Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for generating dual-key system digital certificate and application method

A technology of digital certificates and application methods, applied in the fields of Internet communication and information security, can solve the problems of not being used by dual digital certificates, digital certificates, and difficulty in obtaining evidence, and achieve the requirements of reducing equipment costs, small capacity, and low hardware storage capacity. Effect

Active Publication Date: 2020-09-04
WUHAN ARGUSEC TECH
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, there are some non-negligible technical problems in the use of existing digital certificates: First, due to the lack of effective matching between double digital certificates, any two digital certificates can be combined into a double digital certificate , so that the trusted third-party authority users can easily replace any one of the double digital certificates, and at the same time, it is not known to the owner of the double digital certificate, thereby causing unnecessary losses to the owner of the double digital certificate; second , the user needs to distinguish between the signature certificate and the encryption certificate when using a double digital certificate, but there is currently no simple and effective way to distinguish, when criminals use the encryption certificate as the signature certificate and the signature certificate as the encryption certificate, it is difficult for the judiciary Third, users cannot determine whether the digital certificate belongs to the single-certificate system or the dual-certificate system, which brings about the problem of mixed use of digital certificates; fourth, for the single-certificate system, since the private key is only stored in the user's own In the hands, only the user can decrypt the data encrypted by the public key. When the judiciary wants to obtain the encrypted data of the user, there are difficulties in obtaining evidence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating dual-key system digital certificate and application method
  • Method for generating dual-key system digital certificate and application method
  • Method for generating dual-key system digital certificate and application method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0048] Such as figure 1 As shown, according to the first embodiment of the present invention, a method for generating a dual-key system digital certificate is provided, which is applied in a certificate certification authority (Certificate authority, referred to as CA), and includes the following steps:

[0049] (1) Receive the digital certificate application request from the user, and analyze ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for generating a dual-key system digital certificate, which comprises the following steps: receiving a digital certificate application request from a user, and analyzing the digital certificate application request to obtain a signature public key or a temporary public key of the certificate; acquiring certificate encryption key pairs, encrypting a private key in the certificate encryption key pair by using a randomly generated symmetric key; so as to obtain a first encrypted result, and using the obtained signature public key or temporary public key of the certificate to encrypt the randomly generated symmetric key so as to obtain a second encryption result, issuing a dual-key system digital certificate to the user, the dual-key system digital certificate comprising the signature public key of the certificate and the public key in the certificate encryption key pair, and sending the encryption result to the user. According to the invention, the technical problem of unnecessary loss of owners of double digital certificates due to lack of effective matching between the double digital certificates in the use process of the existing digital certificatescan be solved.

Description

technical field [0001] The invention belongs to the technical field of information security and the field of Internet communication, and more specifically relates to a method for generating and applying a digital certificate of a dual-key system. Background technique [0002] With the continuous improvement of informatization, various government departments or enterprises and institutions have deployed a large number of business systems on the Internet, and conduct business data exchanges with other branches or partners through the Internet. These business data are important digital assets of government departments or enterprises and institutions, and their confidentiality, authenticity, integrity and non-repudiation need to be guaranteed. At present, digital certificates are mainly used to meet these requirements. [0003] A digital certificate is an authoritative electronic document used to prove the identity of each subject (such as a person, server, etc.) conducting info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/14H04L9/32H04L29/06
CPCH04L9/0863H04L9/0869H04L9/14H04L63/045H04L9/3247H04L9/3263
Inventor 郑军胡进张庆勇
Owner WUHAN ARGUSEC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products