Method for supporting various CA (Certification Authority) identity authentications

An identity authentication and CA authentication technology, applied in the field of supporting multiple CA identity authentication, can solve problems such as heavy workload, low product maturity, and low system stability, and achieve the effect of ensuring confidentiality and preventing replay attacks

Active Publication Date: 2011-11-02
INSPUR COMMON SOFTWARE
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, with the development of CA technology, CA manufacturers emerge in endlessly. Most manufacturers have already purchased CA more or less before using our software. This involves how CA integrates with our software and how to reduce the workload. On the issue of better CA integration, most software manufacturers currently adopt the method of changing the background system code according to the interface of the CA manufacturer to be integrated, and integrating a CA to change once, which brings a series of problems. One is work The volume is large, the second is that the system stability is not high, and the third is that the product maturity is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for supporting various CA (Certification Authority) identity authentications
  • Method for supporting various CA (Certification Authority) identity authentications
  • Method for supporting various CA (Certification Authority) identity authentications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0057] as attached figure 1 Shown, the concrete realization step of the inventive method comprises:

[0058] Step 1: Implement a third-party CA based on digital certificate authentication and encryption. According to the defined digital certificate authentication and encryption interface, combined with the third-party CA to be implemented, the program that realizes the digital certificate authentication and encryption is packaged into an assembly, generally a dll.

[0059] Step 2: Deploy the assembly. Publish the assembly deployment to the software system.

[0060] Step 3: Specify the certification CA. Change the server configuration file to specify the CA to use among multiple CAs.

[0061] Step 4: The client starts and obtains the authentication configuration information of the server.

[0062] According to the obtained authentication methods, the login window will obtain the dll and type name of the class that implements the corresponding interface from t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for supporting various CA (Certification Authority) identity authentications and belongs to the technical field of computers. The method disclosed by the invention comprises the following steps: the CA authentications, the encrypted generality and the relativity are extracted as the basic attributes and used as a basis to be abstracted into a digital certificate authentication and encryption interface by virtue of integrating the certificate of the current mainstream CA manufacturer; then, the interface is realized so as to integrate the digital certificate of the third party; the realization is encapsulated into a program set so as to be deployed into a software system; the overall configuration file of the software system is changed; and the current CA is specified as the used CA and integrated into the CA of the third party. Compared with the prior art, the method for supporting various CA identity authentications disclosed by the invention can be used for improving the stability and reusability of a service system, is easy to deploy and configure and can be used for reducing the working amount of system development personnel and maintenance personnel.

Description

[0001] technical field [0002] The invention relates to the field of computer technology, in particular to a method for supporting multiple CA identity authentication. Background technique [0003] Today's computer networks are basically open systems established in accordance with the international standard of Open Systems Interconnection (OSI). Open systems can make network use and interconnection more convenient, but at the same time pose a threat to network security. At present, the threats faced by computer networks can be roughly divided into two types: one is the threat to data information; the other is the threat to physical equipment. [0004] There are many factors that cause network security threats, mainly software vulnerabilities, improper configuration, viruses, hacker attacks, etc. The purpose of these threats is more to steal network information and destroy network communication and information services. For the threats faced by network information, the comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/00G06F21/44
Inventor 魏亮陈磊刘龙
Owner INSPUR COMMON SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products