Unlock instant, AI-driven research and patent intelligence for your innovation.

Certificate import method and terminal

A certificate and terminal technology, applied in the field of information security, can solve the problems of not being suitable for system-side certificate storage, increase costs, etc., and achieve the effect of increasing hardware costs and improving effectiveness

Active Publication Date: 2018-09-04
FUJIAN LANDI COMML EQUIP CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is not suitable for system-side certificate storage, and the storage method based on hardware devices will also increase additional costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificate import method and terminal
  • Certificate import method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] This embodiment provides a method for importing a certificate, including:

[0079] S1. Compile the preset root certificate into an executable file.

[0080] Optionally, the data type of the root certificate is set as a constant.

[0081] Among them, the root certificate is a trusted CA certificate. CA (Certification Authority) is the certification center. It adopts PKI (Public Key Infrastructure) public key infrastructure technology to provide network identity authentication services and is responsible for issuing and managing digital certificates.

[0082] Because this embodiment involves the verification of the public key certificate, it is necessary to load the public key in the trusted CA certificate into the system. In order to improve security, in this embodiment, the public key of the CA certificate is designed as a constant of the application program, which has been loaded into the executable file when the application program is compiled.

[0083] S2. Injecti...

Embodiment 2

[0097] This embodiment provides a certificate importing terminal, including one or more processors 1 and a memory 2, the memory 2 stores a program, and is configured such that the one or more processors 1 perform the following steps:

[0098] S1. Compile the preset root certificate into an executable file.

[0099] Optionally, the data type of the root certificate is set as a constant.

[0100] S2. Injecting a preset authentication key into the hardware security module.

[0101] S3. Acquire identity information; when the identity information passes identity verification, activate a certificate writing function of the executable file; the certificate writing function is used to receive a request corresponding to a certificate to be written into a database.

[0102] S4. When receiving a write database request corresponding to a certificate, the executable file acquires a public key corresponding to the root certificate.

[0103] S5. The executable file verifies the digital sig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information safety, in particular to a certificate import method and a terminal. According to the invention, a preset root certificate is compiled to an executable file. When a write-in database request corresponding to a certificate is received, the executable file acquires a public key corresponding to the root certificate. The executable file verifies the digital signature of the certificate according to the public key, and a verification result is obtained, wherein the verification result comprises passing and failure. When the verification result is passing through verification, the executable file writes in the certificate and a certificate chain corresponding to the certificate to a database. The validity of a certificate is improved on the premise that the hardware cost is not increased.

Description

technical field [0001] The invention relates to the field of information security, in particular to a certificate importing method and a terminal. Background technique [0002] With the widespread use of digital certificate technology, more and more system platforms and transaction terminals use the X.509 certificate system to complete security authentication or sensitive data download transactions. Because the X.509 certificate comes with authenticity and integrity verification, it is widely used. In the field of electronic payment, the payment terminal certificate can be used as the identity certificate of the terminal to realize the identity authentication with the interactive background. In addition, the payment terminal and the acquiring The background key download service can use the certificate to download the terminal master key. [0003] X.509 certificates, especially root certificates and certificate chains, are the basis of trust for mutual authentication between...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/60
CPCH04L9/3247H04L9/3263G06F21/602G06F21/33G06F21/44H04L9/3268H04L9/50
Inventor 王明伟徐永标
Owner FUJIAN LANDI COMML EQUIP CO LTD