CN104852806B - A kind of implementation method signed according to Key Tpe - Google Patents

A kind of implementation method signed according to Key Tpe Download PDF

Info

Publication number
CN104852806B
CN104852806B CN201510247236.XA CN201510247236A CN104852806B CN 104852806 B CN104852806 B CN 104852806B CN 201510247236 A CN201510247236 A CN 201510247236A CN 104852806 B CN104852806 B CN 104852806B
Authority
CN
China
Prior art keywords
key
signature
intelligent cipher
current
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510247236.XA
Other languages
Chinese (zh)
Other versions
CN104852806A (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Feitian Technologies Co Ltd filed Critical Feitian Technologies Co Ltd
Priority to CN201510247236.XA priority Critical patent/CN104852806B/en
Publication of CN104852806A publication Critical patent/CN104852806A/en
Application granted granted Critical
Publication of CN104852806B publication Critical patent/CN104852806B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a kind of implementation method signed according to Key Tpe, including:When receiving generation key to instruction, Key Tpe is identified, key ID and purposes mark write-in key description information, it is corresponding to generate key pair;When receiving signature packet, current hash algorithm, current signature algorithm, current key ID and current applications mark are set;If carrying out common signature, Key Tpe mark corresponding to acquisition, if corresponding key is the key for allowing to carry out common signature, the key according to corresponding to being obtained current key ID and current applications mark is signed to the first data to be signed, return signature result;If carry out review signature, Key Tpe mark corresponding to then obtaining, if corresponding key is to allow to carry out the key for checking signature, then message is carried out the second data to be signed are calculated, the key according to corresponding to obtaining the current key ID and current applications of storage mark is signed to the second data to be signed, returns to signature result.

