Certificate import method and terminal
A certificate and terminal technology, applied in the field of information security, can solve the problems of not being suitable for system-side certificate storage, increase costs, etc., and achieve the effect of increasing hardware costs and improving effectiveness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0078] This embodiment provides a method for importing a certificate, including:
[0079] S1. Compile the preset root certificate into an executable file.
[0080] Optionally, the data type of the root certificate is set as a constant.
[0081] Among them, the root certificate is a trusted CA certificate. CA (Certification Authority) is the certification center. It adopts PKI (Public Key Infrastructure) public key infrastructure technology to provide network identity authentication services and is responsible for issuing and managing digital certificates.
[0082] Because this embodiment involves the verification of the public key certificate, it is necessary to load the public key in the trusted CA certificate into the system. In order to improve security, in this embodiment, the public key of the CA certificate is designed as a constant of the application program, which has been loaded into the executable file when the application program is compiled.
[0083] S2. Injecti...
Embodiment 2
[0097] This embodiment provides a certificate importing terminal, including one or more processors 1 and a memory 2, the memory 2 stores a program, and is configured such that the one or more processors 1 perform the following steps:
[0098] S1. Compile the preset root certificate into an executable file.
[0099] Optionally, the data type of the root certificate is set as a constant.
[0100] S2. Injecting a preset authentication key into the hardware security module.
[0101] S3. Acquire identity information; when the identity information passes identity verification, activate a certificate writing function of the executable file; the certificate writing function is used to receive a request corresponding to a certificate to be written into a database.
[0102] S4. When receiving a write database request corresponding to a certificate, the executable file acquires a public key corresponding to the root certificate.
[0103] S5. The executable file verifies the digital sig...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

