Implicit certificate key extension method and device

An implicit certificate and key extension technology, applied in the field of implicit certificate key extension, can solve the problem of low efficiency of certificate generation

Active Publication Date: 2020-04-24
晟安信息技术有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of this application provides an implicit certificate key extension ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implicit certificate key extension method and device
  • Implicit certificate key extension method and device
  • Implicit certificate key extension method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The principle and spirit of the present application will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present application, rather than to limit the scope of the present application in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of this disclosure to those skilled in the art.

[0024] Those skilled in the art know that the embodiments of the present application may be realized as a system, device, method or computer program product. Therefore, the disclosure of the present application can be specifically implemented in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0025] The embodiment of this application provides an imp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an implicit certificate key expansion method and device, and the method comprises the steps that a first user side generates a first symmetric key, a second symmetric key, a first key pair and a second key pair, and transmits a certificate application request to a certificate application registration center; the certificate application registration center expands a first public key according to the first symmetric key and expands a second public key according to the second symmetric key to obtain a third public key and a fourth public key corresponding to each certificate index, and sends a certificate issuing request to a certificate authorization center for each certificate index; and the certificate authorization center generates a corresponding implicit certificate according to the third public key corresponding to each certificate index, encrypts the corresponding implicit certificate according to the fourth public key corresponding to each certificate index, and sends the encrypted implicit certificate corresponding to each certificate index to the certificate application registration center. According to the scheme, multiple implicit certificates can be obtained by sending the certificate application request once based on key extension, and the certificate generation efficiency is effectively improved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to an implicit certificate key extension method and device. Background technique [0002] With the increasing popularity of network information technology applications, network information security has increasingly become a subject of much concern. Using a digital certificate ensures that the public key cannot be impersonated. A digital certificate is a public key certified by an authority. By looking at the digital certificate, you can know which authority the certificate was issued by, the information about the user of the certificate, and the public key of the user. [0003] At present, in order to obtain multiple digital certificates, the terminal device can send multiple requests, and each request carries a public key. In this case, multiple interactions are required, and the generation efficiency of the digital certificate is low. In addition, the ter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3263H04L9/3268H04L63/0823
Inventor 商建伟张燕燕孙鑫红张心中
Owner 晟安信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products