: f the identity verification request signal Na-authentication request code; the value of the verification request code - the verification request message; the 5f verification request message to the computer ^ The computer receives the inclusion-authentication; the computer uses the secret gold-!22 response message to fetch the verification response code; and the student has verified the identity verification signal of the response code. 43. The method described in the item c further includes the following steps: 200826597: obtaining a verification request code from the identity verification request signal; and generating the identity verification related signal including the verification request code. 44. as claimed in claim 42 or 43 The method of transmitting the identity verification related signal to the server, and the electronic credential message is received from the server, wherein the electronic credential message is received from the server. The step of transmitting the identity verification related signal is to transmit the identity verification related eft to the computer, so that the computer transmits an identity verification according to the identity verification related signal. The method of claim 41, wherein the electronic voucher message includes the electronic voucher and a secret key ciphertext, the secret ciphertext is encrypted with a key encryption The method of claim 46, further comprising the steps of: receiving the key encryption key from the computer; recording the secret voucher from the electronic voucher message. And the method of claim 41, wherein the receiving request signal is a two-way message sent through the short message service system. ΐ申和赖—Secret Gold Material-Electronic Mobile Device 49· One method includes the following steps: 'The electronic application generates an application signal to indicate the lightning certificate and request the secret gold record; Applying to transmit the application signal to a server, requesting the electronic voucher by the device and requesting the secret key server to generate a key encryption key for the electronic action; and '41 200826597 transmitting the record plus Passing the key to the electronic mobile device, so that the electronic mobile device uses the key encryption processing to obtain the secret record. 50. The method of claim 49, further comprising the steps of: • utilizing the key The encryption key encrypts the secret key to obtain a secret key ciphertext, wherein the application signal includes a number of the electronic mobile device, a key to the key ciphertext, and a public key corresponding to the secret key. The method of claim 5, wherein the application signal further includes the electronic voucher. 52. The method of claim 5, further comprising the following steps: And the secret key; and digitally signing the application signal by using the secret key. 53. The method of item 52, wherein the method comprises the following steps: • from the electronic line _ setting the verification request message; from the verification request message retrieval - verification request code; The key verification request code is digitally signed to obtain - inspection, "and if is from m, the following steps are included: Sir "signal team response code; 'key to the money certificate request code for digital signature to get the same iSii: Two: two verification reply signal; and electronic action farmer broken into the application ^ ^ tiger to s Hai feeding device, - t 54. Verify the electronic certificate device to notify the server that 200826597 Γ 白所述之方法,更包含下列步驟· 妾二^電子行動震置之一身分驗證相關訊 產Γ 6二驗證相關訊號擷取一驗證請求碼; 傳误ί Γί驗證請求碼之一身分驗證回覆訊號 該電子行:器’用以通知該錬器 56.二1服;含,二子憑一 子行ί 3 之一申請訊號’該申請訊號用以表示該電 申明&quot;亥電子憑證及索取該秘密金鑰; =該申請峨產生-身分驗證請求訊號; 該身分驗證請求訊號至該電子行動裝置,以求證該電 子订動裝置為申請該電子憑證者; 斗不,收一身分驗證回覆訊號,該身分驗證回覆訊號用以表示 遠電子行動裝置確為申請該電子憑證者; 產生與該電子憑證及該秘密金鑰相關之一電子憑證訊 息;以及 因應該身分驗證回覆訊號傳送該電子憑證訊息; 、其中’該電子行動裝置可經由該電子憑證訊息取得該電子 憑證及该秘密金鎗。 55. 號 以及 57·如請^項56所述之方法,# +該申請訊號包含一公開金鑰及 一$密金鑰密文’該秘密金鑰密文係以一密鑰加密金鑰加密該 秘密金錄而得,以及該公開金鑰與該秘密金鑰相對應。 58·如請求項57所述之方法,其中該申請訊號更包含該電子憑證。 59·如請求項57所述之方法,更包含利用該公開金鑰驗證該申請 訊號之步驟。 43 200826597 60. 如請求項57所述之方法,其中該身分驗證請求訊號包含一驗 證請求碼,該身分驗證回覆訊號包含該驗證請求碼。。 61. 如請求項57所述之方法,更包含下列步驟: 利用該公開金鑰驗證包含於該身分驗證回覆訊號之一 證回應碼; 儿 其中,該身分驗證請求訊號包含一驗證請求碼,該驗證回 應碼係以該秘密金鑰對該驗證請求碼進行數位簽章而得。 62. =求項56所述之方法,其中該身分驗證回覆 電子行動裝置或該電腦。 63. ίΐΐ項56所述之方法,其中該電子憑證訊息更包含該秘密 金鑰密文及該電子憑證。 64. 如請求項56所述之方法,其中該舰器具有ca及^之功能。 65. Γϊΐ項51所述之方法,其中該傳送該身分驗證請求訊號之 透過間訊服務系統傳送一簡訊’該簡訊為該身分驗證請 C 66.2Ϊ 一,為一電子行動裝置向一祠服器申請一電子憑證 及索取一秘雄、金鑰之方法,包含下列步驟: 兮带if電月旬產生一申請訊號,用以表示該電子行動裝置申請 該電子憑證及索取該秘密金鑰‘ 月 二^㈣用該秘密麵對該申請訊號進行數位簽章; 電子服器,以通知鋪服器該 =% 4子憑證及索取該秘密金鑰; 々该伺服器接收來自該電腦之該申 ==器因應辦請訊號產生證請求訊號; 7服$傳送該身分驗證請求訊號至該電子行動裝 44 200826597 置’ 動裝置為中請該電子憑證者; 令該電子3身分驗證請求訊號; 訊號,知“ 丈3服器接收該身分驗證回覆訊號; 息;服㈣應該身分驗證回覆訊號產生—電子憑證訊 Γ 息; .令该伺服ϋΐ軸身分驗證喊訊號傳送 電子憑證訊 二電纖 67· 之方法’更包含下列步驟: 丨取一驗證請 求碼了 /子订動裝置自該身分驗證請求訊號: 訊息;广子购衣置產生包含該驗證請求碼之-驗證請求 C 電子仃動裴置傳送該驗證 腦接收來自該電子行動裝置“ 自· 以得二驗證回自應石^該秘密金錄對該驗證請求碼進行數位簽章 艾二ί細產生包含該驗證自應碼之一驗證回廡訊自· a兮雷工置自该電腦接收該驗證回應訊息; 證 回覆ϋ以ί |置產生包含該驗證回應碼之該身分驗 〇亥伺服n_—公開麵驗證該驗證回應碼; 45 200826597 '、中°亥A開金鑰與該秘密金鑰相互對應 68•如請方法,更包含下列步驟: 令該電子 求碼;以及 f、: ί; 行動巢置自該身吩驗證請求訊號擷取一驗證請 驗證分驗證回誠’其愧身分 妓,册下列步驟: 1:ϊ二產生〜密鑰加密金鑰; 密金加密錄加密該健金錄以得-秘 電子逆如=;;=;=使該 1;雷t仃動裝置自該獅接收該密鑰加密金鑰; 文;ϋ 仃喊置自該電子絲訊息擷取姉密金餘密 密文:置利用該密鑰加密金錄解密該秘密金鑰 金餘密^ 70·如請f項66所述之方法,更包含下列步驟: 令該電腦產生該公開金鑰及該秘密金鑰;以及 令該伺服器產生該電子憑證; 其中’該電子憑證訊息包含該電子憑證及該秘密金输密 文 71·如請求項70所述之方法,其中該伺服器具有CA及^之功能。 72·如請求項66所述之方法,其中該申請訊息更包含該電子憑證。 46 200826597 73·如請求項66所述之方法,其中該身分驗證請求訊 該身分驗證請求訊號係透過簡訊服務系統傳送及接收。β 74·-種申請-電子憑證及傳遞一秘密金餘之方法,包含下列牛 驟· ^ 令一電腦產生一申請訊號,用以表示一電 該=憑證及索取該秘密金錄; 丁動衣置申% ^亥電腦细娜密金麟該申請訊號進行數位簽章; -手ίίΐΐίί該申請訊號至一飼服器,以通知該伺服器該 电子仃,裝置申請該電子憑證及索取該秘密金鑰; 令該伺服器接收來自該電腦之該申請訊號; 服賴應該申請訊生—身分驗證請求訊號; 置,證ίϋϊ亥壯身罢1^證請求訊號至該電子行動裝 八電子動裝置為申請該電子憑證者; 二置自該値器接收該身分驗證請求訊號; 二二+仃動衣置傳送該身分驗證請求訊號至該電腦; 二2腦自該電子行動綠接收該身分驗證請求訊號; t該電腦產生-身分驗證回覆訊號; U _ 該身分驗證請求訊號,傳送該身分驗證回覆 者 =以11知鋪服轉電子行絲置確為t請該電子憑證 息 ίΞ,!接收該身分驗證回覆訊號; w司服㈣應該身分驗證回覆訊號產生—電子憑證訊 息 • ”亥伺服$目應該身分驗證回覆訊號傳送該電 子憑證訊 =子1亍動裝置接收該電子憑證訊息 :以及 及該了純置自謂子憑證訊息巾擷取該電子憑證 47 200826597 75·如請求項74所述之方法,更包含下列步驟: 令该電細自该身分驗證請求訊號擷取一驗證請求碼;以及 令該電腦產生該身分驗證回覆訊號,該身分驗證回覆訊號 包含該驗證回應碼。 76·如請求項74所述之方法,更包含下列步驟: 令該電腦自該身分驗證請求訊號擷取一驗證請求碼; 令該電腦利用該秘密金鑰對該驗證請求碼進立 以得一驗證回應碼; 丁致位双早 令該《產㈣身分驗證回覆讀,該身分 (包含該驗證回應碼;以及 Μ设Λ唬 令該伺服器利用一公開金鑰驗證該驗證回應碼; 其中該公開金鑰與該秘密金鑰相互對應。' 77·如請求項74所述之方法,更包含下列步驟: 令該電腦產生一密鑰加密金鑰; 密金腦利用該密錄加密金錄加密該秘密金餘以得一秘 =㈣腦傳魏魏加密▲鑰至該電子 、 〇 a 置卿該鶴加密金鑰處理以得該秘^全^使该 •令該電子行姆置自該電子憑證、鑰 置自該電腦接收該密鑰加密:广鑰, 文 以及 指貝取該秘密金输密 密文狀贱麟域麵料軸密麵 其中’該申請訊號包含該電子行動 金輸密文及與該秘密金錄相對應之-公^金^7虎碼、該秘密 々lH7所述之方法,更包含下列步驟: 以及 7该電腦產生該公開金觀該秘密金錄 48 200826597 令該伺服器產生該電子憑證; 文 其中’該電子憑證訊息包含該電子憑證及該秘密金鑰密 79·如睛求項78所述之方法,其中該伺服器具有CA及^之功能。 8〇·^ΐ求項/ί所述之方法,其中該身分驗證請求訊號一簡訊, 〇身分驗證睛求訊號係透過簡訊服務系統傳送及接收。 Γ ί, 81·:ί令子行動裝置宇請—電子憑證及索取—秘密金錄之 方法,包含下列步驟: 驗之—接齡面自—舰1接收一身分 子S中該身分驗證請求訊號係因應一電腦為該電 ί裝ϊ申請該電子憑證而產生; 於“ϋ&quot; 了動農置之一傳送介面因應該身分驗證請求訊 置確為ίί該訊號’以通知該舰器該電子行動裝 收,接收-電子憑證訊息 ;以及 取該證轉組自w憑魏息中擷 心之方法,更包含下列步驟: 請求喊娜—驗證請求碼; 之一驗證請求訊息;、 生模組產生包含該驗證請求碼 該驗證請求訊息至該腦; 求竭進行數位簽章而彳^、綠電腦_娜密麵對該驗證請 令該產生模回魏6、娜織證回應碼;以及 ^ s该驗證回應碼之該身分驗證相關 49 200826597 訊號。 83·如請$項81所述之方法,更包含下列步驟: 々&quot;亥掏取模組自該身分驗證請求訊號擷取一驗證請求 碼;以及 令該電子行動裴置之一產生模組產生包含該驗證請求碼 之该身分驗證相關訊號。 84·如請求項82或83所述之方法,射令該傳送介面傳送該身分 f證相關訊號之步驟係傳送該身分驗證相關訊號至該伺服 器,且該電子憑證訊息接收自該伺服器。 85·如請求項83所述之方法,其中令該傳送介面傳送該身分驗證 相關訊號之步驟係傳送該身分驗證相關訊號至該電腦,使該電 腦,應該身分驗證相關訊號傳送一身分驗證回覆訊號至該伺 月艮器。 86·=請求項81所述之方法,其中該電子憑證訊息包含該電子憑 證以及一秘密金鑰密文,該秘密金鑰密文係以一密鑰加 ^ 加密該秘密金餘而得。 87·如請求項86所述之方法,更包4含下列步驟: 令該接收介面自該電腦接收該密鑰加密金鑰; 令該擷取模組自該電子憑證訊息擷取該秘密金鑰密文;以 及 —▲令该電子行動裝置之一解密模組利用該密鑰加密金鑰解 密該秘密金鑰密文以得該秘密金鑰。 88·如,求項所述之方法,其中令該接收介面接收之該身分驗 證請求訊號係為透過簡訊服務系統所發之一簡訊。 89·種申请一電子憑證及傳遞一秘密金錄予一電子行動裝置之 50 200826597 方法,包含下列步驟: 令一電腦之一產生模組產生一申請訊號,用以表示該電子 行動裝置申請該電子憑證及索取該秘密金鑰; 令該電腦之一傳送介面傳送該申請訊號至一伺服器,以通 知该伺服器該電子行動裝置申請該電子憑證及索取該秘密金 錄; 令該產生模組產生一密鑰加密金鑰;以及 令該傳送介面傳送該密鑰加密金鑰至該電子行動裝置,以 使该電子行動裝置利用該密鑰加密金錄處理以得該秘密金錄。The method described in the white includes the following steps: 妾二^Electronic action shocks one identity verification related information Γ 6 2 verification related signal captures a verification request code; ί ί Γί verification request code one identity verification reply The electronic line: the device is used to notify the device 56. 2, 1 service; and the second child applies for a signal with one of the sub-line ί 3 'the application signal is used to indicate the electric declaration &quot; a secret key; = the application generates a - identity verification request signal; the identity verification request signal to the electronic mobile device to verify that the electronic binding device is the applicant for the electronic certificate; The identity verification reply signal is used to indicate that the remote electronic mobile device is actually applying for the electronic certificate; generating an electronic voucher message related to the electronic voucher and the secret key; and transmitting the electronic voucher message according to the identity verification reply signal; Wherein the electronic mobile device can obtain the electronic voucher and the secret golden gun via the electronic voucher message. 55. No. 57 and 57. The method of claim 56, the application signal includes a public key and a secret key ciphertext. The secret key ciphertext is encrypted with a key encryption key. The secret is recorded, and the public key corresponds to the secret key. The method of claim 57, wherein the application signal further comprises the electronic voucher. 59. The method of claim 57, further comprising the step of verifying the application signal using the public key. The method of claim 57, wherein the identity verification request signal includes an authentication request code, and the identity verification reply signal includes the verification request code. . 