[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2014187209A1 - 一种备份电子签名令牌中信息的方法和系统 - Google Patents

一种备份电子签名令牌中信息的方法和系统 Download PDF

Info

Publication number
WO2014187209A1
WO2014187209A1 PCT/CN2014/075748 CN2014075748W WO2014187209A1 WO 2014187209 A1 WO2014187209 A1 WO 2014187209A1 CN 2014075748 W CN2014075748 W CN 2014075748W WO 2014187209 A1 WO2014187209 A1 WO 2014187209A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic signature
signature token
private key
data packet
token
Prior art date
Application number
PCT/CN2014/075748
Other languages
English (en)
French (fr)
Inventor
李东声
Original Assignee
天地融科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 天地融科技股份有限公司 filed Critical 天地融科技股份有限公司
Publication of WO2014187209A1 publication Critical patent/WO2014187209A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Definitions

  • the present invention relates to the field of electronic technologies, and in particular, to a method and system for backing up information in an electronic signature token. Background technique
  • the user's private key and the digital certificate are stored in the electronic signature token, and the user identity is authenticated by using the public key algorithm built into the USB Key.
  • the user private key cannot be read theoretically in any way to ensure the security of user authentication.
  • the electronic signature token cannot be obtained, and the user must re-apply the electronic signature token.
  • the key information such as the private key and the serial number must be redistributed and acquired, and the electronic signature token needs to be triggered.
  • the update process increases the maintenance cost of the electronic signature token. Even if there is a primary electronic signature token and a backup electronic signature token, once the primary electronic signature token is lost, and the remaining backup electronic signature token is upgraded, how to maintain the new standby electronic signature token is urgently needed to be solved. The problem. Summary of the invention
  • the present invention is directed to solving one of the above problems, and provides a method and system for backing up information in an electronic signature token.
  • the invention provides the following technical solutions:
  • a method for backing up information in an electronic signature token includes: after the first electronic signature token is backed up from the primary electronic signature token to obtain a private key of the primary electronic signature token, the first electronic signature token performs acquisition An operation of identifying information of an electronic signature token in a backup relationship with the first electronic signature token; the second electronic signature token performing an operation of transmitting a private key backup request packet, wherein the private key backup request packet includes a first signature issued by the CA server for the second electronic signature token; after receiving the private key backup request data packet, the first electronic signature token refers to the private key backup request packet Determining, by the first signature, whether the identifier of the second electronic signature token is in the acquired identifier information; if the identifier of the second electronic signature token is in the identifier information, The first electronic signature token encrypts the private key of the primary electronic signature token to obtain a private key of the encrypted primary electronic signature token; the first electronic The name token performs an operation of transmitting a private key backup response data packet, wherein the private key backup response data
  • the private key backup response data packet further includes an identifier of the first electronic signature token; the second electronic signature Before the token decrypts the private key of the encrypted primary electronic signature token in the private key backup response data packet, the method further includes: the second electronic signature token is used to back up the private key in the response data packet. Comparing the identifier of the first electronic signature token with the identifier of the primary electronic signature token corresponding to the locally stored second electronic signature token; if the identifier of the first electronic signature token and the second electronic If the identifiers of the primary electronic signature tokens corresponding to the signature tokens are the same, the operation of decrypting the private key of the encrypted primary electronic signature token in the private key backup response data packet is performed.
  • the operation of acquiring the identifier information of the electronic signature token in the backup relationship with the first electronic signature token includes: the first electronic signature token performing the sending identifier query request packet After receiving the identifier query request data packet, the CA server acquires identifier information of an electronic signature token that has a backup relationship with the first electronic signature token, and uses the CA server private key pair to The identifier information is signed, and then the identifier information processed by the identifier query response data packet is sent to the first electronic signature token; the first electronic signature token is processed by the signature Perform verification; if the verification passes, obtain the identification information.
  • the identifier query request data packet includes a second signature of the first electronic signature token.
  • the CA server After receiving the identifier query request data packet, acquires the existence of the first electronic signature token.
  • the method further includes: the CA server verifying the second signature of the first electronic signature token; if the verification is passed, the CA server acquires the first The electronic signature token has identification information of the electronic signature token of the backup relationship.
  • the operation of sending the identifier query request data packet by the first electronic signature token includes: the first electronic signature token signing the identifier query request data packet, and sending the signed identifier query request data before the CA server obtains the identifier information of the electronic signature token that has a backup relationship with the first electronic signature token, the method further includes: after receiving the signature identifier query request data packet, the CA server And verifying the signed identity query request data packet; if the verification is passed, the CA server acquires the identifier information of the electronic signature token that has a backup relationship with the first electronic signature token.
  • the operation of sending the private key backup request data packet by the second electronic signature token includes: the second electronic signature token signing the private key backup request data packet, and sending the signature processed private packet The key backup request data packet; before the first electronic signature token verifies the first signature in the private key backup request data packet, the method further includes: receiving the private key backup request after the signature processing After the data packet, the first electronic signature token verifies the signature processed private key backup request data packet, and if the verification passes, the first electronic signature token is in the private key backup request data packet. The first signature is verified.
  • the operation of sending the private key backup response data packet by the first electronic signature token includes: the first electronic signature token signing the private key backup response data packet, and sending the signature processed private packet Key backup response number Before the second electronic signature token is used to verify the second signature in the private key backup response data packet, the method further includes: after receiving the private key backup response data packet after the signature processing, The second electronic signature token verifies the signature-processed private key backup response data packet, and if the verification passes, executing the second electronic signature token to verify the second signature in the private key backup response data packet. operating.
  • the first electronic signature token encrypts the private key of the primary electronic signature token to obtain the private key of the encrypted primary electronic signature token, including: the first electronic signature token and the first And acquiring, by the second electronic signature token, the first electronic signature token and the second electronic signature token, by using the matching code, an encryption policy used for communication between the two and a decryption strategy corresponding to the encryption policy;
  • the first electronic signature token encrypts the private key of the primary electronic signature token by using the encryption policy to obtain a private key of the encrypted primary electronic signature token;
  • the second electronic signature token is for the private
  • Decrypting the private key of the encrypted primary electronic signature token in the key backup response packet includes: the second electronic signature token decrypting the private key of the encrypted primary electronic signature token by using the decryption policy .
  • the first electronic signature token and the second electronic signature token use the matching code to negotiate an encryption policy used by the two communications and a decryption policy corresponding to the encryption policy, including: using the second electronic The matching code obtained by the signature token is used as a code to be verified, and the second electronic signature token performs an operation of sending the to-be-verified code to the first electronic signature token; the first electronic signature token is acquired After the to-be-verified code, it is determined whether the to-be-verified code is the same as the locally obtained matching code; if the to-be-verified code is the same as the locally obtained matching code, the first electronic signature token generates both An encryption policy used by the communication and a decryption policy corresponding to the encryption policy; the first electronic signature token transmitting at least the decryption policy to the second electronic signature token.
  • the first electronic signature token and the second electronic signature token use the matching code to negotiate an encryption policy used by the two communications and a decryption policy corresponding to the encryption policy, including: the first electronic The signature token and the second electronic signature token obtain a correspondence between the matching code, the encryption policy, and the decryption policy; the first electronic signature token and the second electronic signature token search for the corresponding relationship in the correspondence relationship The encryption policy and the decryption policy corresponding to the matching code; if found, the encrypted policy and the decryption policy are used as an encryption policy used for communication and a decryption policy corresponding to the encryption policy.
  • the encrypting the private key of the primary electronic signature token by the first electronic signature token includes: the first electronic signature token acquiring a first key, the first key and the first The second key stored in the signature is the same, and the private key of the primary electronic signature token is encrypted by using the first key to obtain a private key of the encrypted primary electronic signature token; the second electronic signature order Decrypting the private key of the encrypted primary electronic signature token in the private key backup response data packet, including: the second electronic signature token acquiring the first key locally, and using the A key decrypts the private key of the encrypted primary electronic signature token.
  • a system for backing up information in an electronic signature token comprising: a first acquiring module in a first electronic signature token, After the first electronic signature token is backed up from the primary electronic signature token to obtain the private key of the primary electronic signature token, performing an identifier of the electronic signature token that has a backup relationship with the first electronic signature token The operation of the information; the first sending module of the second electronic signature token, configured to perform an operation of sending a private key backup request data packet, where the private key backup request data packet includes the second electronic signature token a first verification module of the first electronic signature token, configured to: after receiving the private key backup request data packet, verify the first signature in the private key backup request data packet; a determining module in the first electronic signature token, configured to determine, if the verification is passed, whether the identifier of the second electronic signature token is in the acquired identifier information; the encryption module in the first electronic signature token And if the identifier of the second electronic signature token is in the identifier information, encrypting a private key of the primary electronic signature token to obtain an encrypted
  • the second sending module of the first electronic signature token is configured to perform an operation of sending a private key backup response data packet, where the private key backup response data packet includes the first electronic signature command a second signature of the card and a private key of the encrypted primary electronic signature token;
  • the second verification module of the second electronic signature token is configured to: after receiving the private key backup response data packet, verify the second signature in the private key backup response data packet;
  • Decrypting module in the second electronic signature token configured to decrypt the private key of the encrypted primary electronic signature token in the private key backup response data packet if the verification is passed, to obtain the primary The private key of the electronic signature token.
  • the private key backup response data packet further includes an identifier of the first electronic signature token; the second electronic signature token further includes: a comparison module, configured to: back, in the private key backup response data packet Comparing the identifier of the first electronic signature token with the identifier of the primary electronic signature token corresponding to the locally stored second electronic signature token; if the identifier of the first electronic signature token and the second electronic signature token If the identifiers of the corresponding primary electronic signature tokens are the same, the operation of decrypting the private key of the encrypted primary electronic signature token in the private key backup response data packet is performed.
  • a comparison module configured to: back, in the private key backup response data packet Comparing the identifier of the first electronic signature token with the identifier of the primary electronic signature token corresponding to the locally stored second electronic signature token; if the identifier of the first electronic signature token and the second electronic signature token If the identifiers of the corresponding primary electronic signature tokens are the same, the operation of decrypting the private key of the encrypted primary electronic signature token in the private key
  • the first obtaining module is configured to perform an operation of sending an identifier query request data packet; the system further includes a CA server, wherein the CA server issues the first signature for the second electronic signature token, And issuing the second signature to the first electronic signature token, where the CA server includes: a second obtaining module, configured to acquire, after receiving the identifier query request data packet, the first electronic signature The token has the identifier information of the electronic signature token of the backup relationship; the signature module is configured to use the CA server private key to sign the identifier information; and the third sending module is configured to execute the signature processing by using the identifier query response packet And the first obtaining module is further configured to verify the identifier information after the signature processing; if the verification is passed, the identifier information is obtained.
  • the identifier query request data packet includes a second signature of the first electronic signature token.
  • the CA server further includes: a third verification module, configured to use the second signature of the first electronic signature token Performing verification, if the verification is passed, the second obtaining module acquires an electronic signature token having a backup relationship with the first electronic signature token. Identification information.
  • the first obtaining module is configured to: sign the identifier query request data packet, and send the signed identifier query request data packet;
  • the CA server further includes: a fourth verification module, configured to receive After the signed identifier query request data packet, the signed identifier query request data packet is verified; if the verification is passed, the second obtaining module acquires an electronic backup relationship with the first electronic signature token.
  • Signature token identification letter is configured to: sign the identifier query request data packet, and send the signed identifier query request data packet;
  • the CA server further includes: a fourth verification module, configured to receive After the signed identifier query request data packet, the signed identifier query request data packet is verified; if the verification is passed, the second obtaining module acquires an electronic backup relationship with the first electronic signature token.
  • the first sending module is configured to sign the private key backup request data packet, and send the signature processed private key backup request data packet;
  • the first electronic signature token further includes: a fifth verification a module, configured to perform verification on the signature-processed private key backup request data packet after receiving the signature-processed private key backup request data packet, and if the verification is passed, the first verification module is The first signature in the private key backup request packet is verified.
  • the second sending module is configured to: sign the private key backup response data packet, and send the signature private key backup response data packet;
  • the second electronic signature token further includes: a sixth verification a module, configured to: after receiving the signature-processed private key backup response data packet, verify the signature-processed private key backup response data packet, and if the verification passes, the second verification module performs The private key backup responds to the second signature in the data packet for verification.
