Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authorization method which solves problem that certificate private key is reused by multiple users

A multi-user and certificate technology, which is applied in user identity/authority verification and key distribution, can solve the problems of electronic signature repudiation, high cost, slow key generation and certificate issuance, and achieve the effect of completeness and low cost

Active Publication Date: 2016-06-15
HEIBEI TECSHIELD SOFTWARE TECH CO LTD
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In some cases, such as the signing of the informed consent of hospital patients, the signing of business documents of users in paperless business halls, etc., it is difficult to implement the method of reviewing user applications through the CA center and issuing certificates to users one by one.
In these cases, users often only temporarily use the private key to sign a certain data or electronic document once. After signing, the user generally no longer needs to use the private key. The method of issuing certificates to the user on site is too expensive and the process is complicated. , it is difficult for users to accept
[0004] One solution is to temporarily generate keys and certificates for each signature operation of each user, and use temporary keys for electronic signatures. The problem with this method is that key generation and certificate issuance are slow, performance is poor, and user experience is poor. , numerous ephemeral keys and certificates management is complicated
Another method is to let users share a private key and use the same private key to sign data and electronic documents. This method has good performance, simple key management, and can protect the integrity of data and electronic documents. However, it is impossible to confirm which user initiated the electronic signature, and it is impossible to verify the identity of the user and prevent the user from denying the electronic signature.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authorization method which solves problem that certificate private key is reused by multiple users
  • Security authorization method which solves problem that certificate private key is reused by multiple users
  • Security authorization method which solves problem that certificate private key is reused by multiple users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0071] figure 1 It is a flow chart of a method for solving the problem of multi-user reuse of certificate private keys through security authorization technology when users sign electronically. In order to further illustrate the technical scheme of the present invention, below in conjunction with figure 1 Detailed description. Specific steps are as follows:

[0072] Step 1. The authorization system generates the electronic document or data to be signed based on the user's application to-do item, and obtains the characteristic information of the electronic document or data, including the name DC of the data Name , data type DC Type , the calculated hash value DC Hash ;

[0073] Step 2: The authorization system collects the user's feature information, including the user's handwritten signature image UC Sign , Fingerprint UC FP , ID card information UC IDC , photo image UC Pic , live video UC Vid and audio UC Aud Wait;

[0074] Step 3. The authorization system generate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security authorization method which solves a problem that a certificate private key is reused by multiple users, and belongs to the information security field. The method includes the steps that based on characteristic information of a user and an electronicsignature document or data, a use authorization application for a client side public certificate private key is initiated; and an authorization system verifies the validity of the authorization application, signs and issues electronic authorization according to an authorization strategy, and authorizes the user to use the certificate private key for a specific purpose in some period. According to the invention, a security authorization flow based on the user and electronic document characteristic information is realized; the possession and control of the certificate private key by a special user in some document signature process or in some period can be ensured; the electronic document integrity, the signer identity legality, and the signature operation non-repudiation can be realized; temporary certification to the user is avoided; and a usage habit of the user is met. The security authorization method of the invention is simple and convenient, has low cost, satisfies an electronic signature method, meets requirements of electronic evidence proof, and is suitable for e-government and electronic commerce.

Description

technical field [0001] The present invention relates to a method for solving the problem of certificate private key reuse by multiple users through security authorization technology. Specifically, based on the feature information of users and electronic signature documents or data, an application for authorization of the use of the public certificate private key of the client is initiated, and the authorization system The method of verifying the validity of the authorization application, issuing an electronic authorization letter according to the authorization policy, and authorizing the user to use the private key of the certificate for a specific purpose within a certain period of time is applicable to e-government and e-commerce; it belongs to the field of information security. Background technique [0002] Digital certificate technology is used for identity authentication, data integrity and data confidentiality in network communication. During the application, the user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/088H04L9/3247
Inventor 罗小津李岳巍吴志峰
Owner HEIBEI TECSHIELD SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products