61. The method of claim 57, further comprising the steps of: verifying, by the public key, a certificate response code included in the identity verification reply signal; wherein the identity verification request signal includes a verification request code, The verification response code is obtained by digitally signing the verification request code with the secret key. The method of claim 56, wherein the identity verification is replied to the electronic mobile device or the computer. The method of claim 56, wherein the electronic voucher message further comprises the secret key ciphertext and the electronic voucher. The method of claim 56, wherein the vessel has the function of ca and ^. The method of claim 51, wherein the transmitting the identity verification request signal transmits a short message through the inter-message service system, wherein the message is the identity verification request C 66.2Ϊ, for an electronic mobile device to a server The method for applying for an electronic voucher and requesting a secret, key includes the following steps: if bring an application signal to indicate that the electronic mobile device applies for the electronic voucher and obtains the secret key 'Month 2 ^ (4) using the secret to face the application signal for digital signature; electronic server to notify the shopper of the =% 4 sub-voucher and request the secret key; 々 the server receives the application from the computer == The device sends a request for the signal to the request signal; 7 service $ transmits the identity verification request signal to the electronic mobile device 44 200826597 'The mobile device is the electronic certificate holder; the electronic 3 identity verification request signal; "Zhang 3 server receives the identity verification reply signal; interest; service (4) should be verified by the identity reply signal generation - electronic voucher information; . The method of transmitting the electronic voucher signal to the second electronic fiber 67· further includes the following steps: capturing a verification request code/sub-subscribing device from the identity verification request signal: message; the purchase of the device includes the verification request The code-authentication request C electronic sputum device transmits the verification brain receiving from the electronic mobile device "self-received two verification back from the stone ^ the secret gold record of the verification request code digitally signed AI Generate a verification response message containing one of the verification self-recovery codes from the computer. The verification response message is received from the computer; the verification reply is generated by the ί | setting to generate the identity verification code containing the verification response code. - public face verification of the verification response code; 45 200826597 ', the middle of the A open key and the secret key correspond to each other 68 • If the method, including the following steps: to make the electronic code; and f,: ί; The action nest is set to verify the request signal from the body. Please verify that the verification is verified. The following steps are taken: 1. The second key is generated by the key encryption key; the encryption key is encrypted.健金录得得-秘电子逆如如;;=;=使一个1;雷雷仃装置 receives the key encryption key from the lion; text; 仃 仃 置 置 置 该 该 置 置 置 置 置密密余密密文: Use the key to encrypt the secret key to decrypt the secret key. The method described in item 66, further includes the following steps: causing the computer to generate the public key and And the method of claim 70, wherein the server has the CA and the method ^ Function. The method of claim 66, wherein the application message further comprises the electronic voucher. The method of claim 66, wherein the identity verification request message is transmitted and received through the short message service system. 74 74·-Application - Electronic Voucher and Method of Passing a Secret Gold Remaining, including the following sequel to a computer to generate an application signal to indicate that the vouchers and the secret vouchers are required;申申% ^海电脑细娜密金麟 The application signal is digitally signed; -Hand ίίΐΐίί the application signal to a feeding device to notify the server of the electronic device, the device applies for the electronic certificate and requests the secret gold Key; the server receives the application signal from the computer; the service should apply for the student-identity verification request signal; and the certificate ϋϊ ϋϊ 壮 壮 1 ^ ^ ^ 请求 请求 请求 请求 请求 请求Applying the electronic certificate; the second device receives the identity verification request signal from the device; the second + the mobile device transmits the identity verification request signal to the computer; the second brain receives the identity verification request signal from the electronic action green t The computer generates - identity verification reply signal; U _ the identity verification request signal, transmits the identity verification replyer = 11 to see the service electronic transfer wire is indeed t Interest ίΞ ,! Receive the identity verification reply signal; w (4) should verify the response signal generation - electronic voucher message • "Hai servo" should verify the reply signal to transmit the electronic voucher = sub-1 device receives the electronic voucher message: And the method for requesting the electronic voucher 47 200826597 75. The method of claim 74, further comprising the steps of: causing the device to retrieve a verification request code from the identity verification request signal And causing the computer to generate the identity verification reply signal, the identity verification reply signal including the verification response code. 76. The method of claim 74, further comprising the steps of: causing the computer to retrieve the identity verification request signal a verification request code; causing the computer to use the secret key to advance the verification request code to obtain a verification response code; Ding Zhishen double early ordering the production (four) identity verification reply reading, the identity (including the verification response code And setting the command to verify the verification response code by using a public key; wherein the public key and the secret key Corresponding to each other. 77. The method of claim 74, further comprising the steps of: causing the computer to generate a key encryption key; and the secret brain encrypting the secret gold with the secret record to obtain a secret. = (4) Brain transmission Wei Wei encryption ▲ key to the electronic, 〇a qingqing the crane encryption key processing to get the secret ^ full ^ make the electronic order from the electronic certificate, the key is received from the computer The key encryption: the wide key, the text and the finger to take the secret gold to the secret traits of the unicorn domain fabric shaft surface, wherein the application signal contains the electronic action gold cipher text and corresponds to the secret gold record - The method described in the public gold ^7 tiger code, the secret 々 lH7, further includes the following steps: and 7 the computer generates the public gold view of the secret gold record 48 200826597 to enable the server to generate the electronic certificate; The electronic voucher message includes the electronic voucher and the method described in claim 78, wherein the server has the functions of CA and ^. The identity verification request signal is a short message. The identity verification signal is transmitted and received through the SMS service system. Γ ί, 81·: ί 子 行动 行动 — 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子The ship 1 receives the identity verification request signal in the molecule S, which is generated by a computer for the electronic device to apply for the electronic voucher; Ίί The signal 'to inform the ship of the electronic action to receive, receive - electronic voucher message; and to take the method of transferring the certificate from w to the method of Wei Wei, including the following steps: Request shouting - verification request code One of the verification request messages; the production module generates the verification request message containing the verification request code to the brain; exhaustively performs the digital signature and 彳^, the green computer _ Naomi faces the verification, so that the generation is returned Wei 6, the Nana vouchers response code; and ^ s the verification response code of the identity verification related to the 2008 2008 597 signal. 83. The method of claim 81, further comprising the steps of: 々 &quot; 掏 掏 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取 取The identity verification related signal including the verification request code is generated. 84. The method of claim 82 or 83, wherein the step of transmitting the identity signal to the transmitting interface transmits the identity verification related signal to the server, and the electronic credential message is received from the server. The method of claim 83, wherein the step of transmitting the identity verification related signal by the transmitting interface transmits the identity verification related signal to the computer, so that the computer should verify the relevant signal to transmit an identity verification reply signal. To the waiter. 86. The method of claim 81, wherein the electronic voucher message comprises the electronic voucher and a secret key ciphertext, the secret key ciphertext being encrypted by a key plus ^ secret. 87. The method of claim 86, further comprising the steps of: causing the receiving interface to receive the key encryption key from the computer; and causing the retrieval module to retrieve the secret key from the electronic voucher message The ciphertext; and - ▲ causes the decryption module of the electronic mobile device to decrypt the secret key ciphertext using the key encryption key to obtain the secret key. 88. The method of claim 1, wherein the identity verification request signal received by the receiving interface is a text message sent by the short message service system. The method of applying for an electronic voucher and transmitting a secret voucher to an electronic mobile device 50 200826597 includes the following steps: Requesting the secret key; causing one of the computer's transmission interfaces to transmit the application signal to a server to notify the server that the electronic mobile device applies for the electronic voucher and obtains the secret record; a key encryption key; and causing the delivery interface to transmit the key encryption key to the electronic mobile device to cause the electronic mobile device to encrypt the golden record using the key to obtain the secret record. 90·如請求項89所述之方法,更包含下列步驟: 令该電腦之一加密模組利用該密錄加密金输加密該秘密 金餘以得一秘密金鑰密文; ^中,該申請訊號包含該電子行動裝置之一號碼、該秘密 金錄在、文及與該秘密金鑰相對應之一公開金錄。 91·如請求項90所述之方法,其中該申請訊號更包含該電子憑證。 92·如請求項9〇所述之方法,更包含下列步驟: 令該產生模組產生該公開金鑰及該秘密金鑰;以及 々。亥電知之一簽章模組利用該秘密金錄對該申請訊於 行數位簽章。 ° 93·如請求項92所述之方法,更包含下列步驟: &lt;二令該電腦之一接收介面接收來自該電子行動裝置之一 證請求訊息; 。 求碼; 令該電腦之一擷取模組自該驗證請求訊息擷取一 驗證請 令該簽章模組利用該秘密金鑰對該驗證請求碼 簽章以得一驗證回應碼; 叮数位 令该產生模組產生包含該驗證回應碼之一驗證回應訊 51 200826597 息;以及 令該傳送介面傳送該驗證回應訊息至該電子行動裝置。 94·如凊求項92所述之方法,更包含下列步驟: 令该電腦之一接收介面接收來自該電子一 分驗證相關訊號; 乂 身 證請^電歡—擷取模組自該身分驗證相關訊號擷取一驗 Γ 查以ί該ΐΐ模組以該秘密麵對該驗證請求碼進行數位簽 早从付一驗證回應碼; 訊號生模_生包含該驗證回應碼之一身分驗證回覆 知別傳送該身分驗證回覆訊號至該伺服器,以通 矣以伺服益忒電子行動裝置確為申請該電子憑證者。 95·如請求項92所述之方法,更包含下列步驟: 令该電腦之一接收介面接收來自該電 电丁订動衮置之身 證請=^腦之—擷取模組自該身分驗證相關訊號擷取一驗 訊號了 生模組產生包含該驗證請求碼之一身分驗證回覆 通知二送该身分驗證回覆訊號至該伺服器,用以 通知糾心錢子行練置確為申請該電子憑證者。 96·—種令一伺服器傳遞_雷 裝置之方法,包含下列^“及—秘③、金餘至—電子行動 令該伺服器之-接收介面接收來自凡 ==用以表示該電子行動裝置申請該電二索 52 200826597 令該伺服器之-產生模組因應該申請峨產生 證請求訊號; u 令該伺服m傳送介轉魏身分驗證請求訊號至該 電子行動裝置,以求證該電子行触置為申請該電子憑證者; 令該接收介面接收-身分驗證回覆訊號,該身分驗證回覆 訊號用以表示該電子行動裝置確為申請該電子憑證者; 令該產生模組產生與該電子憑證及該秘密 i相 電子憑證訊息;以及 令該傳送介關應該身分驗證回覆訊號傳送該電子憑證 訊息; “ 其中,該電子行動裝置可經由該€子憑證謎 憑證及該秘密金錄。 卞/电丁 97. 如請柄%所狀方法,射該申請訊航含—公開全梦及 二=金鑰f文’該秘密麵密文係以-歸加密金^加^該 秘雄金餘而付’以及該公開麵與娜密錢相對應。 98. 如請求項97所述之方法,其中該申請訊號更包含該電子憑證。 ί/ 99. 如請柄97所述之方法,更包含令 用該公開金錄驗證該申請訊號之步驟。°。之n组利 職」^求項97所述之方法,其中該身分驗證請求訊號包含-驗响求碼’該身分驗證回覆訊號包含該驗證請求碼。。 101. 求項97所述之方法' 更包含下列步驟: 身分之m該公開金錄驗證包含於該 雍踩iti亥身分驗證請求訊號包含—驗證請求碼,該驗證回 應碼係以邮密金錄對該驗證請求碼進行數位簽章而得驗也口 53 200826597 '金如=及 其中該電子憑證訊息更包含該秘 1〇4功倉Γ請求項%所述之方法’其中該规器具有 CA及RA之 所述之方法,其中令該傳送介面傳送該身分驗 106^^&quot;L^1 為—電子行動裝置向—伺服器ψ請一電子憑 组及索取一秘岔金鑰之方法,包含下列步驟: ^ίΐίΐί:產生模組纽—中請訊號,用以表示該電子 仃動衣,申叫忒電子憑證及索取該秘密金鑰; —簽章模組利賴秘密金鑰對該巾請訊號進 仃數位發早, 4 士令該傳送介面傳送該,請訊號至該伺服器 ,以通 二以5③“電子行動裝置㈣該電子憑證及索取該秘密金 輸; ίί=!