Methods of verifying, signing, encrypting, and decrypting data and file
First Claim
1. A method for signing, verifying, encrypting and decrypting data and files, the method comprising:
- installing a software or a hardware in a mobile telecommunication device;
generating a public key and a private key by the software or hardware in the mobile telecommunication device; and
using the public key and the private key stored in the mobile telecommunication device to sign, verify, encrypt and decrypt the data and files.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods of verifying, signing, encrypting and decrypting data and files contained a mobile telecommunication device having public keys (authentication) and private keys (digital identification) installed inside the device, and an electronic device handling requests to the mobile telecommunication device. When the files are signed, verified, encrypted or decrypted, the electronic device is input (or automatically connected) with an identification code and then requests are sent for verification, signing, encryption and decryption together with certain optional necessary data to the mobile telecommunication device. According to various requests, the mobile telecommunication device releases the installed public keys or obtains private keys by inputting pre-set protective access codes to sign, verify, encrypt, or decrypt to the necessary data and then re-transmit the signed, verified, encrypted or decrypted necessary data to the electronic device to complete the methods. By using the mobile telecommunication to sign, verify, encrypt and decrypt the data and files, methods of identification are cost saving and conveniently to be used.
-
Citations
24 Claims
-
1. A method for signing, verifying, encrypting and decrypting data and files, the method comprising:
-
installing a software or a hardware in a mobile telecommunication device;
generating a public key and a private key by the software or hardware in the mobile telecommunication device; and
using the public key and the private key stored in the mobile telecommunication device to sign, verify, encrypt and decrypt the data and files. - View Dependent Claims (2, 3, 4)
-
-
5. A method for signing, verifying, encrypting and decrypting data/files, the method comprising:
-
installing an execution software in a mobile telecommunication device;
inputting a public key and a private key in pair;
operating the execution software (while working together with an electronic device) to sign, verify, encrypt and decrypt the data/files by using the public key and the private key. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification