Unlock instant, AI-driven research and patent intelligence for your innovation.

Electronic commerce secret key management method and system based on XKMS

A key management system and e-commerce technology, which is applied in the field of XKMS-based e-commerce key management methods and systems, and can solve problems such as difficult user deployment, high cost, and difficult deployment

Inactive Publication Date: 2017-05-10
AEROSPACE INFORMATION
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although PKI can solve network security problems very well from a security point of view, there are still many deficiencies in PKI such as: (1) There are many different format technical standards under the large framework of PKI. Differences lead to many obstacles in the actual implementation of PKI; (2) PKI is based on ASN.1 description and encoded by BER / DER, so there are problems such as difficulty in deployment, high cost, and poor interactivity; (3) ) There are many kinds of client tools, and the amount of calculation is huge and complex. Users need to interact with various PKI products, and need to install many different program installation packages, which makes it difficult for users to deploy and increases the complexity of applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic commerce secret key management method and system based on XKMS
  • Electronic commerce secret key management method and system based on XKMS
  • Electronic commerce secret key management method and system based on XKMS

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] This embodiment provides a processing flow of an XKMS-based e-commerce key management method such as figure 1 As shown, in this embodiment, including XKMS key information server, LDAP directory server, and XKMS client,

[0033] Receive in advance the key registration requests sent by the purchaser clients of the e-commerce platform;

[0034] Wherein, the key registration request is encrypted using the shared public key PassPhrase provided by the XKMS key information server and then sent to the XKMS key information server through SOAP;

[0035] Before registering a key, a key pair must first be generated, which can be generated by the client or by the server. In this embodiment, the XKMS key information server generates a key pair, and returns the private key to the purchaser client.

[0036] For server-generated key pairs, the registration request and response formats remain the same, but the data exchanged is different. The request does not include any form of publi...

Embodiment 2

[0052] This embodiment provides a kind of electronic commerce key management system based on XKMS, and its specific realization structure is as follows Figure 4 As shown, it can specifically include the following modules:

[0053] The receiving module 41 is used to receive the access request sent to the XKMS key information server according to the public key bound in the purchase order determined by the purchaser client;

[0054] Verification module 42: used for the XKMS key information server to query the public key bound to the purchase order in the local key store according to the access request and verify the validity of the public key;

[0055] Executing module 43: it is used to access the LDAP directory server by the XKMS key information server to obtain the valid key information of the order and bind the valid key information of the order if the public key fails the verification. After the order is placed, a certificate is issued to the purchaser so that the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an electronic commerce secret key management method and system based on XKMS, and the method comprises the steps: receiving a public key bound in a purchasing order determined a purchasing side client, and transmitting an access request to an XKMS secret key information server; enabling the XKMS secret key information server to query the public key, bound with the purchasing order, in a local secret key library according to the access request, and verifying the validity of the public key; enabling the XKMS secret key information server to visit an LDAP catalog server and obtain the valid secret key information of the order if the public key does not pass the verification, binding the order with the valid secret key information of the order, issuing a certificate to the purchasing side, and enabling the public key of the purchasing side to pass the verification. The XKMS secret key information server enables a strategy of backing up the certificate generated by a conventional PKI in an independent safety database, so the method just need to install a corresponding software program at the client, and a customer does not need to interact with the PKI for many times.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an XKMS-based e-commerce key management method and system. Background technique [0002] At present, with the rapid development of network information technology, information technology security has become a social issue that people pay close attention to. As the core of information technology security, PKI (Public Key Infrastructure) public key infrastructure is to solve e-commerce and e-government information security. It can provide a technical solution combining public key and symmetric key technology to ensure that the information and data transmitted on the Internet are not stolen or destroyed. Although PKI can solve network security problems very well from a security point of view, there are still many deficiencies in PKI such as: (1) There are many different format technical standards under the PKI framework. Differences lead to many obstacles in the actual impleme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/06
Inventor 王绍刚刘海法
Owner AEROSPACE INFORMATION