Description

A kind of implementation method signed according to Key Tpe
Technical field
The present invention relates to information security field, more particularly to a kind of implementation method signed according to Key Tpe.
Background technology
Digital signature technology can ensure that integrality in data transmission procedure, the identity to data sender are authenticated And prevent denial behavior.Intelligent cipher key equipment is a kind of equipment that can be digitally signed, and can store the private of user Key and digital certificate, the certification to user identity is realized using signature algorithm built-in in intelligent cipher key equipment.Prior art In, intelligent cipher key equipment distinguishes common signature by different hash algorithms mostly and review is signed, so as to reach anti-cheat label Purpose.But SM2 signature algorithms can only use with the collocation of SM3 hash algorithms at present, therefore the difference of hash algorithm can not be passed through To distinguish different types of signature, the purpose of anti-cheat label can not be realized.
The content of the invention
The invention aims to overcome the deficiencies in the prior art, there is provided a kind of reality signed according to Key Tpe Existing method, it is that each pair key in intelligent cipher key equipment sets Key Tpe, the purposes of key is limited according to Key Tpe, so as to Different types of signature is distinguished, realizes the purpose of anti-cheat label.
A kind of method signed according to Key Tpe provided by the invention, including:
Step S1:When intelligent cipher key equipment receives the data of host computer transmission, the intelligent cipher key equipment judges number According to type, if generation key then performs step S2 to instructing, if signature packet then performs step S3, if other are instructed Corresponding operating is then performed, implementing result, return to step S1 are returned to the host computer;
Step S2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction Mark write-in key description information, key pair is generated, and the key pair of generation and key description information is write into key storage area, Return success to the host computer, return to step S1;
Step S3:The Hash that current hash algorithm is arranged to specify in the signature packet by the intelligent cipher key equipment Algorithm, the signature algorithm that current signature algorithm is arranged to specify in the signature packet, store in the signature packet Current key ID and current applications mark, perform step S4;
Step S4:Parameter of the intelligent cipher key equipment in the signature packet judges whether to review label Name, it is then to perform step S7, otherwise performs step S5;
Step S5:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark Key type identification, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is Step S6 is then performed, otherwise returns to error message, return to step S1 to the host computer;
Step S6:It is to be signed that first Hash of the intelligent cipher key equipment in the signature packet is worth to first Data, the key according to corresponding to obtaining the current key ID and current applications of storage mark, using the key, according to current label Name algorithm is signed to first data to be signed, is returned to signature result and successful information to the host computer, is removed phase Cyclization border is set, return to step S1;
Step S7:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark Key type identification, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is Step S8 is then performed, otherwise returns to error message, return to step S1 to the host computer;
Step S8:The intelligent cipher key equipment parses to the message in the signature packet, obtains explicit message, Display caching area is arrived into explicit message storage, according to current hash algorithm, the message in the signature packet carried out Hash calculation, the second cryptographic Hash is obtained, the second data to be signed are worth to according to second Hash, perform step S9;
Step S9:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button quilt Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to described Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return Return step S1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes storage Current key ID, current applications mark and the display caching area in data.
A kind of method signed according to Key Tpe that the present invention provides again, including:
Step A1:When intelligent cipher key equipment receives the data of host computer transmission, the intelligent cipher key equipment judges number According to type, if generation key then performs step A2 to instructing, if the instruction of the first common signature then performs step A3, if the One review signature command then performs step A6, if other instructions then perform corresponding operating, is returned to the host computer and performs knot Fruit, return to step A1;
Step A2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction Mark write-in key description information, key pair is generated, and the key pair of generation and key description information write-in is close Key memory block, return success to the host computer, return to step A1;
Step A3:Current hash algorithm is arranged to specify in the first common signature instruction by the intelligent cipher key equipment Hash algorithm, the signature algorithm that current signature algorithm is arranged to specify in first common signature instruction, described in storage Current key ID and current applications mark in the instruction of first common signature;
Step A4:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark Key type identification, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is Step A5 is then performed, otherwise returns to error message, return to step A1 to the host computer;
Step A5:The first Hash during the intelligent cipher key equipment instructs according to first common signature is worth to first Data to be signed, the key according to corresponding to being obtained current key ID and current applications mark, using the key, according to current label Name algorithm is signed to first data to be signed, is returned to signature result and successful information to the host computer, is removed phase Cyclization border is set, return to step A1;
Step A6:Current hash algorithm is arranged to specify in the first review signature command by the intelligent cipher key equipment Hash algorithm, current signature algorithm is arranged to the signature algorithm specified in the first review signature command, described in storage Current key ID and current applications mark in first review signature command;
Step A7:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark Key type identification, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is Step A8 is then performed, otherwise returns to error message, return to step A1 to the host computer;
Step A8:The intelligent cipher key equipment parses to the message in the described first review signature command, is shown Show message, display caching area is arrived into explicit message storage, according to current hash algorithm, to the described first review signature command In message carry out Hash calculation, obtain the second cryptographic Hash, the second data to be signed be worth to according to second Hash, perform Step A9;
Step A9:The intelligent cipher key equipment is shown to the explicit message in the display caching area, and is waited and being pressed Key is pressed, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment according to Key corresponding to current key ID and current applications the mark acquisition of storage, using the key, according to current signature algorithm pair Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set Put, return to step A1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes storage Current key ID, current applications mark and the display caching area in data.
A kind of method signed according to Key Tpe that the present invention provides again, including:
Step B1:When intelligent cipher key equipment receives the data of host computer transmission, the intelligent cipher key equipment judges number According to type, if generation key then performs step B2 to instructing, if first sets instruction then to perform step B3, if second is general Logical signature command then performs step B4, if the second review signature command then performs step B6, if other instructions then perform phase It should operate, implementing result, return to step B1 are returned to the host computer;
Step B2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction Mark write-in key description information, key pair is generated, and the key pair of generation and key description information write-in is close Key memory block, return success to the host computer, return to step B1;
Step B3:The Kazakhstan that current hash algorithm is arranged to specify in the first setting instruction by the intelligent cipher key equipment Uncommon algorithm, the signature algorithm that current signature algorithm is arranged to specify in the first setting instruction, storage described first are set Current key ID and current applications mark in instruction, return success, return to step B1 to the host computer;
Step B4:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark Key type identification, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is Step B5 is then performed, otherwise returns to error message, return to step B1 to the host computer;
Step B5:The first Hash during the intelligent cipher key equipment instructs according to second common signature is worth to first Data to be signed, the key according to corresponding to obtaining the current key ID and current applications of storage mark, use the key, basis Current signature algorithm is signed to first data to be signed, and signature result and successful information are returned to the host computer, Remove relevant environment to set, return to step B1;
Step B6:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark Key type identification, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is Step B7 is then performed, otherwise returns to error message, return to step B1 to the host computer;
Step B7:The intelligent cipher key equipment parses to the message in the described second review signature, obtains display report Text, display caching area is arrived into explicit message storage, according to current hash algorithm, to the message in the described second review signature Hash calculation is carried out, obtains the second cryptographic Hash, the second data to be signed are worth to according to second Hash, perform step B8;
Step B8:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button quilt Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to described Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return Return step B1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes storage Current key ID, current applications mark and the display caching area in data.
A kind of method signed according to Key Tpe that the present invention provides again, including:
Step C1:When intelligent cipher key equipment receives the instruction of host computer transmission, the intelligent cipher key equipment judges to refer to Type is made, if generation key then performs step C2 to instructing, if first sets instruction then to perform step C3, if the 3rd is general Logical signature command then performs step C4, if packet parsing instruction then performs step C6, if the 3rd review signature command is then held Row step C8, if other instructions then perform corresponding operating, implementing result, return to step C1 are returned to the host computer;
Step C2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction Mark write-in key description information, key pair is generated, and the key pair of generation and key description information write-in is close Key memory block, return success to the host computer, return to step C1;
Step C3:The Kazakhstan that current hash algorithm is arranged to specify in the first setting instruction by the intelligent cipher key equipment Uncommon algorithm, the signature algorithm that current signature algorithm is arranged to specify in the first setting instruction, storage described first are set Current key ID and current applications mark in instruction, return success, return to step C1 to the host computer;
Step C4:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark Key type identification, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is Step C5 is then performed, otherwise returns to error message, return to step C1 to the host computer;
Step C5:The first Hash during the intelligent cipher key equipment instructs according to the 3rd common signature is worth to first Data to be signed, the first obtained data to be signed are stored in memory block to be signed, return success to the host computer, Return to step C1;
Step C6:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark Key type identification, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is Step C7 is then performed, otherwise returns to error message, return to step C1 to the host computer;
Step C7:Message during the intelligent cipher key equipment instructs to the packet parsing parses, and obtains display report Text, display caching area is arrived into explicit message storage, according to current hash algorithm, to the message in packet parsing instruction Hash calculation is carried out, the second cryptographic Hash is obtained, the second data to be signed is worth to according to second Hash, described second is treated Signed data is stored in memory block to be signed, is return success to the host computer, return to step C1;
