Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for verifying user authorization certificate through verifying authorization time

A technology for authorization time and authorization verification, applied in the field of communication security, can solve problems such as errors, and achieve the effect of ensuring security and avoiding information tampering

Active Publication Date: 2016-05-04
BEIJING FORTUNET INFORMATION TECH
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004]In view of this, it is necessary to provide a method and system for verifying user authorization certificates by verifying the authorization time to solve the problem that it is impossible to determine whether the authorization time in the certificate is legal and valid , which avoids the situation that the required time is wrong when verifying the valid time period of the certificate, and ensures that the authorization time of the verifying certificate can be correctly judged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for verifying user authorization certificate through verifying authorization time
  • Method and system for verifying user authorization certificate through verifying authorization time

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical scheme and advantages of the present invention clearer, the following combination Attached picture The embodiment and the method and the system for verifying the user authorization certificate by verifying the authorization time of the present invention are further described in detail. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0050] In one embodiment, Such as figure 1 As shown, a method for verifying a user authorization certificate by verifying the authorization time is provided, and the method includes the following steps:

[0051] S100. Obtain the hardware identification, firmware identification and hard disk power-on timing time of the user end, and encrypt the hardware identification, firmware identification and hard disk power-on timing time and transmit them to the server end.

[0052] S200, make a verificati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for verifying a user authorization certificate through verifying authorization time. The method comprises that: obtaining a hardware identifier, a firmware identifier and electric timekeeping time on a hard disk of a client itself by the client, encrypting and transmitting to a server; manufacturing a verification certificate by the server, generating effective authorization time according to the electric timekeeping time on the hard disk, writing the hardware identifier, the firmware identifier and the effective authorization time in the verification certificate, carrying out digital signing, encrypting the verification certificate by the hardware identifier and the firmware identifier, thus obtaining the verification certificate; and judging whether the verification certificate is effective according to the effective authorization time. Encryption and decryption are carried out to the verification certificate by using the hardware identifier and the firmware identifier; the defects that the certificate is forged and the information in the certificate is tampered are overcome; the defect that the system time is modified so that whether the certificate is illegal and effective cannot be judged is overcome by using the electric timekeeping time.

Description

Technical field [0001] The present invention involves the field of communication security, especially the method and system that involves a method and system that verifies the user authorization certificate by verifying authorization. Background technique [0002] The traditional method of verifying the user authorized certificate is to use the public key to encrypt the information, and then send the information to the server. After the server signs a certificate with a private key, send it to the user.The system time judgment whether the certificate is valid. [0003] In addition, after using the public key decryption certificate to obtain information, the user can reintermine the certificate and replace the original certificate and public key by using its own public key.Whether the public key is faked and the public key is replaced, the validity time of the certificate may also be modified, so it is impossible to determine whether the certificate is legal and effective. Invent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3249H04L9/3263H04L9/3297
Inventor 陈杰沈伟亮
Owner BEIJING FORTUNET INFORMATION TECH