Generating method and system of trusted application identification, application method and application end device

A technology of application identification and application method, applied in the field of information security, can solve the problems of key escrow, difficult to interconnect households, large systemic risks, etc., and achieve the effect of making up for defects and deficiencies, enhancing system security, and expanding application methods

Active Publication Date: 2019-08-16
鄂尔多斯市迪曼森密码科技有限公司
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the CA certificate authentication system, the private key is a random number, and the public key is generated by calculation of the private key. The public key has no calculation relationship with the entity identity (hereinafter also referred to as the entity identification EID), and a trusted third-party CA center is required for authentication. The center needs to maintain a large number of certificates in a unified manner, which is difficult to support large-scale applications. An entity usually holds certificates from multiple CA centers and it is difficult to communicate with each other. The center conducts data query or regularly synchronizes data; at the same time, the basic information of the entity users audited and registered when the digital certificate is issued adopts a standard (such as X.500) format in the certificate, which is out of touch with the application, has poor practicability, and has the possibility of privacy leakage. risk; in addition, all digital certificates are issued by the private key of the CA center, there is a large systemic risk, once the central root key is leaked, the entire system will be destroyed
[0004] Identity-Based Cryptograph (Identity-Based Cryptograph) is the latest development based on the CA certification system. It was first proposed by Israeli cryptographer Shamir. The main idea is to use the identity as the public key to technically simplify the public key management and certificate exchange process of the CA center. , but the existing identification cryptographic system still has defects or deficiencies such as complex algorithms, low efficiency, and key escrow
[0005] With the rapid development of the network and the popularization and application of electronic certification, especially the development of the mobile Internet, Internet of Things, and blockchain networks, the existing CA certification system has been difficult to meet the requirements, and its drawbacks and shortcomings in the application have gradually emerged. The cryptographic system also needs to change from pure technical simplification to practicality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generating method and system of trusted application identification, application method and application end device
  • Generating method and system of trusted application identification, application method and application end device
  • Generating method and system of trusted application identification, application method and application end device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The present invention will be described in detail below based on specific embodiments with reference to the accompanying drawings. For the sake of clarity, steps or structures that are known to those skilled in the art are not described in detail herein. Additionally, while the invention has been described in conjunction with particular embodiments, it should be understood that such description is not intended to limit the invention to the described embodiments. On the contrary, the description is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the invention as defined by the appended claims.

[0077] First, the outline of the present invention will be described. The invention relates to a generation method and an application method of a trusted application identifier. In the present invention, the trusted application identifier TAID (Trusted Application Identity) is a trusted network identity based o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and system for generating a trusted application identifier, an application method and an application-side device. A method for generating a trusted application identifier is characterized incomprising a management domain attribute obtaining step of acquiring a management domain attribute associated with an entity by the trusted application identifier management system; an application domain attribute obtaining step of obtaining an application domain attribute associated with the entity and the application by the trusted application identification management system; an entity identification generation step of combining the management domain attribute and the application domain attribute to generate an entity identification by the trusted application identification management system; and a trusted application identification generation step of calculating and generating an identification key for the entity identification by the trusted application identification management system and signing to generate a trusted application identification. The invention also includes generating a security domain code and adding the security domain code to the entity identifier. The invention can effectively expand the application method, the range and the efficacy of the identification key system, effectively make up the defect and the deficiency of the CA certificate system, and is also the innovation and the expansion of the identification cryptosystem.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method and system for generating a trusted application identifier, an application method and an application terminal device. Background technique [0002] The existing electronic certification system adopts an asymmetric key system, which usually checks the basic information of registered entity users through a third-party trusted organization—the certification center CA (Certificate Authority), and realizes entity identity and security by issuing digital certificates through the CA center. Binding of public keys. [0003] In the CA certificate authentication system, the private key is a random number, and the public key is generated by calculation of the private key. The public key has no calculation relationship with the entity identity (hereinafter also referred to as the entity identification EID), and a trusted third-party CA center is required for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0866H04L63/0815H04L63/0861H04L63/0876
Inventor 何晓涛
Owner 鄂尔多斯市迪曼森密码科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products