Step C8:The intelligent cipher key equipment judges whether the data to be signed in memory block to be signed are first to be signed Data, it is then to perform step C9, otherwise performs step C10;
Step C9:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark Key, the first data to be signed of storage are signed using the key, according to current signature algorithm, returned to the host computer Signature result and successful information are returned, relevant environment is removed and sets, return to step C1;
Step C10:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button quilt Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to storage The second data to be signed signed, return to signature result and successful information to the host computer, remove relevant environment and set, Return to step C1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes storage Current key ID, current applications mark and the display caching area in data.
The present invention compared with prior art, has advantages below:
A kind of implementation method signed according to Key Tpe provided by the invention, it is each pair in intelligent cipher key equipment Key sets Key Tpe, and the purposes of key is limited according to Key Tpe, for example, be served only for the key of common signature can not be multiple Used in core signature process, being served only for the key of review signature can not use in process common signature, so as to distinguish inhomogeneity The signature of type, realize the purpose of anti-cheat label.
Brief description of the drawings
Fig. 1 is a kind of flow chart for implementation method signed according to Key Tpe that the embodiment of the present invention 1 provides;
Fig. 2 to Fig. 5 is a kind of flow for implementation method signed according to Key Tpe that the embodiment of the present invention 2 provides Figure.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Embodiment 1
Embodiments of the invention 1 provide a kind of implementation method signed according to Key Tpe, as shown in figure 1, bag Include:
Step S1:When intelligent cipher key equipment receives the data of host computer transmission, intelligent cipher key equipment judges data class Type, if generation key then performs step S2 to instructing, if signature packet then performs step S3, if other instructions are then held Row corresponding operating, implementing result, return to step S1 are returned to host computer;
Step S2:Intelligent cipher key equipment identifies key is generated to Key Tpe mark, key ID and the purposes in instruction Key description information is write, generates key pair, and the key pair of generation and key description information are write into key storage area, upwards Position machine is return success, return to step S1;
Step S3:The hash algorithm that current hash algorithm is arranged to specify in signature packet by intelligent cipher key equipment, will Current signature algorithm is arranged to the signature algorithm specified in signature packet, stores the current key ID in signature packet and works as Preceding purposes mark, performs step S4;
Step S4:Parameter of the intelligent cipher key equipment in signature packet judges whether to review signature, is to hold Row step S7, otherwise perform step S5;
Step S5:Intelligent cipher key equipment Key Tpe mark according to corresponding to being obtained current key ID and current applications mark Know, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is then to perform step S6, Otherwise error message, return to step S1 are returned to host computer;
Step S6:First Hash of the intelligent cipher key equipment in signature packet is worth to the first data to be signed, root According to key corresponding to current key ID and current applications mark acquisition, wait to sign to first using key, according to current signature algorithm Name data are signed, and signature result and successful information are returned to host computer, are removed relevant environment and are set, return to step S1;
Step S7:Intelligent cipher key equipment Key Tpe mark according to corresponding to being obtained current key ID and current applications mark Know, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is then to perform step S8, Otherwise error message, return to step S1 are returned to host computer;
Step S8:Intelligent cipher key equipment is parsed to the message in signature packet, obtains explicit message, and display is reported Display caching area is arrived in text storage, according to current hash algorithm, carries out Hash calculation to the message in signature packet, obtains second Cryptographic Hash, the second data to be signed are worth to according to the second Hash, and the second data to be signed are stored in into memory block to be signed, held Row step S9;
Step S9:Intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button to be pressed, When the button that intelligent cipher key equipment is judged to be pressed is acknowledgement key, intelligent cipher key equipment according to the current key ID of storage and Second data to be signed are signed by key corresponding to current applications mark acquisition using key, according to current signature algorithm, Signature result and successful information are returned to host computer, relevant environment is removed and sets, return to step S1.
In the present embodiment, the above method is completed to be carried out according to Key Tpe by generating key to instruction and signature packet The operation of signature, in addition to this it is possible to the operation for completing to be signed according to Key Tpe by more MIMD, for example, logical Cross generation key and that is signed according to Key Tpe is completed to instruction, the instruction of the first common signature and the first review signature command Operation, it is specially:
Step S1:When intelligent cipher key equipment receives the data of host computer transmission, intelligent cipher key equipment judges data class Type, if generation key then performs step S2 to instructing, if the instruction of the first common signature then performs step A3, if first is multiple Core signature command then performs step A7, if other instructions then perform corresponding operating, returns to implementing result to the host computer, returns Return step S1;
Step S2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction Mark write-in key description information, key pair is generated, and the key pair of generation and key description information is write into key storage area, Return success to the host computer, return to step S1;
Step A3:Current hash algorithm is arranged to specify in the first common signature instruction by the intelligent cipher key equipment Hash algorithm, the signature algorithm that current signature algorithm is arranged to specify in first common signature instruction, described in storage Current key ID and current applications mark in the instruction of first common signature;
Step A4:Intelligent cipher key equipment Key Tpe according to corresponding to being obtained current key ID and current applications mark Mark, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to perform Step A5, otherwise return to error message, return to step S1 to the host computer;
Step A5:The first Hash during the intelligent cipher key equipment instructs according to first common signature is worth to first Data to be signed, the key according to corresponding to being obtained current key ID and current applications mark, using the key, according to current label Name algorithm is signed to first data to be signed, is returned to signature result and successful information to the host computer, is removed phase Cyclization border is set, return to step S1;
Step A6:Current hash algorithm is arranged to specify in the first review signature command by the intelligent cipher key equipment Hash algorithm, current signature algorithm is arranged to the signature algorithm specified in the first review signature command, described in storage Current key ID and current applications mark in first review signature command;
Step A7:Intelligent cipher key equipment Key Tpe according to corresponding to being obtained current key ID and current applications mark Mark, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to perform Step A8, otherwise return to error message, return to step S1 to the host computer;
Step A8:The intelligent cipher key equipment parses to the message in the described first review signature command, is shown Show message, display caching area is arrived into explicit message storage, according to current hash algorithm, to the described first review signature command In message carry out Hash calculation, obtain the second cryptographic Hash, the second data to be signed be worth to according to second Hash, by institute State the second data to be signed and be stored in memory block to be signed, perform step A9;
Step A9:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button quilt Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to described Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return Return step S1.
Similarly, instruction, the instruction of the second common signature and the second review is set to sign instruction, first by generating key The operation signed according to Key Tpe is completed in instruction, is specially:
Step S1:When intelligent cipher key equipment receives the data of host computer transmission, intelligent cipher key equipment judges data class Type, if generation key then performs step S2 to instructing, if first sets instruction then to perform step B3, if the second common label Name instruction then performs step B4, if the second review signature command then performs step B6, if other instructions then perform corresponding behaviour Make, implementing result, return to step S1 are returned to the host computer;
Step S2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction Mark write-in key description information, key pair is generated, and the key pair of generation and key description information is write into key storage area, Return success to the host computer, return to step S1;
Step B3:The Kazakhstan that current hash algorithm is arranged to specify in the first setting instruction by the intelligent cipher key equipment Uncommon algorithm, the signature algorithm that current signature algorithm is arranged to specify in the first setting instruction, storage described first are set Current key ID and current applications mark in instruction, return success, return to step S1 to the host computer;
Step B4:Intelligent cipher key equipment Key Tpe according to corresponding to being obtained current key ID and current applications mark Mark, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to perform Step B5, otherwise return to error message, return to step S1 to the host computer;
Step B5:The first Hash during the intelligent cipher key equipment instructs according to second common signature is worth to first Data to be signed, the key according to corresponding to being obtained current key ID and current applications mark, using the key, according to current label Name algorithm is signed to first data to be signed, is returned to signature result and successful information to the host computer, is removed phase Cyclization border is set, return to step S1;
Step B6:Intelligent cipher key equipment Key Tpe according to corresponding to being obtained current key ID and current applications mark Mark, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to perform Step B7, otherwise return to error message, return to step S1 to the host computer;
Step B7:The intelligent cipher key equipment parses to the message in the described second review signature, obtains display report Text, display caching area is arrived into explicit message storage, according to current hash algorithm, to the message in the described second review signature Hash calculation is carried out, the second cryptographic Hash is obtained, the second data to be signed is worth to according to second Hash, described second is treated Signed data is stored in memory block to be signed, performs step B6;
Step B8:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button quilt Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to described Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return Return step S1.
Similarly, instruction, the 3rd common signature is set to instruct instruction, first by generating key, packet parsing instruction The operation signed with the 3rd review signature command completion according to Key Tpe, it is specially:
Step S1:When intelligent cipher key equipment receives the instruction of host computer transmission, intelligent cipher key equipment decision instruction class Type, if generation key then performs step S2 to instructing, if first sets instruction then to perform step C3, if the 3rd common label Name instruction then performs step C4, if packet parsing instruction then performs step C6, if the 3rd review signature command then performs step Rapid C8, if other instructions then perform corresponding operating, implementing result, return to step S1 are returned to the host computer;
Step S2:The intelligent cipher key equipment will generate key to Key Tpe mark, key ID and the purposes in instruction Mark write-in key description information, key pair is generated, and the key pair of generation and key description information is write into key storage area, Return success to the host computer, return to step S1;
