Digital certificate revocation method and equipment

A digital certificate and digital technology, applied in the field of network security, can solve the problems of digital certificate revocation, network security hidden dangers, etc., and achieve the effect of ensuring security, user information security, and revocation process directly and quickly

Inactive Publication Date: 2012-05-09
HUAWEI TECH CO LTD
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing revocation process is that the user calls or sends an E-mail to the administrator of the certificate authority CA, and the administrator manually revokes the user's digital certificate; when the administrator of the c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital certificate revocation method and equipment
  • Digital certificate revocation method and equipment
  • Digital certificate revocation method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0044] Example 1

[0045] The processing flow chart of the method for revoking a digital certificate provided by the embodiment of the present invention is as follows: figure 1 As shown, the terminal entities applied to PKI technology include:

[0046] Step S101: Obtain a digital certificate revocation instruction.

[0047] In this embodiment, the digital revocation instruction may be obtained when the user needs to revoke his digital certificate due to changes in user identity, user information or user public key, leakage of user private key, or user service suspension. The digital certificate revocation instruction sent by the user; it may also be the digital certificate revocation instruction automatically generated after the network device as the terminal entity detects that it is attacked.

[0048] Step S102: Construct a digital certificate revocation request message according to the digital certificate revocation instruction.

[0049] When receiving the digital certif...

Example Embodiment

[0073] Embodiment 2

[0074] exist figure 1 Based on the method shown, when the digital certificate revocation request message is sent to the certificate server, optionally, the process further includes waiting for the certificate server to respond to the digital certificate revocation request message, such as: image 3 shown, including steps S101-S107, wherein:

[0075] Steps 101 to 104 are the same as those in the first embodiment, and are not repeated here.

[0076] Step S105: Waiting to receive the digital certificate revocation response message responded by the server in the certificate authority, and start timing from the time when the digital certificate revocation request message is sent to the certificate server;

[0077] After sending the digital certificate revocation request message to the certificate server, start timing from the time when the digital certificate revocation request message is sent, and record the time from the digital certificate revocation requ...

Example Embodiment

[0086] Embodiment 3

[0087] The embodiment of the present invention provides a digital certificate revocation device corresponding to the digital certificate revocation request message shown in the first embodiment, and its structural diagram is as follows Figure 5 shown, including:

[0088] an acquisition unit 301, a processor 302, an encoder 303 and a transmitter 304;

[0089] in:

[0090] The obtaining unit 301 is configured to obtain a digital certificate revocation instruction;

[0091] The processor 302 is configured to construct a digital certificate revocation request message according to the digital certificate revocation instruction;

[0092] The encoder 303 is configured to digitally encrypt the digital certificate revocation request message and set an identity identifier for the digitally encrypted digital certificate revocation request message;

[0093] The transmitter 304 is configured to send the digitally encrypted certificate revocation request message s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a digital certificate revocation method. The method comprises the following steps: obtaining a digital certificate revocation command by a client side; constructing a digital certificate revocation request message according to the digital certificate revocation command; carrying out digital encryption on the digital certificate revocation request message, and setting identity identification for the digital certificate revocation request message after digital encryption; and sending the encrypted digital certificate revocation request message with the identity identification to a certificate server so as to request the certificate server to perform digital certificate revocation. In the digital certificate revocation method, after the digital certificate revocation command input by a user is received, the digital certificate revocation request message is constructed and sent to the certificate server so as to perform digital certificate revocation so that the revocation process is more direct and faster, which ensures timeliness for digital certificate revocation and improves the safety of user information.

Description

technical field [0001] This application relates to the field of network security, in particular to a digital certificate revocation method and equipment. Background technique [0002] With the development of information technology and the improvement of people's quality of life, network technology has become a part of people's life, such as online banking and personal mailboxes that people often use in daily life. Network technology has changed people's lives more and more. At the same time, the communication security of network technology has attracted more and more attention. Most of the existing communication security guarantees for network technology use PKI technology. [0003] Public key infrastructure (English: Public Key Infrastructure, referred to as: PKI) is a system that provides system information security services through public key technology and digital certificates, and is responsible for verifying the identity of digital certificate holders. The PKI infrast...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 邵官阁
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products