Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A root certificate storage device and secure access method

A storage device and secure access technology, applied in the field of communication security, can solve the problems of inability to receive, user information and financial information leakage, increase application risks, etc., to achieve the effect of enhancing security

Active Publication Date: 2020-01-21
PRANUS BEIJING TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this leads to a problem: if this CA fakes the site of other application systems, it will cause other applications to be automatically verified by the system when they connect to the fake server, and they will not receive any prompts, which greatly increases the number of applications in the system. risk, which may lead to leakage of user information and financial information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A root certificate storage device and secure access method
  • A root certificate storage device and secure access method
  • A root certificate storage device and secure access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The scope of applicability of the present invention will become apparent from the detailed description given below. It should be understood, however, that the detailed description and specific examples, while indicating the preferred embodiment of the invention, are given for purposes of illustration only.

[0028] figure 1 Shows a schematic structural diagram of the root certificate storage area of ​​the root certificate storage device 100 of the present invention, wherein the root certificate storage device 100 is a built-in memory of a mobile terminal such as a mobile phone or an SD card connected to a mobile phone, and the root certificate storage device 100 includes a The fixed storage area D0 of the well-known CA root certificate, the root certificate in it cannot be modified or added, and can only be read. The root certificate in this area is built into the mobile phone before leaving the factory, and is used to verify the certificate of the other party's site w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a root certificate storage device and a secure access method, wherein the method includes: when a certificate needs to be verified, determining whether there is a corresponding CA root certificate in the fixed storage area; When CA root certificate is obtained, obtain the developer name of the application; determine whether the extensible storage area contains a subdirectory named after the developer name; include a subdirectory named after the developer name in the extensible storage area , determine whether the subdirectory contains the corresponding CA root certificate; when the extensible storage area does not contain the subdirectory named after the developer or does not contain the corresponding CA root certificate in the subdirectory, ask the user Whether to trust the root certificate of the site to be connected; disconnect when the user confirms that they do not trust. The invention can prevent applications from being connected to fake sites, thereby preventing possible theft of information and enhancing the security among different applications.

Description

technical field [0001] The present application relates to the field of communication security, in particular to a root certificate storage device and a method for implementing secure access by using the root certificate storage device. Background technique [0002] In order to meet the application of PKI technology on mobile phones, such as correctly establishing https connections, root certificates of many CA sites need to be maintained in the mobile phone. In the mobile phone system currently on the market, there are two types of root certificate management methods. One is for well-known CA issuing institutions. Generally, mobile phones have built-in CA root certificates of these institutions in the read-only storage area of ​​the mobile phone. Users and applications can use these CA root certificates but cannot change them. This type of management method will cause the system to fail to automatically verify the site certificate issued by the CA that is not built into the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3265H04L63/0823
Inventor 杨玉奇
Owner PRANUS BEIJING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products