Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for validating digital user certificate

A technology for user certificates and digital users, applied in user identity/authority verification, digital transmission systems, public key infrastructure trust models, etc., can solve problems such as error-prone and complex implementation

Active Publication Date: 2021-09-10
SIEMENS AG
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Therefore, the implementation of certificate verification is complex and error-prone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for validating digital user certificate
  • Method for validating digital user certificate
  • Method for validating digital user certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] figure 1 The basic structure of a digital certificate 1 , eg according to ITU-T standard X.509, is shown. Such a digital certificate 1 is required in asymmetric cryptosystems, for example, for authenticating a user by means of a verification device. The digital certificate 1 includes in particular the public key PubK of the user of the certificate 1 , which is also additionally indicated by a key symbol. The digital certificate 1 itself is protected by a digital signature 11 , the authenticity of which can be checked using public key verification of the issuing authority of the certificate 1 . The issuing authority's public key is hereinafter referred to as the issuer key.

[0058] The certificate 1 also contains the common name CN of the user by means of which the user is identified for which the certificate has been issued. For example, this can be stated by its name, its email address, its IP address, etc. In the case of equipment certificates, the manufacturer, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for validating a digital user certificate (32, 33) of a user (30) by means of a checking device (31). The user certificate (32, 33) is protected by a digital signature with an issuer key of an issuance location (23) which issues the user certificate. The method has the steps: receiving (S1) the user certificate in the checking device (31), checking (S2) the user certificate (32, 33) using a certificate path positive list (CPL) with at least one valid certificate path which is provided to the checking device (31) by at least one positive path server (21), and confirming (S3) the validity of the user certificate (32, 33) if the issuer key of the user certificate (32, 33) can be traced back to a root certificate according to one of the valid certificate paths of the certificate path positive list (CPL). The invention additionally relates to a system, a checking device, a user device, a positive path server, and a computer program product which are designed to carry out the method for validating a digital user certificate (32, 33).

Description

technical field [0001] A method for verifying a user's digital user certificate by means of a verification device, wherein the user certificate is protected by a signature with an issuer key of an issuing authority that issues the user certificate, and a system, verification system configured to implement the method devices, user devices, positive path servers, and computer program products. Background technique [0002] With the aid of asymmetric cryptographic systems, such as public key infrastructure (PKI (Public Key Infrastructure)), digital certificates can be used to verify the authenticity or identity of a device. Such certificates are often referred to as device certificates. Furthermore, digital certificates can be used for authenticating the communication partner and / or for encrypting the exchanged messages. Accordingly, messages may be digitally signed and / or encrypted within the network. The sender of the message needs the receiver's public key to transmit it ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00
CPCH04L9/006H04L9/3263H04L9/3268H04L9/3247
Inventor R·法尔克S·弗里斯
Owner SIEMENS AG