Step C3:The Kazakhstan that current hash algorithm is arranged to specify in the first setting instruction by the intelligent cipher key equipment Uncommon algorithm, the signature algorithm that current signature algorithm is arranged to specify in the first setting instruction, storage described first are set Current key ID and current applications mark in instruction, return success, return to step S1 to the host computer;
Step C4:Intelligent cipher key equipment Key Tpe according to corresponding to being obtained current key ID and current applications mark Mark, whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to perform Step C5, otherwise return to error message, return to step S1 to the host computer;
Step C5:The first Hash during the intelligent cipher key equipment instructs according to the 3rd common signature is worth to first Data to be signed, the first obtained data to be signed are stored in memory block to be signed, return success to the host computer, Return to step S1;
Step C6:Intelligent cipher key equipment Key Tpe according to corresponding to being obtained current key ID and current applications mark Mark, whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to perform Step C7, otherwise return to error message, return to step S1 to the host computer;
Step C7:Message during the intelligent cipher key equipment instructs to the packet parsing parses, and obtains display report Text, display caching area is arrived into explicit message storage, according to current hash algorithm, to the message in packet parsing instruction Hash calculation is carried out, the second cryptographic Hash is obtained, the second data to be signed is worth to according to second Hash, described second is treated Signed data is stored in memory block to be signed, is return success to the host computer, return to step S1;
Step C8:The intelligent cipher key equipment judges whether the data to be signed in memory block to be signed are first to be signed Data, it is then to perform step C9, otherwise performs step C10;
Step C9:The intelligent cipher key equipment is close according to corresponding to obtaining the current key ID and current applications of storage mark Key, using the key, first data to be signed are signed according to current signature algorithm, returned to the host computer Result of signing and successful information, remove relevant environment and set, return to step S1;
Step C10:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button quilt Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to described Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return Return step S1.
In the present embodiment, remove relevant environment set include initialize secure ID, remove current hash algorithm and currently The setting of signature algorithm, the current key ID for removing storage, current applications mark and display caching data;
If the button that intelligent cipher key equipment is judged to be pressed is cancel key, intelligent cipher key equipment display suppression information, Remove relevant environment to set, return success to host computer, return to step S1;
In the present embodiment, intelligent cipher key equipment needs to judge whether completely before common signature and/or review signature is carried out Sufficient safety condition, it is to continue common signature and/or review signature, otherwise returns to error message to host computer, return to step Rapid S1.
A kind of implementation method signed according to Key Tpe provided in the present embodiment, it is in intelligent cipher key equipment Each pair key sets Key Tpe, and the purposes of key is limited according to Key Tpe, for example, be served only for the key of common signature can not Used in signature process is checked, being served only for the key of review signature can not use in process common signature, so as to distinguish not The signature of same type, realize the purpose of anti-cheat label.
Embodiment 2
Embodiments of the invention 2 provide a kind of implementation method signed according to Key Tpe, such as Fig. 2 to Fig. 5 institutes Show, including:
Step 201:It is electric on intelligent cipher key equipment, initialized;
Step 202:The instruction that the host computer to be received such as intelligent cipher key equipment is sent, when intelligent cipher key equipment receives instruction When, intelligent cipher key equipment decision instruction type, if generation key then performs step 203 to instructing, if first sets instruction Step 208 is then performed, if the instruction of the 3rd common signature then performs step 214, if packet parsing instruction then performs step 222, if the 3rd review signature command then performs step 234, if other instructions then perform corresponding operating, returned to host computer Implementing result, return to step 202;
Step 203:Intelligent cipher key equipment judges whether to meet safety condition, is then to perform step 204, otherwise to host computer Return to error message, return to step 202;
Specifically, intelligent cipher key equipment judge secure ID whether set, be, determination meet safety condition, otherwise determine It is unsatisfactory for safety condition;
In the present embodiment, to reset, the PIN code that intelligent cipher key equipment inputs to user is carried out the original state of secure ID Checking, when the authentication succeeds by secure ID set;
Step 204:It is legal that intelligent cipher key equipment judges that generation key identifies whether to the Key Tpe in instruction, is to hold Row step 205, otherwise return to error message, return to step 202 to host computer;
Specifically, intelligent cipher key equipment judges to generate whether the value that key identifies the Key Tpe in instruction is first pre- If value, it is then to determine that Key Tpe mark is legal, otherwise determines that Key Tpe mark is illegal;
For example, generation key is 00 46 00 01 02 01 00 to instruction, wherein the data of the 4th byte are key class Type identifies;First preset value is any one in 0x00,0x01 and 0x02;
In the present embodiment, if the value that generation key identifies to the Key Tpe in instruction is 0x00, intelligent cipher key equipment The key of generation is mixed key;If it is 0x01 to generate the value that key identifies to the Key Tpe in instruction, intelligent key is set The key of standby generation is common signature key;If it is 0x02 to generate the value that key identifies to the Key Tpe in instruction, intelligence The key of key devices generation is review signature key;
Step 205:Intelligent cipher key equipment judges whether generation key is legal to the key length in instruction, is then to perform step Rapid 206, otherwise return to error message, return to step 202 to host computer;
Specifically, intelligent cipher key equipment judges to generate whether key is preset length to the value of the key length in instruction Value, it is then to determine that key length is legal, otherwise determines that key length is illegal;
For example, generation key is key length to the data of the 6th, 7 byte of instruction;Preset length value is 0x0100;
Step 206:Intelligent cipher key equipment identifies key is generated to Key Tpe mark, key ID and the purposes in instruction Key description information is write, generates key pair, and the key pair of generation and key description information are write into key storage area;
Step 207:Effectively whether intelligent cipher key equipment judge the key of generation to, being to return to host computer and successfully believe Breath, return to step 202, the key pair of generation is otherwise deleted, error message, return to step 202 are returned to host computer;
Specifically, intelligent cipher key equipment is judged whether using the key of generation to being signed to preset data and sign test Success, be determine generation key to effective, otherwise determine generation key to invalid;
Step 208:Intelligent cipher key equipment judges itself whether support the hash algorithm that the first setting is specified in instructing, and is then Step 209 is performed, otherwise returns to error message, return to step 202 to host computer;
Specifically, intelligent cipher key equipment judges whether the value of the hash algorithm mark in the first setting instruction is second default Value, it is to determine itself to support that first sets the hash algorithm specified in instruction, otherwise determines that itself does not support the first setting to refer to The hash algorithm specified in order;
For example, the first setting instruction is 00 22 41 B6 07 80 01 52 84 02 02 13, wherein the 8th byte Data be hash algorithm mark;Second preset value is any in 0x12,0x32,0x52,0x72,0xF2,0xE2 and 0xC2 One;
Step 209:The hash algorithm that current hash algorithm is arranged to specify in the first setting instruction by intelligent cipher key equipment;
In the present embodiment, if first sets the hash algorithm in instruction to be identified as 0x12, specified in the first setting instruction Hash algorithm be SHA-1 algorithms;If first sets the hash algorithm in instruction to be identified as 0x32, first sets instruction middle finger Fixed hash algorithm is MD5 algorithms;If first sets the hash algorithm in instruction to be identified as 0x52, first sets instruction middle finger Fixed hash algorithm is SM3 algorithms;If first sets the hash algorithm in instruction to be identified as 0x72, first sets instruction middle finger Fixed hash algorithm is MD5 and SHA-1 algorithms;If first sets the hash algorithm in instruction to be identified as 0xF2, first is set The hash algorithm specified in instruction is SHA-256 algorithms;If first sets the hash algorithm in instruction to be identified as 0xE2, first It is SHA-512 algorithms to set the hash algorithm specified in instruction;If first sets the hash algorithm in instruction to be identified as 0xC2, The hash algorithm specified in first setting instruction is SHA-384 algorithms;
Step 210:Intelligent cipher key equipment judges itself whether support the signature algorithm that the first setting is specified in instructing, and is then Step 211 is performed, otherwise returns to error message, return to step 202 to host computer;
Specifically, intelligent cipher key equipment judges whether the value of the purposes mark in the first setting instruction is the 3rd preset value, It is to determine itself to support that first sets the signature algorithm specified in instruction, otherwise determines in itself not supporting that the first setting instructs The signature algorithm specified;
For example, first sets the data of the 12nd byte of instruction to be identified for hash algorithm;3rd preset value be 0x13, Any one in 0x1B, 0x23 and 0x2B;
Step 211:The signature algorithm that current signature algorithm is arranged to specify in the first setting instruction by intelligent cipher key equipment;
In the present embodiment, if first sets the purposes in instruction to be identified as 0x13 or 0x1B, first sets instruction middle finger Fixed signature algorithm is SM2 algorithms;If first sets the purposes in instruction to be identified as 0x23 or 0x2B, first is set in instruction The signature algorithm specified is RSA Algorithm;
Step 212:Current key ID and current applications of the intelligent cipher key equipment in the first setting instruction are identified close Key pair is obtained in key memory block, whether effectively the key for judging to get is then to perform step 213, otherwise removes related to Environment is set, and error message, return to step 202 are returned to host computer;
For example, the data of the 11st byte of the first setting instruction are current key ID, the data of the 12nd byte are to work as Preceding purposes mark;If current key ID is 0x02 to 0x03, current applications are identified as 0x13, then the key got is calculated for SM2 Method private key;If current key ID is 0x02 to 0x03, current applications are identified as 0x1B, then the key got is that SM2 algorithms are public Key;If current key ID is 0x02 to 0x07, current applications are identified as 0x23, then the key got is RSA Algorithm private key;If Current key ID is 0x02 to 0x07, and current applications are identified as 0x2B, then the key got is that RSA calculates public key;
Specifically, intelligent cipher key equipment using the key that gets to being signed to preset data and sign test, judgement are No success, be the key for determining to get to effective, the key for otherwise determining to get is to invalid;
In the present embodiment, remove relevant environment set include initialize secure ID, remove current hash algorithm and currently The setting of signature algorithm, the current key ID for removing storage and current applications mark;
Step 213:Intelligent cipher key equipment storage first sets current key ID and current applications mark in instruction, upwards Position machine is return success, return to step 202;
Step 214:Intelligent cipher key equipment judges whether the parameter of the 3rd common signature instruction is correct, is to perform step 215, otherwise return to error message, return to step 202 to host computer;
For example, the instruction of the 3rd common signature is the 5D 77 of 00 2A, 90 81 20 22 3B of EC AA 6C D6 BE 83 AF BE 69 FE D1 86 A04C 04 C7 2E C7 40 69 F5 B1 CD 02 51 08 5D 52;
Step 215:Intelligent cipher key equipment judges whether to meet safety condition, is then to perform step 216, otherwise to host computer Return to error message, return to step 202;
Specifically, intelligent cipher key equipment judge secure ID whether set, be, determination meet safety condition, otherwise determine It is unsatisfactory for safety condition;