  • the system further includes: a first negotiation module in the first electronic signature token and a second negotiation module in the second electronic signature token, where the first negotiation module and the second negotiation module are used Obtaining a matching code, and using the matching code to negotiate an encryption policy used by the first electronic signature token and the second electronic signature token communication, and a decryption policy corresponding to the encryption policy; wherein the encryption module Encrypting the private key of the primary electronic signature token with the encryption policy to obtain a private key of the encrypted primary electronic signature token; wherein the decryption module is configured to encrypt the encryption by using the decryption policy The private key of the subsequent primary electronic signature token is decrypted to obtain the private key of the primary electronic signature token.
  • the second negotiation module is configured to use the matching code obtained by the second electronic signature token as a code to be verified, and perform an operation of sending the to-be-verified code to the first negotiation module; a negotiation module, configured to determine, after obtaining the to-be-verified code, whether the to-be-verified code is the same as the locally obtained matching code; if the to-be-verified code is the same as the locally obtained matching code, Generating an encryption policy used by the first electronic signature token and the second electronic signature token communication and a decryption policy corresponding to the encryption policy; and transmitting the decryption policy to the second negotiation module at least.
  • the negotiation module in the first electronic signature token and the second electronic signature token obtains an encryption policy used by the two communications and a decryption policy corresponding to the encryption policy, where the first negotiation module and the first negotiation module Said
  • the second negotiation module is configured to obtain a correspondence between the matching code, the encryption policy, and the decryption policy, and search for the encryption policy and the decryption policy corresponding to the matching code in the correspondence relationship; if found, the The encryption policy and the decryption policy are used as an encryption policy used by the first electronic signature token and the second electronic signature token communication, and a decryption policy corresponding to the encryption policy.
  • the cryptographic module is configured to acquire a first key, where the first key is the same as a second key stored in the first signature, and encrypt the primary electronic signature token by using the first key
  • the private key, the private key of the encrypted primary electronic signature token ; the decryption module, configured to acquire the first key locally, and use the first key to sign the encrypted primary electronic signature
  • the private key of the token is decrypted to obtain the private key of the primary electronic signature token.
  • the first electronic signature token acquires the identification information of the electronic signature token stored in the backup relationship, and when receiving the private key backup request packet sent by the second electronic signature token, An electronic signature token verifies the first signature to determine whether the second electronic signature token is a legitimate device, and then determines whether the second electronic signature token is in the identification information to determine the first electronic signature token and the first Whether there is an active/standby relationship between the two electronic signature tokens.
  • the first electronic signature token encrypts the private key of the primary electronic signature token, and then encrypts the encrypted primary electronic signature token.
  • the private key is sent out through the private key backup response packet, and after the second electronic signature token receives the private key backup response data packet, the second electronic signature token verifies the second signature to determine the first electronic signature token. Whether it is a legal device, after determining the legality, the second electronic signature token decrypts the private key of the encrypted second electronic signature token to obtain the main electronic The private key of the signature token completes the backup of the private key.
  • the second electronic signature token and the first electronic signature token respectively verify the legality of the other party, and the first electronic signature token verifies the master-slave relationship, and the private key is transmitted under the premise of determining the security of the other party. Secure backup private key.
  • FIG. 1 is a schematic flowchart of a method for backing up information in an electronic signature token according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a system for backing up information in an electronic signature token according to an embodiment of the present invention. detailed description
  • connection In the description of the present invention, it should be noted that the terms “installation”, “connected”, and “connected” are to be understood broadly, and may be fixed or detachable, for example, unless otherwise explicitly defined and defined. Connected, or connected integrally; can be mechanical or electrical; can be directly connected, or indirectly connected through an intermediate medium, can be the internal communication of the two components.
  • Connected, or connected integrally can be mechanical or electrical; can be directly connected, or indirectly connected through an intermediate medium, can be the internal communication of the two components.
  • the specific meaning of the above terms in the present invention can be understood in a specific case by those skilled in the art.
  • FIG. 1 is a schematic flowchart diagram of an embodiment of a method for backing up information in an electronic signature token according to the present invention.
  • the method embodiment shown in Figure 1 includes:
  • Step 101 After the first electronic signature token is backed up from the primary electronic signature token to obtain the private key of the primary electronic signature token, the first electronic signature token performs an operation of acquiring the identification information of the second electronic signature token.
  • Step 102 The second electronic signature token performs an operation of sending a private key backup request data packet, where the private key backup request data packet includes a CA (Certificate Authority) server as the second electronic signature token.
  • CA Certificate Authority
  • Step 103 After receiving the private key backup request data packet, the first electronic signature token verifies the first signature in the private key backup request data packet.
  • Step 104 If the verification is passed, determining whether the identifier of the second electronic signature token is in the acquired identifier information; if the identifier of the second electronic signature token is in the identifier information;
  • Step 105 If the identifier of the second electronic signature token is in the identifier information, the first electronic signature token encrypts the private key of the primary electronic signature token to obtain the private identity of the encrypted primary electronic signature token. Key
  • Step 106 The first electronic signature token performs an operation of sending a private key backup response data packet, where the private key backup response data packet includes a second signature issued by the CA server for the first electronic signature token, and The private key of the encrypted primary electronic signature token;
  • Step 107 The first electronic signature token responds to the private key backup after receiving the private key backup response data packet.
  • the second signature in the data packet is verified;
  • Step 108 If the verification is passed, decrypt the private key of the encrypted primary electronic signature token in the private key backup response packet to obtain the private key of the primary electronic signature token.
  • the first electronic signature token acquires the identification information of the electronic signature token stored in the backup relationship, and when receiving the private key backup request packet sent by the second electronic signature token, An electronic signature token verifies the first signature to determine whether the second electronic signature token is a legitimate device, and then determines whether the second electronic signature token is in the identification information to determine the first electronic signature token and the first Whether there is an active/standby relationship between the two electronic signature tokens.
  • the first electronic signature token encrypts the private key of the primary electronic signature token, and then encrypts the encrypted primary electronic signature token.
  • the private key is sent out through the private key backup response packet, and after the second electronic signature token receives the private key backup response data packet, the second electronic signature token verifies the second signature to determine the first electronic signature token. Whether it is a legal device, after determining the legality, the second electronic signature token decrypts the private key of the encrypted second electronic signature token to obtain the main electronic The private key of the signature token completes the backup of the private key.
  • the second electronic signature token and the first electronic signature token respectively verify the legality of the other party, and the first electronic signature token verifies the master-slave relationship, and the private key is transmitted under the premise of determining the security of the other party. Secure backup private key.
  • the private key backup response data packet further includes an identifier of the first electronic signature token
  • the method further includes:
  • the second electronic signature token compares the identifier of the first electronic signature token in the private key backup response packet with the identifier of the primary electronic signature token corresponding to the locally stored second electronic signature token;
  • the identifier of the first electronic signature token is the same as the identifier of the primary electronic signature token corresponding to the second electronic signature token, performing the encryption of the primary electronic signature token in the private key backup response packet The operation of decrypting the private key.
  • the second electronic signature token can determine the first electronic signature token and the second electronic signature token by determining that the identifier of the first electronic signature token is compared with the identifier of the primary electronic signature token of the first electronic signature token. Whether there is an active/standby relationship between them, to ensure the security of their private key backup.
  • the operation of the first electronic signature token to obtain the identifier information of the electronic signature token having the backup relationship with the first electronic signature token to the CA server includes:
  • the first electronic signature token performs an operation of transmitting an identifier query request packet
  • the CA server After receiving the identifier query request data packet, the CA server obtains the identifier information of the electronic signature token that has a backup relationship with the first electronic signature token, and signs the identifier information by using the CA server private key. Again Sending, by the identifier query response data packet, the signature processed identifier information to the first electronic signature token; the first electronic signature token validating the signature processed identifier information; Said the logo.
  • the identifier information is obtained by the CA server in the embodiment of the present invention, and the identifier information is signed by using the CA server private key, and the accuracy and security are high.
  • the identifier query request data packet includes a second signature of the first electronic signature token
  • the method further includes:
  • the C A server verifies the second signature of the first electronic signature token
  • the CA server acquires identification information of the electronic signature token having a backup relationship with the first electronic signature token.
  • the CA server uses the CA server public key to verify that the first signature of the first electronic signature token passes, indicating that the first electronic signature token is a legitimate device, and then acquiring the identification information to avoid an illegal electronic signature token. Defraud the identification information to improve the security of the information.
  • the CA server spoofs the identification information, and the first electronic signature token performs an operation of sending an identifier query request packet, including:
  • the first electronic signature token signs the identifier query request data packet, and sends the signed identifier query request data packet;
  • the signature used here is the private key used by the first electronic signature token in the communication process between the first electronic signature token and the CA server;
  • the method further includes:
  • the CA server verifies the signed identity query request data packet
  • the CA server acquires identification information of the electronic signature token having a backup relationship with the first electronic signature token.
  • the CA server verifies the signature by using the public key corresponding to the private key used by the first electronic signature token in the communication process between the first electronic signature token and the CA server.
  • the second electronic signature token performs an operation of sending a private key backup request data packet, including: The second electronic signature token signs the private key backup request data packet, and sends the signature processed private key backup request data packet;
  • the method further includes: the first electronic signature token verifying the signature processed private key backup request data packet And if the verification passes, the first electronic signature token verifies the first signature in the private key backup request packet.
  • the private key backup request data packet is signed by the second electronic signature token, and the private key backup request data packet is verified by the first electronic signature token, so that the second electronic device that initiates the backup request is implemented.
  • the identity of the signature token is such that the electronic signature token with the first signature cannot spoof the private key of the primary electronic signature token, thereby improving the security of the private key backup.
  • the private key used for signing the private key backup request packet and the public key used by the first electronic signature token to verify the signature of the private key backup request packet are pre-negotiated and respectively written to each In the device.
  • the first electronic signature token performs an operation of sending a private key backup response data packet, including:
  • the first electronic signature token signs the private key backup response data packet, and sends the signature processed private key backup response data packet;
  • the method further includes: the second electronic signature token verifying the signature private key backup response data packet, if After the verification is passed, the second electronic signature token is performed to verify the second signature in the private key backup response data packet.
  • the private key backup response data packet is signed by the first electronic signature token
  • the second electronic signature token is used to verify the private key backup response data packet, so as to implement the first electronic response to initiate the backup response.
  • the identity authentication of the signature token enables the legal electronic signature token with the second signature to prevent the second electronic signature token from acquiring the correct private key, and ensures that the second electronic signature token can back up the correct private key.
  • the private key used for signing the private key backup request packet and the public key used by the second electronic signature token to verify the signed private key backup request packet are pre-negotiated and respectively written to each In the device.
  • the first electronic signature token encrypts the private key of the primary electronic signature token in the following two manners, including:
  • Manner 1 The first electronic signature token and the second electronic signature token obtain a matching code, and the first electronic signature token and the second electronic signature token use the matching code to negotiate an encryption policy used for communication between the two and the encryption a decryption policy corresponding to the policy; the first electronic signature token encrypts the private key of the primary electronic signature token by using the encryption policy, and obtains a private key of the encrypted primary electronic signature token; The second electronic signature token decrypts the private key of the encrypted primary electronic signature token in the private key backup response data packet, and obtains the private key of the primary electronic signature token, including: The second electronic signature token decrypts the private key of the encrypted primary electronic signature token by using the decryption policy to obtain a private key of the primary electronic signature token.
  • the first electronic signature token acquires a first key, the first key is the same as the second key stored in the digital signature of the second electronic signature token, and the primary key is encrypted by using the first key
  • the private key of the signature token is obtained, and the private key of the encrypted main electronic signature token is obtained;
  • the decrypting, by the second electronic signature token, the private key of the encrypted primary electronic signature token in the private key backup response data packet comprises: the first electronic signature token in the private key backup response data packet The private key of the encrypted primary electronic signature token is decrypted.
  • the second electronic signature token may generate a matching code according to a locally pre-stored matching code generation policy, and the matching code may include at least one of a character, a number, and a character, and output the matching code; of course, the first electronic signature token is obtained.
  • the matching code may include wireless or wired transmission, or manual input by the user.
  • the second electronic signature token and the first electronic signature token may be matched by the bank backend server to send the matching code to the second electronic signature token and the first electronic signature token.
  • the method of generating the matching code by the second electronic signature token and acquiring by the first electronic signature token does not require the participation of the bank background server, and the interaction process is simpler than that of the bank background server.
