Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Certificate application method, device and equipment

A certificate and encryption certificate technology, applied in the field of data processing, can solve the problems of constant change, threat to terminal information security, explicit public key information, etc.

Active Publication Date: 2019-10-22
NEUSOFT CORP
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Certificates are usually divided into explicit certificates and implicit certificates. At present, explicit certificates are widely used in many fields in our country. However, compared with implicit certificates, the defect of explicit certificates is that the public key information in the process of certificate application is It is explicit and remains unchanged, and once the public key information is leaked, the relevant information of the corresponding terminal will also be leaked, seriously threatening the information security of the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificate application method, device and equipment
  • Certificate application method, device and equipment
  • Certificate application method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0063] In the field of information security, there is a problem of information leakage in the current certificate application process, which threatens the information security of terminals that need to apply for certificates. In order to avoid information leakage during the certificate application process, ensure information security during the certificate application process, and ultimately ensure terminal information security, this application provides a certificate application met...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a certificate application method, device and equipment, and the method comprises the steps: a terminal encrypting a certificate application request carrying an encryption public key through a public key of an anonymous certificate issuing system PCA, and obtaining an encrypted certificate application request; wherein the encryption public key is generated by the terminal; sending the encrypted certificate application request to an access authentication system RA, the RA receiving the encrypted certificate application request, and sending the encrypted certificate application request to the PCA through the RA, so that the PCA decrypts the encrypted certificate application request to obtain the encrypted public key, encrypts the encrypted public key into an anonymouscertificate generated by the terminal, and sends the anonymous certificate to the RA; and receiving the anonymous certificate sent by the RA. According to the application, the encrypted public key ofthe terminal at one side of the certificate issuing mechanism is not leaked in the certificate application process, so that the information security of the certificate encrypted by using the encryptedpublic key is ensured, and finally, the information security of the terminal using the certificate for communication is ensured.

Description

technical field [0001] This application relates to the field of data processing, in particular to a certificate application method, device and equipment. Background technique [0002] In the field of information security, before each terminal performs information communication, it is necessary to apply for a certificate to an authority responsible for issuing and managing digital certificates, that is, a certificate authority (Certificate Authority; CA). [0003] Certificates are usually divided into explicit certificates and implicit certificates. At present, explicit certificates are widely used in many fields in our country. However, compared with implicit certificates, the defect of explicit certificates is that the public key information in the process of certificate application is It is explicit and remains unchanged, and once the public key information is leaked, the relevant information of the corresponding terminal will also be leaked, which seriously threatens the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/3263H04L9/3268
Inventor 朱旭
Owner NEUSOFT CORP
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More