CPK and PKI compatible method and device, terminal, system and storage medium

A terminal, terminal sending technology, applied in the field of information security, can solve problems such as the incompatibility of CPK and PKI

Pending Publication Date: 2019-09-24
JIN SHANG BO CHUANG BEIJING SCI & TECH CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a compatible method, device, terminal, system and storage medium based on CPK and PKI, which solves the problem of incompatibility between CPK and PKI in the prior art, and realizes the construction of emerging Internet of Things terminals with CPK system application, and compatible with the PKI system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CPK and PKI compatible method and device, terminal, system and storage medium
  • CPK and PKI compatible method and device, terminal, system and storage medium
  • CPK and PKI compatible method and device, terminal, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0038] Both CPK and PKI in the embodiment of the present invention belong to the public key system, which is the management method of the public key. The two adopt the same public key cryptographic algorithm (for example, RSA or ECC), and the difference between the two is only in the generation method of the key. different (wherein, the key pair of CPK generates the identification public key and the identification private key through the identification and public key matrix and the private key matrix respectively, while the key pair of PKI is randomly generated), and the generated key pair is the same , the used application algorithm protocol (for example, signa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security, discloses a CPK and PKI compatible method and device, a terminal, a system and a storage medium, and solves the problem that CPK and PKI cannot be compatible in the prior art. The method is applied to a first terminal with a CPK system, and comprises the following steps of sending an access request to a second terminal with a PKI system; receiving the verification information returned by the second terminal; utilizing an identification private key corresponding to the first terminal account to carry out digital signature on the verification information to obtain the signature information; packaging the signature information and a CA digital certificate corresponding to the first terminal account into a signature data packet, and sending the signature data packet to the second terminal, so that when the second terminal verifies both the CA digital certificate in the signature data packet and the signature information, it is determined that the access to the first terminal account is allowed. The embodiment of the invention is suitable for the data interaction between the CPK system and the PKI system.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a compatible method, device, terminal, system and storage medium based on CPK and PKI. Background technique [0002] With the rise of the Internet of Things in recent years, the Internet of Everything has been realized, and the devices connected to the network have increased geometrically. The limitations of the hierarchical CA (Certificate Authority, digital certificate certification body) system have gradually become prominent in coping with changes. The NB-IoT, LoRa, zigbee and other protocols involved in the Internet of Things are narrowband communication protocols. Most embedded devices in the Internet of Things have limited computing power. facilities) / CA security infrastructure is no longer suitable. In recent years, an important branch of public key cryptography has emerged—identified public key cryptography (such as combined public key, Combined Pub...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/00
CPCH04L9/3263H04L9/3247H04L9/0825H04L9/006
Inventor 李维刚南相浩
Owner JIN SHANG BO CHUANG BEIJING SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products