  • matching code negotiation encryption and decryption strategies has the following two types, including:
  • the matching code obtained by the first electronic signature token is used as a code to be verified, and the first electronic signature token performs an operation of sending the to-be-verified code to the second electronic signature token;
  • the second electronic signature token is acquired After the code to be verified, it is determined whether the code to be verified is the same as the matching code obtained locally; if the code to be verified is the same as the matching code, the second electronic signature token generates an encryption policy used for communication between the two and the encryption policy.
  • the second electronic signature token performs an operation of transmitting a decryption policy to the first electronic signature token.
  • the second electronic signature token determines whether the device that initiates the encryption/decryption policy with the second electronic signature token is determined by comparing the to-be-verified code with the locally obtained matching code.
  • the first electronic signature token is used to verify the identity of the first electronic signature token, and the device is determined to be the first electronic signature token, and then the decryption algorithm is sent to the first electronic signature token to ensure the transmission of the private key. Safety.
  • the first electronic signature token performs an operation of sending the to-be-verified code to the second electronic signature token, including:
  • the first electronic signature token signs the code to be verified, and sends the signature to be verified to the second electronic signature.
  • the method further includes:
  • the second electronic signature token verifies the second electronic signature token to be verified by the signature processing. If the verification succeeds, it is determined whether the code to be verified is the same as the locally obtained matching code.
  • the private key used by the first electronic signature token to sign the verification code may be the same as the private key used when the first electronic signature token signs the private key backup request packet.
  • the second electronic signature order The public key used by the card to verify the signed code to be verified is the same as the public key used to back up the request packet for the signed private key.
  • the second electronic signature token performs the operation of sending the decryption policy to the first electronic signature token, including:
  • the second electronic signature token signs the decryption policy, and the decryption strategy after the signature processing is sent to the first electronic signature token;
  • the method further includes:
  • the first electronic signature token verifies the decryption policy after the signature processing, and if the verification passes, the decryption policy is obtained.
  • the private key used by the second electronic signature token to sign the decryption policy may be the same as the private key used by the second electronic signature token to sign the private key backup response packet.
  • the first electronic signature order The public key used by the card to verify the decrypted decryption policy is the same as the public key used to back up the response packet to the signed private key.
  • the second electronic signature token and the first electronic signature token obtain a correspondence between the matching code, the encryption policy, and the decryption policy; and the second electronic signature token and the first electronic signature token find a matching code corresponding to the matching
  • the encryption policy and the decryption policy; if found, the encrypted policy and the decryption policy that are found are used as the encryption policy used for communication and the decryption policy corresponding to the encryption policy.
  • the second electronic signature token and the first electronic signature token determine the encryption and decryption strategy used for communication by querying the locally obtained correspondence relationship, and the implementation is simple, and the second electronic signature token and the The information exchange between an electronic signature token reduces the possibility of information being stolen.
  • the above two methods can achieve the purpose of randomly selecting encryption and decryption strategies by matching codes, improve the randomness of the encryption method, and ensure communication security.
  • the first electronic signature token in the present invention pre-stores a private key that signs the content when communicating with the second electronic signature token, and performs verification of the signed content sent by the second electronic signature token.
  • the second electronic signature token used at the time is used for the public key of the communication, and a pair of keys for encrypting and decrypting the content; and the second electronic signature token is pre-stored with the content when the first electronic signature token is communicated
  • Signed private key, signed by the first electronic signature token The first electronic signature token used for the verification of the name is used for the public key of the communication and the private key of the first electronic signature token for the backup; in addition, the first electronic signature token is also stored
  • the private key that signs the content when communicating with the CA server, and correspondingly, the CA server stores the public key used to authenticate the signed content when communicating with the first electronic signature token.
  • FIG. 2 is a schematic structural diagram of a system embodiment for backing up information in an electronic signature token according to the present invention.
  • the system embodiment shown in Figure 2 includes:
  • the first obtaining module 201 of the first electronic signature token is configured to perform acquiring and the first electronic signature after the first electronic signature token is backed up from the primary electronic signature token to obtain the private key of the primary electronic signature token.
  • the first sending module 202 of the second electronic signature token is configured to perform an operation of sending a private key backup request data packet, where the private key backup request data packet includes a first signature of the second electronic signature token;
  • the first verification module 203 of the first electronic signature token is configured to: after receiving the private key backup request data packet, verify the first signature in the private key backup request data packet;
  • the determining module 204 of the first electronic signature token is configured to determine, if the verification is passed, whether the identifier of the second electronic signature token is in the acquired identification information;
  • the encryption module 205 in the first electronic signature token is configured to encrypt the private key of the primary electronic signature token if the identifier of the second electronic signature token is in the identification information, The private key of the encrypted primary electronic signature token;
  • the second sending module 206 of the first electronic signature token is configured to perform an operation of sending a private key backup response data packet, where the private key backup response data packet includes a second signature of the first electronic signature token and The private key of the encrypted primary electronic signature token;
  • the second verification module 207 of the second electronic signature token is configured to verify the second signature in the private key backup response data packet after receiving the private key backup response data packet;
  • the decryption module 208 in the second electronic signature token is configured to decrypt the private key of the encrypted primary electronic signature token in the private key backup response data packet to obtain a primary electronic signature order if the verification is passed.
  • the private key of the card is configured to decrypt the private key of the encrypted primary electronic signature token in the private key backup response data packet to obtain a primary electronic signature order if the verification is passed. The private key of the card.
  • the private key backup response data packet further includes an identifier of the first electronic signature token
  • the second electronic signature token further includes:
  • a comparison module configured to compare an identifier of the first electronic signature token in the private key backup response packet with an identifier of a primary electronic signature token corresponding to the locally stored second electronic signature token;
  • the identifier of the signature token is the same as the identifier of the primary electronic signature token corresponding to the second electronic signature token, and then performing decryption on the private key of the encrypted primary electronic signature token in the private key backup response packet Operation.
  • the first obtaining module is configured to perform an operation of sending an identifier query request data packet; the system further includes a CA server, wherein the CA server issues the first signature for the second electronic signature token, And issuing the second signature to the first electronic signature token, where the CA server includes: a second obtaining module, configured to acquire, after receiving the identifier query request data packet, the first electronic signature The token has the identification information of the electronic signature token of the backup relationship;
  • a signing module configured to sign the identification information by using a CA server private key
  • a third sending module configured to perform an operation of sending, by using the identifier query response data packet, the identifier processed information to the first electronic signature token
  • the first obtaining module is further configured to: perform verification on the signature processed identifier information; if the verification passes, obtain the identifier information.
  • the identifier query request data packet includes a second signature of the first electronic signature token
  • the CA server further includes:
  • a third verification module configured to verify a second signature of the first electronic signature token, and if the verification succeeds, the second obtaining module acquires an electronic signature that has a backup relationship with the first electronic signature token The identification information of the token.
  • the first obtaining module is configured to sign the identifier query request data packet, and send the signed identifier query request data packet;
  • the CA server further includes:
  • a fourth verification module configured to: after receiving the signed identifier query request data packet, verify the signed identifier query request data packet; if the verification is passed, the second obtaining module acquires the first electronic The signature token has identification information of the electronic signature token of the backup relationship.
  • the first obtaining module is configured to sign the identifier query request data packet, and send the signed identifier query request data packet;
  • the CA server further includes:
  • a fourth verification module configured to: after receiving the signed identity query request data packet, the CA server performs verification on the signed identity query request data packet; if the verification is passed, the CA server obtains the An electronic signature token has identification information of an electronic signature token of a backup relationship.
  • the first sending module is configured to sign a private key backup request data packet, and send a signature private key backup request data packet;
  • the first electronic signature token further includes:
  • a fifth verification module configured to: after receiving the signature processing private key backup request data packet, the signature The processed private key backup request packet is verified. If the verification is passed, the first verification module verifies the first signature in the private key backup request packet.
  • the second sending module is configured to sign a private key backup response data packet, and send a signature private key backup response data packet;
  • the second electronic signature token further includes:
  • a sixth verification module configured to: after receiving the private key backup response data packet after the signature processing, verify the private key backup response data packet after the signature processing, and if the verification is passed, the second verification module performs the private The operation of verifying the second signature in the key backup response packet.
  • the system further includes: a first negotiation module in the first electronic signature token and a second negotiation module in the second electronic signature token, where the first negotiation module and the second negotiation module are used Obtaining a matching code, and using the matching code to negotiate an encryption policy used by the first electronic signature token and the second electronic signature token communication, and a decryption strategy corresponding to the encryption policy;
  • the encryption module is configured to encrypt the private key of the primary electronic signature token by using the encryption policy, to obtain a private key of the encrypted primary electronic signature token; and the decryption module is configured to utilize the decryption policy. Decrypting the private key of the encrypted primary electronic signature token to obtain a private key of the primary electronic signature token.
  • the second negotiation module is configured to use the matching code obtained by the second electronic signature token as a code to be verified, and perform an operation of sending the to-be-verified code to the first negotiation module; a negotiation module, configured to determine, after obtaining the to-be-verified code, whether the to-be-verified code is the same as the locally obtained matching code; if the to-be-verified code is the same as the locally obtained matching code, Generating an encryption policy used by the first electronic signature token and the second electronic signature token communication and a decryption policy corresponding to the encryption policy; and transmitting the decryption policy to the second negotiation module at least.
  • the negotiation module in the first electronic signature token and the second electronic signature token obtains an encryption policy used by the two communications and a decryption policy corresponding to the encryption policy, including:
  • the first electronic signature token and the second electronic signature token Corresponding relationship between the first electronic signature token and the second electronic signature token to obtain a matching code, an encryption policy, and a decryption policy; the first electronic signature token and the second electronic signature token searching for the matching code in the correspondence relationship Corresponding encryption policy and decryption policy; if found, the encrypted policy and the decryption policy are used as an encryption policy used for communication and a decryption policy corresponding to the encryption policy.
  • the encryption module is configured to acquire a first key, where the first key is the same as a second key stored in the first signature, and encrypt the private identifier of the primary electronic signature token by using the first key Key, the private key of the encrypted primary electronic signature token is obtained;
  • the decrypting module is configured to acquire the first key locally, and use the first key pair to encrypt the main
  • the private key of the electronic signature token is decrypted to obtain the private key of the primary electronic signature token.
  • the first electronic signature token acquires the identification information of the electronic signature token stored in the backup relationship, and when receiving the private key backup request packet sent by the second electronic signature token, An electronic signature token verifies the first signature to determine whether the second electronic signature token is a legitimate device, and then determines whether the second electronic signature token is in the identification information to determine the first electronic signature token and the first Whether there is an active/standby relationship between the two electronic signature tokens.
  • the first electronic signature token encrypts the private key of the primary electronic signature token, and then encrypts the encrypted primary electronic signature token.
  • the private key is sent out through the private key backup response packet, and after the second electronic signature token receives the private key backup response data packet, the second electronic signature token verifies the second signature to determine the first electronic signature token. Whether it is a legal device, after determining the legality, the second electronic signature token decrypts the private key of the encrypted second electronic signature token to obtain the main electronic The private key of the signature token completes the backup of the private key.
  • the second electronic signature token and the first electronic signature token respectively verify the legality of the other party, and the first electronic signature token verifies the master-slave relationship, and the private key is transmitted under the premise of determining the security of the other party. Secure backup private key.
  • portions of the invention may be implemented in hardware, software, firmware or a combination thereof.
  • multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
  • a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented with any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
  • each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the integrated module can also be stored in a computer readable form if it is implemented in the form of a software functional module and sold or used as a standalone product. Take the storage medium.
  • the above-mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the description of the terms “one embodiment”, “some embodiments”, “example”, “specific example”, or “some examples” and the like means a specific feature described in connection with the embodiment or example.
  • a structure, material or feature is included in at least one embodiment or example of the invention.
  • the schematic representation of the above terms does not necessarily mean the same embodiment or example.
  • the particular features, structures, materials, or characteristics described may be combined in a suitable manner in any one or more embodiments or examples.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提供一种备份电子签名令牌中信息的方法和系统,所述方法包括:第一电子签名令牌执行获取标识信息的操作;第二电子签名令牌执行发送私钥备份请求数据包的操作;第一电子签名令牌对私钥备份请求数据包中的第一签名进行验证;如果验证通过,判断第二电子签名令牌的标识是否在获取的标识信息中;如果在标识信息中,则第一电子签名令牌对主电子签名令牌的私钥进行加密;第一电子签名令牌执行发送私钥备份响应数据包的操作;第二电子签名令牌对私钥备份响应数据包中的第二签名进行验证;如果验证通过,则对加密后的主电子签名令牌的私钥进行解密,得到主电子签名令牌的私钥。

Description

一种备份电子签名令牌中信息的方法和系统
技术领域
本发明涉及一种电子技术领域,尤其涉及一种备份电子签名令牌中信息的方法和系统。 背景技术
现有技术中, 电子签名令牌中存储用户的私钥以及数字证书, 利用 USB Key内置的公 钥算法实现对用户身份的认证。 在现有的电子签名令牌中理论上使用任何方式都无法读取 用户私钥, 以保证了用户认证的安全性。 然而, 一旦电子签名令牌丢失, 就无法得到原有 的私钥, 用户就必须重新办理电子签名令牌, 私钥和序列号等关键信息都得重新分发和获 取, 需要触发电子签名令牌的更新流程, 使得电子签名令牌的维护成本提高。 即使有主电 子签名令牌和备电子签名令牌, 一旦主电子签名令牌丢失后, 剩下的备电子签名令牌升级 为主, 那么如何对新的备电子签名令牌进行维护是亟待解决的问题。 发明内容
本发明旨在解决上述问题之一, 提供一种备份电子签名令牌中信息的方法和系统。 本发明提供如下技术方案:
一种备份电子签名令牌中信息的方法, 所述方法包括: 当第一电子签名令牌从主电子 签名令牌备份得到主电子签名令牌的私钥后, 第一电子签名令牌执行获取与所述第一电子 签名令牌存在备份关系的电子签字令牌的标识信息的操作; 第二电子签名令牌执行发送私 钥备份请求数据包的操作, 其中所述私钥备份请求数据包包括由 CA服务器为所述第二电 子签名令牌颁发的第一签名; 第一电子签名令牌在接收到所述私钥备份请求数据包后, 对 所述私钥备份请求数据包中的所述第一签名进行验证; 如果验证通过, 判断所述第二电子 签名令牌的标识是否在获取的标识信息中; 如果所述第二电子签名令牌的标识在所述标识 信息中, 则所述第一电子签名令牌对所述主电子签名令牌的私钥进行加密, 得到加密后的 主电子签名令牌的私钥; 所述第一电子签名令牌执行发送私钥备份响应数据包的操作, 其 中所述私钥备份响应数据包包括由所述 CA服务器为所述第一电子签名令牌颁发的第二签 名以及所述加密后的主电子签名令牌的私钥; 所述第二电子签名令牌在接收到所述私钥备 份响应数据包后, 对所述私钥备份响应数据包中的第二签名进行验证; 如果验证通过, 则 对所述私钥备份响应数据包中加密后的主电子签名令牌的私钥进行解密, 得到所述主电子 签名令牌的私钥。
其中, 所述私钥备份响应数据包还包括第一电子签名令牌的标识; 所述第二电子签名 令牌对所述私钥备份响应数据包中所述加密后的主电子签名令牌的私钥进行解密之前, 还 包括: 所述第二电子签名令牌将所述私钥备份响应数据包中的所述第一电子签名令牌的标 识与本地存储的第二电子签名令牌对应的主电子签名令牌的标识进行比较; 如果所述第一 电子签名令牌的标识与所述第二电子签名令牌对应的主电子签名令牌的标识相同, 则执行 对所述私钥备份响应数据包中所述加密后的主电子签名令牌的私钥进行解密的操作。
其中, 第一电子签名令牌执行获取与所述第一电子签名令牌存在备份关系的电子签字 令牌的标识信息的操作, 包括: 所述第一电子签名令牌执行发送标识查询请求数据包的操 作; 所述 CA服务器在接收到所述标识查询请求数据包后, 获取与所述第一电子签名令牌 存在备份关系的电子签字令牌的标识信息, 并利用 CA服务器私钥对所述标识信息进行签 名, 再执行通过标识查询响应数据包将签名处理后的标识信息发送给所述第一电子签名令 牌的操作; 所述第一电子签名令牌对所述签名处理后的标识信息进行验证; 如果验证通过, 获取所述标识信息。
其中, 所述标识查询请求数据包包括所述第一电子签名令牌的第二签名; 所述 CA服 务器在接收到所述标识查询请求数据包之后,获取与所述第一电子签名令牌存在备份关系 的电子签字令牌的标识信息之前, 还包括: 所述 CA服务器对所述第一电子签名令牌的第 二签名进行验证; 如果验证通过, 则所述 CA服务器获取与所述第一电子签名令牌存在备 份关系的电子签字令牌的标识信息。
其中, 所述第一电子签名令牌执行发送标识查询请求数据包的操作, 包括: 所述第一 电子签名令牌对所述标识查询请求数据包进行签名, 并发送签名后的标识查询请求数据包 所述 CA服务器获取与所述第一电子签名令牌存在备份关系的电子签字令牌的标识信息之 前, 还包括: 在接收到所述签名后的标识查询请求数据包后, 所述 CA服务器对所述签名 后的标识查询请求数据包进行验证; 如果验证通过, 则 CA服务器获取与所述第一电子签 名令牌存在备份关系的电子签字令牌的标识信息。
其中, 所述第二电子签名令牌执行发送私钥备份请求数据包的操作, 包括: 所述第二 电子签名令牌对所述私钥备份请求数据包进行签名, 并发送签名处理后的私钥备份请求数 据包;所述第一电子签名令牌对所述私钥备份请求数据包中的所述第一签名进行验证之前, 还包括: 在接收到所述签名处理后的私钥备份请求数据包后, 所述第一电子签名令牌对所 述签名处理后的私钥备份请求数据包进行验证, 如果验证通过, 则第一电子签名令牌对所 述私钥备份请求数据包中的所述第一签名进行验证。
其中, 所述第一电子签名令牌执行发送私钥备份响应数据包的操作, 包括: 所述第一 电子签名令牌对所述私钥备份响应数据包进行签名, 并发送签名处理后的私钥备份响应数 据包; 所述第二电子签名令牌对所述私钥备份响应数据包中的第二签名进行验证之前, 还 包括: 在接收到所述签名处理后的私钥备份响应数据包后, 所述第二电子签名令牌对签名 处理后的私钥备份响应数据包进行验证, 如果验证通过, 则执行所述第二电子签名令牌对 私钥备份响应数据包中的第二签名进行验证的操作。
其中, 所述第一电子签名令牌对所述主电子签名令牌的私钥进行加密得到加密后的主 电子签名令牌的私钥, 包括: 所述第一电子签名令牌和所述第二电子签名令牌获取匹配码; 所述第一电子签名令牌与所述第二电子签名令牌利用所述匹配码协商两者通信所使用的加 密策略以及该加密策略对应的解密策略; 所述第一电子签名令牌利用所述加密策略对所述 主电子签名令牌的私钥加密, 得到加密后的主电子签名令牌的私钥; 所述第二电子签名令 牌对所述私钥备份响应数据包中加密后的主电子签名令牌的私钥进行解密包括: 所述第二 电子签名令牌利用所述解密策略对所述加密后的主电子签名令牌的私钥进行解密。
其中, 所述第一电子签名令牌与所述第二电子签名令牌利用所述匹配码协商两者通信 所使用的加密策略以及该加密策略对应的解密策略, 包括: 将所述第二电子签名令牌获取 到的匹配码作为待验证码, 所述第二电子签名令牌执行发送该待验证码给所述第一电子签 名令牌的操作; 所述第一电子签名令牌在获取到所述待验证码后, 判断所述待验证码与本 地获取到的匹配码是否相同; 如果所述待验证码与所述本地获取到的匹配码相同, 则第一 电子签名令牌生成两者通信所使用的加密策略以及所述加密策略对应的解密策略; 所述第 一电子签名令牌至少将所述解密策略发送给所述第二电子签名令牌。
其中, 所述第一电子签名令牌与所述第二电子签名令牌利用所述匹配码协商两者通信 所使用的加密策略以及所述加密策略对应的解密策略, 包括: 所述第一电子签名令牌和所 述第二电子签名令牌获取匹配码、 加密策略和解密策略的对应关系; 所述第一电子签名令 牌和所述第二电子签名令牌在所述对应关系中查找所述匹配码对应的加密策略和解密策 略; 如果查找到, 则将查找到的加密策略和解密策略作为两者通信所使用的加密策略以及 所述加密策略对应的解密策略。
其中, 所述第一电子签名令牌对所述主电子签名令牌的私钥进行加密包括: 所述第一 电子签名令牌获取第一密钥, 所述第一密钥与所述第一签名中存储的第二密钥相同, 并利 用所述第一密钥加密所述主电子签名令牌的私钥, 得到加密后的主电子签名令牌的私钥; 所述第二电子签名令牌对所述私钥备份响应数据包中加密后的主电子签名令牌的私钥进行 解密, 包括: 所述第二电子签名令牌从本地获取所述第一密钥, 并利用所述第一密钥对所 述加密后主电子签名令牌的私钥进行解密。
一种备份电子签名令牌中信息的系统, 包括: 第一电子签名令牌中的第一获取模块, 用于当所述第一电子签名令牌从主电子签名令牌备份得到主电子签名令牌的私钥后, 执行 获取与所述第一电子签名令牌存在备份关系的电子签字令牌的标识信息的操作; 第二电子 签名令牌中的第一发送模块, 用于执行发送私钥备份请求数据包的操作, 其中所述私钥备 份请求数据包包括所述第二电子签名令牌的第一签名; 所述第一电子签名令牌中的第一验 证模块, 用于在接收到私钥备份请求数据包后, 对所述私钥备份请求数据包中的所述第一 签名进行验证; 所述第一电子签名令牌中的判断模块, 用于如果验证通过, 判断所述第二 电子签名令牌的标识是否在获取的标识信息中; 所述第一电子签名令牌中的加密模块, 用 于如果所述第二电子签名令牌的标识在所述标识信息中, 则对所述主电子签名令牌的私钥 进行加密, 得到加密后的主电子签名令牌的私钥; 所述第一电子签名令牌中的第二发送模 块, 用于执行发送私钥备份响应数据包的操作, 其中所述私钥备份响应数据包包括所述第 一电子签名令牌的第二签名以及所述加密后的主电子签名令牌的私钥;
所述第二电子签名令牌中的第二验证模块, 用于在接收到私钥备份响应数据包后, 对 所述私钥备份响应数据包中的第二签名进行验证;
所述第二电子签字令牌中的解密模块, 用于如果验证通过, 则对所述私钥备份响应数 据包中所述加密后的主电子签名令牌的私钥进行解密, 得到所述主电子签名令牌的私钥。
其中, 所述私钥备份响应数据包还包括第一电子签名令牌的标识; 所述第二电子签名 令牌还包括: 比较模块, 用于将所述私钥备份响应数据包中的所述第一电子签名令牌的标 识与本地存储的第二电子签名令牌对应的主电子签名令牌的标识进行比较; 如果所述第一 电子签名令牌的标识与所述第二电子签名令牌对应的主电子签名令牌的标识相同, 则执行 对所述私钥备份响应数据包中所述加密后的主电子签名令牌的私钥进行解密的操作。
其中, 所述第一获取模块, 用于执行发送标识查询请求数据包的操作; 所述系统还包 括 CA服务器, 其中所述 CA服务器为所述第二电子签名令牌颁发所述第一签名, 以及为 所述第一电子签名令牌颁发所述第二签名, 所述 CA服务器包括: 第二获取模块, 用于在 接收到所述标识查询请求数据包后, 获取与所述第一电子签名令牌存在备份关系的电子签 字令牌的标识信息; 签名模块, 用于利用 CA服务器私钥对所述标识信息进行签名; 第三 发送模块, 用于执行通过标识查询响应数据包将签名处理后的标识信息发送给所述第一电 子签名令牌的操作; 其中, 所述第一获取模块还用于对所述签名处理后的标识信息进行验 证; 如果验证通过, 获取所述标识信息。
其中, 所述标识查询请求数据包包括所述第一电子签名令牌的第二签名; 所述 CA服 务器还包括: 第三验证模块, 用于对所述第一电子签名令牌的第二签名进行验证, 如果验 证通过, 则所述第二获取模块获取与所述第一电子签名令牌存在备份关系的电子签字令牌 的标识信息。
其中, 所述第一获取模块, 用于对所述标识查询请求数据包进行签名, 并发送签名后 的标识查询请求数据包; 所述 CA服务器还包括: 第四验证模块, 用于在接收到所述签名 后的标识查询请求数据包后, 对签名后的标识查询请求数据包进行验证; 如果验证通过, 则所述第二获取模块获取与所述第一电子签名令牌存在备份关系的电子签字令牌的标识信 白
其中, 所述第一发送模块, 用于对所述私钥备份请求数据包进行签名, 并发送签名处 理后的私钥备份请求数据包; 所述第一电子签名令牌还包括: 第五验证模块, 用于在接收 到所述签名处理后的私钥备份请求数据包后, 对所述签名处理后的私钥备份请求数据包进 行验证, 如果验证通过, 则所述第一验证模块对所述私钥备份请求数据包中的所述第一签 名进行验证。
其中, 所述第二发送模块, 用于对所述私钥备份响应数据包进行签名, 并发送签名处 理后的私钥备份响应数据包; 所述第二电子签名令牌还包括: 第六验证模块, 用于在接收 到所述签名处理后的私钥备份响应数据包后, 对所述签名处理后的私钥备份响应数据包进 行验证, 如果验证通过, 则所述第二验证模块执行对所述私钥备份响应数据包中的第二签 名进行验证的操作。
其中, 所述系统还包括: 所述第一电子签名令牌中的第一协商模块和所述第二电子签 名令牌中的第二协商模块, 所述第一协商模块和第二协商模块用于获取匹配码, 并利用所 述匹配码协商所述第一电子签名令牌和所述第二电子签名令牌通信所使用的加密策略以及 该加密策略对应的解密策略; 其中, 所述加密模块用于利用所述加密策略对所述主电子签 名令牌的私钥加密, 得到加密后的主电子签名令牌的私钥; 其中, 所述解密模块用于利用 所述解密策略对所述加密后的主电子签名令牌的私钥进行解密, 得到所述主电子签名令牌 的私钥。
其中, 所述第二协商模块, 用于将所述第二电子签名令牌获取到的匹配码作为待验证 码, 并执行发送该待验证码给所述第一协商模块的操作; 所述第一协商模块, 用于在获取 到所述待验证码后, 判断所述待验证码与本地获取到的匹配码是否相同; 如果所述待验证 码与所述本地获取到的匹配码相同, 则生成所述第一电子签名令牌和所述第二电子签名令 牌通信所使用的加密策略以及该加密策略对应的解密策略; 并至少将所述解密策略发送给 所述第二协商模块。
其中, 第一电子签名令牌与第二电子签名令牌中的协商模块通过如下方式得到两者通 信所使用的加密策略以及所述加密策略对应的解密策略, 包括: 所述第一协商模块和所述 第二协商模块, 均用于获取匹配码、 加密策略和解密策略的对应关系; 并在所述对应关系 中查找所述匹配码对应的加密策略和解密策略; 如果查找到, 则将查找到的加密策略和解 密策略作为所述第一电子签名令牌和所述第二电子签名令牌通信所使用的加密策略以及该 加密策略对应的解密策略。
