CA authentication method and device based on block chain and electronic device

A CA certification, blockchain technology, applied in the field of information security, can solve user information security threats, electronic information storage and management security issues, digital certificate information security risks, etc., to reduce security risks.

Inactive Publication Date: 2018-12-14
Fisherman Information Technology Co Ltd
View PDF6 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, CA certification and authorization centers in China store electronic information in the information system and manage them centrally. Once the information system of CA certification and authorization centers is attacked maliciously, it may cause information security risks in all digital certificates issued by it. This kind of The centralized information system has the problem of electronic information stor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CA authentication method and device based on block chain and electronic device
  • CA authentication method and device based on block chain and electronic device
  • CA authentication method and device based on block chain and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] A blockchain-based CA authentication method provided in Embodiment 1 of this application, such as figure 1 shown, including:

[0057] S101: Receive a request message for applying for a digital certificate sent by a client.

[0058] Here, request messages for applying for different types of digital certificates sent by the client may be received. Based on the application angle classification of digital certificates, the types of digital certificates can be classified into server certificates, email certificates and personal certificates.

[0059] S102: Obtain the applicant information and user public key in the request message.

[0060] If the digital certificate applied by the client is a server certificate, the applicant information may include a website domain name; if the digital certificate applied by the client is an email certificate, the applicant information may include an email address; if the The digital certificate applied by the client is a personal certi...

Embodiment 2

[0078] The process of validating digital certificates in a blockchain-based CA authentication method provided by the present application will be described below through Embodiment 2.

[0079] A blockchain-based CA authentication method provided in Embodiment 2 of the present application, such as figure 2 shown, including:

[0080] S201: Receive a verification request message sent by the client to verify the legality of the digital certificate, where the verification request message includes signature information of the digital certificate.

[0081] In specific implementation, verifying the legitimacy of the digital certificate means verifying the legitimacy of the signature information of the digital certificate, where it is necessary to verify the signature information of the digital certificate using the signature key used when forming the signature information of the digital certificate .

[0082] S202: Send a subkey invocation request to the preset node.

[0083] In a ...

Embodiment 3

[0096] Another blockchain-based CA authentication method provided in Embodiment 3 of this application, such as image 3 shown, including:

[0097] S301: Any node in the blockchain receives a request message for applying for a digital certificate sent by the client.

[0098] Here, any node in the blockchain can receive request messages sent by clients to apply for different types of digital certificates. Based on the application angle classification of digital certificates, the types of digital certificates can be classified into server certificates, email certificates and personal certificates.

[0099] S302: The node obtains the applicant information and the user public key in the request message.

[0100]If the digital certificate applied by the client is a server certificate, the applicant information may include a website domain name; if the digital certificate applied by the client is an email certificate, the applicant information may include an email address; if the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a CA authentication method based on a block chain, wherein the method comprises the following steps: receiving a request message sent by a client to apply for a digital certificate; acquiring applicant information and a user public key in the request message; obtaining a sub-key of a preset node in a block chain and generating a signature key; signing the applicant information and the user public key with the signing key, forming signature information, storing the signature information, the applicant information, and the user public key correspondingly in a block of a block chain to form a digital certificate of a request message for the client, wherein the node is a different CA authentication authorization center. Embodiments of the present application employ blockchain technology, enabling decentralization of CA certification authorization centers.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a blockchain-based CA authentication method, device and electronic equipment. Background technique [0002] The e-commerce certification authority, CA (Certificate Authority), as an authoritative, reliable, and impartial third-party organization, is responsible for issuing and managing all digital certificates required by entities participating in online transactions. It is a safe electronic information The core of the exchange. [0003] At present, CA certification and authorization centers in China store electronic information in the information system and manage them centrally. Once the information system of CA certification and authorization centers is attacked maliciously, it may cause information security risks in all digital certificates issued by it. This kind of The centralized information system has the problem of electronic information storage a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/38
CPCG06Q20/38215G06Q20/3825G06Q20/3829
Inventor 于佳平郭刚宋志华成盼青
Owner Fisherman Information Technology Co Ltd
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products