之一接收介面接收來自該電腦之該申請訊號; 證請=產生模組因應該申請訊號產生-身分驗 〜23器^傳送介面傳送該身分驗證請求《至該 電雅動裝置為巾請該電子憑證者; 驗證G訊號; 接收介面自_服雜收該身分 • 〒置之―傳送介面因應該身分驗證請求訊 諕,傳运-身为驗證回覆訊號,以通知該伺服器該電子行動裝 54 200826597 置確為清求該電子憑證者; 令该伺服器之該接收介面接收該身分驗證回覆訊號; 服器之該產生模組因應該身分驗 訊 一電子憑證訊息; 令該伺服器之該傳送介面明應該身分驗證回覆訊號傳送 一電子憑證訊息; 及 τ孩電子行動裝置之該接收介面接收該電子憑證訊息 ,•以 C ϋ 取該娜觀自該電子憑證訊息中操 107·如^求項1〇6所述之方法,更包含下列步驟: 娜置之鋪取歡自料錄證請求訊號 之-裝置之—產生模組產生包含該驗證請求碼 該電i該電子行動裝置之該槪介面傳送該驗證請求訊息至 證請腦之—接收介面接收來自該電子行_置之該驗 證請 求碼; 令該電腦之-擷轉組自紐證請求訊息掏取該驗 進行該秘密金鑰對該驗證請求碼 回應S電腦之該產生模組產生包含該驗證回應碼之-驗證 動裝^該電腦之該傳送介面,送該驗證回應訊息至該電子行 應訊i該電子行鱗置之該接收介面自該電腦接收該驗證回 55 200826597 令該電子行練置之生模組產生包含該 之該身分驗證回覆訊號;以及 ^ 口應碼 令該伺服器之-驗證模組—公開錢驗證該驗證回 應碼 其中該公開金輸與該秘密金錄相互對應。 108·如清求項1〇6所述之方法,更包含下列步驟· 操取練敝自料轉證請求訊號 Γ 。令該電子行鱗置之該產生模組產生該 號’其中該身分驗證回覆訊號包含該驗證請求碼。…且復° 109. 如請求項106所述之方法,更包含下列 2J腦之該產生模組產生一密鑰加密金鑰; 金输蝴職錄《麵加密該秘密 動裝Ϊ 密4加密金鑰至該電子行 秘密金錄; 仃動衣置_ _餘加密金祕理以得該 密金電子订動裳置之該接收介面自該電腦接收該密输加 該秘^::動^之該擷取模組_子憑證訊息擷取 金势4及包含該電子行動|置之一號碼、該秘密 錄益文賴雜⑧錢姆應之-公開錢。 令糊之㈣秘密金 110.=巧所迷之方法,.更包含下列/ 鑰;以 56 200826597 及 令該伺服器之該產生模組產生該電子憑證; 其中,該電子憑證訊息包含該電子憑證及該秘密金鑰密 文0 111·如請求項110所述之方法,其中該伺服器具有CA及RA之 功能。 ί 112·如請求項106所述之方法,其中該申請訊息更包含該電子 憑證。90. The method of claim 89, further comprising the steps of: causing an encryption module of the computer to encrypt the secret gold to obtain a secret key ciphertext by using the secret encryption key; ^, the application The signal includes a number of the electronic mobile device, the secret gold record, the text, and a public account corresponding to the secret key. The method of claim 90, wherein the application signal further comprises the electronic voucher. 92. The method of claim 9, further comprising the steps of: causing the generating module to generate the public key and the secret key; and 々. One of the signing modules of Haidian knew that the application was signed by the secret gold record. The method of claim 92, further comprising the steps of: &lt;2, wherein one of the receiving interfaces of the computer receives a request message from the electronic mobile device; Asking for a verification module to use the secret key to sign the verification request code to obtain a verification response code; The generating module generates a verification response message including the verification response code, and causes the transmission interface to transmit the verification response message to the electronic mobile device. 94. The method of claim 92, further comprising the steps of: causing one of the receiving interfaces of the computer to receive a signal from the electronic one-point verification; the body card is required to be ^Electronics--the module is verified from the identity The relevant signal captures a verification check, and the verification module responds to the verification request code by the secret to perform a digital verification. The signal generation template contains one of the verification response codes. Do not send the identity verification reply signal to the server to apply for the electronic certificate by using the servo electronic device. 95. The method of claim 92, further comprising the steps of: causing one of the receiving interfaces of the computer to receive the body certificate from the electric device, and the brain is obtained from the identity verification module. The relevant signal captures a test signal, and the health module generates a verification verification reply code containing one of the verification request codes to send the identity verification reply signal to the server to notify the correcting money bank to practice the application. Voucher. 96--A method for causing a server to transmit a _Ray device, including the following ^" and - secret 3, Jin Yuzhi - electronic action to enable the receiving interface of the server - from the == to indicate the electronic mobile device Applying for the electric cable 52200826597, the server-generating module should apply for a certificate request signal; u cause the servo m to transmit the Wei identity verification request signal to the electronic mobile device to verify the electronic touch And the identity verification reply signal is used to indicate that the electronic mobile device is indeed the applicant for the electronic certificate; and the generation module generates the electronic certificate and The secret i-phase electronic voucher message; and causing the transmission mediator to transmit the electronic voucher message by the identity verification reply signal; "where the electronic mobile device can pass the voucher voucher and the secret voucher.卞 / 电丁97. If you take the method of %, shoot the application of the navigation - open the whole dream and the second = key f text 'The secret face of the ciphertext is - the encryption of the gold ^ plus ^ the secret gold I will pay for it and the public face will correspond to Naomi. 98. The method of claim 97, wherein the application signal further comprises the electronic voucher. ί/ 99. The method of claim 97 further includes the step of verifying the application signal using the disclosure. °. The method of claim 97, wherein the identity verification request signal includes an acquiescence request code, and the identity verification reply signal includes the verification request code. . 101. The method of claim 97, further comprising the following steps: the identity verification of the public account is included in the verification code of the 雍 iti 身 identity verification request containing the verification request code, the verification response code is recorded by postal secret The verification request code is digitally signed and verified. 53200826597 '金如= and the electronic voucher message thereof further includes the method described in the claim 1. The specification has CA And the method of RA, wherein the transmitting interface transmits the identity test 106^^&quot;L^1 to - the electronic mobile device to the server, requesting an electronic group and requesting a secret key, The following steps are included: ^ίΐίΐί: Generate a module button - the signal is used to indicate the electronic device, the electronic certificate and the secret key are obtained; - the signature module relies on the secret key to the towel Please enter the number to send the message early, and the 4th command will transmit the message to the server. Please send the signal to the server to pass the e-voucher with 53" electronic mobile device (4) and request the secret gold; ίί=! Interface receives from the electricity The application signal; the certificate = the generation module should be applied for the signal generation - the identity inspection ~ 23 device ^ transmission interface to transmit the identity verification request "to the electronic device is the towel to request the electronic certificate; verify the G signal; receive The interface is from the _ service receipt of the identity • 传送 之 传送 传送 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因The voucher; the receiving interface of the server receives the identity verification reply signal; the generating module of the server is configured to verify the electronic voucher message; the transmission interface of the server is determined to be the identity verification reply signal transmission An electronic voucher message; and the receiving interface of the tau electronic mobile device receives the electronic voucher message, and the method described in the electronic voucher message is as follows: In addition, the following steps are included: Na Yazhi's self-dealing request signal-device-generating module generates the verification request code. The interface of the mobile device transmits the verification request message to the card-receiving interface, and the receiving interface receives the verification request code from the electronic device. The computer-transfer group obtains the verification request message from the new card request message. The secret key sends the verification response code to the generation module of the S computer to generate the verification response code containing the verification response code, and sends the verification response message to the electronic communication device. The receiving interface receives the verification from the computer back to the computer. The system generates the identity verification reply signal including the identity; and the authentication module of the server - The public money verifies the verification response code in which the disclosure money corresponds to the secret gold record. 108. The method described in the first paragraph of the present invention further includes the following steps: operating the self-requesting request signal Γ . The generation module generates the number, wherein the identity verification reply signal includes the verification request code. And the method described in claim 106, further comprising the following 2J brain generating module to generate a key encryption key; the gold loss record "face encryption the secret mobile device" secret 4 encryption gold Key to the electronic bank secret record; 仃动衣__ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The capture module_sub-voucher message captures the gold potential 4 and contains the electronic action|set one of the numbers, the secret record and the benefit of the text 8 money should be - public money. The method of generating a voucher (4) secret gold 110.= fascinating, including the following / key; generating the electronic voucher at 56 200826597 and causing the generating module of the server; wherein the electronic voucher message includes the electronic voucher And the secret key ciphertext 0. The method of claim 110, wherein the server has the functions of CA and RA. The method of claim 106, wherein the application message further comprises the electronic voucher. 113.如請求項106所述之方法,其中該身分驗證請求訊號為一 簡訊,該身分驗證請求訊號係透過簡訊服務系統傳送及接收。 114· 一種申請一電子憑證及傳遞一秘密金鑰之方法,包含下列 步驟: —令一電腦之一產生模組產生一申請訊號,用以表示一電子 行動裝置申晴該電子憑證及索取該秘密金錄; ^令該電腦之一簽章模組利用該秘密金鑰對該申請訊號進 行數位簽章; 令該電口腦之—傳送介面傳送該申請訊號至一伺服器,以通 二S玄祠服H該電子行絲置申請該電子憑證及索取該秘密金 錄, ϋΐ司服11之—接收介面接收來自該電腦之該中請訊號; 證請服器之—產生模組因應該中請訊號產生一身分驗 電子傳送介面傳送該身分驗證請求訊號至該 令Ί求證該電子行_置為申請該電子憑證者; 驗證請置之—接收介面自該伺服器接收該身分 X電子行動裝置之—傳送介面傳送該身分驗證請求訊 57 200826597 號至該電腦; ‘接收介面自該電子行動裝置魏該身分驗 令該電腦之一, 證請求訊號; 組產生一身分驗證回覆訊號; 身八因應該身分驗證請求訊號,傳送該 該伺服器該電子行動裝置確為申請 ίΐ=器。ΐΐ接收介面接收該身分驗證回覆訊號;The method of claim 106, wherein the identity verification request signal is a short message, and the identity verification request signal is transmitted and received through the short message service system. 