Cryptographic operation method and device based on digital certificate
A technology of digital certificate and operation method, applied in digital data authentication and key distribution, can solve problems such as increasing development cost, consuming user terminal resources, affecting user experience, etc., to avoid development, improve operation efficiency, and improve user experience.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] In order to further illustrate the technical means adopted by the present invention and the achieved effects, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings and preferred embodiments.
[0042] see figure 1 , is a schematic flowchart of the digital certificate-based cryptographic operation method of the present invention. The cryptographic operation method based on the digital certificate of the present invention comprises the following steps:
[0043] S101 Query the digital certificate corresponding to the logged-in user in the access device, and return the queried digital certificate to the logged-in user; wherein, the digital certificate of each user is pre-stored in the access device;
[0044] S102, the access device receives a cryptographic operation request submitted by the login user;
[0045] S103, the access device executes a corresponding cryptographic operation acc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 