Method, device and system for certificate management
A certificate and processor technology, applied in the transmission system, digital transmission system, user identity/authority verification, etc., can solve security problems, increase the cost of different service providers, heavy memory and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] Techniques for online registration of a service, for obtaining a service provider signed certificate (SP signed certificate) for obtaining a service, and for using an SP signed certificate to obtain the service are discussed herein. For example, an encryption key pair comprising a device private key and a device public key is preferably generated during manufacture of the user device. The device private key is stored in a secure storage area or secure memory of the user device, such as a trusted execution environment. The user device contacts an online registration server (OSUS) via a communication network and the OSUS authenticates the user device. The device provides the device public key to OSUS and OSUS verifies that the user device uses a secure key provision, ie the device private key corresponding to the device public key is securely stored at the user device. For example, OSUS looks for the device public key in a whitelist database or for an indication of secur...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