Step 216:Intelligent cipher key equipment is identified in key storage area according to the current key ID and current applications of storage Key description information corresponding to acquisition;
Step 217:Intelligent cipher key equipment judges whether to get key description information, is then execution step 218, otherwise to Host computer returns to error message, return to step 202;
Step 218:Intelligent cipher key equipment obtains Key Tpe mark from key description information;
Step 219:It is legal that the Key Tpe that intelligent cipher key equipment judges to get identifies whether, is then to perform step 220, Otherwise error message, return to step 202 are returned to host computer;
Specifically, whether the value for the Key Tpe mark that intelligent cipher key equipment judges to get is the first preset value, is then Determine that Key Tpe mark is legal, otherwise determine that Key Tpe mark is illegal;Wherein, the first preset value be 0x00,0x01 and Any one in 0x02;
Step 220:Intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement is permission The key of common signature is carried out, is then to perform step 221, otherwise returns to error message, return to step 202 to host computer;
Specifically, whether the value for the Key Tpe mark that intelligent cipher key equipment judges to get is the 4th preset value, is then It is determined that corresponding key is the key for not allowing to carry out common signature, otherwise key corresponding to determination is to allow to carry out common signature Key;For example, the 4th preset value is 0x02;In the present embodiment, mixed key and common signature key be allow to carry out it is general The key of logical signature;
Step 221:Intelligent cipher key equipment obtains the first cryptographic Hash in the instruction of the 3rd common signature, and the first cryptographic Hash is entered Row filling, obtains the first data to be signed, the first obtained data to be signed is stored in into memory block to be signed, returned to host computer Return successful information, return to step 202;
Step 222:Intelligent cipher key equipment judges whether the parameter of packet parsing instruction is correct, is then to perform step 223, no Then error message, return to step 202 are returned to host computer;
For example, packet parsing instruction is the 3E 3C 4D of 00 2A, 90 81 7E, 01 02 03 04 3C, 54 3E 3C 44 09 0A 3C 54 3E 3C 44 3E 3E 3C 44 3E 3C 4D 09 0A 3C 54 3E 3C 30 32 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 34 32 30 30 31 30 31 30 30 30 30 30 30 30 30 30 30 30 30 30 30 35 34 30 30 30 30 30 30 31 38 30 30 30 30 30 30 30 37 61 62 632E 74 78 74 61 62 63 30 30 30 30 30 30 32 30 30 30 30 30 30 30 30 38 74 65 73 74 2E 74 78 74 74 65 73 74;
Step 223:Intelligent cipher key equipment judges whether to meet safety condition, is then to perform step 224, otherwise to host computer Return to error message, return to step 202;
Specifically, intelligent cipher key equipment judge secure ID whether set, be, determination meet safety condition, otherwise determine It is unsatisfactory for safety condition;
Step 224:Intelligent cipher key equipment is identified in key storage area according to the current key ID and current applications of storage Key description information corresponding to acquisition;
Step 225:Intelligent cipher key equipment judges whether to get key description information, is then execution step 226, otherwise to Host computer returns to error message, return to step 202;
Step 226:Intelligent cipher key equipment obtains Key Tpe mark from key description information;
Step 227:It is legal that the Key Tpe that intelligent cipher key equipment judges to get identifies whether, is then to perform step 228, Otherwise error message, return to step 202 are returned to host computer;
Specifically, whether the value for the Key Tpe mark that intelligent cipher key equipment judges to get is the first preset value, is then Determine that Key Tpe mark is legal, otherwise determine that Key Tpe mark is illegal;Wherein, the first preset value be 0x00,0x01 and Any one in 0x02;
Step 228:Intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement is permission Check the key of signature, be then to perform step 229, otherwise return to error message, return to step 202 to host computer;
Specifically, whether the value for the Key Tpe mark that intelligent cipher key equipment judges to get is the 5th preset value, is then It is determined that corresponding key is not allow to carry out the key for checking signature, otherwise key corresponding to determination is to allow to carry out review signature Key;For example, the 5th preset value is 0x01;In the present embodiment, it is to allow to be answered to use key and review signature key with The key of core signature;
Step 229:For intelligent cipher key equipment according to current hash algorithm, the message in being instructed to packet parsing carries out Hash meter Calculate, obtain the second cryptographic Hash, and the message in packet parsing instruction is parsed;
Step 230:Intelligent cipher key equipment judges whether successfully resolved, is, obtains explicit message, and explicit message is stored To display caching area, step 231 is performed, otherwise returns to error message, return to step 202 to host computer;
Specifically, intelligent cipher key equipment judge packet parsing instruction in message whether be preset format message, be then Successfully resolved is determined, otherwise determines parsing failure;
Step 231:Intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement is only to permit Permitted to carry out the key for checking signature, be then to perform step 232, otherwise perform step 233;
Specifically, whether the value for the Key Tpe mark that intelligent cipher key equipment judges to get is the 4th preset value, is then It is determined that corresponding key is only to allow to carry out the key for checking signature, otherwise key corresponding to determination is not only to allow to be checked The key of signature;For example, the 4th preset value is 0x02;
Step 232:Intelligent cipher key equipment is filled to the second cryptographic Hash, obtains the second data to be signed, by what is obtained Second data to be signed are stored in memory block to be signed, are return success to host computer, return to step 202;
Step 233:According to current hash algorithm, the message in being instructed to packet parsing parses intelligent cipher key equipment, Transaction Information is obtained, Hash calculation is carried out to Transaction Information, the 3rd cryptographic Hash is obtained, the second cryptographic Hash and the 3rd cryptographic Hash is entered Row combination, and combined result is filled, the second data to be signed are obtained, the second obtained data to be signed are stored in and treated Signature memory block, returns success, return to step 202 to host computer;
Step 234:Intelligent cipher key equipment judges whether the parameter of the 3rd review signature command is correct, is to perform step 235, otherwise return to error message, return to step 202 to host computer;
Step 235:Intelligent cipher key equipment judges currently whether the first data to be signed are signed, and is to perform step 236, otherwise perform step 237;
Specifically, in the present embodiment, also include in step 221, common signature is identified set by intelligent cipher key equipment, then is walked Intelligent cipher key equipment judges that common signature identifies whether set in rapid 235, is, determines the number to be signed in memory block to be signed According to for the first data to be signed, it is the second data to be signed otherwise to determine the data to be signed in memory block to be signed;
In addition to this it is possible to it is:Also include in step 229, intelligent cipher key equipment will check mark set of signing, then walks Intelligent cipher key equipment judges that review signature identifies whether set in rapid 235, is to determine the number to be signed in memory block to be signed According to for the second data to be signed, it is the first data to be signed otherwise to determine the data to be signed in memory block to be signed;
Step 236:Intelligent cipher key equipment key according to corresponding to obtaining the current key ID and current applications of storage mark, Using the key got, the first data to be signed are signed according to current signature algorithm, signature knot is returned to host computer Fruit and successful information, remove relevant environment and set, return to step 202;
In the present embodiment, remove relevant environment set include initialize secure ID, remove current hash algorithm and currently The setting of signature algorithm, the current key ID for removing storage and current applications mark;
Step 237:Intelligent cipher key equipment is shown to the explicit message in display caching area;
Step 238:Intelligent cipher key equipment judges whether that a button is pressed, is then to perform step 240, otherwise performs step 239;
Step 239:Intelligent cipher key equipment judge button wait whether time-out, be then display suppression information, returned to host computer Successful information is returned, relevant environment is removed and sets, return to step 202;Otherwise return to step 238;
In the present embodiment, remove relevant environment set include initialize secure ID, remove current hash algorithm and currently The setting of signature algorithm, the current key ID for removing storage and current applications mark, display caching area data;
Step 240:Intelligent cipher key equipment judges the push-button type being pressed, if acknowledgement key then performs step 241;If Then display suppression information, removing relevant environment set, return success to host computer, return to step 202 cancel key;
Step 241:Intelligent cipher key equipment key according to corresponding to obtaining the current key ID and current applications of storage mark, Using the key got, the second data to be signed are signed according to current signature algorithm, signature knot is returned to host computer Fruit and successful information, remove relevant environment and set, return to step 202;
In addition, in the present embodiment, step 221 can also be:Intelligent cipher key equipment obtains the instruction of the 3rd common signature In the first cryptographic Hash, the first cryptographic Hash is filled, obtains the first data to be signed, according to the current key ID of storage and Key corresponding to current applications mark acquisition, using the key got, according to current signature algorithm to the first data to be signed Signed, signature result and successful information are returned to host computer, removed relevant environment and set, return to step 202;
Then intelligent cipher key equipment judges that the parameter of the 3rd review signature command correctly performs step 237 afterwards in step 234;
In the present embodiment, the above method by generate key to instruction, first set instruction, the 3rd common signature instruct, The operation that packet parsing is instructed and the 3rd review signature command completion is signed according to Key Tpe, in addition to this it is possible to The operation for completing to be signed according to Key Tpe by less instruction, for example, being set by generating key to instruction, first Instruction, the instruction of the second common signature and the second review signature command complete the operation signed according to Key Tpe, i.e. in intelligence After energy key devices receive the second review signature command, packet parsing operation and review signature operation are completed;For example, pass through life The behaviour for completing to be signed according to Key Tpe to instruction, the instruction of the first common signature and the first review signature command into key Make, i.e. after intelligent cipher key equipment receives the instruction of the first common signature, complete to set the operation of hash algorithm, signature algorithm The operation identified with storage current key ID and current applications, and common signature operation is completed, received in intelligent cipher key equipment After first review signature command, complete to set hash algorithm, the operation of signature algorithm and storage current key ID and current applications The operation of mark, and complete to check signature operation;For example, instruction and signature packet are completed according to key by generating key The operation that type is signed, i.e. after intelligent cipher key equipment receives signature packet, be configured hash algorithm, signature The operation of algorithm and storage current key ID and current applications mark operation, and complete common signature operation or review signature Operation.
A kind of implementation method signed according to Key Tpe provided in the present embodiment, it is in intelligent cipher key equipment Each pair key sets Key Tpe, and the purposes of key is limited according to Key Tpe, for example, be served only for the key of common signature can not Used in signature process is checked, being served only for the key of review signature can not use in process common signature, so as to distinguish not The signature of same type, realize the purpose of anti-cheat label.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited thereto, Any one skilled in the art is in technical scope disclosed by the invention, the change or replacement that can readily occur in, It should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with scope of the claims It is defined.

