Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Certificate authentication method and device

An authentication method and authentication device technology, applied in the field of information security, can solve problems such as not supporting ECC certificates, failure of terminals to verify ECC certificates, long handshake delay, etc.

Pending Publication Date: 2020-09-22
BEIJING DAJIA INTERNET INFORMATION TECH CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The failure reasons mainly include: 1. The terminal network library version is low and does not support ECC certificates; 2. The terminal network library supports ECC certificates, but the root certificate trust list of the terminal does not include the root certificate of the ECC certificate. It will cause the terminal to fail to verify the ECC certificate
The compatibility of ECC certificates is low, which greatly limits the use of ECC certificates on servers
[0004] Due to the low compatibility of the ECC certificate, the server uses the RSA certificate during the handshake phase, which causes the server and the terminal to consume more central processing unit (CPU) resources, and causes a large handshake delay and a slow handshake rate. Low
Among them, the server uses the RSA certificate to sign is one of the most time-consuming operations in the handshake phase. When the server shakes hands with multiple terminals at the same time, it is easy to cause overload.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificate authentication method and device
  • Certificate authentication method and device
  • Certificate authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to enable ordinary persons in the art to better understand the technical solutions of the present disclosure, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings.

[0049] It should be noted that the terms "first" and "second" in the specification and claims of the present disclosure and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein can be practiced in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consist...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a certificate authentication method and device, relates to the field of information security, and can improve the compatibility of an ECC certificate in a terminal, thereby reducing the handshake time delay and improving the handshake efficiency. According to the specific scheme, the method comprises the steps that 1, aserver receives a connection request sent by the terminal, wherein the connection request is used for requesting to establish connection with a server; and in response to the connection request, when it is determined that the terminal supports the firstcertificate, a first certificate chain is sent to the terminal, the first certificate chain comprising the first certificate and a cross certificate, the cross certificate being a certificate generated by signing a root certificate of the first certificate using a root certificate of the second certificate, and an efficiency level of the first certificate being higher than an efficiency level of the second certificate.

Description

technical field [0001] The present disclosure relates to the field of information security, and in particular to a certificate authentication method and device. Background technique [0002] In the field of Internet information security, certificates and their certification are the basis for ensuring information security. In related technologies, during the handshake phase between the server and the terminal, the server will use a certificate to sign, and send the certificate and signature to the terminal, and the terminal will verify the received certificate and signature. Certificates commonly used in the handshake phase include RSA certificates, ECC certificates, etc. Among them, the RSA certificate appeared earlier and has higher compatibility. ECC certificates appeared later. Compared with RSA certificates, ECC certificates have the advantages of short key length, fast operation speed and small size under the same security. [0003] When the server uses an ECC certif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/3263H04L9/3268
Inventor 陈冬剑
Owner BEIJING DAJIA INTERNET INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products