Method and system for certification

A technology of identity authentication and authentication center, which is applied in the direction of user identity/authority verification, public key for secure communication, etc., and can solve the problems of difficult discovery, complicated processing, and long certificate path of the mesh authentication center structure path

Inactive Publication Date: 2007-11-07
HUAZHONG UNIV OF SCI & TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to overcome the defects of the prior art and provide a method and system for identity authentication to solve the problems in the structure of the network authentication center that the path is difficult to find, the path of the certificate becomes longer and the processing is complicated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for certification
  • Method and system for certification
  • Method and system for certification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The authentication process of identity authentication between authentication centers in the extended PKI / CA system will be described in detail below.

[0029] The architecture of this extended PKI / CA system is shown in Figure 2. It consists of six autonomous domains (autonomous domain A - autonomous domain F), and each domain has a unique root certification center. According to the size and application of the domain According to actual needs, multiple secondary certification centers can be dynamically configured to provide various types of certificate services for end users. As shown on the right side of the figure, the root certification center in autonomous domain C has two secondary certification centers.

[0030] certificate issuer

[0031] Table I

[0032] The structure of a domain certificate mainly includes eight basic elements, namely:

[0033] Certificate Issuer: The distinguished name of the issuer of the certificate.

[0034] Certi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is an ID identifying method and system. Based on a net and layer combined extended PKI / CA structure, the system divides the entire public key infrastructural domain into many autonomous domains, each autonomous domain adopts a basic layered PKI / CA structure and has an only root identifying center, and according to domain size and actual applied requirement, can dynamically configure many two-stage identifying centers to provide all kinds of certificate service for terminal users, and each root identifying center is a single confidence point for all the users in its own domain. It adopts a net PKI / CA structure between all the autonomous domains, only the root identifying center can make a confidence relation with other autonomous domains. It avoids the disadvantage of a single confidence point in the whole system; largely reduces the number of nodes and complexity of trans-domain certificate path treatment, and solving the excessively complex problem of extending and finding a certificate path.

Description

technical field [0001] The invention belongs to the field of computer authentication and safety, and in particular relates to an authentication method and a realization system based on a network topology. Background technique [0002] While enjoying the convenience brought by the network and computer, people also taste the bitterness of security issues. The rapid spread of viruses, the rampant intrusion of computer "hackers", and the leakage of important information... These problems have threatened government services, finance, telecommunications, electricity and other national infrastructure. In order to prevent these hidden dangers, many new security technical specifications are constantly emerging, and public key infrastructure / certification authority (PKI / CA for short) technology is one of them. [0003] A Certificate Authority (CA for short) can verify the legitimacy of an online identity. However, since it is difficult for the certification center to solve the secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 金海黄琛吴松冉龙波王志平陈勇
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products