其中, 所述加密模块, 用于获取第一密钥, 所述第一密钥与第一签名中存储的第二密 钥相同, 并利用所述第一密钥加密所述主电子签名令牌的私钥, 得到加密后的主电子签名 令牌的私钥; 所述解密模块, 用于从本地获取所述第一密钥, 并利用所述第一密钥对所述 加密后主电子签名令牌的私钥进行解密, 得到所述主电子签名令牌的私钥。
与现有技术相比, 第一电子签名令牌获取与自身存储在备份关系的电子签名令牌的标 识信息, 并在接收到第二电子签名令牌发送的私钥备份请求数据包时, 第一电子签名令牌 对第一签名进行验证, 以确定第二电子签名令牌是否是合法设备, 再通过判断第二电子签 名令牌是否在标识信息中, 以确定第一电子签名令牌和第二电子签名令牌之间是否存在主 备关系, 在上述两个条件都满足时, 第一电子签名令牌再将主电子签名令牌的私钥加密, 再将加密后主电子签名令牌的私钥通过私钥备份响应数据包发送出去, 在第二电子签名令 牌接收到私钥备份响应数据包后, 第二电子签名令牌对第二签名进行验证, 以确定第一电 子签名令牌是否是合法设备, 在确定合法后, 第二电子签名令牌再将加密后的第二电子签 名令牌的私钥进行解密, 得到主电子签名令牌的私钥, 完成私钥的备份。 通过第二电子签 名令牌和第一电子签名令牌分别验证对方的合法性, 以及第一电子签名令牌验证主备关系, 在确定对方安全的前提下, 再进行私钥的传输, 实现了安全备份私钥。 附图说明
为了更清楚地说明本发明实施例的技术方案, 下面将对实施例描述中所需要使用的附 图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明的一些实施例, 对于本领 域的普通技术人员来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他附 图。
图 1为本发明实施例提供的备份电子签名令牌中信息的方法实施例的流程示意图; 图 2为本发明实施例提供的备份电子签名令牌中信息的系统实施例的结构示意图。 具体实施方式
下面结合本发明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描 述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是全部的实施例。 基于本发 明的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例, 都属于本发明的保护范围。
在本发明的描述中, 需要理解的是, 术语"中心"、 "纵向"、 "横向"、 "上"、 "下"、 "前"、 "后"、 "左"、 "右"、 "竖直"、 "水平"、 "顶"、 "底"、 "内"、 "外"等指示的方位或位置关系为 基于附图所示的方位或位置关系, 仅是为了便于描述本发明和简化描述, 而不是指示或暗 示所指的装置或元件必须具有特定的方位、 以特定的方位构造和操作, 因此不能理解为对 本发明的限制。 此外, 术语"第一"、 "第二 "仅用于描述目的, 而不能理解为指示或暗示相 对重要性或数量或位置。
在本发明的描述中,需要说明的是,除非另有明确的规定和限定,术语"安装"、 "相连"、 "连接 "应做广义理解, 例如, 可以是固定连接, 也可以是可拆卸连接, 或一体地连接; 可 以是机械连接, 也可以是电连接; 可以是直接相连, 也可以通过中间媒介间接相连, 可以 是两个元件内部的连通。 对于本领域的普通技术人员而言, 可以具体情况理解上述术语在 本发明中的具体含义。
下面将结合附图对本发明实施例作进一步地详细描述。
图 1为本发明提供的备份电子签名令牌中信息的方法实施例的流程示意图。 图 1所示 方法实施例包括:
步骤 101、 当第一电子签名令牌从主电子签名令牌备份得到主电子签名令牌的私钥后, 第一电子签名令牌执行获取第二电子签名令牌的标识信息的操作;
步骤 102、 第二电子签名令牌执行发送私钥备份请求数据包的操作, 其中所述私钥备 份请求数据包包括由 CA ( Certificate Authority, 证书授证)服务器为所述第二电子签名令 牌颁发的第一签名;
步骤 103、 第一电子签名令牌在接收到私钥备份请求数据包后, 对私钥备份请求数据 包中的所述第一签名进行验证;
步骤 104、 如果验证通过, 判断所述第二电子签名令牌的标识是否在获取的标识信息 中; 如果所述第二电子签名令牌的标识在所述标识信息中;
步骤 105、 如果第二电子签名令牌的标识在标识信息中, 则所述第一电子签名令牌对 所述主电子签名令牌的私钥进行加密得到加密后的主电子签名令牌的私钥;
步骤 106、 所述第一电子签名令牌执行发送私钥备份响应数据包的操作, 其中所述私 钥备份响应数据包包括由 CA服务器为所述第一电子签名令牌颁发的第二签名以及加密后 的主电子签名令牌的私钥;
步骤 107、 所述第一电子签名令牌在接收到私钥备份响应数据包后, 对私钥备份响应 数据包中的第二签名进行验证;
步骤 108、 如果验证通过, 则对所述私钥备份响应数据包中加密后的主电子签名令牌 的私钥进行解密, 得到主电子签名令牌的私钥。
与现有技术相比, 第一电子签名令牌获取与自身存储在备份关系的电子签名令牌的标 识信息, 并在接收到第二电子签名令牌发送的私钥备份请求数据包时, 第一电子签名令牌 对第一签名进行验证, 以确定第二电子签名令牌是否是合法设备, 再通过判断第二电子签 名令牌是否在标识信息中, 以确定第一电子签名令牌和第二电子签名令牌之间是否存在主 备关系, 在上述两个条件都满足时, 第一电子签名令牌再将主电子签名令牌的私钥加密, 再将加密后主电子签名令牌的私钥通过私钥备份响应数据包发送出去, 在第二电子签名令 牌接收到私钥备份响应数据包后, 第二电子签名令牌对第二签名进行验证, 以确定第一电 子签名令牌是否是合法设备, 在确定合法后, 第二电子签名令牌再将加密后的第二电子签 名令牌的私钥进行解密, 得到主电子签名令牌的私钥, 完成私钥的备份。 通过第二电子签 名令牌和第一电子签名令牌分别验证对方的合法性, 以及第一电子签名令牌验证主备关系, 在确定对方安全的前提下, 再进行私钥的传输, 实现了安全备份私钥。
下面对本发明提供的方法实施例作进一步的说明:
可选的, 所述私钥备份响应数据包还包括所述第一电子签名令牌的标识;
所述第二电子签名令牌对所述私钥备份响应数据包中加密后的主电子签名令牌的私钥 进行解密之前, 还包括:
所述第二电子签名令牌将所述私钥备份响应数据包中的第一电子签名令牌的标识与本 地存储的第二电子签名令牌对应的主电子签名令牌的标识进行比较;
如果第一电子签名令牌的标识与所述第二电子签名令牌对应的主电子签名令牌的标识 相同, 则执行对所述私钥备份响应数据包中加密后的主电子签名令牌的私钥进行解密的操 作。
由上可以看出, 第二电子签名令牌通过判断第一电子签名令牌的标识与自身的主电子 签名令牌的标识进行比较, 可以确定第一电子签名令牌和第二电子签名令牌之间是否存在 主备关系, 保证自身的私钥备份安全。
其中, 第一电子签名令牌执行向 CA服务器获取与所述第一电子签名令牌存在备份关 系的电子签字令牌的标识信息的操作, 包括:
所述第一电子签名令牌执行发送标识查询请求数据包的操作;
CA服务器在接收到所述标识查询请求数据包后,获取与所述第一电子签名令牌存在备 份关系的电子签字令牌的标识信息, 并利用 CA服务器私钥对所述标识信息进行签名, 再 通过标识查询响应数据包将签名处理后的标识信息发送给所述第一电子签名令牌; 所述第一电子签名令牌对所述签名处理后的标识信息进行验证; 如果验证通过, 获取 所述标识。
与现有技术中通过用户手动输入该标识信息等方式相比, 本发明实施例中标识信息是 通过 CA服务器来获取, 且利用 CA服务器私钥对标识信息进行签名, 准确性和安全性高。
其中, 标识查询请求数据包包括所述第一电子签名令牌的第二签名;
所述 CA服务器获取与所述第一电子签名令牌存在备份关系的电子签字令牌的标识信 息之前, 还包括:
所述 C A服务器对所述第一电子签名令牌的第二签名进行验证;
如果验证通过, 则所述 CA服务器获取与所述第一电子签名令牌存在备份关系的电子 签字令牌的标识信息。
由上可以看出, CA服务器利用 CA服务器公钥验证第一电子签名令牌的第一签名通过, 表示该第一电子签名令牌为合法设备, 再获取该标识信息, 避免非法电子签名令牌骗取该 标识信息, 提高信息的安全性。
进一步的, 为了避免其他电子签名令牌窃取到第一电子签名令牌的第二签名后进而从
CA服务器骗取标识信息,所述第一电子签名令牌执行发送标识查询请求数据包的操作,包 括:
所述第一电子签名令牌对标识查询请求数据包进行签名, 并发送签名后的标识查询请 求数据包;
其中, 此处签名使用的是第一电子签名令牌与 CA服务器协商确定的两者通信过程中 第一电子签名令牌在签名时所使用的私钥;
相应的, 所述 CA服务器获取与所述第一电子签名令牌存在备份关系的电子签字令牌 的标识信息之前, 还包括:
所述 CA服务器对签名后的标识查询请求数据包进行验证;
如果验证通过, 则 CA服务器获取与所述第一电子签名令牌存在备份关系的电子签字 令牌的标识信息。
其中, CA服务器验证签名所使用的是第一电子签名令牌与 CA服务器协商确定的两者 通信过程中第一电子签名令牌签名时所使用的私钥对应的公钥。
为了避免合法的电子签名令牌在获取到第一签名后, 冒充真正的第二电子签名令牌骗 取主电子签名令牌的私钥, 造成私钥泄漏的安全, 上述方法流程中:
所述第二电子签名令牌执行发送私钥备份请求数据包的操作, 包括: 所述第二电子签名令牌对私钥备份请求数据包进行签名, 并发送签名处理后的私钥备 份请求数据包;
所述第一电子签名令牌对私钥备份请求数据包中的第一签名进行验证之前, 还包括: 所述第一电子签名令牌对所述签名处理后的私钥备份请求数据包进行验证, 如果验证 通过, 则第一电子签名令牌对私钥备份请求数据包中的第一签名进行验证。
由上可以看出, 通过第二电子签名令牌对私钥备份请求数据包进行签名, 再由第一电 子签名令牌对私钥备份请求数据包进行验证, 实现对发起备份请求的第二电子签名令牌的 身份认证, 使得具有第一签名的电子签名令牌无法骗取到主电子签名令牌的私钥, 提高私 钥备份的安全性。
其中, 私钥备份请求数据包的签名所使用的私钥以及第一电子签名令牌验证签名后的 私钥备份请求数据包所使用的公钥是预先协商好的, 且分别写入到的各自的设备中的。
同理, 为了避免合法的电子签名令牌在获取到第二签名后, 冒充真正的第一电子签名 令牌发送错误的私钥给第二电子签名令牌, 造成私钥备份失败的问题, 上述方法流程中: 所述第一电子签名令牌执行发送私钥备份响应数据包的操作, 包括:
所述第一电子签名令牌对私钥备份响应数据包进行签名, 并发送签名处理后的私钥备 份响应数据包;
所述第二电子签名令牌对私钥备份响应数据包中的第二签名进行验证之前, 还包括: 所述第二电子签名令牌对签名处理后的私钥备份响应数据包进行验证,如果验证通过, 则执行所述第二电子签名令牌对私钥备份响应数据包中的第二签名进行验证的操作。
由上可以看出, 通过第一电子签名令牌对私钥备份响应数据包进行签名, 再由第二电 子签名令牌对私钥备份响应数据包进行验证, 实现对发起备份响应的第一电子签名令牌的 身份认证, 使得具有第二签名的合法电子签名令牌无法妨碍第二电子签名令牌获取正确的 私钥, 保证第二电子签名令牌能够备份得到正确的私钥。
其中, 私钥备份请求数据包的签名所使用的私钥以及第二电子签名令牌验证签名后的 私钥备份请求数据包所使用的公钥是预先协商好的, 且分别写入到的各自的设备中的。
其中, 第一电子签名令牌对主电子签名令牌的私钥进行加密有如下两种方式, 具体包 括:
方式一: 第一电子签名令牌和第二电子签名令牌获取匹配码, 第一电子签名令牌与第 二电子签名令牌利用所述匹配码协商两者通信所使用的加密策略以及该加密策略对应的解 密策略; 第一电子签名令牌利用所述加密策略对所述主电子签名令牌的私钥加密, 得到加 密后的主电子签名令牌的私钥; 其中, 所述第二电子签名令牌对所述私钥备份响应数据包中加密后的主电子签名令牌 的私钥进行解密, 得到所述主电子签名令牌的私钥, 包括: 所述第二电子签名令牌利用所 述解密策略对所述加密后的主电子签名令牌的私钥进行解密, 得到所述主电子签名令牌的 私钥。
方式二: 第一电子签名令牌获取第一密钥, 该第一密钥与第二电子签名令牌的数字签 名中存储的第二密钥相同, 并利用第一密钥加密所述主电子签名令牌的私钥, 得到加密后 的主电子签名令牌的私钥;
相应的, 所述第二电子签名令牌对所述私钥备份响应数据包中加密后的主电子签名令 牌的私钥进行解密包括: 第一电子签名令牌对私钥备份响应数据包中加密后的主电子签名 令牌的私钥进行解密。
下面要对方式一作进一步说明:
第二电子签名令牌可以根据本地预先存储的匹配码生成策略生成匹配码, 该匹配码可 以包括文字、 数字和字符中的至少一个, 并输出该匹配码; 当然, 第一电子签名令牌获取 该匹配码, 其中获取的方式有很多种, 如通过无线或有线传输方式, 也可以通过用户手动 输入方式。 当然, 也可以由银行后台服务器向第二电子签名令牌和第一电子签名令牌发送 该匹配码等方式实现第二电子签名令牌和第一电子签名令牌得到匹配码。
相比较而言, 由第二电子签名令牌生成匹配码, 再由第一电子签名令牌获取的方式, 较银行后台服务器发送的方式相比, 无需银行后台服务器的参与, 交互流程简单。
其中, 利用匹配码协商加解密策略有如下两种, 包括:
A1 : 将第一电子签名令牌获取到的匹配码作为待验证码, 第一电子签名令牌执行发送 该待验证码给第二电子签名令牌的操作; 第二电子签名令牌在获取到该待验证码后, 判断 待验证码与本地获取到的匹配码是否相同; 如果待验证码与匹配码相同,, 则第二电子签名 令牌生成两者通信所使用的加密策略以及该加密策略对应的解密策略; 第二电子签名令牌 执行发送解密策略给第一电子签名令牌的操作。
由上可以看出, 方式一提供的方式中, 第二电子签名令牌通过将待验证码与本地获取 到的匹配码进行比较, 确定发起与第二电子签名令牌协商加解密策略的设备是否为第一电 子签名令牌, 来验证第一电子签名令牌的身份, 在确定该设备为第一电子签名令牌, 再将 解密算法发送给第一电子签名令牌, 保证了私钥的传输安全。
在 A1 中, 为了避免其他电子签名令牌窃取该私钥的加密策略, 第一电子签名令牌执 行发送该待验证码给第二电子签名令牌的操作, 包括:
第一电子签名令牌对该待验证码进行签名, 发签名处理后的待验证码给第二电子签名 令牌;
相应的, 第二电子签名令牌判断待验证码与本地获取到的匹配码是否相同之前, 还包 括:
第二电子签名令牌对签名处理后的待验证码给第二电子签名令牌进行验证, 如果验证 通过, 再判断待验证码与本地获取到的匹配码是否相同。
其中, 第一电子签名令牌对待验证码进行签名所使用的私钥可以与第一电子签名令牌 对私钥备份请求数据包签名时所使用的私钥相同, 同理, 第二电子签名令牌对签名后的待 验证码验证时所使用的公钥与对签名后的私钥备份请求数据包时所使用的公钥相同。
为了避免其他电子签名令牌冒充第二电子签名令牌发送错误的解密算法给第一电子签 名令牌, 第二电子签名令牌执行发送解密策略给第一电子签名令牌的操作, 包括:
第二电子签名令牌对解密策略进行签名, 发签名处理后的解密策略给第一电子签名令 牌;
相应的, 第一电子签名令牌获取解密策略之前还包括:
第一电子签名令牌对签名处理后的解密策略进行验证, 如果验证通过, 则获取解密策 略。
其中, 第二电子签名令牌对解密策略进行签名所使用的私钥可以与第二电子签名令牌 对私钥备份响应数据包签名时所使用的私钥相同, 同理, 第一电子签名令牌对签名后的解 密策略验证时所使用的公钥与对签名后的私钥备份响应数据包时所使用的公钥相同。
A2: 第二电子签名令牌和第一电子签名令牌获取匹配码、 加密策略和解密策略的对应 关系; 第二电子签名令牌和第一电子签名令牌在对应关系中查找匹配码对应的加密策略和 解密策略; 如果查找到, 则将查找到的加密策略和解密策略作为两者通信所使用的加密策 略以及该加密策略对应的解密策略。
在 A2 中, 第二电子签名令牌和第一电子签名令牌通过查询本地获取到的对应关系, 确定两者通信所使用的加解密策略, 实现简单, 且无需第二电子签名令牌和第一电子签名 令牌之间信息交互, 降低了信息被窃取的可能。
上述两种方式通过匹配码可以实现随机选择加解密策略的目的, 提高了加密方式的随 机性, 保证了通信安全。
综上, 本发明中的第一电子签名令牌预先存储有与第二电子签名令牌通信时对内容进 行签名的私钥、 对第二电子签名令牌发送的经签名后的内容进行验签时所使用的第二电子 签名令牌用于通信的公钥, 以及自身加解密内容的一对密钥; 而第二电子签名令牌预先存 储有与第一电子签名令牌通信时对内容进行签名的私钥、 对第一电子签名令牌发送的经签 名后的内容进行验签时所使用的第一电子签名令牌用于通信的公钥以及第一电子签名令牌 请求备份的私钥; 除此之外, 第一电子签名令牌还存储有与 CA服务器进行通信时对内容 进行签名的私钥,相应的, CA服务器存储有与第一电子签名令牌通信时对签名内容进行验 证所使用的公钥。
图 2为本发明提供的备份电子签名令牌中信息的系统实施例的结构示意图。 图 2所示 系统实施例包括:
第一电子签名令牌中的第一获取模块 201, 用于当第一电子签名令牌从主电子签名令 牌备份得到主电子签名令牌的私钥后, 执行获取与所述第一电子签名令牌存在备份关系的 电子签字令牌的标识信息的操作;
第二电子签名令牌中的第一发送模块 202, 用于执行发送私钥备份请求数据包的操作, 其中所述私钥备份请求数据包包括第二电子签名令牌的第一签名;
所述第一电子签名令牌中的第一验证模块 203, 用于在接收到私钥备份请求数据包后, 对私钥备份请求数据包中的所述第一签名进行验证;
所述第一电子签名令牌中的判断模块 204, 用于如果验证通过, 判断所述第二电子签 名令牌的标识是否在获取的标识信息中;
所述第一电子签名令牌中的加密模块 205, 用于如果所述第二电子签名令牌的标识在 所述标识信息中, 则对所述主电子签名令牌的私钥进行加密, 得到加密后的主电子签名令 牌的私钥;
所述第一电子签名令牌中的第二发送模块 206, 用于执行发送私钥备份响应数据包的 操作, 其中所述私钥备份响应数据包包括第一电子签名令牌的第二签名以及加密后的主电 子签名令牌的私钥;
所述第二电子签名令牌中的第二验证模块 207, 用于在接收到私钥备份响应数据包后, 对私钥备份响应数据包中的第二签名进行验证;
所述第二电子签字令牌中的解密模块 208, 用于如果验证通过, 则对所述私钥备份响 应数据包中加密后的主电子签名令牌的私钥进行解密, 得到主电子签名令牌的私钥。
其中, 所述私钥备份响应数据包还包括所述第一电子签名令牌的标识;
所述第二电子签名令牌还包括:
比较模块, 用于将所述私钥备份响应数据包中的第一电子签名令牌的标识与本地存储 的第二电子签名令牌对应的主电子签名令牌的标识进行比较; 如果第一电子签名令牌的标 识与所述第二电子签名令牌对应的主电子签名令牌的标识相同, 则执行对所述私钥备份响 应数据包中加密后的主电子签名令牌的私钥进行解密的操作。 其中, 所述第一获取模块, 用于执行发送标识查询请求数据包的操作; 所述系统还包括 CA服务器, 其中所述 CA服务器为所述第二电子签名令牌颁发所述 第一签名, 以及为所述第一电子签名令牌颁发所述第二签名, 所述 CA服务器包括: 第二获取模块, 用于在接收到所述标识查询请求数据包后, 获取与所述第一电子签名 令牌存在备份关系的电子签字令牌的标识信息;
签名模块, 用于利用 CA服务器私钥对所述标识信息进行签名;
第三发送模块, 用于执行通过标识查询响应数据包将签名处理后的标识信息发送给所 述第一电子签名令牌的操作;
其中, 所述第一获取模块还用于对所述签名处理后的标识信息进行验证; 如果验证通 过, 获取所述标识信息。
其中, 所述标识查询请求数据包包括所述第一电子签名令牌的第二签名;
所述 CA服务器还包括:
第三验证模块, 用于对所述第一电子签名令牌的第二签名进行验证, 如果验证通过, 则所述第二获取模块获取与所述第一电子签名令牌存在备份关系的电子签字令牌的标识信 息。
其中, 所述第一获取模块, 用于对标识查询请求数据包进行签名, 并发送签名后的标 识查询请求数据包;
所述 CA服务器还包括:
第四验证模块, 用于在接收到所述签名后的标识查询请求数据包后, 对签名后的标识 查询请求数据包进行验证; 如果验证通过, 则第二获取模块获取与所述第一电子签名令牌 存在备份关系的电子签字令牌的标识信息。
其中, 所述第一获取模块, 用于对标识查询请求数据包进行签名, 并发送签名后的标 识查询请求数据包;
所述 CA服务器还包括:
第四验证模块, 用于在接收到所述签名后的标识查询请求数据包后, 所述 CA服务器 对签名后的标识查询请求数据包进行验证; 如果验证通过, 则 CA服务器获取与所述第一 电子签名令牌存在备份关系的电子签字令牌的标识信息。
其中, 所述第一发送模块, 用于对私钥备份请求数据包进行签名, 并发送签名处理后 的私钥备份请求数据包;
所述第一电子签名令牌还包括:
第五验证模块, 用于在接收到所述签名处理后的私钥备份请求数据包后, 对所述签名 处理后的私钥备份请求数据包进行验证, 如果验证通过, 则第一验证模块对私钥备份请求 数据包中的第一签名进行验证。
其中, 所述第二发送模块, 用于对私钥备份响应数据包进行签名, 并发送签名处理后 的私钥备份响应数据包;
所述第二电子签名令牌还包括:
第六验证模块, 用于在接收到所述签名处理后的私钥备份响应数据包后, 对签名处理 后的私钥备份响应数据包进行验证, 如果验证通过, 则第二验证模块执行对私钥备份响应 数据包中的第二签名进行验证的操作。
其中, 所述系统还包括: 所述第一电子签名令牌中的第一协商模块和所述第二电子签 名令牌中的第二协商模块, 所述第一协商模块和第二协商模块用于获取匹配码, 并利用所 述匹配码协商所述第一电子签名令牌和所述第二电子签名令牌通信所使用的加密策略以及 该加密策略对应的解密策略;
其中, 所述加密模块用于利用所述加密策略对所述主电子签名令牌的私钥加密, 得到 加密后的主电子签名令牌的私钥; 所述解密模块用于利用所述解密策略对所述加密后的主 电子签名令牌的私钥进行解密, 得到所述主电子签名令牌的私钥。
其中, 所述第二协商模块, 用于将所述第二电子签名令牌获取到的匹配码作为待验证 码, 并执行发送该待验证码给所述第一协商模块的操作; 所述第一协商模块, 用于在获取 到所述待验证码后, 判断所述待验证码与本地获取到的匹配码是否相同; 如果所述待验证 码与所述本地获取到的匹配码相同, 则生成所述第一电子签名令牌和所述第二电子签名令 牌通信所使用的加密策略以及该加密策略对应的解密策略; 并至少将所述解密策略发送给 所述第二协商模块。
其中, 第一电子签名令牌与第二电子签名令牌中的协商模块通过如下方式得到两者通 信所使用的加密策略以及该加密策略对应的解密策略, 包括:
第一电子签名令牌和第二电子签名令牌获取匹配码、加密策略和解密策略的对应关系; 第一电子签名令牌和第二电子签名令牌在所述对应关系中查找所述匹配码对应的加密策略 和解密策略; 如果查找到, 则将查找到的加密策略和解密策略作为两者通信所使用的加密 策略以及该加密策略对应的解密策略。
所述加密模块, 用于获取第一密钥, 所述第一密钥与第一签名中存储的第二密钥相同, 并利用所述第一密钥加密所述主电子签名令牌的私钥, 得到加密后的主电子签名令牌的私 钥;
所述解密模块, 用于从本地获取所述第一密钥, 并利用所述第一密钥对所述加密后主 电子签名令牌的私钥进行解密, 得到所述主电子签名令牌的私钥。
与现有技术相比, 第一电子签名令牌获取与自身存储在备份关系的电子签名令牌的标 识信息, 并在接收到第二电子签名令牌发送的私钥备份请求数据包时, 第一电子签名令牌 对第一签名进行验证, 以确定第二电子签名令牌是否是合法设备, 再通过判断第二电子签 名令牌是否在标识信息中, 以确定第一电子签名令牌和第二电子签名令牌之间是否存在主 备关系, 在上述两个条件都满足时, 第一电子签名令牌再将主电子签名令牌的私钥加密, 再将加密后主电子签名令牌的私钥通过私钥备份响应数据包发送出去, 在第二电子签名令 牌接收到私钥备份响应数据包后, 第二电子签名令牌对第二签名进行验证, 以确定第一电 子签名令牌是否是合法设备, 在确定合法后, 第二电子签名令牌再将加密后的第二电子签 名令牌的私钥进行解密, 得到主电子签名令牌的私钥, 完成私钥的备份。 通过第二电子签 名令牌和第一电子签名令牌分别验证对方的合法性, 以及第一电子签名令牌验证主备关系, 在确定对方安全的前提下, 再进行私钥的传输, 实现了安全备份私钥。 流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为, 表示包括一个 或更多个用于实现特定逻辑功能或过程的步骤的可执行指令的代码的模块、 片段或部分, 并且本发明的优选实施方式的范围包括另外的实现, 其中可以不按所示出或讨论的顺序, 包括根据所涉及的功能按基本同时的方式或按相反的顺序, 来执行功能, 这应被本发明的 实施例所属技术领域的技术人员所理解。
应当理解, 本发明的各部分可以用硬件、 软件、 固件或它们的组合来实现。 在上述实 施方式中, 多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或 固件来实现。 例如, 如果用硬件来实现, 和在另一实施方式中一样, 可用本领域公知的下 列技术中的任一项或他们的组合来实现: 具有用于对数据信号实现逻辑功能的逻辑门电路 的离散逻辑电路, 具有合适的组合逻辑门电路的专用集成电路, 可编程门阵列 (PGA), 现 场可编程门阵列 (FPGA) 等。
本技术领域的普通技术人员可以理解实现上述实施例方法携带的全部或部分步骤是可 以通过程序来指令相关的硬件完成, 所述的程序可以存储于一种计算机可读存储介质中, 该程序在执行时, 包括方法实施例的步骤之一或其组合。
此外, 在本发明各个实施例中的各功能单元可以集成在一个处理模块中, 也可以是各 个单元单独物理存在, 也可以两个或两个以上单元集成在一个模块中。 上述集成的模块既 可以采用硬件的形式实现, 也可以采用软件功能模块的形式实现。 所述集成的模块如果以 软件功能模块的形式实现并作为独立的产品销售或使用时, 也可以存储在一个计算机可读 取存储介质中。
上述提到的存储介质可以是只读存储器, 磁盘或光盘等。
在本说明书的描述中, 参考术语"一个实施例"、 "一些实施例"、 "示例"、 "具体示例"、 或"一些示例"等的描述意指结合该实施例或示例描述的具体特征、 结构、 材料或者特点包 含于本发明的至少一个实施例或示例中。 在本说明书中, 对上述术语的示意性表述不一定 指的是相同的实施例或示例。 而且, 描述的具体特征、 结构、 材料或者特点可以在任何的 一个或多个实施例或示例中以合适的方式结合。
尽管上面已经示出和描述了本发明的实施例, 可以理解的是, 上述实施例是示例性的, 不能理解为对本发明的限制, 本领域的普通技术人员在不脱离本发明的原理和宗旨的情况 下在本发明的范围内可以对上述实施例进行变化、 修改、 替换和变型。 本发明的范围由所 附权利要求及其等同限定。

