A method and system for issuing an identity-based asymmetric key
An asymmetric key, symmetric encryption technology, applied in key distribution, can solve the problems of easy guessing, hidden dangers, easy interception of passwords by hackers, etc., to simplify configuration and management, and enhance security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] Embodiment 1 of the present invention provides an identification-based asymmetric key issuance method, such as figure 1 shown, including:
[0041] Step s101: the key generation center receives the user registration information submitted by the user, saves the user registration information, and determines the key carrier according to the user registration information.
[0042] Among them, when the user applies for registration, the information that needs to be submitted may include: applicant identification type, applicant identification, applicant name, applicant contact information, key carrier network electronic identity (EID), etc.; The network electronic identity identifier EID is used to determine the key carrier.
[0043] Among them, if the user is a first-time registered user, the user needs to go to the designated service point for face-to-face registration and application, and the local registration service provider will complete the preliminary legality revie...
Embodiment 2
[0138] Embodiment 2 of the present invention provides an identification-based asymmetric key issuance method, such as figure 2 shown, including:
[0139] Step s201: the registration proxy server receives the user registration information submitted by the user.
[0140] Among them, when the user applies for registration, the information that needs to be submitted includes: applicant identification type, applicant identification, applicant name, applicant contact information, key carrier network electronic identity (EID), other information, etc.; The key carrier network electronic identity identifier EID is used to determine the key carrier.
[0141] Among them, if the user is a first-time registered user, the user needs to go to the designated service point for face-to-face registration and application, and the local registration service provider will complete the preliminary legality review of the user's application information at the counter.
[0142] Step s202: the regist...
Embodiment 3
[0245] This embodiment provides an identification-based asymmetric key issuance method, such as image 3 shown, including:
[0246] Step s301: The key carrier receives the user verification request sent by the key generation center.
[0247] Specifically, the key carrier receives the user verification request sent by the key generation center, and the instruction format is: 0x80 FC02 00 20;
[0248] Among them, the key carrier is a software / hardware module that can safely store the key; before the user registers, the key carrier has been initialized and has system parameters.
[0249] Step s302: The key carrier prompts the user to input a password, and judges whether the password entered by the user is correct, and if so, executes step s303; otherwise, continues to execute step s302.
[0250] Specifically, step s302 also includes: when the user enters a wrong password, judging whether the number of times the user has entered has reached the upper limit of the number of allow...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


