Method, device and system for accessing to certificate revocation list

A certificate revocation list and access certificate technology, applied in the field of digital certificate management, can solve the problem that the certificate client cannot obtain the certificate revocation list in time, and can not obtain the certificate revocation list in time, so as to avoid uncertainty and ensure normal processing. Effect

Inactive Publication Date: 2008-03-05
ALIBABA GRP HLDG LTD
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is to provide a method for accessing the certificate revocation list, so as to solve the problem that the certificate client cannot obtain the certificate revocation list in time in the prior art
[0008] Another object of the present invention is to provide a device for accessing the certificate revocation list, so as to solve the problem that the existing certificate client cannot obtain the certificate revocation list in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for accessing to certificate revocation list
  • Method, device and system for accessing to certificate revocation list
  • Method, device and system for accessing to certificate revocation list

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] Before describing the method, device and system of the present invention in combination with specific embodiments, firstly introduce several concepts involved in the complete certificate authentication process, and understand the functions and relationships of each subject in the authentication process through a specific example.

[0065] In an e-commerce activity, all entities participating in the transaction must clearly indicate their identities. Only when this mutual trust relationship is established can the transaction be carried out normally. The digital certificate is an effective means for participating entities to show their identity to each other.

[0066] Asymmetric encryption algorithm is the basis for realizing digital certificate. The algorithm uses a private / public key pair, and data encrypted with the private key can only be decrypted with the corresponding public key, and vice versa. Typically, a CA signs a certificate so that it confirms that the publ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method comprises: pre-setting certificate revocation list (CRL) in the real-time distributor; the certificate use end send a CRL download request to the real-time distributor; the real-time distributor enquiries the CRL corresponding to the download request in its saved CRLs, and returns the CRL to the certificate user end.

Description

technical field [0001] The invention relates to the management of digital certificates, in particular to a method, device and system for accessing a certificate revocation list. Background technique [0002] With the popularity of the Internet, various e-commerce activities are developing rapidly. In order to ensure the security of electronic transactions and payments on the Internet and prevent fraudulent behavior in the process of transactions and payments, a trust mechanism must be established on the Internet. This requires that buyers and sellers participating in e-commerce must have legal identities and be able to be verified effectively and correctly online. [0003] Based on the public key infrastructure (PKI, Pubic Key Infrastructure), the use of asymmetric encryption public / private key pairs and certificates is an effective means to meet the above requirements. Data encrypted with a private key can only be decrypted with the corresponding public key, and vice versa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00G06F21/00H04L9/08H04L9/32
Inventor 金伟安
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products