Claims

权利要求书
1、 一种备份电子签名令牌中信息的方法, 其特征在于, 所述方法包括:
当第一电子签名令牌从主电子签名令牌备份得到主电子签名令牌的私钥后, 第一电子 签名令牌执行获取与所述第一电子签名令牌存在备份关系的电子签字令牌的标识信息的操 作;
第二电子签名令牌执行发送私钥备份请求数据包的操作, 其中所述私钥备份请求数据 包包括由 CA服务器为所述第二电子签名令牌颁发的第一签名;
第一电子签名令牌在接收到所述私钥备份请求数据包后, 对所述私钥备份请求数据包 中的所述第一签名进行验证; 如果验证通过, 判断所述第二电子签名令牌的标识是否在获 取的标识信息中; 如果所述第二电子签名令牌的标识在所述标识信息中, 则所述第一电子 签名令牌对所述主电子签名令牌的私钥进行加密, 得到加密后的主电子签名令牌的私钥; 所述第一电子签名令牌执行发送私钥备份响应数据包的操作, 其中所述私钥备份响应 数据包包括由所述 CA服务器为所述第一电子签名令牌颁发的第二签名以及所述加密后的 主电子签名令牌的私钥;
所述第二电子签名令牌在接收到所述私钥备份响应数据包后, 对所述私钥备份响应数 据包中的第二签名进行验证; 如果验证通过, 则对所述私钥备份响应数据包中所述加密后 的主电子签名令牌的私钥进行解密, 得到所述主电子签名令牌的私钥。
2、 根据权利要求 1所述的方法, 其特征在于:
所述私钥备份响应数据包还包括第一电子签名令牌的标识;
所述第二电子签名令牌对所述私钥备份响应数据包中所述加密后的主电子签名令牌的 私钥进行解密之前, 还包括:
所述第二电子签名令牌将所述私钥备份响应数据包中的所述第一电子签名令牌的标识 与本地存储的第二电子签名令牌对应的主电子签名令牌的标识进行比较;
如果所述第一电子签名令牌的标识与所述第二电子签名令牌对应的主电子签名令牌的 标识相同, 则执行对所述私钥备份响应数据包中所述加密后的主电子签名令牌的私钥进行 解密的操作。
3、 根据权利要求 1或 2所述的方法, 其特征在于, 第一电子签名令牌执行获取与所述 第一电子签名令牌存在备份关系的电子签字令牌的标识信息的操作, 包括:
所述第一电子签名令牌执行发送标识查询请求数据包的操作;
所述 CA服务器在接收到所述标识查询请求数据包后, 获取与所述第一电子签名令牌 存在备份关系的电子签字令牌的标识信息, 并利用 CA服务器私钥对所述标识信息进行签 名, 再执行通过标识查询响应数据包将签名处理后的标识信息发送给所述第一电子签名令 牌的操作;
所述第一电子签名令牌对所述签名处理后的标识信息进行验证; 如果验证通过, 获取 所述标识信息。
4、 根据权利要求 3所述的方法, 其特征在于, 所述标识查询请求数据包包括所述第一 电子签名令牌的第二签名;
所述 CA服务器在接收到所述标识查询请求数据包之后,获取与所述第一电子签名令牌 存在备份关系的电子签字令牌的标识信息之前, 还包括:
所述 C A服务器对所述第一电子签名令牌的第二签名进行验证;
如果验证通过, 则所述 CA服务器获取与所述第一电子签名令牌存在备份关系的电子 签字令牌的标识信息。
5、 根据权利要求 3所述的方法, 其特征在于:
所述第一电子签名令牌执行发送标识查询请求数据包的操作, 包括:
所述第一电子签名令牌对所述标识查询请求数据包进行签名, 并发送签名后的标识查 询请求数据包;
所述 CA服务器获取与所述第一电子签名令牌存在备份关系的电子签字令牌的标识信 息之前, 还包括:
在接收到所述签名后的标识查询请求数据包后, 所述 CA服务器对所述签名后的标识 查询请求数据包进行验证;
如果验证通过, 则 CA服务器获取与所述第一电子签名令牌存在备份关系的电子签字 令牌的标识信息。
6、 根据权利要求 1至 5任一项所述的方法, 其特征在于:
所述第二电子签名令牌执行发送私钥备份请求数据包的操作, 包括:
所述第二电子签名令牌对所述私钥备份请求数据包进行签名, 并发送签名处理后的私 钥备份请求数据包;
所述第一电子签名令牌对所述私钥备份请求数据包中的所述第一签名进行验证之前, 还包括:
在接收到所述签名处理后的私钥备份请求数据包后, 所述第一电子签名令牌对所述签 名处理后的私钥备份请求数据包进行验证, 如果验证通过, 则第一电子签名令牌对所述私 钥备份请求数据包中的所述第一签名进行验证。
7、 根据权利要求 1至 6任一项所述的方法, 其特征在于:
所述第一电子签名令牌执行发送私钥备份响应数据包的操作, 包括:
所述第一电子签名令牌对所述私钥备份响应数据包进行签名, 并发送签名处理后的私 钥备份响应数据包;
所述第二电子签名令牌对所述私钥备份响应数据包中的第二签名进行验证之前, 还包 括:
在接收到所述签名处理后的私钥备份响应数据包后, 所述第二电子签名令牌对签名处 理后的私钥备份响应数据包进行验证, 如果验证通过, 则执行所述第二电子签名令牌对私 钥备份响应数据包中的第二签名进行验证的操作。
8、 根据权利要求 1至 7任一项所述的方法, 其特征在于:
所述第一电子签名令牌对所述主电子签名令牌的私钥进行加密得到加密后的主电子签 名令牌的私钥, 包括:
所述第一电子签名令牌和所述第二电子签名令牌获取匹配码;
所述第一电子签名令牌与所述第二电子签名令牌利用所述匹配码协商两者通信所使用 的加密策略以及该加密策略对应的解密策略;
所述第一电子签名令牌利用所述加密策略对所述主电子签名令牌的私钥加密, 得到加 密后的主电子签名令牌的私钥;
其中, 所述第二电子签名令牌对所述私钥备份响应数据包中加密后的主电子签名令牌 的私钥进行解密, 包括:
所述第二电子签名令牌利用所述解密策略对所述加密后的主电子签名令牌的私钥进行 解密。
9、 根据权利要求 8所述的方法, 其特征在于, 所述第一电子签名令牌与所述第二电子 签名令牌利用所述匹配码协商两者通信所使用的加密策略以及该加密策略对应的解密策 略, 包括:
将所述第二电子签名令牌获取到的匹配码作为待验证码, 所述第二电子签名令牌执行 发送该待验证码给所述第一电子签名令牌的操作;
所述第一电子签名令牌在获取到所述待验证码后, 判断所述待验证码与本地获取到的 匹配码是否相同;
如果所述待验证码与所述本地获取到的匹配码相同, 则第一电子签名令牌生成两者通 信所使用的加密策略以及所述加密策略对应的解密策略;
所述第一电子签名令牌至少将所述解密策略发送给所述第二电子签名令牌。
10、 根据权利要求 8所述的方法, 其特征在于, 所述第一电子签名令牌与所述第二电 子签名令牌利用所述匹配码协商两者通信所使用的加密策略以及所述加密策略对应的解密 策略, 包括:
所述第一电子签名令牌和所述第二电子签名令牌获取匹配码、 加密策略和解密策略的 对应关系;
所述第一电子签名令牌和所述第二电子签名令牌在所述对应关系中查找所述匹配码对 应的加密策略和解密策略;
如果查找到, 则将查找到的加密策略和解密策略作为两者通信所使用的加密策略以及 所述加密策略对应的解密策略。
11、 根据权利要求 1至 10任一项所述的方法, 其特征在于:
所述第一电子签名令牌对所述主电子签名令牌的私钥进行加密包括:
所述第一电子签名令牌获取第一密钥, 所述第一密钥与所述第一签名中存储的第二密 钥相同, 并利用所述第一密钥加密所述主电子签名令牌的私钥, 得到加密后的主电子签名 令牌的私钥;
所述第二电子签名令牌对所述私钥备份响应数据包中所述加密后的主电子签名令牌的 私钥进行解密, 包括:
所述第二电子签名令牌从本地获取所述第一密钥, 并利用所述第一密钥对所述加密后 主电子签名令牌的私钥进行解密。
12、 一种备份电子签名令牌中信息的系统, 其特征在于, 包括:
第一电子签名令牌中的第一获取模块, 用于当所述第一电子签名令牌从主电子签名令 牌备份得到主电子签名令牌的私钥后, 执行获取与所述第一电子签名令牌存在备份关系的 电子签字令牌的标识信息的操作;
第二电子签名令牌中的第一发送模块, 用于执行发送私钥备份请求数据包的操作, 其 中所述私钥备份请求数据包包括所述第二电子签名令牌的第一签名;
所述第一电子签名令牌中的第一验证模块, 用于在接收到私钥备份请求数据包后, 对 所述私钥备份请求数据包中的所述第一签名进行验证;
所述第一电子签名令牌中的判断模块, 用于如果验证通过, 判断所述第二电子签名令 牌的标识是否在获取的标识信息中;
所述第一电子签名令牌中的加密模块, 用于如果所述第二电子签名令牌的标识在所述 标识信息中, 则对所述主电子签名令牌的私钥进行加密, 得到加密后的主电子签名令牌的 私钥; 所述第一电子签名令牌中的第二发送模块,用于执行发送私钥备份响应数据包的操作, 其中所述私钥备份响应数据包包括所述第一电子签名令牌的第二签名以及所述加密后的主 电子签名令牌的私钥;
所述第二电子签名令牌中的第二验证模块, 用于在接收到私钥备份响应数据包后, 对 所述私钥备份响应数据包中的第二签名进行验证;
所述第二电子签字令牌中的解密模块, 用于如果验证通过, 则对所述私钥备份响应数 据包中所述加密后的主电子签名令牌的私钥进行解密, 得到所述主电子签名令牌的私钥。
13、 根据权利要求 12所述的系统, 其特征在于:
所述私钥备份响应数据包还包括第一电子签名令牌的标识;
所述第二电子签名令牌还包括:
比较模块, 用于将所述私钥备份响应数据包中的所述第一电子签名令牌的标识与本地 存储的第二电子签名令牌对应的主电子签名令牌的标识进行比较; 如果所述第一电子签名 令牌的标识与所述第二电子签名令牌对应的主电子签名令牌的标识相同, 则执行对所述私 钥备份响应数据包中所述加密后的主电子签名令牌的私钥进行解密的操作。
14、 根据权利要求 12或 13所述的系统, 其特征在于:
所述第一获取模块, 用于执行发送标识查询请求数据包的操作;
所述系统还包括 CA服务器, 其中所述 CA服务器为所述第二电子签名令牌颁发所述 第一签名, 以及为所述第一电子签名令牌颁发所述第二签名, 所述 CA服务器包括:
第二获取模块, 用于在接收到所述标识查询请求数据包后, 获取与所述第一电子签名 令牌存在备份关系的电子签字令牌的标识信息;
签名模块, 用于利用 CA服务器私钥对所述标识信息进行签名;
第三发送模块, 用于执行通过标识查询响应数据包将签名处理后的标识信息发送给所 述第一电子签名令牌的操作;
其中, 所述第一获取模块还用于对所述签名处理后的标识信息进行验证; 如果验证通 过, 获取所述标识信息。
15、 根据权利要求 14所述的系统, 其特征在于, 所述标识查询请求数据包包括所述第 一电子签名令牌的第二签名;
所述 CA服务器还包括:
第三验证模块, 用于对所述第一电子签名令牌的第二签名进行验证, 如果验证通过, 则所述第二获取模块获取与所述第一电子签名令牌存在备份关系的电子签字令牌的标识信
16、 根据权利要求 14所述的系统, 其特征在于:
所述第一获取模块, 用于对所述标识查询请求数据包进行签名, 并发送签名后的标识 查询请求数据包;
所述 CA服务器还包括:
第四验证模块, 用于在接收到所述签名后的标识查询请求数据包后, 对所述签名后的 标识查询请求数据包进行验证; 如果验证通过, 则所述第二获取模块获取与所述第一电子 签名令牌存在备份关系的电子签字令牌的标识信息。
17、 根据权利要求 12至 16任一项所述的系统, 其特征在于:
