Method for validating digital user certificate
A technology for user certificates and digital users, applied in user identity/authority verification, digital transmission systems, public key infrastructure trust models, etc., can solve problems such as error-prone and complex implementation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] figure 1 The basic structure of a digital certificate 1 , eg according to ITU-T standard X.509, is shown. Such a digital certificate 1 is required in asymmetric cryptosystems, for example, for authenticating a user by means of a verification device. The digital certificate 1 includes in particular the public key PubK of the user of the certificate 1 , which is also additionally indicated by a key symbol. The digital certificate 1 itself is protected by a digital signature 11 , the authenticity of which can be checked using public key verification of the issuing authority of the certificate 1 . The issuing authority's public key is hereinafter referred to as the issuer key.
[0058] The certificate 1 also contains the common name CN of the user by means of which the user is identified for which the certificate has been issued. For example, this can be stated by its name, its email address, its IP address, etc. In the case of equipment certificates, the manufacturer, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


