Method and system for secure management and use of key and certificate based on virtual machine technology

A technical security and key certificate technology, which is applied in the field of enhancing the security of network identity authentication using soft certificates on computers, to achieve the effects of avoiding theft and misappropriation, retaining ease of use, and easy reading

Inactive Publication Date: 2011-09-21
BEIJING SOFTLUMOS TECH
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And this new architecture cannot be the way of hardware+Windows+Windows software. As we all know, in the Windows architecture, Windows is the direct controller of the hardware, and Windows has opened up the development int

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for secure management and use of key and certificate based on virtual machine technology
  • Method and system for secure management and use of key and certificate based on virtual machine technology
  • Method and system for secure management and use of key and certificate based on virtual machine technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] To facilitate an understanding of the principles and features of the present invention, the following description refers to the implementation of an exemplary embodiment. Specifically, the present invention is described for using Windows 2000 and above operating systems as user operating systems, and using a computer configured with a CPU supporting Intel VT technology as a device scenario. In addition, the present invention is combined with the PKI public key infrastructure system, and is described for online banking services.

[0037] It should be understood, however, that this is not the only embodiment in which the invention may be practiced. On the contrary, the present invention can be applied to various operating systems, such as Linux operating system; can be applied to different hardware environments, such as the computer that has configured AMD to support hardware-assisted virtualization CPU; can not be restricted by the PKI public key infrastructure system ,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and system for secure management and use of a key and a certificate based on a virtual machine technology. In the method, a key/certificate management program is isolated from a user operation system in different hardware resource spaces through a virtual machine monitor (VMM), therefore the security in management and use of the key and the certificate with a software method is improved. Accordingly, the invention integrates the advantages of good user experience of a software certificate and high security of a USB key certificate, meanwhile further solves the difficult problem of insufficient storage capacity of a USB key, reduces the customer service and hardware costs, and provides the secure management and use of the key and the certificate with a universal solution taking the interests of users, developers and service providers into consideration.

Description

technical field [0001] The present invention generally relates to enabling secure transactions over a network through credentials, such as PKI certificates. More specifically, the present invention relates to methods and systems for enhancing the security of network identity authentication using soft certificates on computers. Background technique [0002] With the advent of the Internet, the number of online transactions has also increased dramatically. As such transactions increase, so do issues such as transaction security, authentication of transaction parties, non-repudiation of transactions, and authentication and verification of devices used in such transactions. In response to these problems, a public key infrastructure (PKI) has been developed in which a certification authority (CA) issues a digital certificate and a pair of associated keys to individuals and organizations participating in electronic commerce through an open network such as the Internet. These cer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00H04L9/32G06F21/62
Inventor 冯伟吴畏
Owner BEIJING SOFTLUMOS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products