114. A method for applying for an electronic voucher and transmitting a secret key, comprising the steps of: - causing a computer to generate a request signal to indicate an electronic mobile device, Shen Qing, the electronic voucher and requesting the secret Jin Lu; ^Make the signature module of the computer use the secret key to digitally sign the application signal; and enable the electronic interface to transmit the application signal to a server to pass the second S祠服H The electronic singer applies for the electronic voucher and requests the secret vouchers, and the ϋΐ 服 之 之 — 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收The signal generates an electronic transmission interface to transmit the identity verification request signal to the order to verify the electronic bank _ to apply for the electronic certificate; to verify that the receiving interface receives the identity X electronic mobile device from the server - the transmission interface transmits the identity verification request message 57 200826597 to the computer; 'the receiving interface from the electronic mobile device Wei, the identity of the computer, one of the certificates Request signal; generating a set of identity verification reply signal; body by eight signal should identity verification request, the server which transmits the electronic mobile device is determined to apply ίΐ =. Receiving the identity verification reply signal by the receiving interface; -電^證訊I·模組㈣該身分驗證回覆訊號產生 介賴崎分驗證喊訊號傳送 及 p亥電子行動裝置之該接收介面接收該電子憑證訊息 ;以 取該操取模組自該電子憑證訊息中擷 115·如請求項114所述之方法,更包含下列步驟:-Electricity Testimony I·Module (4) The identity verification reply signal generation is received by the receiving interface of the subscribing verification shouting signal transmission and the phai electronic mobile device; the operation module is taken from the electronic In the voucher message, the method described in claim 114 further includes the following steps: 令該電腦之一擷取模組自該身分驗證請求訊號擷取一驗 證請求碼;以及 令該電腦之該產生模組產畫該身分驗證回覆訊號,該身分 驗證回覆訊號包含該驗證回應碼。 116·如請求項114所述之方法,更包含下列步驟: 令該電腦之一擷取模組自該身分驗證請求訊號擷取一驗 證請求碼; 令邊電腦之該簽章模組利用該秘密金錄對該驗證請求碼 進行數位簽章以得一驗證回應碼; 令该電腦之該產生模組產生該身分驗證回覆訊號,該身分 驗證回覆訊號包含該驗證回應碼;以及 58 200826597 應碼! 乂祠服叩之驗證模組利用一公開金錄驗證該驗證回 其中該公開金輪與該秘密金錄相互對應。 117·如請求項114所述之方法,更包含下列 i該ΐ腦之該產生模組產生-密鑰加密金鑰; 金鑰(蝴關㈣加密錢加密該秘密 動裝密金錄至該電子行 Ο 秘密金鑰; 仃動衣覃利用該密餘加密金餘處理以得該 密金電子订動裝置之該接收介面自該電腦接收該密鐘加 動裝置之—解雜組利用該密鑰加密金餘解 植、该秘猎金鑰岔文以得該秘密金鑰; 入松ϊ號包含該電子行動裝置之-號碼、該秘密 至鑰孩、文及,、该秘密金鑰相對應之一公開金鑰。 i 118·如^求項in所述之方法,更包含下列步驟: 及 令違電細之雜生模組纽該公開金鑰及該秘密金餘;以 令忒伺服為之該產生模組產生該電子憑證; 文 其中,該電子憑證訊息包含該電子憑證及該秘密金餘密 119·如請求項118所述之方法,其中該伺服器具有CA及从之 功能。 120.如請求項114所述之方法,其中該身分驗證請求訊號一簡 59 200826597 訊’該身分驗證請求訊號係透過簡訊服務系統傳送及接收。 121· 一種内儲於一電子行動裝置之應用程式,使該電子行動 置執打令該電子行練置申請-電子憑證及索取-秘密金^ 之方法,該方法包含下列步驟: 》,該,,行動裂置之一接收介面自一伺服器接收一身八 驗證請求域,其㈣身分驗證請求訊號翻應—f腦為該^ 子行動裝置申請該電子憑證而產生; 電 口令^電子行動裝置之一傳送介面因應該身分驗證請求訊 號,傳达一身分驗證相關訊號,以通知該伺服器該電子行動货 f》 置確為申請該電子憑證者; 〜 令該接收介面接收一電干丨證訊息;以及 令該電子行動装置之一擷取模組自該電子憑證訊息中 取該電子憑證及該秘密金餘。 σ 122·如^求項121所述之應用程式,該方法更包含下列步驟: 令f擷取巧組自該身分驗證請求訊號擷取-驗證請求碼; 令忒電子行動裝置之一產生模組產生包含該驗證請求 之一驗證請求訊息; ·… +祕送介轉賴驗輯求訊ϋ該電腦; ’ 令減介面自該電腦魏包含-驗證喊碼之-驗證 =應訊息’該驗證回應碼係該電腦利用該秘密金 未碼進行數位簽章而得; 令該擷取1組自該驗證自i訊息擷取該驗證回應碼;以及 。令該產生漁產生包含該驗證回應歇該身分驗證相關 矾號。 123.如請求項121所述之應用程式,該方法更包含下列步驟: 令該擷取模組自該身分驗證請求訊號擷取一 碼;以及 月 200826597 之該=:=”生模組產生包含該驗證請求碼 124.如請求項122或123所述之應用程式,其 傳运該身分驗證相關訊號之步驟係傳送 ^關^ 至該伺服器’且該電子憑證訊息接收自該飼服器。戍相關耐 =因應該身分驗證相關訊號傳送一^ 26.如明求項121所述之應用程式’其中兮雷工席, 該^子憑證以及—秘密金减文,該秘密二密2 加密金鑰加密該秘密金鑰而得。 ⑴”铪鑰 127·如請求項126所述之應用程式,該方法更句冬 令該接收介面自該電腦接收該密鎗加密金輪;.驟· 及々該操取模組自該電子憑證讯息拮頁取該秘、密金餘密文;以 令该電子行動裝置之一解密模組利用該穷偽^ 密該秘密金鑰密文以得該秘密金鑰。 ” ϋ饴i鑰解 128·如請求項121所述之應用程式,其中令兮技 該身分驗證請求訊號係為透—訊服務系統二發之收之 129. 一種内儲於—電腦之應用程式,使該電腦 带 證及傳遞一秘密金錄予一電子行動裝置之方、本 二电子 下列步驟: 去’该方法包含 令該電腦之一產生模組產生一申請訊號, 行動裝置申請該電子憑證及索取該秘密金鑰;、不〜電子 200826597 知該申請訊號至-娜器 錄; 裝置申W 5亥電子憑證及索取該秘邊、炎 々^亥產生模組產生一密· 丁動衣置利用該密餘加密金餘處理以得該秘密金餘。 13a 朗程^,财法更包含T列步驟: 金鑰驗利㈣麵加密金鑰加密該秘密 合餘ίΓ/Π巧遽包含該電子行動裝置之—號碼、該秘密 U及與雜密麵相對應之—公開金餘。 電130所述之應用程式’其中該申請訊號更包含該 求項130所述之應用程式,該方法更包含下列步驟: :,產生模組產生該公開金鑰及該秘密金鑰;以及 々^亥電知之一簽早模組利用該秘密金餘對該申 行數位簽章。 μ J /甲口月Λ琉進 C; 133·如請求項132所述之應用程式,該方法更包含下列步驟·· 令該電腦之一接收介面接收來自該電子行動步夕一 證請求訊息; 衣直《-驗 求碼; 令4電細之一操取模組自該驗證請求訊息擷取 驗證請 令該簽章模組利用該秘密’金鑰對該驗證請求 簽章以得一驗證回應碼; 丁数4 令該產生模組產生包含該驗證回應碼之一驗 息;以及 爽哎回應訊 令該傳送介面傳送該驗證回應訊息至該電子行動穿置。 62 200826597 134·如請求項132所述之應用程式,該方法更包含下列步驟: 令該電腦之一接收介面接收來自該電子行動震置之一身 分驗證相關訊號; 令該電腦之一擷取模組自該身分驗證相關訊號擷取一驗 證請求碼; 令該簽章模組以該秘密金鑰對該驗證請求碼進行數位簽 章以得一驗證回應碼; a 令該產生模組產生包含該驗證回應碼之一身分驗證回覆 訊號;以及 17 令5亥傳送介面傳送該身分驗證回覆訊號至該伺服器,以通 知該伺服器該電子行動裝置確為申請該電子憑證者。ϋ 135·如請求項132所述之應用程式,該方法更包含下列步驟: 令該電腦之一接收介面接收來自該電子行動裝置之一 分驗證相關訊號; ,該電腦之-擷取模組r該身分驗證相關訊號擷取一驗 證請求碼; ㈣令=级组產生包含該驗證請求碼之一身分驗證回覆 L 令該傳送介面傳送該身分驗證回覆訊號 通知鋪顧該電子行械置確Μ請該電子憑證者L 136雷二=儲―匕值11之剌程式,使該伺服器執行傳遞- 鑰至—f子行練置之方法,該方法包含 號,^—接收介面接收來自—f腦之-申請訊 “;;表示該電‘子行動裝置申請謝 證請服益之—產生模組因應該中請訊號產生-身分驗 63 200826597 電子行面傳送該身分驗證請求訊號至該 為申請該電子憑證者; 表捕電子行動裝置 電子生触電子驗及_密錄相關之一 :挪$;| φ目應財分驗證回覆訊賴賴電子憑證 ^TU #^ &gt; f 憑證動裝置可經由該電子憑證訊息取得該電子 137pq^T求項136所述之應用程式,其中該申請訊號包含一公 開金鍮及一秘密金錄密文,該秘密金输密文係以-密錄加密金 鑰加密該秘密_而得,以及該公開錢與娜密金输 應0 138. 如請求項137所述之應用程式,其中該申請訊號更包含該 電子憑證。 139. 如凊求項137所述之應用程式,該方法更包含令該伺服器 之一驗證模組利用該公開金鑰驗證該申請訊號之步驟。 140·如請求項137所述之應用程式,其中該身分驗證請求訊號 包含一驗證請求碼,該身分驗證回覆訊號包含該驗證請求碼。。 141·如請求項137所述之應用程式,該方法更包含下列步驟: 令該伺服器之一驗證模組利用該公開金鑰驗證包含於該 身分驗證回覆訊號之一驗證回應碼; 其中,該身分驗證請求訊號包含一驗證請求碼,該驗證回 應碼係以該秘密金鑰對該驗證請求碼進行數位簽章而得。 64 200826597 142. 如請求項136所述之應用程式,其中該身分驗證回覆訊號 接收自該電子行動裝置或該電腦。 143. 如請求項136所述之應用程式,其中該電子憑證訊息更包 含該秘密金鑰密文及該電子憑證。 144. 如請求項136所述之應用程式,其中該伺服器具有CA及 RA之功能。 145·如請求項136所述之應用程式,其中令該傳送介面傳送該 身分驗證請求訊號之步驟係透過簡訊服務系統傳送一符矽 簡訊為該身分驗證請求訊號。 《 0 ^ 146· 一種内儲於一系統之應用程式,使該系統執行令一電腦為 電子行動裝置向一伺服态申凊一電子憑證及索取一秘密金 鑰之方法,該方法包含下列步驟: 一令該電腦之-產生模組產生一申請訊號,用以表示該電子 行動裝置申請該電子憑證及索取該秘密金餘; 行數^3月&amp;之一簽早权組烈用該秘密金鑰對該申請訊號進 i) 知』Ξΐίίι傳送介面傳送該申請訊號至該饲服器’以通 餘°厂—電子仃動裝置申請該電子憑證及索取該秘密金 ίΞίΐιΐ收,接收來自該電腦之該申請訊號; 證請求訊號;w 缝組因賴申請《產生-身分驗 電子行動裝置,料f =面傳賴衫驗證請求訊號至該 令該電子行電子行動裝置為申請該電子憑證者,· 驗證請求訊號;、之一接收介面自該伺服器接收該身分 令該電子行動步:番 (心 、直之一傳送介面因應該身分驗證請求訊 65 200826597 號’/ί ΤΙ身分驗證回覆訊號,以通知該飼服器該電子行動褒 置確為請求該電子憑證者; 令,祠服t之該接收介面接收該身分驗證回覆訊號; 服之該產生模組因應該身分驗證回覆訊號產生 一電子憑證訊息; 令f伺服裔之該傳送介面因應該身分驗證回覆訊號傳送 一電子憑證訊息; 及 令該電子行動裝置之該接收介面接收該電子憑證訊息 •,以And causing the one of the computer to obtain a verification request code from the identity verification request signal; and causing the generation module of the computer to produce the identity verification reply signal, the identity verification reply signal including the verification response code. 116. The method of claim 114, further comprising the steps of: causing a capture module of the computer to retrieve a verification request code from the identity verification request signal; and causing the signature module of the edge computer to utilize the secret The gold record of the verification request code is digitally signed to obtain a verification response code; the generation module of the computer generates the identity verification reply signal, the identity verification reply signal includes the verification response code; and 58 200826597 should be coded! The verification module of the service uses a public record to verify the verification back, wherein the public gold wheel and the secret gold record correspond to each other. 117. The method of claim 114, further comprising the following i generating the module generating key-key encryption key; the key (buttering (four) encrypting the money encrypting the secret mobile cryptographic record to the electronic The secret key is used by the 覃 覃 加密 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , The encryption key is de-embedded, and the secret key is obtained by the secret key; the entry number includes the number of the electronic mobile device, the secret to the key, the text, and the secret key corresponding to the key A public key. The method described in the above-mentioned item, further includes the following steps: and making the secret module of the violation of electricity and the secret gold balance; The generating module generates the electronic credential; wherein the electronic credential message includes the electronic credential and the secret gold secret 119. The method of claim 118, wherein the server has a CA and a function thereof. The method of claim 114, wherein the identity verification is Request No. 59 200826597 The identity verification request signal is transmitted and received through the SMS service system. 121. An application stored in an electronic mobile device to enable the electronic action to be ordered to apply for the electronic operation. - Electronic voucher and request - secret gold ^ method, the method comprises the following steps: ",", the action split one receiving interface receives a verification request field from a server, and (4) the identity verification request signal is adapted - The f brain is generated by applying the electronic voucher to the mobile device; the transmission interface of the electronic password device is transmitted by the identity verification request signal to transmit an identity verification related signal to notify the server of the electronic mobile phone f </ br /> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> σ 122 · The application program described in item 121, the method further comprising the following steps: Configuring the f-acquisition group from the identity verification request signal Capture-verify request code; cause one of the electronic mobile device generation modules to generate a verification request message containing the verification request; ·... + secret delivery to the inspection request for the computer; 'decrease the interface from the Computer Wei Contains - Verification Call Code - Verification = Should Message 'This verification response code is obtained by the computer using the secret gold uncoded digital signature; so that the capture 1 group from the verification from the i message to retrieve the verification And the response code; and the application generates the verification response to the identity verification related nickname. 123. The application of claim 121, the method further comprising the steps of: causing the capture module to be from the identity The verification request signal captures a code; and the month: 200826597 of the =:= "the production module generates the verification request code 124. The application program as claimed in claim 122 or 123, which transmits the identity verification related signal step The system transmits ^^ to the server' and the electronic voucher message is received from the feeder.戍Related resistance=According to the identity verification related signal transmission ^^ 26. The application program as described in Item 121, where the 兮雷工席, the ^ sub-voucher and the secret gold reduction text, the secret two secret 2 encryption gold The key is encrypted by the secret key. (1) "Key 127", as described in claim 126, the method further causes the receiving interface to receive the rifle encryption gold wheel from the computer; and the operation module is stipulated from the electronic voucher message The page takes the secret, the secret ciphertext; so that the decryption module of the electronic mobile device uses the secret ciphertext to obtain the secret key." ϋ饴i key solution 128·如The application program of claim 121, wherein the identity verification request signal is received by the second service provider. 