所述第一发送模块, 用于对所述私钥备份请求数据包进行签名, 并发送签名处理后的 私钥备份请求数据包;
所述第一电子签名令牌还包括:
第五验证模块, 用于在接收到所述签名处理后的私钥备份请求数据包后, 对所述签名 处理后的私钥备份请求数据包进行验证, 如果验证通过, 则所述第一验证模块对所述私钥 备份请求数据包中的所述第一签名进行验证。
18、 根据权利要求 12至 17任一项所述的系统, 其特征在于:
所述第二发送模块, 用于对所述私钥备份响应数据包进行签名, 并发送签名处理后的 私钥备份响应数据包;
所述第二电子签名令牌对还包括:
第六验证模块, 用于在接收到所述签名处理后的私钥备份响应数据包后, 对所述签名 处理后的私钥备份响应数据包进行验证, 如果验证通过, 则所述第二验证模块执行对所述 私钥备份响应数据包中的第二签名进行验证的操作。
19、 根据权利要求 12至 18任一项所述的系统, 其特征在于, 还包括:
所述第一电子签名令牌中的第一协商模块和所述第二电子签名令牌中的第二协商模 块, 所述第一协商模块和第二协商模块用于获取匹配码, 并利用所述匹配码协商所述第一 电子签名令牌和所述第二电子签名令牌通信所使用的加密策略以及该加密策略对应的解密 策略;
其中, 所述加密模块用于利用所述加密策略对所述主电子签名令牌的私钥加密, 得到 加密后的主电子签名令牌的私钥;
其中, 所述解密模块用于利用所述解密策略对所述加密后的主电子签名令牌的私钥进 行解密, 得到所述主电子签名令牌的私钥。
20、 根据权利要求 19所述的系统, 其特征在于, 所述第二协商模块, 用于将所述第二电子签名令牌获取到的匹配码作为待验证码, 并 执行发送该待验证码给所述第一协商模块的操作;
所述第一协商模块, 用于在获取到所述待验证码后, 判断所述待验证码与本地获取到 的匹配码是否相同; 如果所述待验证码与所述本地获取到的匹配码相同, 则生成所述第一 电子签名令牌和所述第二电子签名令牌通信所使用的加密策略以及该加密策略对应的解密 策略; 并至少将所述解密策略发送给所述第二协商模块。
21、 根据权利要求 19所述的系统, 其特征在于, 第一电子签名令牌与第二电子签名令 牌中的协商模块通过如下方式得到两者通信所使用的加密策略以及所述加密策略对应的解 密策略, 包括:
所述第一协商模块和所述第二协商模块, 均用于获取匹配码、 加密策略和解密策略的 对应关系; 并在所述对应关系中查找所述匹配码对应的加密策略和解密策略; 如果查找到, 则将查找到的加密策略和解密策略作为所述第一电子签名令牌和所述第二电子签名令牌通 信所使用的加密策略以及该加密策略对应的解密策略。
22、 根据权利要求 12至 21任一项所述的系统, 其特征在于:
所述加密模块, 用于获取第一密钥, 所述第一密钥与第一签名中存储的第二密钥相同, 并利用所述第一密钥加密所述主电子签名令牌的私钥, 得到加密后的主电子签名令牌的私 钥;
所述解密模块, 用于从本地获取所述第一密钥, 并利用所述第一密钥对所述加密后主 电子签名令牌的私钥进行解密, 得到所述主电子签名令牌的私钥。
PCT/CN2014/075748 2013-05-23 2014-04-18 一种备份电子签名令牌中信息的方法和系统 WO2014187209A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310194144.0 2013-05-23
CN201310194144.0A CN103248490B (zh) 2013-05-23 2013-05-23 一种备份电子签名令牌中信息的方法和系统

Publications (1)

Publication Number Publication Date
WO2014187209A1 true WO2014187209A1 (zh) 2014-11-27

Family

ID=48927726

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/075748 WO2014187209A1 (zh) 2013-05-23 2014-04-18 一种备份电子签名令牌中信息的方法和系统

Country Status (3)

Country Link
CN (1) CN103248490B (zh)
HK (1) HK1185472A1 (zh)
WO (1) WO2014187209A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248490B (zh) * 2013-05-23 2016-08-10 天地融科技股份有限公司 一种备份电子签名令牌中信息的方法和系统
CN106487758B (zh) * 2015-08-28 2019-12-06 华为技术有限公司 一种数据安全签名方法、业务终端以及私钥备份服务器
CN107423609B (zh) * 2016-09-09 2020-03-24 天地融科技股份有限公司 一种授权系统、方法及卡片

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1383265A1 (en) * 2002-07-16 2004-01-21 Nokia Corporation Method for generating proxy signatures
CN102118392A (zh) * 2011-01-18 2011-07-06 南京朗睿软件科技有限公司 数据传输的加密/解密方法及系统
CN102790678A (zh) * 2012-07-11 2012-11-21 飞天诚信科技股份有限公司 一种认证方法及系统
CN103248490A (zh) * 2013-05-23 2013-08-14 天地融科技股份有限公司 一种备份电子签名令牌中信息的方法和系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080104417A1 (en) * 2006-10-25 2008-05-01 Nachtigall Ernest H System and method for file encryption and decryption
US8305090B2 (en) * 2007-11-30 2012-11-06 Toyota Jidosha Kabushiki Kaisha Capacitance touch sensing device and door locking device
CN102831362B (zh) * 2012-07-25 2014-12-10 飞天诚信科技股份有限公司 一种安全生产智能密钥设备的方法及装置
CN102932140A (zh) * 2012-11-20 2013-02-13 成都卫士通信息产业股份有限公司 一种增强密码机安全的密钥备份方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1383265A1 (en) * 2002-07-16 2004-01-21 Nokia Corporation Method for generating proxy signatures
CN102118392A (zh) * 2011-01-18 2011-07-06 南京朗睿软件科技有限公司 数据传输的加密/解密方法及系统
CN102790678A (zh) * 2012-07-11 2012-11-21 飞天诚信科技股份有限公司 一种认证方法及系统
CN103248490A (zh) * 2013-05-23 2013-08-14 天地融科技股份有限公司 一种备份电子签名令牌中信息的方法和系统

Also Published As

Publication number Publication date
HK1185472A1 (zh) 2014-02-14
CN103248490B (zh) 2016-08-10
CN103248490A (zh) 2013-08-14

Similar Documents

Publication Publication Date Title
CN113545006B (zh) 远程授权访问锁定的数据存储设备
CN108551455B (zh) 智能卡的配置方法及装置
US8112787B2 (en) System and method for securing a credential via user and server verification
WO2014187206A1 (zh) 一种备份电子签名令牌中私钥的方法和系统
WO2014187210A1 (zh) 一种电子签名令牌私钥的备份方法和系统
US20180276664A1 (en) Key download method and apparatus for pos terminal
WO2019020051A1 (zh) 一种安全认证的方法及装置
CN102510333B (zh) 一种授权认证方法及系统
US8806206B2 (en) Cooperation method and system of hardware secure units, and application device
TW201334493A (zh) 用於安全金鑰產生的設備、利用終端用戶設備來進行安全金鑰產生的方法及在裝置製造者伺服器中進行安全金鑰產生的方法
CN113260992B (zh) 数据存储设备的多设备解锁
CN106161032A (zh) 一种身份认证的方法及装置
CN102946314A (zh) 一种基于浏览器插件的客户端用户身份认证方法
CN101588245A (zh) 一种身份认证的方法、系统及存储设备
CN112396735B (zh) 网联汽车数字钥匙安全认证方法及装置
WO2014201907A1 (zh) 电子签名方法及系统
CN113557689B (zh) 用管理器设备初始化数据存储设备
CN113316915B (zh) 解锁数据存储设备
CN113545021B (zh) 预先授权设备的注册
CN114175574A (zh) 无线安全协议
KR102415628B1 (ko) Dim을 이용한 드론 인증 방법 및 장치
WO2014187208A1 (zh) 一种备份电子签名令牌中私钥的方法和系统
WO2014187209A1 (zh) 一种备份电子签名令牌中信息的方法和系统
CN115529591A (zh) 基于令牌的认证方法、装置、设备及存储介质
TWI633231B (zh) Smart lock and smart lock control method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14801821

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14801821

Country of ref document: EP

Kind code of ref document: A1