Application certificate application method and device
A technology in the field of certificate and application, applied in the field of communication, can solve the problems that are not involved, achieve the effect of improving security and reliability, and perfecting the certificate issuing process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0109] see Figure 4 As shown, the process of applying CA directly to the authorization server for an authorization token is as follows:
[0110] 0, the application CA establishes a trusted relationship with the authorization server, and the certificate application device establishes a trusted relationship with the authorization server. The trusted relationship can be based on a mechanism based on a symmetric key (shared key mechanism) or a mechanism based on an asymmetric key (such as the mechanism of PKI) to establish. In addition, this embodiment is described using an asymmetric key-based PKI mechanism, that is, both parties store the other party's public key certificate to verify the other party's digital signature.
[0111] 1. The certificate application device sends a second application certificate application message to the application CA. Of course, the second application certificate application message can be digitally signed with the private key corresponding to the...
no. 2 example
[0117] see Figure 5 As shown, the process of the application CA indirectly obtaining the authorization token sent by the authorization server through the certificate application device is as follows:
[0118] 0, the application CA establishes a trusted relationship with the authorization server, and the certificate application device establishes a trusted relationship with the authorization server. The trusted relationship can be based on a mechanism based on a symmetric key (shared key mechanism) or a mechanism based on an asymmetric key (such as the mechanism of PKI) to establish. In addition, this embodiment is described using an asymmetric key-based PKI mechanism, that is, both parties store the other party's public key certificate to verify the other party's digital signature.
[0119] 1. The certificate application device sends a third application certificate application message to the application CA, wherein the third application certificate application message contai...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