129. An application stored in the computer, so that the computer carries the certificate and transmits a The secret gold is recorded to the side of an electronic mobile device, and the second step of the second electronic: "The method includes causing one of the computers to generate a module to generate an application signal, the mobile device applying for the electronic voucher and requesting the secret key; 200826597 Know the application signal to - Naru Record; device application W 5 Hai e-voucher and request the secret side, Yan Yi ^ Hai production module to generate a secret · Ding Yi clothes use the secret encryption gold processing to get Secret gold I. 13a Long Cheng ^, the financial method also includes the T column steps: Key IQ (4) face encryption key encryption The secret balance Γ Π Π 遽 遽 遽 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该Corresponding to - open the gold surplus. The application program of the electric device 130, wherein the application signal further includes the application program described in the item 130, the method further comprises the following steps:: generating a module to generate the public key and the secret key; and 々^ One of the Haidian knows that the early signing module used the secret Jinyu to sign the digital signature of the application. </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI>直直--Check code; Let one of the 4 operating modules retrieve the verification request message, and ask the signature module to use the secret 'key to sign the verification request for a verification response The code 4 generates the test module to generate one of the verification response codes; and the response message transmits the verification response message to the electronic action. 62 200826597 134. The application of claim 132, the method further comprising the steps of: causing one of the receiving interfaces of the computer to receive an identity verification related signal from the electronic action shake; causing one of the computers to capture the mode The group obtains a verification request code from the identity verification related signal; and causes the signature module to digitally sign the verification request code with the secret key to obtain a verification response code; a. Verifying the response code of one of the identity verification reply signals; and the 17th 5H transmission interface transmits the identity verification reply signal to the server to notify the server that the electronic mobile device is indeed the applicant for the electronic certificate. 135 135. The application of claim 132, the method further comprising the steps of: causing one of the receiving interfaces of the computer to receive a verification-related signal from the electronic mobile device; the computer-capture module r The identity verification related signal captures a verification request code; (4) the order=level group generates a verification verification reply containing one of the verification request codes, so that the transmission interface transmits the identity verification reply signal to notify the electronic device The electronic credential L 136 Lei 2 = store 匕 匕 11 , program, so that the server performs the transfer-key to -f sub-line practice method, the method includes a number, ^ - the receiving interface receives the -f brain - application message ";; said that the electric 'sub-action device application for the application of the testimonials please benefit - the generation of the module due to the request signal generation - identity test 63 200826597 electronic line to send the identity verification request signal to the application Electronic voucher; table capture electronic mobile device electronic contact electronic test and _ secret record related one: move $; | φ eye should be verified by the verification of the reply electronic relying on electronic voucher ^TU #^ &gt; f certificate moving device can Obtaining, by the electronic voucher message, the application described in the electronic 137pq^T request 136, wherein the application signal includes a public key and a secret gold ciphertext, and the secret gold ciphertext is encrypted by a secret key encryption key. The secret is obtained, and the public money and Naomi's input is 0 138. The application described in claim 137, wherein the application signal further includes the electronic certificate. 139. The application as described in claim 137 The program further includes the step of causing the verification module of the server to verify the application signal by using the public key. 140. The application of claim 137, wherein the identity verification request signal includes a verification request code The identity verification reply signal includes the verification request code. 141. The application according to claim 137, the method further comprising the steps of: causing the one of the server verification modules to use the public key verification to be included in the The identity verification reply signal is one of the verification response codes; wherein the identity verification request signal includes a verification request code, and the verification response code is the verification key by the secret key </ RTI> The application of claim 136, wherein the identity verification reply signal is received from the electronic mobile device or the computer. 143. The application as claimed in claim 136, The electronic voucher message further includes the secret key ciphertext and the electronic voucher. 144. The application of claim 136, wherein the server has the functions of CA and RA. 145. The application, wherein the step of transmitting the identity verification request signal by the transmitting interface is to transmit a message to the identity verification request signal through the short message service system. 0 ^ 146. An application stored in a system that causes the system to execute a method for an electronic mobile device to apply for an electronic voucher and a secret key to a servo state. The method comprises the following steps: The computer-generating module generates an application signal for indicating that the electronic mobile device applies for the electronic voucher and requests the secret gold balance; the number of lines ^3 month &amp; one signing the early right group to use the secret gold The key is sent to the application message by sending the application signal to the feeding device. The application signal; the certificate request signal; the w-seam group relies on the application for the production-identity verification electronic mobile device, and the material f = the face-to-face verification request signal to the order that the electronic mobile electronic device is the application for the electronic certificate, Verifying the request signal; one receiving interface receives the identity from the server to cause the electronic action step: Fan (heart, straight transmission interface due to identity verification request message 65 200 826597 '/ί ΤΙ identity verification reply signal to inform the feeding device that the electronic action device is indeed the request for the electronic certificate; the receiving interface of the service t receives the identity verification reply signal; The module generates an electronic voucher message for the identity verification reply signal; the transmission interface of the f server is transmitted by the identity verification reply signal; and the receiving interface of the electronic mobile device receives the electronic voucher message. To P二ί Ϊ子行動裂置之一擷取模組自該電子憑證訊息中操 取遠電子憑證及該秘密金鑰。 147.如請求項146所述之應用程式,該方法更包含下列步驟: 擷取裝置之該擷取模組自該身分驗一 之置之—產生模喊生包含雜證請求碼 該電i該電子行鱗置之轉送介面傳賴驗證請求訊息至 證請ϊΐί腦之—接收介面接絲自該電子行紐置之該驗 长碼令該電腦之—擷取模組自該驗證請求訊息擷取該驗證請 if簽賴組_該秘密金_該驗證請求碼 進订,位,早以得一驗證回應碼; 回應2電腦之該產生模組產生包含該驗證回應碼之一驗證 動裝i該電腦之該傳送介面傳送該驗證回應訊息至該電子行 令該電子行動裝置之該接收介面自該電腦接收該驗證回 66 200826597 應訊息; 令該電子行動裝置之該產生模組產生包含該驗證回應碼 之該身分驗證回覆訊號;以及 令該伺服器之一驗證模組利用一公開金鑰驗證該驗證回 應碼; 其中該公開金鑰與該秘密金鑰相互對應。 148·如請求項146所述之應用程式,該方法更包含下列步驟:One of the P2 Ϊ 行动 action split modules fetches the far e-voucher and the secret key from the e-voucher message. 147. The application of claim 146, the method further comprising the steps of: the capture module of the capture device is self-identified from the identity-generating mode call containing the certificate request code The e-line scale transfer interface passes the verification request message to the certificate, please 脑 脑 脑 — 接收 接收 — 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 接收 — 接收 — — — 接收 — 接收 接收 该 该 该 该The verification please if the signing group _ the secret gold _ the verification request code is ordered, the bit is obtained by a verification response code; the response module 2 generates the module containing the verification response code to verify the mobile device i The transmitting interface of the computer transmits the verification response message to the electronic device to cause the receiving interface of the electronic mobile device to receive the verification message from the computer; and the generating module of the electronic mobile device generates the verification response The identity verification reply signal of the code; and causing the verification module of the server to verify the verification response code by using a public key; wherein the public key and the secret key correspond to each other. 148. The application of claim 146, further comprising the steps of: 令該電子行動裝置之該擷取模組自該身分驗證請求訊號 擷取一驗證請求碼;以及 ^該電子行動裝置之該產生模組產生該身分驗證回覆訊 ^,其中該身分驗證回覆訊號包含該驗證請求碼。 如^求項146所述之應用程式,該方法更包含下列步驟: ίϊ電^該產生模組產生—密鑰加密金输; 全電腦之—加密模組利用該密输加密金鑰加密該秘密 孟鑰μ得一秘密金鑰密文; 動裝置轉送介面傳送該密錄力禮金錄至該電子行 秘ί金鑰;%子行動裝置利用該密鑰加密金鑰處理以得該 密金輪Γ電子行動裝置之該接收介面自該電腦接收該密输加 該秘Sii于動3之該擷取模組自該電子憑證訊息撷取 密該用該密鑰加密金输解 金鑰密ί及子行動裝置之-號碼、該秘密 山金鑰相對應之-公開金鑰。 •如請求項146所述之靡 之應用耘式,該方法更包含下列少雜·· 67 200826597 令該電腦之該產生模組產生該公開金输及該秘密金錄^;以 及 , 令該伺服器之該產生模組產生該電子憑證; 其中,該電子憑證訊息包含該電子憑證及該秘密金輪密 151·如請求項150所述之應用程式,其中該伺服器具有CA RA之功能。 ΟAnd the generating module of the electronic mobile device generates the identity verification reply message, wherein the identity verification reply signal includes The verification request code. The method further includes the following steps: ??? The key of the key is a secret key ciphertext; the mobile device transfer interface transmits the cryptographic record to the electronic key; the % sub-action device uses the key to encrypt the key to obtain the rim rim electronic The receiving interface of the mobile device receives the secret input from the computer and the capture module of the secret Sii is activated from the electronic voucher message. The key is used to encrypt the key and the sub-action The device-number, the secret mountain key, corresponds to the public key. • The application method described in claim 146, the method further includes the following miscellaneous. 67 200826597 causes the production module of the computer to generate the public gold deposit and the secret gold record; and, the servo The generating module generates the electronic credential; wherein the electronic credential message includes the electronic credential and the secret golden key 151. The application program as claimed in claim 150, wherein the server has the function of CA RA. Ο 152·如請求項146所述之應用程式,其中該申請訊息更包含 電子憑證。 / 153·如請求項146所述之應用程式,其中該身分驗證請求訊號 為一簡訊,該身分驗證請求訊號係透過簡訊服務系統傳送及^ 收0 154. 一種内儲於一系統之應用程式,使該系統執行一種申請一 電子憑證及傳遞一秘密金鑰之方法,該方法包含下列步驟°: —令-之-產生模組產生—申請訊號,肋表示一電子 行動裝置申請該電子憑證及索取該秘密金鑰; 之—簽早模組利用該秘密金鑰對該巾請訊號進 订數位簽鞏; 錄 之1Ϊ收介面接收來自該電腦之該中請訊號; 證請之—產生模組因應該申請訊號產生—身分驗 t+彳=32送介面傳送該身分驗證請求訊號至該 爾置為申請該電子憑證者; /兒 衣置之接收介面自該伺服器接收該身分 68 200826597 驗證請求訊號; 號至ίϊίΓ行鱗置之—傳送介面傳送該身分驗證請求訊 證請腦之—接收介面自職子行姆置接收該身分驗 令該電腦之該產生模組產生一身分驗證回覆訊號; 身分ϊΐίΐΐί傳送介關應該身分驗輯求訊號,傳送該 驗復成波,以通知該飼服器該電子行動裝置確為申請 f、152. The application of claim 146, wherein the application message further comprises an electronic voucher. 