Claims (30)

1. a kind of implementation method signed according to Key Tpe, it is characterised in that methods described includes:
Step S1:When intelligent cipher key equipment receives the data of host computer transmission, the intelligent cipher key equipment judges data class Type, if generation key then performs step S2 to instructing, if signature packet then performs step S3, if other instructions are then held Row corresponding operating, implementing result, return to step S1 are returned to the host computer;
Step S2:The intelligent cipher key equipment identifies key is generated to Key Tpe mark, key ID and the purposes in instruction Key description information is write, generates key pair, and the key pair of generation and key description information are write into key storage area, to institute State host computer to return success, return to step S1;
Step S3:The intelligent cipher key equipment calculates the Hash that current hash algorithm is arranged to specify in the signature packet Method, the signature algorithm that current signature algorithm is arranged to specify in the signature packet, store in the signature packet Current key ID and current applications mark, perform step S4;
Step S4:Parameter of the intelligent cipher key equipment in the signature packet judges whether to review signature, is Step S7 is then performed, otherwise performs step S5;
Step S5:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark Type identifies, and whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to hold Row step S6, otherwise return to error message, return to step S1 to the host computer;
Step S6:First Hash of the intelligent cipher key equipment in the signature packet is worth to the first number to be signed According to the key according to corresponding to obtaining the current key ID and current applications of storage mark, using the key, according to current signature Algorithm is signed to first data to be signed, and signature result and successful information are returned to the host computer, is removed related Environment is set, return to step S1;
Step S7:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark Type identifies, and whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to hold Row step S8, otherwise return to error message, return to step S1 to the host computer;
Step S8:The intelligent cipher key equipment parses to the message in the signature packet, obtains explicit message, by institute State explicit message storage and arrive display caching area, according to current hash algorithm, Hash is carried out to the message in the signature packet Calculate, obtain the second cryptographic Hash, the second data to be signed are worth to according to second Hash, perform step S9;
Step S9:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button to be pressed, When the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to the current of storage Key corresponding to key ID and current applications mark acquisition, using the key, is treated according to current signature algorithm to described second Signed data is signed, and signature result and successful information are returned to the host computer, is removed relevant environment and is set, return to step S1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes working as storage Data in preceding key ID, current applications mark and the display caching area.
2. according to the method for claim 1, it is characterised in that the intelligent cipher key equipment is according to the current key ID of storage Key Tpe mark corresponding to obtaining is identified with current applications, is specially:The intelligent cipher key equipment is according to the current close of storage Key ID and current applications mark the key description information corresponding to acquisition in the key storage area, from the key description information It is middle to obtain the Key Tpe mark.
3. according to the method for claim 1, it is characterised in that described close according to corresponding to judging Key Tpe mark Whether key is the key for allowing to carry out common signature, is specially:The intelligent cipher key equipment judges the Key Tpe mark Whether value is the 4th preset value, is, key corresponding to determination is the key for not allowing to carry out common signature, is otherwise determined corresponding Key be allow carry out common signature key.
4. according to the method for claim 1, it is characterised in that described close according to corresponding to judging Key Tpe mark Whether key is to allow to carry out the key for checking signature, is specially:The intelligent cipher key equipment judges the Key Tpe mark got Whether the value of knowledge is the 5th preset value, is, key corresponding to determination is not allow to carry out the key for checking signature, is otherwise determined Corresponding key is to allow to carry out the key for checking signature.
5. according to the method for claim 1, it is characterised in that the intelligent cipher key equipment is in the signature packet Message includes after being parsed:The intelligent cipher key equipment judges whether successfully resolved, is, obtains explicit message, otherwise to The host computer returns to error message, return to step S1.
6. according to the method for claim 1, it is characterised in that described according to second Hash to be worth to second to be signed Data, including:
Step S8-1:The intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement Only to allow to carry out the key for checking signature, it is then to perform step S8-2, otherwise performs step S8-3;
Step S8-2:The intelligent cipher key equipment is filled to second cryptographic Hash, obtains second data to be signed;
Step S8-3:The intelligent cipher key equipment parses to the message, obtains Transaction Information, is calculated according to current Hash Method, Hash calculation is carried out to the Transaction Information, the 3rd cryptographic Hash is obtained, to second cryptographic Hash and the 3rd cryptographic Hash It is combined, and combined result is filled, obtains second data to be signed.
7. according to the method for claim 6, it is characterised in that the intelligent cipher key equipment judge corresponding to key whether be Only allow to carry out the key for checking signature, be specially:The intelligent cipher key equipment judge Key Tpe mark value whether For the 4th preset value, it is that key corresponding to determination is only to allow to carry out the key for checking signature, otherwise key corresponding to determination It is not only to allow to carry out the key for checking signature.
8. a kind of implementation method signed according to Key Tpe, it is characterised in that methods described includes:
Step A1:When intelligent cipher key equipment receives the data of host computer transmission, the intelligent cipher key equipment judges data class Type, if generation key then performs step A2 to instructing, if the instruction of the first common signature then performs step A3, if first is multiple Core signature command then performs step A6, if other instructions then perform corresponding operating, returns to implementing result to the host computer, returns Return step A1;
Step A2:The intelligent cipher key equipment identifies key is generated to Key Tpe mark, key ID and the purposes in instruction Key description information is write, generates key pair, and the key pair of generation and key description information write-in key are deposited Storage area, return success to the host computer, return to step A1;
Step A3:The Kazakhstan that current hash algorithm is arranged to specify in the first common signature instruction by the intelligent cipher key equipment Uncommon algorithm, the signature algorithm that current signature algorithm is arranged to specify in the first common signature instruction, storage described first Current key ID and current applications mark in common signature instruction;
Step A4:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark Type identifies, and whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to hold Row step A5, otherwise return to error message, return to step A1 to the host computer;
Step A5:First Hash of the intelligent cipher key equipment in first common signature instruction is worth to first and waits to sign Name data, the key according to corresponding to being obtained current key ID and current applications mark, are calculated using the key, according to current signature Method is signed to first data to be signed, is returned to signature result and successful information to the host computer, is removed correlative link Border is set, return to step A1;
Step A6:The Kazakhstan that current hash algorithm is arranged to specify in the first review signature command by the intelligent cipher key equipment Uncommon algorithm, the signature algorithm that current signature algorithm is arranged to specify in the first review signature command, storage described first Check the current key ID and current applications mark in signature command;
Step A7:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark Type identifies, and whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to hold Row step A8, otherwise return to error message, return to step A1 to the host computer;
Step A8:The intelligent cipher key equipment parses to the message in the described first review signature command, obtains display report Text, display caching area is arrived into explicit message storage, according to current hash algorithm, in the described first review signature command Message carries out Hash calculation, obtains the second cryptographic Hash, is worth to the second data to be signed according to second Hash, performs step A9;
Step A9:The intelligent cipher key equipment is shown to the explicit message in the display caching area, and waits button quilt Press, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to described Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return Return step A1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes working as storage Data in preceding key ID, current applications mark and the display caching area.
9. according to the method for claim 8, it is characterised in that the intelligent cipher key equipment is according to the current key ID of storage Key Tpe mark corresponding to obtaining is identified with current applications, is specially:The intelligent cipher key equipment is according to the current close of storage Key ID and current applications mark the key description information corresponding to acquisition in the key storage area, from the key description information It is middle to obtain the Key Tpe mark.
10. according to the method for claim 8, it is characterised in that described according to corresponding to judging Key Tpe mark Whether key is the key for allowing to carry out common signature, is specially:The intelligent cipher key equipment judges the Key Tpe mark Value whether be the 4th preset value, be, determine corresponding to key be do not allow carry out common signature key, otherwise determine pair The key answered is the key for allowing to carry out common signature.
11. according to the method for claim 8, it is characterised in that described according to corresponding to judging Key Tpe mark Whether key is to allow to carry out the key for checking signature, is specially:The intelligent cipher key equipment judges the Key Tpe got Whether the value of mark is the 5th preset value, is, key corresponding to determination is not allow to carry out the key for checking signature, otherwise really Key corresponding to fixed is to allow to carry out the key for checking signature.
12. according to the method for claim 8, it is characterised in that the intelligent cipher key equipment is signed to the described first review Message in instruction includes after being parsed:The intelligent cipher key equipment judges whether successfully resolved, is, obtains display report Text, otherwise return to error message, return to step A1 to the host computer.
13. according to the method for claim 8, it is characterised in that described to be worth to second according to second Hash and wait to sign Name data, including:
Step A8-1:The intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement Only to allow to carry out the key for checking signature, it is then to perform step A8-2, otherwise performs step A8-3;
Step A8-2:The intelligent cipher key equipment is filled to second cryptographic Hash, obtains second data to be signed;
Step A8-3:The intelligent cipher key equipment parses to the message, obtains Transaction Information, according to current hash algorithm Hash calculation is carried out to the Transaction Information, the 3rd cryptographic Hash is obtained, second cryptographic Hash and the 3rd cryptographic Hash is entered Row combination, and combined result is filled, obtain second data to be signed.
14. according to the method for claim 13, it is characterised in that whether key corresponding to the intelligent cipher key equipment judgement Only to allow to carry out the key for checking signature, it is specially:The intelligent cipher key equipment judges that the value of the Key Tpe mark is No is the 4th preset value, is, key corresponding to determination is only to allow to carry out the key for checking signature, otherwise close corresponding to determination Key is not only to allow to carry out the key for checking signature.
15. a kind of implementation method signed according to Key Tpe, it is characterised in that methods described includes:
Step B1:When intelligent cipher key equipment receives the data of host computer transmission, the intelligent cipher key equipment judges data class Type, if generation key then performs step B2 to instructing, if first sets instruction then to perform step B3, if the second common label Name instruction then performs step B4, if the second review signature command then performs step B6, if other instructions then perform corresponding behaviour Make, implementing result, return to step B1 are returned to the host computer;
Step B2:The intelligent cipher key equipment identifies key is generated to Key Tpe mark, key ID and the purposes in instruction Key description information is write, generates key pair, and the key pair of generation and key description information write-in key are deposited Storage area, return success to the host computer, return to step B1;
Step B3:Current hash algorithm is arranged to described first and sets the Hash specified in instruction to calculate by the intelligent cipher key equipment Method, the signature algorithm that current signature algorithm is arranged to specify in the first setting instruction, storage described first set instruction In current key ID and current applications mark, return success to the host computer, return to step B1;
