Digital certificate generation method, authentication method and electronic equipment

A technology for digital certificates and authentication methods, applied in digital transmission systems, electrical components, user identity/authority verification, etc. The effect of reducing redundancy

Active Publication Date: 2020-04-24
EIDLINK INFORMATION TECH CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the identities of all parties on the Internet can be verified through digital certificates. Digital certificates are issued by a certificate authority (CA organization, Certificate Authority). The authenticity of the digital certificate, the existing digital certificate issuance method is that a certain CA organization can only issue the digital certificate of the corresponding specific certificate application system, however, according to the existing digital certificate issuance method, the digital certificate issued by a certain CA organization can only It is used on the specific certificate application system corresponding to the CA institution. If the user needs to use multiple certificate application systems, he needs to apply for a digital certificate from the CA institution corresponding to each certificate application system. Therefore, the digital certificates issued by each CA institution are mutually exclusive. They cannot be used universally, resulting in a large number of digital certificate redundancy and poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital certificate generation method, authentication method and electronic equipment
  • Digital certificate generation method, authentication method and electronic equipment
  • Digital certificate generation method, authentication method and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] The embodiment of this application provides a digital identity-based digital certificate generation method, such as figure 1 As shown, the method may include the following steps:

[0067] Step S101, acquiring user-related information from the first client;

[0068] For this embodiment of the application, the user-related information from the first client is acquired, wherein the first client in the embodiment of the The CA authentication system applies for a digital certificate, wherein at least one site administrator can be assigned to each first client, and the site administrator can verify the authenticity of the user-related information materials submitted by the digital certificate applicant, and then pass the first client Send a corresponding request, where the request carries the applicant's user-related information, which can be the citizen's name and ID number.

[0069] Step S102, sending a digital identity application request including user-related informati...

Embodiment 2

[0091] Based on the same inventive concept, the embodiment of this application provides an authentication method based on digital certificates, including:

[0092] Step S301, sending the password input by the user to the digital certificate carrier to activate the digital certificate carrier, the digital certificate carrier carries a private key and a digital certificate, and the digital certificate carries a public key;

[0093] For the embodiment of this application, the password entered by the user through the terminal device is sent to the digital certificate carrier. If the input password is consistent with the activation password of the digital certificate carrier, the digital certificate carrier is activated. The digital certificate issuing network is making the digital certificate When using the carrier, perform the operation of allowing the user to set a password. When using the digital certificate carrier, the digital certificate carrier can only activate the digital ...

Embodiment 3

[0127] Based on the same inventive concept, the embodiment of this application provides another authentication method based on digital certificates, such as Figure 5 As shown, the method includes:

[0128] Step S501, acquiring user-related information;

[0129] For this embodiment of the application, the user-related information input by the user through the corresponding terminal device is obtained, where the user-related information may be the user's name and ID number.

[0130] Step S502, obtaining the digital certificate sent by the digital certificate carrier, and obtaining the signature information that the digital certificate carrier executes signing on the user-related information;

[0131] For this embodiment of the application, the digital certificate carrier may be a USBkey (also known as USB-Shield), or other forms of carriers capable of realizing the functions of this application, which are not limited here.

[0132] Step S503, verifying the legitimacy of the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a digital certificate generation method, an authentication method and electronic equipment, and is applied to the digital certificate technology field. The method comprises the following steps: acquiring user related information from a first client; sending a digital identity application request comprising user related information and a first application identifier of the first client to a network identity identification system; receiving a first digital identity fed back by the network identity recognition system, wherein the first application identifier is a unique identifier value allocated to each application by the network identity recognition system; sending a digital certificate application request including user related information, the first application identifier and the first digital identity to a CA certification authority, and receiving the digital certificate issued by the CA certification authority, thereby solving the universal problem of the digital certificate, realizing that one digital certificate can be used in a plurality of digital certificate application systems, reducing the redundancy of the digital certificate, andfurther improving the user experience.

Description

technical field [0001] The present application relates to the technical field of digital certificates, and in particular, the present application relates to a digital certificate generating method, an authentication method and electronic equipment. Background technique [0002] With the vigorous development of e-commerce and e-government, people's production and life are more and more closely connected with the Internet. It is more convenient and faster, but how to verify the identity of all parties on the Internet has become a key issue. Since the identity of Internet users can be verified through digital certificates, electronic authentication services based on digital certificates have been rapidly promoted. [0003] At present, the identities of all parties on the Internet can be verified through digital certificates. Digital certificates are issued by a certificate authority (CA organization, Certificate Authority). The authenticity of the digital certificate, the exis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3263H04L9/3247H04L63/0823
Inventor 吴志明郭宏杰刘海龙
Owner EIDLINK INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products