153. The application of claim 146, wherein the identity verification request signal is a short message, and the identity verification request signal is transmitted and received through the short message service system. 154. An application stored in a system, Having the system perform a method of applying for an electronic voucher and transmitting a secret key, the method comprising the steps of: - enabling - generating a module - applying a signal, the rib representing an electronic mobile device applying for the electronic voucher and requesting The secret key; the early signing module uses the secret key to subscribe to the towel request signal; the recorded interface receives the request signal from the computer; the certificate-generating module Should apply for signal generation - identity check t + 彳 = 32 send interface to send the identity verification request signal to the person who applied for the electronic certificate; / the child's receiving interface receives the identity from the server 68 200826597 verification request signal; No. to ϊ Γ Γ — — — 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送 传送The generating module generates a brain of identity verification reply signal; identity ϊΐίΐΐί transmission medium should be closed test series identity request signal, transmitting the test wave to complex, to inform the server unit feeding the electronic mobile device application indeed F, 令該伺服器之該接收介面接收該身分驗證回覆訊號; 令該伺服器之該產生模組因應該身分驗證回覆訊號產生 一電子憑證訊息; 令该伺服器之該傳送介面因應該身分驗證回覆訊號傳送 該電子憑證訊息; 令該電子行動裝置之該接收介面接收該電子憑證訊息;以 及 令該電子行動裝置之一擷取模組自該電子憑證訊息中擷 取該電子憑證及該秘密金鍮。 155·如請求項154所述之應用程式,該方法更包含下列步驟: 令該電腦之一擷取模組自該身分驗證請求訊號擷取一驗 證請求碼;以及 令該電腦之該產生模組產生該身分驗證回覆訊號,該身分 驗證回覆訊號包含該驗證回應碼。 156·如請求項154所述之應用程式,該方法更包含下列步驟·· 令該電腦之一擷取模組自該身分驗證請求訊號擷取一驗 言登請求碼; 令該電腦之該簽章模組利用該秘密金鑰對該驗證請求碼 進行數位簽章以得一驗證回應碼; 69 200826597 令ί電ϊΐϊ產生模組產生該身分驗證回覆訊號,該身分 驗證回覆訊唬^含該驗證回應碼;以及 々該4司艮之驗5登模挺利用一公開金鑰驗證該驗證回 應碼; 其中該公開金輸與該秘密金输相互對應。 157·如請求項154所述之應用程式,該方法更包含下列步驟: 令該電月亥產生模組產生-密鑰加密金錄; 々該電細之加後模組利用該密餘加密金錄加密該秘密 金鑰以得一秘密金輪密文; 令該電腦)之該傳送介面傳送該密錄加密金錄至該電子行 動裝置,以使輯子行動裝置彻該錄加密錢處理以得該 秘密金鑰, 令該電子行動裝置之該接收介面自該電腦接收該密餘加 密金鑰; 令該電子行動裝置之該擷取模組自該電子憑證訊息擷取 該秘密金鑰密文;以及 令該電子行動裝置之一解密模組利用該密鑰加密金鑰解 密該秘密金鑰密文以得該秘密金输; 其中,該申請訊號包含該電子行動裝置之一號碼、該秘密 金鑰密文及與該秘密金输相對應之一公開金鑰。 158·如請求項157所述之應用程式,該方法更包含下列步驟: 令該電腦之該產生模組產生該公開金鑰及該秘密金鑰;以 及 令該祠服器之該產生模轉暴生該電子憑證; 其中,忒電子憑證訊息包含該電子憑證及該秘密金錄密 文0 159.如請求項I%所述之應用程式’其中該伺服器具有。八及 200826597 RA之功能。 160·如請求項154所述之應用程式,其中該身分驗證請求訊號 一簡訊,該身分驗證請求訊號係透過簡訊服務系統傳送及^ 收。 呀 161· 一種電腦可讀取記錄媒體,用以儲存一應用程式,該應用 程式執行令一電子行動裝置申請一電子憑證及索取一秘密 鑰之方法,該方法包含下列步驟: * ” Γ 令該電子行動裝置之一接收介面自一伺服器接收一身分 驗證請求訊號,其中該身分驗證請求訊號係因應一電腦為誃二 子4亍動裝置申睛該電子憑證而產生; 私 令,電子行動裝置之一傳送介面因應該身分驗證請求 唬,傳送一身分驗證相關訊號,以通知該伺服器該電子行 置確為申請該電子憑證者; 衣 令該接收介面接收一電子憑證訊息;以及 中擷 令該電子行練置之模組自該電子憑證訊息 取该電子憑證及该秘密金鎗。 162.如請求項161所述之可讀取記錄媒體,該方法更包含下列 步驟. 令該操取模組自該身分驗證請求訊號搁取一驗證請求碼; 裝置之-產生模組產生包含該驗證請求碼 之一驗證請求訊息; 令S亥傳送介面傳送該驗證請求訊息至該電腦; 令,接收介面自該電腦接收包含一驗證回應碼之一驗證 回應碼係該電腦_該秘密錢對該驗證請 求碼進行數位簽章而得; t該擷,組自該驗證回應訊息擷取該驗證回應碼 ;以及 W 她纽包含該驗如應碼之歸分驗證相關 200826597 訊號。 163·如請求項161所述之可讀取記錄媒體,該方法更包含下列 步驟: 令該擷取模組自該身分驗證請求訊號擷取一驗證請求 碼;以及 令該電子行動裝置之一產生模組產生包含該驗證請求碼 之該身分驗證相關訊號。 164·、、,如請求項162或163所述之可讀取記錄媒體,其中令該傳 达f面傳送該身分驗證相關訊號之步驟係傳送該身分驗證相 關汛號至該伺服器,且該電子憑證訊息接收自該伺服器。 16\、如&gt;請求項163所述之可讀取記錄媒體,其中令該傳送介面 t该身分驗證相關訊號之步驟係傳送該身分驗證相關訊號 二電月Γ使,電腦因應該身分驗證相關訊號傳送一身分驗證 回覆訊號至該伺服器。 U 媒體,其愼子憑證訊 一密鑰加密綠__=彳7,綱金鑰密文係以 167步驟如請求項166所述之可讀取記錄媒體,該方法更包含下列 令該擷取模組自該電子憑證^=麵密文;以 腦接收該密鑰加密金鍮; 及 令該電子行動裂置之^ 密該秘密金鑰密文以得該秘莫組利用該密鑰加密金鑰解 168·如請求項161所述之 u貝取5己錄媒體,其中令該接收介面 72 200826597 接收之該身分驗證請求訊號係為透過簡訊服務系統所發之一 簡訊。 • 一種電腦可讀取記錄媒體,用以儲存一應用程式,該應用 程式執行申請一電子憑證及傳遞一秘密金鑰予一電子行動裝 置之方法,該方法包含下列步驟: 令一電腦之一產生模組產生一申請訊號,用以表示該電子 行動裝置申請該電子憑證及索取該秘密金鑰; 令該電腦之一傳送介面傳送該申請訊號至一伺服器,以通The receiving interface of the server receives the identity verification reply signal; the generation module of the server generates an electronic voucher message for the identity verification reply signal; and causes the transmission interface of the server to respond to the identity verification reply signal Transmitting the electronic voucher message; causing the receiving interface of the electronic mobile device to receive the electronic voucher message; and causing the electronic capture device to retrieve the electronic voucher and the secret voucher from the electronic voucher message. 155. The application of claim 154, the method further comprising the steps of: causing a capture module of the computer to retrieve a verification request code from the identity verification request signal; and causing the computer to generate the module The identity verification reply signal is generated, and the identity verification reply signal includes the verification response code. 156. The application of claim 154, the method further comprising the steps of: causing one of the computer capture modules to retrieve an authentication request code from the identity verification request signal; The module uses the secret key to digitally sign the verification request code to obtain a verification response code; 69 200826597 The power generation module generates the identity verification reply signal, and the identity verification reply message includes the verification The response code; and the verification of the 4th squad 5, the verification response code is verified by a public key; wherein the public gold input corresponds to the secret gold exchange. 157. The application of claim 154, the method further comprising the steps of: causing the e-month generating module to generate a key-encrypted record; wherein the module is configured to utilize the secret encryption Recording the secret key to obtain a secret golden ciphertext; causing the computer interface to transmit the ciphertext encryption record to the electronic mobile device, so that the series mobile device can perform the cryptographic processing for the recording a secret key for causing the receiving interface of the electronic mobile device to receive the secret encryption key from the computer; causing the retrieval module of the electronic mobile device to retrieve the secret key ciphertext from the electronic voucher message; Decrypting the decryption module of the electronic mobile device by using the key encryption key to decrypt the secret key ciphertext to obtain the secret gold input; wherein the application signal includes a number of the electronic mobile device, the secret key key And the public key corresponding to the secret gold loss. 158. The application of claim 157, the method further comprising the steps of: causing the generating module of the computer to generate the public key and the secret key; and causing the server to generate the model The electronic voucher is generated; wherein the electronic voucher message includes the electronic voucher and the secret v. ciphertext 0 159. The application program as claimed in claim I% wherein the server has. Eight and 200826597 RA functions. 160. The application of claim 154, wherein the identity verification request signal is a short message, and the identity verification request signal is transmitted and received through the short message service system. 161. A computer readable recording medium for storing an application for executing an electronic mobile device requesting an electronic voucher and requesting a secret key, the method comprising the following steps: * 令The receiving interface of the electronic mobile device receives a identity verification request signal from a server, wherein the identity verification request signal is generated by a computer for the electronic device to serve the electronic certificate; private order, electronic mobile device a delivery interface transmits an identity verification related signal to notify the server that the electronic device is indeed the applicant for the electronic certificate; the device causes the receiving interface to receive an electronic voucher message; The electronic processing module takes the electronic voucher and the secret golden gun from the electronic voucher message. 162. The readable recording medium as claimed in claim 161, the method further comprising the following steps. Receiving a verification request code from the identity verification request signal; the device-generating module generates the verification request code Verifying the request message; causing the S-hai transmission interface to transmit the verification request message to the computer; and causing the receiving interface to receive from the computer a verification response code including one of the verification response codes of the computer_the secret money digitizing the verification request code If the signature is obtained; t, the group retrieves the verification response code from the verification response message; and the W-News includes the verification of the corresponding verification of the 200826597 signal. 163. Reading the recording medium, the method further comprises the steps of: causing the capture module to retrieve a verification request code from the identity verification request signal; and causing the electronic mobile device to generate a module to generate the verification request code 164. The readable record medium of claim 162 or 163, wherein the step of transmitting the identity verification related signal is to transmit the identity verification related nickname to the a server, and the electronic credential message is received from the server. 16\, as described in claim 163, the recordable medium is recorded, wherein the transport interface t is The step of verifying the relevant signal is to transmit the identity verification related signal, and the computer transmits an identity verification reply signal to the server according to the identity verification related signal. U media, its dice certificate, a key encryption green __=彳7, the key ciphertext is 167 steps as described in claim 166, the method further includes the following command: the capture module from the electronic voucher ^=face ciphertext; The brain receives the key encryption key; and causes the electronic action to sever the secret key ciphertext so that the secret group uses the key to encrypt the key 168; as described in claim 161 5 The recorded media, wherein the identity verification request signal received by the receiving interface 72 200826597 is a short message sent through the short message service system. • A computer readable recording medium for storing an application, the application executing a method of requesting an electronic voucher and transmitting a secret key to an electronic mobile device, the method comprising the steps of: causing one of the computers to generate The module generates an application signal for indicating that the electronic mobile device applies for the electronic voucher and obtains the secret key; and causes one of the computer transmission interfaces to transmit the application signal to a server for communication 知該伺服為该電子行動裝置申請該電子憑證及索取該秘密金 錄; 令該產生模組產生一密鑰加密金鑰;以及 令該傳送介面傳送該密錄加密金錄至該電子行動裝置,以 使該電子行動裝置利用該密鑰加密金鑰處理以得該秘密金鑰。 170·如請求項169所述之電腦可讀取記錄媒體,該方法更包含 下列步驟: 令該電腦之-加密模組利用該密錄加密金錄加密該秘密 金錄以得一秘密金錄密文;u1 ^中,該申請訊號包含該電子行動裝置之—號碼、該秘密 至鑰费文及與該秘密金鑰相對應之一公開金鑰。 171㈣如項170所述之電腦可讀取記錄媒體,其中該申請訊 號更包含该電子憑證。 172丁=青求項170所述之電腦可讀取記錄媒體,該方法更包含 下列步驟: 令該產生模組產生該公開金鑰及該秘密金鑰;以及 行數腦之&quot;^章模_用該秘密金餘對該申請訊號進 73 200826597 項172所述之電腦可讀取記錄媒體,該方法更包含 證請ϋί腦之—接收細魏來自該電子行練置之一驗 求碼Τ該電腦之—触模組自該驗證請求訊息触—驗證請 簽章===晴麵雜驗剛碼進行數位 息;=產生模組產生包含該驗證回應碼之 一驗證回應訊 令該傳送介面傳送該驗證1^應訊息至該電子行動裝置。 