Step B4:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark Type identifies, and whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to hold Row step B5, otherwise return to error message, return to step B1 to the host computer;
Step B5:First Hash of the intelligent cipher key equipment in second common signature instruction is worth to first and waits to sign Name data, the key according to corresponding to obtaining the current key ID and current applications of storage mark, using the key, according to current Signature algorithm is signed to first data to be signed, is returned to signature result and successful information to the host computer, is removed Relevant environment is set, return to step B1;
Step B6:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark Type identifies, and whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to hold Row step B7, otherwise return to error message, return to step B1 to the host computer;
Step B7:The intelligent cipher key equipment parses to the message in the described second review signature, obtains explicit message, will Display caching area is arrived in the explicit message storage, is carried out according to current hash algorithm, to the message in the described second review signature Hash calculation, the second cryptographic Hash is obtained, the second data to be signed are worth to according to second Hash, perform step B8;
Step B8:The intelligent cipher key equipment is shown to the explicit message in display caching area, and waits button to be pressed, When the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to the current of storage Key corresponding to key ID and current applications mark acquisition, is treated using the key, according to current signature algorithm to described second Signed data is signed, and signature result and successful information are returned to the host computer, is removed relevant environment and is set, return to step B1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes working as storage Data in preceding key ID, current applications mark and the display caching area.
16. according to the method for claim 15, it is characterised in that the intelligent cipher key equipment is according to the current key of storage ID and current applications identify Key Tpe mark corresponding to acquisition, are specially:The intelligent cipher key equipment is according to the current of storage Key ID and current applications mark the key description information corresponding to acquisition in the key storage area, describe to believe from the key The Key Tpe mark is obtained in breath.
17. according to the method for claim 15, it is characterised in that described according to corresponding to judging Key Tpe mark Whether key is the key for allowing to carry out common signature, is specially:The intelligent cipher key equipment judges the Key Tpe mark Value whether be the 4th preset value, be, determine corresponding to key be do not allow carry out common signature key, otherwise determine pair The key answered is the key for allowing to carry out common signature.
18. according to the method for claim 15, it is characterised in that described according to corresponding to judging Key Tpe mark Whether key is to allow to carry out the key for checking signature, is specially:The intelligent cipher key equipment judges the Key Tpe got Whether the value of mark is the 5th preset value, is, key corresponding to determination is not allow to carry out the key for checking signature, otherwise really Key corresponding to fixed is to allow to carry out the key for checking signature.
19. according to the method for claim 15, it is characterised in that the intelligent cipher key equipment is signed to the described second review In message parsed after include:The intelligent cipher key equipment judges whether successfully resolved, is, obtains explicit message, no Then error message, return to step B1 are returned to the host computer.
20. according to the method for claim 15, it is characterised in that described to be worth to second according to second Hash and wait to sign Name data, including:
Step B7-1:The intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement Only to allow to carry out the key for checking signature, it is then to perform step B7-2, otherwise performs step B7-3;
Step B7-2:The intelligent cipher key equipment is filled to second cryptographic Hash, obtains second data to be signed;
Step B7-3:The intelligent cipher key equipment root parses to the message, obtains Transaction Information, according to current hash algorithm Hash calculation is carried out to the Transaction Information, the 3rd cryptographic Hash is obtained, second cryptographic Hash and the 3rd cryptographic Hash is entered Row combination, and combined result is filled, obtain second data to be signed.
21. according to the method for claim 20, it is characterised in that whether key corresponding to the intelligent cipher key equipment judgement Only to allow to carry out the key for checking signature, it is specially:The intelligent cipher key equipment judges that the value of the Key Tpe mark is No is the 4th preset value, is, key corresponding to determination is only to allow to carry out the key for checking signature, otherwise close corresponding to determination Key is not only to allow to carry out the key for checking signature.
22. a kind of implementation method signed according to Key Tpe, it is characterised in that methods described includes:
Step C1:When intelligent cipher key equipment receives the instruction of host computer transmission, the intelligent cipher key equipment decision instruction class Type, if generation key then performs step C2 to instructing, if first sets instruction then to perform step C3, if the 3rd common label Name instruction then performs step C4, if packet parsing instruction then performs step C6, if the 3rd review signature command then performs step Rapid C8, if other instructions then perform corresponding operating, implementing result, return to step C1 are returned to the host computer;
Step C2:The intelligent cipher key equipment identifies key is generated to Key Tpe mark, key ID and the purposes in instruction Key description information is write, generates key pair, and the key pair of generation and key description information write-in key are deposited Storage area, return success to the host computer, return to step C1;
Step C3:Current hash algorithm is arranged to described first and sets the Hash specified in instruction to calculate by the intelligent cipher key equipment Method, the signature algorithm that current signature algorithm is arranged to specify in the first setting instruction, storage described first set instruction In current key ID and current applications mark, return success to the host computer, return to step C1;
Step C4:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark Type identifies, and whether key is the key for allowing to carry out common signature according to corresponding to judging Key Tpe mark, is to hold Row step C5, otherwise return to error message, return to step C1 to the host computer;
Step C5:First Hash of the intelligent cipher key equipment in the 3rd common signature instruction is worth to first and waits to sign The first obtained data to be signed are stored in memory block to be signed, return success to the host computer by name data, are returned Step C1;
Step C6:Intelligent cipher key equipment key class according to corresponding to obtaining the current key ID and current applications of storage mark Type identifies, and whether key is to allow to carry out the key for checking signature according to corresponding to judging Key Tpe mark, is to hold Row step C7, otherwise return to error message, return to step C1 to the host computer;
Step C7:Message during the intelligent cipher key equipment instructs to the packet parsing parses, and obtains explicit message, will Display caching area is arrived in the explicit message storage, is carried out according to current hash algorithm, to the message in packet parsing instruction Hash calculation, the second cryptographic Hash is obtained, the second data to be signed are worth to according to second Hash, it is to be signed by described second Data storage is return success, return to step C1 to the host computer in memory block to be signed;
Step C8:The intelligent cipher key equipment judges whether the data to be signed in memory block to be signed are the first number to be signed According to being then execution step C9, otherwise perform step C10;
Step C9:Intelligent cipher key equipment key according to corresponding to obtaining the current key ID and current applications of storage mark, The first data to be signed of storage are signed using the key, according to current signature algorithm, returned to the host computer Result of signing and successful information, remove relevant environment and set, return to step C1;
Step C10:The intelligent cipher key equipment shows to the explicit message in display caching area, and wait button by by Under, when the button that the intelligent cipher key equipment is judged to be pressed is acknowledgement key, the intelligent cipher key equipment is according to storage Current key ID and current applications mark obtain corresponding to key, using the key, according to current signature algorithm to storage Second data to be signed are signed, and signature result and successful information are returned to the host computer, are removed relevant environment and are set, return Return step C1;
The relevant environment of removing sets the setting for including removing current hash algorithm and current signature algorithm, removes working as storage Data in preceding key ID, current applications mark and the display caching area.
23. according to the method for claim 22, it is characterised in that the intelligent cipher key equipment is according to the current key of storage ID and current applications identify Key Tpe mark corresponding to acquisition, are specially:The intelligent cipher key equipment is according to the current of storage Key ID and current applications mark the key description information corresponding to acquisition in the key storage area, describe to believe from the key The Key Tpe mark is obtained in breath.
24. according to the method for claim 22, it is characterised in that described according to corresponding to judging Key Tpe mark Whether key is the key for allowing to carry out common signature, is specially:The intelligent cipher key equipment judges the Key Tpe mark Value whether be the 4th preset value, be, determine corresponding to key be do not allow carry out common signature key, otherwise determine pair The key answered is the key for allowing to carry out common signature.
25. according to the method for claim 22, it is characterised in that described according to corresponding to judging Key Tpe mark Whether key is to allow to carry out the key for checking signature, is specially:The intelligent cipher key equipment judges the Key Tpe got Whether the value of mark is the 5th preset value, is, key corresponding to determination is not allow to carry out the key for checking signature, otherwise really Key corresponding to fixed is to allow to carry out the key for checking signature.
26. according to the method for claim 22, it is characterised in that the intelligent cipher key equipment instructs to the packet parsing In message parsed after include:The intelligent cipher key equipment judges whether successfully resolved, is, obtains explicit message, no Then error message, return to step C1 are returned to the host computer.
27. according to the method for claim 22, it is characterised in that described to be worth to second according to second Hash and wait to sign Name data, including:
Step C7-1:The intelligent cipher key equipment identifies according to the Key Tpe got, and whether key corresponding to judgement Only to allow to carry out the key for checking signature, it is then to perform step C7-2, otherwise performs step C7-3;
Step C7-2:The intelligent cipher key equipment is filled to second cryptographic Hash, obtains second data to be signed;
Step C7-3:The intelligent cipher key equipment parses to the message, obtains Transaction Information, according to current hash algorithm Hash calculation is carried out to the Transaction Information, the 3rd cryptographic Hash is obtained, second cryptographic Hash and the 3rd cryptographic Hash is entered Row combination, and combined result is filled, obtain second data to be signed.
28. according to the method for claim 27, it is characterised in that whether key corresponding to the intelligent cipher key equipment judgement Only to allow to carry out the key for checking signature, it is specially:The intelligent cipher key equipment judges that the value of the Key Tpe mark is No is the 4th preset value, is, key corresponding to determination is only to allow to carry out the key for checking signature, otherwise close corresponding to determination Key is not only to allow to carry out the key for checking signature.
29. according to the method for claim 22, it is characterised in that the step C5 includes:The intelligent cipher key equipment will Common signature identifies set;
The intelligent cipher key equipment judges whether the data to be signed in memory block to be signed are the first data to be signed, specifically For:The intelligent cipher key equipment judges that the common signature identifies whether set, is to determine to wait to sign in memory block to be signed Name data are the first data to be signed, and it is the second data to be signed otherwise to determine the data to be signed in memory block to be signed.
30. according to the method for claim 22, it is characterised in that the step C7 includes:The intelligent cipher key equipment will Review signature mark set;
The intelligent cipher key equipment judges whether the data to be signed in memory block to be signed are the first data to be signed, specifically For:The intelligent cipher key equipment judges that the review signature identifies whether set, is to determine to wait to sign in memory block to be signed Name data are not the first data to be signed, and it is the first data to be signed otherwise to determine the data to be signed in memory block to be signed.
CN201510247236.XA 2015-05-15 2015-05-15 A kind of implementation method signed according to Key Tpe Active CN104852806B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510247236.XA CN104852806B (en) 2015-05-15 2015-05-15 A kind of implementation method signed according to Key Tpe

