METHOD TO CREATE AND VERIFY AUTHENTICITY OF ELECTRONIC SIGNATURE Russian patent published in 2011 - IPC H04L9/08 

Abstract RU 2411670 C2

FIELD: information technologies.

SUBSTANCE: method includes stages of basic key extraction from area of memory in terminal of mobile communication, user realising input of registration data, formation of dynamic key on the basis of basic key and registration data; besides, method additionally includes stages to produce electronic message, and formation of electronic signature using generated dynamic key, besides, stage of basic key extraction includes getting basic key from area of memory, containing section of code of terminal application, downloaded to terminal of mobile communication, besides, at least basic key is stored in specified section of code in hidden type. At the same time basic key is hidden in code so that it is not possible to read it directly or extract from code.

EFFECT: elimination of dependence on operator and improved reliability of protection against malicious attacks or attempts of fraudulent use.

8 cl, 7 dwg

Similar patents RU2411670C2

Title Year Author Number
METHOD AND USER AUTHENTICATION SYSTEM THROUGH MOBILE DEVICE WITH USAGE OF CERTIFICATES 2013
  • Vantsak Gergej
RU2638741C2
TELECOMMUNICATION CHIP-CARD 2013
  • Shriya Sandzhiv
  • Fogat Vikas
RU2628492C2
METHOD FOR PROVISION OF SIGNATURE KEY FOR DIGITAL SIGNATURE, VERIFICATION OR CODING OF DATA, AND ALSO MOBILE TERMINAL 2005
  • Banet Frants-Jozef
  • Duspiva Mattias
  • Rupp Shtefan
  • Shtegers Khans Jozef
RU2404520C2
AUTHORIZATION CONTROL METHOD 2018
  • Chou, Hung-Chien
RU2698424C1
DEVICE SAFETY AUTOMATIC CERTIFICATION WITH THE USE OF THE BLOCKS CHAIN 2016
  • Sprague, Michael
  • Sprague, Steven
RU2673842C1
RELIABLE AUTHENTICATION METHOD AND DEVICE 2006
  • Taugbel' Petter
RU2434352C2
CRYPTOGRAPHIC AUTHENTICATION AND TOKENIZED TRANSACTIONS 2017
  • Collinge, Mehdi
  • Johnson, Alan
RU2741321C2
METHOD OF CREATING SECURITY CODE, METHOD OF USING SAID CODE, PROGRAMMABLE DEVICE FOR REALISING SAID METHOD 2006
  • Lindmo Ehrik
  • Taugbel' Petter
RU2415470C2
APPLICATION AUTHENTICATION 2007
  • Lakshmeshvar Shreekant
  • Ginzburg Filip
  • Lajtinen Pekka
  • Khol'Tmanns Sil'Ke
RU2414086C2
SYSTEM, DEVICE, AND METHOD DESIGNED FOR SIM BASED AUTHENTICATION AND FOR ENCRYPTION WITH WIRELESS LOCAL AREA NETWORK ACCESS 2002
  • Gregorio Rodriges Khesus Ankhel' De
  • Monkhas L'Erente Migel' Ankhel'
RU2292648C2

RU 2 411 670 C2

Authors

Skorve Ehjgil Tapio

Khenriksveen Mads Ehgil

Khagen Jon

Lindstel Gunnar

Imsdalen Tollef

Lisne Ehdvard

Kommisrud Ragnkhild

Dates

2011-02-10Published

2005-06-24Filed