Supercharge Your Innovation With Domain-Expert AI Agents!

Authentication method and system, storage medium, and electronic device based on digital certificate

A technology of digital certificates and authentication methods, applied in digital transmission systems, transmission systems, electrical components, etc., can solve problems such as insufficient security enhancement methods, security key leakage, and insufficient security protection strength, and achieve the effect of ensuring data security.

Active Publication Date: 2022-04-08
蚂蚁蓉信(成都)网络科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] A possible security enhancement method in the prior art is to share a security key between the mobile application and the digital certificate application to encrypt and protect the transmitted data to be signed. However, due to the insufficient security protection strength of the mobile application itself, There is still the possibility that the security key will be leaked, so this security enhancement method is still not enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system, storage medium, and electronic device based on digital certificate
  • Authentication method and system, storage medium, and electronic device based on digital certificate
  • Authentication method and system, storage medium, and electronic device based on digital certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Embodiment 1, the authentication method based on digital certificate such as figure 2 As shown, it should be understood that the premise of the process described in this embodiment is that the digital certificate has been initialized and issued, and this embodiment is configured as an application example of a digital certificate, including the following steps:

[0060] S11. The mobile terminal interacts with the mobile application server; wherein, the user has applied for and installed a digital certificate application in the security unit of the mobile terminal, and the mobile application server has also retained the user's public key certificate; the user interacts with the server through the mobile application , to generate the data to be signed that needs to be signed by the user's digital certificate. For example, the user can trigger a third-party service to call the call interface module in the mobile terminal to obtain the device information and digital certifi...

Embodiment 2

[0070] Embodiment 2, the authentication method based on digital certificate such as Figure 4 As shown, it should be understood that the premise of the process described in this embodiment is that the digital certificate has been initialized and issued. This embodiment is configured as an application example of a digital certificate, including the following steps:

[0071]S11. The mobile terminal interacts with the mobile application server; wherein, the user has applied for and installed a digital certificate application in the security unit of the mobile terminal, and the mobile application server has also retained the user's public key certificate; the user interacts with the server through the mobile application , to generate the data to be signed that needs to be signed by the user's digital certificate. For example, the user can trigger a third-party service to call the call interface module in the mobile terminal to obtain the device information and digital certificate ...

Embodiment 3

[0084] Example 3, such as image 3 As shown, the authentication system based on digital certificates includes a security unit built in a mobile terminal, a mobile application server, and a trusted application server; the mobile application server has a user digital certificate public key built in, and a digital certificate is installed in the security unit Application; Among them, the digital certificate application is a string of numbers that marks the identity information of the communication parties in the network communication, and provides a way to verify the identity of the communication entity on the Internet. In this embodiment, it is issued to the user by a legal authority, and the user's certificate corresponding private key is stored in the digital certificate application in the security unit of the mobile terminal, and the user's public key certificate can be obtained by the mobile application server from the legal authority and used for Subsequent verification of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

One or more embodiments of this specification provide an authentication method based on digital certificates, including the mobile terminal interacting with the server side and generating data to be signed on the server side; the trusted application server on the server side encapsulates the data to be signed and returns it to the mobile terminal. Terminal; the mobile terminal verifies the encapsulated data to be signed through the key shared with the trusted application server, and uses the private key of the user certificate to sign after the verification is passed; the mobile terminal returns the signed data to the server side, and uses the user digital certificate The public key verifies the signed data. One or more embodiments of this specification also relate to an authentication system, a storage medium, and an electronic device based on a digital certificate. One or more embodiments of this specification perform digital certificate authentication by first sending the data to be signed to the server for secure packaging, and then returning it to the mobile application and sending it to the digital certificate application for signing.

Description

technical field [0001] One or more embodiments of this specification relate to the field of mobile terminal digital certificate authentication, and in particular to a digital certificate-based authentication method and system, a storage medium, and an electronic device. Background technique [0002] With the development of mobile Internet services, the security requirements for user identity authentication are becoming stronger and stronger. Digital certificate application is a typical user identity authentication method. The traditional digital certificate application is to issue a separate certificate hardware carrier to the user. The carrier has a built-in private key corresponding to the user certificate. When performing network business transaction confirmation, the user uses the certificate to sign and realize identity authentication. In today's mobile Internet stage, the user's digital certificate application can be built into the security unit of the user's mobile t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/40
CPCH04L9/3247H04L9/3263H04L63/08H04L63/0823
Inventor 孙曦落红卫
Owner 蚂蚁蓉信(成都)网络科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More