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510247236.XA CN104852806B (en) 2015-05-15 2015-05-15 A kind of implementation method signed according to Key Tpe

Publications (2)

Publication Number Publication Date
CN104852806A CN104852806A (en) 2015-08-19
CN104852806B true CN104852806B (en) 2018-01-05

Family

ID=53852176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510247236.XA Active CN104852806B (en) 2015-05-15 2015-05-15 A kind of implementation method signed according to Key Tpe

Country Status (1)

Country Link
CN (1) CN104852806B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871557B (en) * 2016-05-18 2019-04-16 飞天诚信科技股份有限公司 Email signature method, apparatus and system
CN110189125B (en) * 2019-05-29 2021-04-27 飞天诚信科技股份有限公司 Interactive digital signature method and system
CN111049654A (en) * 2019-11-11 2020-04-21 北京握奇智能科技有限公司 Tamper-proof protection method and system for bank USBKey certificate application
WO2021196047A1 (en) * 2020-03-31 2021-10-07 华为技术有限公司 Key processing method and apparatus
CN117353926B (en) * 2023-12-01 2024-02-27 苏州元脑智能科技有限公司 SM2 algorithm password processing method, device and equipment based on chip

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599836A (en) * 2009-07-14 2009-12-09 北京坚石诚信科技有限公司 A kind of endorsement method, signature device and system
CN103532721A (en) * 2013-10-23 2014-01-22 北京旋极信息技术股份有限公司 Digital signature method, signature verification method, and method of distinguishing transaction signature and common signature
CN103701598A (en) * 2013-12-05 2014-04-02 武汉信安珞珈科技有限公司 SM2 signature algorithm-based double-check signature method and digital signature equipment
CN104579677A (en) * 2014-11-18 2015-04-29 飞天诚信科技股份有限公司 Secure and rapid data signature method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7779258B2 (en) * 2006-09-22 2010-08-17 International Business Machines Corporation Method for controlling security function execution with a flexible, extendable, and non-forgable block

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599836A (en) * 2009-07-14 2009-12-09 北京坚石诚信科技有限公司 A kind of endorsement method, signature device and system
CN103532721A (en) * 2013-10-23 2014-01-22 北京旋极信息技术股份有限公司 Digital signature method, signature verification method, and method of distinguishing transaction signature and common signature
CN103701598A (en) * 2013-12-05 2014-04-02 武汉信安珞珈科技有限公司 SM2 signature algorithm-based double-check signature method and digital signature equipment
CN104579677A (en) * 2014-11-18 2015-04-29 飞天诚信科技股份有限公司 Secure and rapid data signature method

Also Published As

Publication number Publication date
CN104852806A (en) 2015-08-19

Similar Documents

Publication Publication Date Title
CN104852806B (en) A kind of implementation method signed according to Key Tpe
CN103081399B (en) Authenticating device and system
US9184918B2 (en) Trusted hardware for attesting to authenticity in a cloud environment
US9094823B2 (en) Data processing for securing local resources in a mobile device
CN101778099B (en) Architecture accessing trusted network for tolerating untrusted components and access method thereof
CN113014539B (en) Internet of things equipment safety protection system and method
US20150350164A1 (en) Intelligent card secure communication method
CN110737897B (en) Method and system for starting measurement based on trusted card
CN106534086B (en) A kind of equipment authentication method, terminal device, server and system
EP2378414A2 (en) Remote update method for firmware
WO2020035009A1 (en) Authentication system and working method therefor
CN109729046A (en) Two-dimensional code scanning method and terminal, authentication method and server and service system
CN106372487A (en) Method and system for enhancing trust of server operating system
CA3184034A1 (en) Software integrity protection method and apparatus, and software integrity verification method and apparatus
CN106156677A (en) Identity card card reading method and system
CN109257170A (en) Cryptographic key negotiation method, equipment, terminal, storage medium and system
WO2018166163A1 (en) Pos terminal control method, pos terminal, server and storage medium
CN106022081A (en) Card reading method for identity-card card-reading terminal, and terminal and system for identity-card card-reading
CN110190950A (en) A kind of implementation method and device of security signature
CN106936797A (en) The management method and system of magnetic disk of virtual machine and file encryption key in a kind of cloud
CN106529221B (en) A kind of FPGA program anti-copy method and PCI-E cipher card
CN106027249A (en) Identity card reading method and system
CN112287312B (en) Method and system for logging in Windows operating system
CN107919963B (en) Authenticator and implementation method thereof
CN107169318A (en) A kind of method and device of application security protection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
OL01 Intention to license declared