Method and apparatus for signing identity verification certificate in trusted computing

A technology of trusted computing and identity certification, applied in user identity/authority verification, public keys for secure communication, electrical components, etc., can solve problems such as performance bottlenecks, heavy loads, and congestion in the issuance process.

Inactive Publication Date: 2009-07-22
THE PLA INFORMATION ENG UNIV
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since each TCP uses a different AIK certificate in each identity verification process, the privacy CA needs to participate in each TCP identity verification process, and there are a large number of TCPs in the trust domain of a privacy CA. Continuous identity verification is required for different transaction behaviors, which requires a high processing speed for the privacy CA. If the AIK request of TCP cannot be processed in time, it will easily cause congestion in the issuance process and become a performance bottleneck in the entire authentication process. bottleneck
[0010] It can be seen that the defect of the existing technology is that the privacy CA needs to participate in each identity verification process of TCP, and the load is too large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for signing identity verification certificate in trusted computing
  • Method and apparatus for signing identity verification certificate in trusted computing
  • Method and apparatus for signing identity verification certificate in trusted computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] In order for those skilled in the art to further understand the features and technical contents of the present invention, please refer to the following detailed description and accompanying drawings of the present invention. The accompanying drawings are provided for reference and illustration only, and are not intended to limit the present invention.

[0098] The technical solutions of the present invention will be described below in conjunction with the drawings and embodiments.

[0099] refer to figure 2 , is a flowchart of a method for issuing an AIK certificate in trusted computing according to an embodiment of the present invention. In the embodiment of the present invention, a method of issuing an AIK certificate for TCP is described with a proxy CA as the main body, wherein the proxy CA is a trusted third party authorized by a privacy CA and capable of issuing certificates. The method includes:

[0100] Step 201, the proxy CA receives the public key of the AIK...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and apparatus for signing and issuing ID certificate in a credible calculation, the method comprises following steps that: public key, validity certificate and proxy authentication authoritative identification binding value of ID cipher key pair submitted by the credible calculation platform can be received by the proxy authentication authority, wherein, the validity certificate is signed and issued after the credible calculation platform is verified truly and effectively by the privacy authentication authority; if the proxy authentication authority ID binding value is matched to the proxy authentication authority oneself, so that the validity certificate is verified whether effective or not; if effective, the proxy authentication authority signs and issues the ID certificate for the public key of the ID cipher key pair. According to the invention embodiment, the true validity verification and the ID certificate of the credible calculation platform are singed and issued dividedly and are completed by the privacy authentication authority and the proxy authentication authority respectively, and the validity certificate can be used repeatedly, thereby reducing the certificate signing and issuing amount of the privacy authentication authority and alleviating the load of the privacy authentication authority.

Description

technical field [0001] The invention relates to the technical field of trusted computing, in particular to a method and device for issuing identity certificates in trusted computing. Background technique [0002] TCG (Trusted Computing Group, Trusted Computing Working Group) is an industrial standardization organization aimed at enhancing the security of various heterogeneous computing platforms. Based on the specifications of security-enhanced hardware and software, evaluation criteria have also been published to measure whether computing devices using TCG technology meet trustworthiness requirements. [0003] The TCP defined by TCG is to embed TPM (Trusted Platform Module, Trusted Platform Module) on the main board, and add TSS (Trusted Software Stack, Trusted Software Stack) to the software layer, through the mutual cooperation of TCP and TSS for the upper layer application Provide trusted computing capabilities. Among them, TCP has a platform certificate to confirm the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32H04L29/06
Inventor 周雁舟李立新户家富李超零郭锦娣
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products