174下^項172所述之電腦可讀取記錄媒體,該方法更包含 分驗接收介面接收來自該電子行動裝置之-身 證請ϋ電腦之—擷取模組自該身分驗證相關峨擷取一驗 章以該秘密金鑰對該驗證請求碼進行數位簽 訊號1生核組產生包含該驗證回應碼之一身分驗證回覆 知該;至該伺服器’以通 丁助衣置確為申請該電子憑證者。 75下^項172所述之電腦可讀取記錄媒體,該方法更包含 分驗接收介面接收來自該電子行動裝置之一身 令該電腦之一擁取模組自該身分驗證相關訊號擷取-驗 200826597 證請求碼; 訊號生模組產生包含該驗證請求瑪之-身分驗證回覆 通知該槪_二動器’用以 176· —種電腦可讀取記錄媒體,用 程式執行傳遞-電子憑證應f以,該應用 方法,該方法包含下列步心金餘至一電子行動裝置之 Γ ί, 令二伺服ϋ之-接收介面接收來自—電腦之 號用以表示該電子行動裝置申請該電子憑證;索 證請=服裔之一產生模組因應該申請訊號產生一身分驗 電子介面傳_身分驗證請求訊號至該 電子行動裝置為申請該電子憑證者; 替;:ΐΐΐί收—身分驗證回覆號,該身分驗證回覆 ϋίϋίίΐΐ裝置確料請該電子憑證者; 電子訊息;、以ί與該電子憑證及該秘密金錄相關之一 訊息ΐ該傳送介面因應該身分鍊證回覆訊號傳送該電子憑證 憑證動裂置可經由該電子憑證訊息取得該電子 177心如=\項176所述之細可讀取記錄媒體,其中該申請訊 開金餘及—秘密金輸密文,該秘密金鑰密文係以一 ^相U鑰加密該秘密金錄而得,以及該公開金餘與該秘密 75 200826597 177所述之電腦可讀取記錄媒體,其中該申請訊 號更包含該電子憑證。 τ 之 步驟 179八^請求177所述之電腦可讀取記錄媒體,該方法更包含 1 “伺服|§之一驗證模組利用該公開金鑰驗證該申請訊號 ,之電腦可讀取記錄媒體,其中該身分驗 包含-驗證請求碼,該身分驗證回覆訊號 證請求碼。。 Γ 181.如請求項177所述之電腦相取記錄媒體,該方法更包含 下列步驟: 令該伺服器之-驗證模__公開金賴證包含於該 身分驗證回覆訊號之一驗證回應碼; 其中,該身分驗證請求訊號包含一驗證請求碼,該 應碼係以該秘密金鑰對該驗證請求碼進行數位簽章而得。ϋ 182·如請求項I76所述之電腦可讀取記錄媒體,其中該身八 證回覆訊號接收自該電子行動裝置或該電腦。 刀、 183·如請求項Π6所述之電腦可讀取記錄媒體,豆中哕 證訊息更包含該秘密金鑰密文及該電子憑證。’、μ电卞芯 184·如請求項176所述之電腦可讀取記錄媒體, 抑 具有CA及RA之功能。 八下以刎服裔 185·如請求項Π6所述之電腦可讀取記錄媒體,其中令 介面傳送該身分驗忌凊求矾號之步驟係透過簡訊 ^ 送一簡訊,該簡訊為該身分驗證請求訊號。 力’、、、先傳 186·-種電腦可讀取記錄媒體,用以儲存_應用程式,該應用 76 200826597 釭式執行令一電腦為一電子行動裝置向一伺服器申請一電子 憑證及索取-秘密金叙方法,該方法包含下列步驟: 令忒電細之一產生模組產生一申請訊號,用以表示該電子 行動裝置”該電子憑觀錄娜密金錄; ^令ΐί腦之—簽章模組利用該秘密金鑰對該申請訊號進 行數位簽章; 令該電腦之-傳送介面傳送該申請訊號至該伺服器,以通 ^該飼服器該電子行練置申請該電子憑證及索取該秘密金 t該伺服器之-接收介面接收來自該電腦之該中請訊號; μ ί该ΐ服&amp;之—產生模組因應該中請訊號產生一身分驗 雷早ίίϊί11之Γ傳送介_送該身分驗證請求訊號至該 置,以求證該電子行動裝置為申請該電子憑證者; 裝置之一傳送介面因應該身分驗證請求訊 ΐ雜回覆訊號,以通知_服器該電子行動裝 置確為凊求该電子憑證者; 器。之該接收介面接收該身分驗證回覆訊號; 一電ΐϊΞΐ找赵馳目應财分麟喊訊號產生 -電找傳送細應該身分驗_訊號傳送 及^亥電子订動農置之該接收介面接收該電子憑證訊息;以 取該娜模組自該電子憑證訊綱 187.如請求項186所述之電腦可讀取記錄媒體,該方法更包含 77 200826597 下列步驟: 擷取二ϋίίί襄置之該搁取模組自該身分驗證請求訊號 之一 置之—產生额產生包含概證請求碼 該電腦;电子行動衣置之$傳送介面傳送該驗證請求訊息至 證請之—接收介面接收來自該電子行動裝置之該驗 求碼;電知之梅取模組自該驗證請求訊息擷取該驗證請 進行卿錄騎證請求碼 回應腦之該產生模織生包含該驗證回應碼之一驗證 動裂if電^之_送介面傳送該驗證喊訊息至該電子行 應訊^ f電子仃練置之該減介面自該電腦接收該驗證回 之該;生模組產生包含該驗證回應碼 應石馬^摘服器之—驗證模組_—公開金鑰驗證該驗證回 ,、中》亥A開金鍮與該秘密金餘相互對應。 MS下項Μ6所述之電腦可讀取記錄媒體,該方法更包含 拍貝取ίii 該擷取模組自該身分驗證請求訊號 7。亥%子行動裝置之該產生模組產生該身分驗證回覆訊 78 200826597 號,其中該身分驗證回覆訊號包含該驗證請求碼。 189下歹項186所述彻可讀取記錄媒體,讎更包含 令該電腦之職生歡產生1鑰 令該電腦之一加密模組利用該宓在至鑰, 金鑰以得-秘密金鑰密文; 密金鑰加密該秘猪 令該電腦之該傳送介面傳送該宓 6 動裝置,以使該電子行動裝置利用加进金鑰至該電子灯 秘密金鑰; w 4鑰加密金鑰處理以得該 Γ 密金if電子订動衣置之°亥接收介面自該電腦接收該密錄加 該秘㈣證訊息娜 密該繼加密金鑰解 其中,該申請訊號包含該電子行動努 一 金鑰密文及與該秘密金鑰相對應之一公^金鑰了5〜馬、“秘捃 190•如^求項186所述之電腦可讀取記錄媒體,該方法更包含 卜夕U梦驟· 令該電腦之該產生模組產生該公開麵及該秘密金錄;以 及 令該伺服器之該產生模組產生該電子憑證; 其中,该電子憑證訊息包含該電子憑證及該秘密金輸密 文。 間山 191·如請求項190所述之電腦寸讀取記錄媒體,其中該伺服哭 具有CA及RA之功能。 192*如請求項186所述之電腦可讀取記錄媒體,其中該申請訊 79 200826597 息更包含該電子憑證 193·如請求項186所述之電腦可讀取記錄媒體,其中該身分驗 證請求訊號為一簡訊,該身分驗證請求訊號係透過簡訊服務系 統傳送及接收。 194·-種電腦可讀取記錄媒體,用以儲存—應用程式,該應用 程式執行-種巾請-f子憑證及傳遞—秘密金狀方法,該方 法包含下列步驟: 令一電腦之一產生模組產生一申請訊號,用以表示一電子 〇 行動裝置申請該電子憑證及索取該秘密金鑰; ιίϊί腦之—料触湘該秘密金鑰對射請訊號進 饤數位簽章, 土 該電腦之一傳送介面傳送該申請訊號至一伺服器,以通 :該鏡器該電子行動裝置申請該電子憑證及索:該秘&amp; ίΞί 介面接收來自該電腦之該申請称 證請求訊號; 生模組因應該巾請訊號產生一身分驗 面傳送該身分驗證請求訊 號至該 驗證:認行動以; 分 號至該 令該電腦之 證請求訊號; 之一傳送介面傳送該身麵證請求訊 ‘接收介面自該電子行_置接收該身分驗 身ί驗證回覆訊號; 身分驗證_•以二該確: 200826597 該電子憑證者; ==服器之該接收介面接收該身分驗證回覆訊號; -電财生齡因軸衫麟喊訊號產生 該電找傳送介㈣應科麵證时訊號傳送 及 令該電子行練置之該歡細細辦子憑證訊息 ;以 ” ΐίί:,置之一擷取模組自該電子憑證訊息中擷 (、 取该電子憑證及該秘密金鑰。 19Ί5項194所述之電腦可讀取記錄媒體,該方法更包含 證請ΐ;;=Γ擷取難自該身分驗證請纽賴取一驗 驗;ί 產生杈組產生該身分驗證回覆訊號,該身分 驗證回覆讯號包含該驗證回應碼。 196τ^ΐί項194所述之電射讀取記錄媒體,該方法更包含 ( 卜列步驟· 證請之—齡敝自該身分驗證請求減擷取一驗 進彳雜、密錢觸麟請求碼 驗證ί 軸綱,該身分 應碼ΐ該舰11之—驗證模組_ 一公開麵驗證該驗證回 其中該公開金鑰與該秘密金鑰相互對應。 81 200826597 197下^^項194所述之電腦可讀取記錄媒體,該方法更包含 ί=&lt;之該產生模組產生-密鑰加密金鑰; 金錄組利賴錄加密錄加密該秘密 動狀ί 專送介面傳送該密鍮加密金鑰至該電子行 秘ΐ金鑰;行動裝置利用該密鑰加密金鑰處理以得該Knowing that the servo applies for the electronic voucher for the electronic mobile device and requests the secret vault; causing the generating module to generate a key encryption key; and causing the transmitting interface to transmit the encrypted voucher to the electronic mobile device, The electronic mobile device is processed by the key encryption key to obtain the secret key. 170. The computer-readable recording medium of claim 169, the method further comprising the steps of: causing the computer-encryption module to encrypt the secret record by using the secret record encryption record to obtain a secret gold record ciphertext; In u1 ^, the application signal includes the number of the electronic mobile device, the secret to key fee, and a public key corresponding to the secret key. 171. The computer-readable recording medium of item 170, wherein the application signal further comprises the electronic voucher. The computer readable recording medium described in 172, the method of claim 170, further comprising the steps of: causing the generating module to generate the public key and the secret key; and the number of lines of the brain&quot; _ Use the secret gold to the application signal into the computer-readable recording medium described in Item 72, 200826597, 172, the method further includes the certificate ϋ 脑 brain-receiving fine Wei from the electronic line practice one of the verification code Τ The computer-touch module is triggered by the verification request message--verification signature===clear-faced code-for-digit number; the generation module generates one of the verification response codes to verify the response message. The verification message is transmitted to the electronic mobile device. The computer-readable recording medium described in 174, wherein the method further comprises receiving a receiving interface from the electronic mobile device, and the capturing module is obtained from the identity verification. A verification certificate uses the secret key to perform a digital signature on the verification request code. The birth verification group generates an identity verification response including the verification response code; and the server is determined to apply for the application. Electronic voucher. The computer readable recording medium described in Item 172, wherein the method further comprises receiving a receiving interface from the one of the electronic mobile devices, and the one of the computer acquiring the module is authenticated from the identity verification signal. 200826597 certificate request code; the signal generation module generates the verification request request - the identity verification reply notification that the 槪 _ second actuator 'for 176 · a computer readable recording medium, the program execution delivery - electronic certificate should be f In the application method, the method includes the following steps to an electronic mobile device, and the second servo receiving-receiving interface receives the number from the computer to indicate that the electronic mobile device applies for the electronic voucher; Cards = one of the service-generating modules generates a module for the application of the signal to generate an electronic interface _ identity verification request signal to the electronic mobile device for the application of the electronic certificate; for; ΐΐΐ 收 收 - identity verification reply number, the Authenticated reply ϋ ϋ ϋ ΐΐ ΐΐ 确 确 确 确 ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; The transmission interface transmits the electronic voucher voucher according to the identity chain reply signal, and the electronic 177 message can be obtained through the electronic voucher message, wherein the application is open. Jin Yu and secret gold ciphertext, the secret key ciphertext is obtained by encrypting the secret gold record with a ^ phase U key, and the computer readable record described in the disclosure of the secret 75 200826597 177 The media, wherein the application signal further includes the electronic voucher. The computer-readable recording medium described in step 179, the method of 177, further comprises: 1 "servo| § one of the verification modules uses the public key to verify the application signal, and the computer can read the recording medium, Wherein the identity verification includes a verification request code, and the identity verification reply signal request code. Γ 181. The computer phase capture recording medium as claimed in claim 177, the method further comprising the steps of: enabling the server to verify The __ public vouchers are included in the verification verification response code of the identity verification reply signal; wherein the identity verification request signal includes a verification request code, and the code is digitally signed by the secret key 182. The computer-readable recording medium of claim I76, wherein the body card reply signal is received from the electronic mobile device or the computer. Knife, 183. Computer as claimed in claim 6 The recording medium can be read, and the smuggling message further includes the secret key ciphertext and the electronic vouchers. ', μ 卞 core 184 · The computer readable recording medium as claimed in claim 176, It has the functions of CA and RA. The computer can read the recording medium as described in the request item ,6, and the step of transmitting the identity testimony request nickname is to send a short message through the newsletter ^ The newsletter is the identity verification request signal. The force ',, first pass 186 · a computer readable recording medium for storing _ application, the application 76 200826597 釭 execution of a computer as an electronic mobile device Applying an electronic voucher to a server and requesting a secret-small method, the method comprising the steps of: causing a module to generate an application signal to indicate the electronic mobile device "the electronic device The cryptographic module uses the secret key to digitally sign the application signal; the computer-transmission interface transmits the application signal to the server to pass the service The electronic line applies for the electronic voucher and requests the secret gold. The receiving interface of the server receives the request signal from the computer; μ ί ΐ & 产生 产生 产生 产生 产生 产生 产生 产生产生 产生 雷 ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί ί 身 ί ί ί Signal, to notify the server that the electronic mobile device is indeed begging for the electronic certificate; The receiving interface receives the identity verification reply signal; an electric ΐϊΞΐ 赵 赵 驰 驰 应 应 应 应 应 麟 麟 麟 产生 产生 产生 产生 产生 产生 产生 产生 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The computer can read the recording medium as described in claim 186. The method further includes 77 200826597. The following steps: Select the two-part ί ί ί ί ί ί ί ί ί ί ί ί The group is provided by one of the identity verification request signals - the generated amount generates the computer containing the certificate request code; the electronic mobile device transmits the verification request message to the certificate - the receiving interface receives the electronic mobile device The verification code; the electronically-received module takes the verification from the verification request message, and asks for the registration of the request code. The response code of the brain is generated by the model. The verification response code includes one of the verification response codes. The sending interface transmits the verification call message to the electronic line, and the subtraction interface receives the verification back from the computer; the raw module generates the verification The response code should be Shima ^ 服 器 — - verification module _ - public key verification of the verification back, in the "Hai A Kai Jin" and the secret gold surplus correspond to each other. The computer can read the recording medium according to item 6 of the MS, and the method further comprises: taking the capture module from the identity verification request signal 7. The generating module of the Haiyi sub-action device generates the identity verification reply 78 200826597, wherein the identity verification reply signal includes the verification request code. The 189 can read the recording medium as described in Item 186, and further includes causing the computer to generate a key for the user to use the cryptographic module of the computer to use the key to the key, the key to obtain the secret key Ciphertext; the secret key encrypts the secret pig to transmit the mobile device to the electronic mobile device, so that the electronic mobile device uses the added key to the electronic light secret key; w 4 key encryption key processing The 亥 密 密 if if if if if if if if if if if if if if if if if if if if if if if if if if if if if 自 自 自 自 自 自 自 自 自 自 自 自 自 自 自 自 自 自 自 自 自 自The key ciphertext and one of the public key corresponding to the secret key are 5~Ma, "The secret 190•, as described in item 186, the computer readable recording medium, the method further includes the Bu Xi U Meng The production module of the computer generates the public side and the secret record; and the production module of the server generates the electronic certificate; wherein the electronic voucher message includes the electronic voucher and the secret gold input Ciphertext. Between the mountains 191. The computer inch reads the recording medium, wherein the server crying has the functions of CA and RA. 192* The computer readable recording medium as claimed in claim 186, wherein the application message 79 200826597 further includes the electronic certificate 193. The computer-readable recording medium of item 186, wherein the identity verification request signal is a short message, and the identity verification request signal is transmitted and received through the short message service system. 194--a computer-readable recording medium for storing - the application, the application executes - the towel-f sub-voucher and the delivery-secret gold method, the method comprises the steps of: causing one of the computers to generate a module to generate an application signal for indicating an electronic action The device applies for the electronic voucher and requests the secret key; ιίϊί brain-material touches the secret key, and the signal is sent to the digital signature, and one of the computer transmits the application signal to a server to Passing: the electronic device of the mirror applies for the electronic voucher and the cable: the secret &amp; ίΞί interface receives the request for certification request signal from the computer The health module sends a verification request signal to the verification for the verification of the identity signal: the action is taken; the semi-signal to the certificate request signal of the computer; one of the transmission interfaces transmits the identity card request message 'Receiving interface from the electronic line _ receiving the identity verification ί verification reply signal; identity verification _• two to be true: 200826597 the electronic voucher; == the receiving interface of the server receives the identity verification reply signal; The e-commerce age is generated by the Axis Lin screaming signal. (4) The signal transmission during the application of the face-to-face certificate and the processing of the voucher message for the electronic line; " ΐ ί ί : The module is taken from the electronic voucher message (and the electronic voucher and the secret key are taken). 19Ί5, 194, the computer readable recording medium, the method further includes a certificate;; = it is difficult to obtain a verification from the identity verification; 杈 the generation group generates the identity verification reply signal, The identity verification reply signal includes the verification response code. 196 τ ΐ 项 194 194 194 194 194 194 194 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 196 Verifying the axis, the identity should be coded on the ship 11 - the verification module _ a public face verifies that the verification back to the public key and the secret key correspond to each other. 81 200826597 197 under ^^ Item 194 The computer can read the recording medium, and the method further comprises: ί=&lt;the generation module generates a key encryption key; the gold record group Lilai recorded encrypted record encrypts the secret motion ί the special interface transmits the secret encryption Key to the electronic bank secret key; the mobile device uses the key to encrypt the key processing to obtain the key 密金电子订動裝置之該接收介面自該電腦接收該密鑰加 動裝置之該擷取模組㈣電子憑證訊息操取 该秘始、金餘密文;以及 ”裝置之一解密模組利用該密鑰加密金鑰解 检该秘松金鑰雄、文以得該秘密金鑰; 人於it ηδίι戒包含該電子行動裝置之一號碼、該秘密 孟鑰岔文及與該秘密金鑰相對應之一公開金鑰。 198·如請求項197所述之電腦可讀取記錄媒體, 下列步驟: 令該電腦之該產生模組產生該公開金鑰及該秘密金鑰;以 及 令該伺服器之該產生模組產生該電子憑證; 其中,4¾子憑s登訊息包含該電子憑證及該秘密金鑰密 文。 199·如請求項198所述之電腦可讀取記錄媒體,其中該伺服器 具有CA及RA之功能。 2〇〇=如請求項194所述之電腦可讀取記錄媒體,其中該身分驗 證請求訊號一簡訊,該身分驗證請求訊號係透過簡訊服務系統 82 200826597 傳送及接收。The receiving interface of the micro-gold electronic binding device receives the capturing module of the key adding device from the computer (4) the electronic voucher message to operate the secret source, the Jin Yu ciphertext; and the "decryption module utilization of one of the devices The key encryption key is used to detect the secret key of the secret key, and the person includes the number of the electronic mobile device, the secret key, and the secret key corresponding to it ηδίι 198. The computer readable recording medium as claimed in claim 197, the following steps: causing the generating module of the computer to generate the public key and the secret key; and causing the server to The generating module generates the electronic credential; wherein, the sub-message includes the electronic credential and the secret key ciphertext. The computer-readable recording medium as claimed in claim 198, wherein the server has The function of the CA and the RA. 2〇〇= The computer-readable recording medium as claimed in claim 194, wherein the identity verification request signal is a short message, and the identity verification request signal is transmitted through the short message service system 82 200826597 And receiving.
TW095146905A 2006-12-14 2006-12-14 System, apparatus, method, application program, and computer readable medium thereof for requesting a digital certificate and delivering a secret key for a mobile devices TWI340579B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW095146905A TWI340579B (en) 2006-12-14 2006-12-14 System, apparatus, method, application program, and computer readable medium thereof for requesting a digital certificate and delivering a secret key for a mobile devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW095146905A TWI340579B (en) 2006-12-14 2006-12-14 System, apparatus, method, application program, and computer readable medium thereof for requesting a digital certificate and delivering a secret key for a mobile devices

Publications (2)

Publication Number Publication Date
TW200826597A true TW200826597A (en) 2008-06-16
TWI340579B TWI340579B (en) 2011-04-11

Family

ID=44772468

Family Applications (1)

Application Number Title Priority Date Filing Date
TW095146905A TWI340579B (en) 2006-12-14 2006-12-14 System, apparatus, method, application program, and computer readable medium thereof for requesting a digital certificate and delivering a secret key for a mobile devices

Country Status (1)

Country Link
TW (1) TWI340579B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI455562B (en) * 2011-12-27 2014-10-01 Jrsys Internat Corp Dual-channel electronic signature system using image codes and related method and computer program product
TWI484428B (en) * 2013-07-18 2015-05-11

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI486808B (en) * 2013-06-26 2015-06-01 Taiwan Ca Inc System for validating electronic insurance policy with certificate and method thereof
US20160267479A1 (en) * 2013-10-30 2016-09-15 Pin-Ta Chung Operation and Management System for Transaction Certificates

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI455562B (en) * 2011-12-27 2014-10-01 Jrsys Internat Corp Dual-channel electronic signature system using image codes and related method and computer program product
TWI484428B (en) * 2013-07-18 2015-05-11

Also Published As

Publication number Publication date
TWI340579B (en) 2011-04-11

Similar Documents

Publication Publication Date Title
US20230133210A1 (en) Secure authentication system and method
AU2010315111B2 (en) Verification of portable consumer devices for 3-D secure services
US20090172402A1 (en) Multi-factor authentication and certification system for electronic transactions
CN101897165B (en) Method of authentication of users in data processing systems
CA2937850C (en) Verification of portable consumer devices
CN1956016B (en) Storage media issuing method
US20150012444A1 (en) Mobile peer-to-peer authenticated transfers
CN104200363B (en) A kind of method of payment of the electronic purse system based on encrypting fingerprint
CN202210326U (en) Personal payment terminal provided with keyboard
US20140100973A1 (en) Smartphone virtual payment card
JP2018522353A (en) Authentication system and method for server-based payment
CN105701661A (en) Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
CN103985036A (en) Two-dimension code payment method with biological characteristics
CN107077670A (en) Transaction message is sent
JP6743276B2 (en) System and method for end-to-end key management
AU2011316932A1 (en) Integration of verification tokens with portable computing devices
CN202854880U (en) SMS payment system based on fingerprint identification mobile phone
TW201135619A (en) Electronic transaction method and system utilizing QR code
EP2786362A2 (en) A method of generation and transmission of secure tokens based on tokens generated by trng and split into shares and the system thereof
US20130121490A1 (en) Method and apparatus for trust based data scanning, capture, and transfer
US20210209594A1 (en) System and methods for using limit-use encrypted code to transfer values securely among users
CN103353973A (en) Banking transaction authentication method based on video verification, and banking transaction authentication system based on video verification
WO2005117527A2 (en) An electronic device to secure authentication to the owner and methods of implementing a global system for highly secured authentication
WO2012072022A1 (en) Remote payment method
Tandon et al. QR Code based secure OTP distribution scheme for Authentication in Net-Banking