Unlock instant, AI-driven research and patent intelligence for your innovation.

CFL centralized management mode implementation method

A technology for centralized management and implementation methods, applied in the field of information security, can solve problems that are not conducive to centralized management

Active Publication Date: 2019-03-26
青岛博文广成信息安全技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0041] From the CFL certificate generation algorithm of the above-mentioned CFL certificate generation center, it can be seen that the work public and private keys of CFL users are generated by themselves, which is not conducive to centralized management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CFL centralized management mode implementation method
  • CFL centralized management mode implementation method
  • CFL centralized management mode implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The CFL centralized management mode realization method of the present invention is made of following five algorithms:

[0050] Algorithm 1: CFL centralized management mode CFL certificate generation center identification public and private key generation element set generation algorithm

[0051] 1) The CFL certificate generation center uses a random number generator to randomly generate an identification private key generation element set:

[0052] IDSKG={sk 0 ,sk 1 ,...,sk L-1}

[0053] Among them, the elements must be independently generated, pass the randomness test, and be different in pairs, and are unique to the CFL certificate generation center.

[0054] 2) The CFL certificate generation center generates the corresponding identity public key generation element set based on the identification private key generation element set:

[0055] IDPKG={pk 0 , pk 1 ,...,pk L-1},

[0056] where pk i is the private key sk in the public key cryptography algorithm i ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method for implementing a CFL centralized management mode, which belongs to the technical field of information security, and relates to a key authentication system. The method for implementing a CFL centralized management mode provided by the present invention includes five algorithms, i.e. an algorithm for a CFL certificate generation center to generate identifier public / private key element sets, an algorithm for the CFL certificate generation center to generate a random number k of an identifier in a user certificate identifier signature algorithm, an algorithm for the certificate generation center to generate work public / private key identifiers for users, a CFL certificate generation algorithm and a CFL certificate verification algorithm, and gives the specific embodiments of the five algorithms, thereby proving that the method for implementing a CFL centralized management mode has good information security property.

Description

technical field [0001] The invention belongs to the technical field of information security and relates to a key authentication system. Background technique [0002] Based on the national commercial encryption algorithm SM 2 , SM 3 and SM 4 In the CFL authentication algorithm of the user's CFL certificate, the CFL signature verification is performed on the user's CFL certificate, and the process is as follows: [0003] Assume that the identification private key generation element set and identification public key generation element set required for CFL signature verification are as follows: [0004] IDSKG (Identity Secret Key Generation): The main system key that the CFL certificate generation center signs for the user certificate is [0005] IDSKG={sk 0 ,sk 1 ,...,sk L-1}, [0006] Each element is independently generated and different in pairs. It passes the randomness test and is unique to the CFL certificate generation center. L is the total number of elements in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0866H04L9/0869H04L9/3268
Inventor 范修斌
Owner 青岛博文广成信息安全技术有限公司