Method and device for issuing identity certificate in trusted computing

A technology of identity proof and trusted computing, applied in user identity/authority verification, public key for secure communication, electrical components, etc., can solve problems such as heavy load, achieve the effect of reducing load and reducing the amount of certificate issuance

Inactive Publication Date: 2011-12-21
THE PLA INFORMATION ENG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] It can be seen that the defect of the existing technology is that the privacy CA needs to participate in each identity verification process of TCP, and the load is too large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for issuing identity certificate in trusted computing
  • Method and device for issuing identity certificate in trusted computing
  • Method and device for issuing identity certificate in trusted computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] In order for those skilled in the art to further understand the features and technical contents of the present invention, please refer to the following detailed description and accompanying drawings of the present invention. The accompanying drawings are provided for reference and illustration only, and are not intended to limit the present invention.

[0081] The technical solutions of the present invention will be described below in conjunction with the drawings and embodiments.

[0082] refer to figure 2 , is a flowchart of a method for issuing an AIK certificate in trusted computing according to an embodiment of the present invention. In the embodiment of the present invention, a method of issuing an AIK certificate for TCP is described with a proxy CA as the main body, wherein the proxy CA is a trusted third party authorized by a privacy CA and capable of issuing certificates. The method includes:

[0083] Step 201, the proxy CA receives the public key of the AIK...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method and device for issuing identity certification certificates in trusted computing, the method comprising: the proxy certification authority receives the public key of the identity certification key pair submitted by the trusted computing platform, the validity certificate and the proxy certification authority identity binding fixed value, wherein, the validity certificate is issued by the privacy certification authority after verifying that the trusted computing platform is true and valid; if the identity binding value of the proxy certification authority matches the proxy certification authority itself, then Verifying whether the validity certificate is valid; if valid, the proxy authentication authority issues an identity certificate for the public key of the identity certificate key pair. The embodiment of the present invention separates the verification of the authenticity and validity of the trusted computing platform from the issuance of the identity certificate, which are respectively completed by the privacy authentication authority and the proxy authentication authority, and the validity certificate can be reused, which greatly reduces the privacy authentication. The amount of authoritative certificate issuance reduces the load on the privacy certification authority.

Description

technical field [0001] The invention relates to the technical field of trusted computing, in particular to a method and device for issuing identity certificates in trusted computing. Background technique [0002] TCG (Trusted Computing Group, Trusted Computing Working Group) is an industrial standardization organization aimed at enhancing the security of various heterogeneous computing platforms. Based on the specifications of security-enhanced hardware and software, evaluation criteria have also been published to measure whether computing devices using TCG technology meet trustworthiness requirements. [0003] The TCP defined by TCG is to embed TPM (Trusted Platform Module, Trusted Platform Module) on the main board, and add TSS (Trusted Software Stack, Trusted Software Stack) to the software layer, through the mutual cooperation of TCP and TSS for the upper layer application Provide trusted computing capabilities. Among them, TCP has a platform certificate to confirm the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/32H04L29/06
Inventor 周雁舟李立新户家富李超零郭锦娣
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products