Method and system for safely downloading certificate
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A certificate and security technology, applied in the field of information security, can solve problems such as single authentication method and counterfeit smart key equipment
Active Publication Date: 2013-11-13
FEITIAN TECHNOLOGIES
View PDF5 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
However, after all, the authentication method is single, and theoretically there is still the possibility of forging smart key devices, so reinforcement is required to ensure the security of certificate downloads
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0112] see figure 1 , this embodiment provides a method for securely downloading certificates, the specific process is as follows:
[0113] 101. The smart key device establishes a connection with the client;
[0114] Preferably, the client establishes a connection with the smart key device by calling CryptAcquireContext of a CSP (Cryptographic Service Provider, encryption service provider) interface.
[0115] 102. The client receives the request for downloading the certificate submitted by the user, and sends an instruction to the smart key device to generate a transaction key pair;
[0116] 103. The smart key device generates a transaction public key and a transaction private key after receiving the instruction;
[0117] It should be noted that the transaction private key is used to sign the transaction information during the transaction.
[0118] 104. The smart key device signs the transaction public key according to its stored protection private key, and obtains the tran...
Embodiment 2
[0239] This embodiment provides a system for securely downloading certificates, see figure 2 , including: a smart key device 20, a client 21 and a server 22; wherein, the functions of each device are as follows:
[0240] Smart key device 20 includes:
[0241] The storage unit 200 is used to store the birth certificate, the protection private key and the certificate, wherein the birth certificate and the protection private key have been generated and stored when the smart key device leaves the factory;
[0242] Specifically, the birth certificate includes: type number, birth certificate version information, birth certificate time stamp, shell number, protection public key, first-level authorization key, birth certificate issuance key information, and birth certificate signature. For the description of the item, refer to the relevant description in Embodiment 1, and do not repeat them here;
[0243] It should be noted that when the smart key device generates a protected priva...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention discloses a method and a system for safely downloading a certificate, belonging to the field of information safety. The method for safely downloading a certificate comprises the following steps of: establishing a connection between intelligent key equipment and a client side; after the client side receives a request for downloading a certificate, issuing a command for generating a trading key pair; generating a trading public key and a trading private key by the intelligent key equipment with a generation algorithm, and signing the trading public key according to a locally stored protective private key; generating a certificate request data packet by the client side; acquiring a birth certificate and a trading public key signature, locally stored in the intelligent key equipment, by the client side and sending the birth certificate, the trading public key signature and the certificate request data packet to a service side; judging whether the received birth certificate is legal or not, if not, returning an error to the client side, if so, judging whether the trading public key signature is legal or not, if not, returning an error to the client side, and if so, signing and issuing the certificate and sending the certificate to the client side; and writing the certificate into the intelligent key equipment by the client side.
Description
technical field [0001] The invention belongs to the field of information security, in particular to a method and system for safely downloading certificates. Background technique [0002] In the prior art, the user binds the smart key device with the server at the counter, that is, the server stores the number of the legal smart key device, and when the certificate is downloaded, the server compares whether the number of the smart key device is consistent with the saved number , consistent, the certificate download is allowed, and inconsistent, the certificate download is rejected, although to some extent it can effectively prevent the user from using a fake smart key device to download the certificate. However, after all, the authentication method is single, and there is still the possibility of counterfeiting smart key devices in theory. Therefore, reinforcement is required to ensure the security of certificate downloads. Contents of the invention [0003] The present in...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.