Public key processing method and device for public key infrastructure

A technology of public key infrastructure and processing method, which is applied in the field of public key processing method and device of public key infrastructure, can solve the problems of complex legality verification algorithm, limited digital certificate, complicated operation, etc., and achieve simplified acquisition of public key process, high security, effect of reducing failure

Active Publication Date: 2018-10-09
CHINA MOBILE COMM LTD RES INST +1
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. If the CA fails to be controlled, etc., the management of application, issuance, revocation and renewal of digital certificates will be out of control, resulting in a greatly reduced security level during the use of asymmetric algorithms
For example, once the CA's own private key is stolen, the attacker can issue various digital certificates, leading to the above-mentioned out-of-control state
[0005] 2. The management of the above-mentioned digital certificates all need to go through procedures such as application, issuance, revocation and renewal, and the operation is complicated
[0006] 3. The digital certificates that a CA can store are limited, and the server of the CA is usually dedicated, so the infrastructure construction cost and operation and maintenance cost of the CA are expensive
[0007] 4. The verification of the validity of the certificate is more complicated. In addition to verifying the correctness of the digital signature, it is necessary to check the validity period of the certificate and whether the certificate has been revoked
There are two commonly used methods to check whether a certificate has been revoked: 1). Certificate revocation list (Certificate revocation list), 2). Online Certificate Status Protocol (Online Certificate Status Protocol) Both verification methods involve a large amount of information query, resulting in The legality verification algorithm is complex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key processing method and device for public key infrastructure
  • Public key processing method and device for public key infrastructure
  • Public key processing method and device for public key infrastructure

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0194] Such as Image 6 As shown, this example provides a blockchain certificate application and issuance method, including:

[0195] The user terminal sends an application request carrying a blockchain certificate to the blockchain network;

[0196] The network nodes of the blockchain network perform identity verification. After the verification is passed, a new block is generated based on the consensus mechanism of the blockchain, and the newly generated block is connected to the generated blockchain to increase the block the length of the chain. The identity verification here is a kind of verification of the blockchain certificate or corresponding request in the foregoing embodiments.

[0197] The following details the various operations of the above-mentioned user terminal and blockchain network:

[0198] 1: The user terminal generates a blockchain certificate and marks the status of the blockchain certificate as valid. The user terminal processes the information of th...

example 2

[0208] Such as Figure 7As shown, this example provides a blockchain certificate revocation method, including:

[0209] 1: The user terminal sends a revocation request to the blockchain network, and the revocation request carries the blockchain certificate that needs to be revoked.

[0210] 2: After the network node of the blockchain network receives the revocation request, it verifies the user address to determine whether it meets the consensus mechanism generated by the blockchain. in the blockchain. The user address verification here is a kind of verification of the blockchain certificate or corresponding request in the foregoing embodiments.

[0211] The following is a detailed introduction to each operation of blockchain certificate revocation, and the specific steps are as follows:

[0212] The user terminal copies the blockchain certificate that needs to be revoked, and changes the status of the certificate to invalid. The user terminal treats the certificate inform...

example 3

[0216] Such as Figure 8 As shown, this example provides a query method for blockchain certificates, including:

[0217] 1: The user terminal sends a query request to the blockchain network, and the query request carries the user identification to be queried, such as a user name or a user serial number.

[0218] 2: After the network node of the blockchain network receives the query request, it uses the user ID as the query index to query the blockchain, and returns the public key in the valid blockchain certificate to the user terminal.

[0219] Specific steps are as follows:

[0220] To obtain someone else's blockchain certificate, the user terminal needs to use the user name on the blockchain certificate to initiate a query on the local blockchain or the remote blockchain. For efficiency, the search query starts from the latest block conduct;

[0221] If the user name to be queried is not retrieved on the blockchain, the query is terminated and an error message (the certi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a public key processing method and device for a public key infrastructure. The method comprises the steps of acquiring a public key, determining a status flagof the public key, generating a blockchain certificate including the public key, the status flag and an account identifier, broadcasting the blockchain certificate to a blockchain network, wherein the blockchain certificate is written into a block of a blockchain after blockchain network verification is passed.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a public key processing method and device of a public key infrastructure (Public Key Infrastructure, PKI). Background technique [0002] During the use of asymmetric encryption algorithms, public keys and private keys are usually used. The public key can be used by the sender to encrypt information sent to the receiver; the private key is used by the receiver to decode the information encrypted by the public key. Typically, the public key is an encryption key that other devices use to send information to this device. The public key is an integral part of the digital certificate; and the digital certificate is issued by a third-party certification authority. And before other devices send the information encrypted with the public key, they first need to pass information verification from a third-party certification authority (Certification Authority, CA) to obtain th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3249H04L9/3265
Inventor 刘福文彭晋左敏阎军智杭小勇
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products