Method for protecting safety of trusted certificate
A certificate and security technology, which is applied to the public key of secure communication, user identity/authority verification, etc., can solve the problems of the verifier being wrongly trusted, using incorrect trusted certificates, and changes that cannot be detected by technical means, so as to prevent The effect of digital certificate verification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] The above and other technical features and advantages of the present invention will be described in more detail below in conjunction with the accompanying drawings.
[0039] Aiming at the security problems of trusted certificates in the current application of digital certificates, the present invention uses digital signature technology to provide a protection method to ensure that trusted certificates are not replaced during downloading, transmission and storage, and prevent users from The wrong trusted certificate is used as the basis for authentication. The first is the establishment of self-trust, that is, when a user chooses a CA center to apply for a certificate, the CA center will first review the authenticity of the user's identity, and the user who passes the review will get a digital certificate authorized by the CA center, as well as the digital certificate used in the digital certificate. The private key corresponding to the public key is stored in the certif...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 