Method and system for certification

A technology of identity authentication and authentication center, which is applied in the direction of user identity/authority verification, public key for secure communication, etc., and can solve problems such as difficulty in finding the structural path of the mesh authentication center, lengthening of the certificate path, and complicated processing

Inactive Publication Date: 2004-11-10
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to overcome the defects of the prior art and provide a method and system for identity authentication to solve the problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for certification
  • Method and system for certification
  • Method and system for certification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The authentication process of identity authentication between authentication centers in the extended PKI / CA system will be described in detail below.

[0029] The architecture of this extended PKI / CA system is as follows: figure 2 As shown, it consists of six autonomous domains (autonomous domain A - autonomous domain F), each domain has a unique root authentication center, according to the size of the domain and the actual needs of the application, you can dynamically configure multiple secondary certification The center provides various types of certificate services for end users. As shown on the right side of the figure, the root certification center in autonomous domain C has two secondary certification centers.

[0030] certificate issuer

[0031] Table I

[0032] The structure of a domain certificate mainly includes eight basic elements, namely:

[0033] Certificate Issuer: The distinguished name of the issuer of the certificate.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is an ID identifying method and system. Based on a net and layer combined extended PKI/CA structure, the system divides the entire public key infrastructural domain into many autonomous domains, each autonomous domain adopts a basic layered PKI/CA structure and has an only root identifying center, and according to domain size and actual applied requirement, can dynamically configure many two-stage identifying centers to provide all kinds of certificate service for terminal users, and each root identifying center is a single confidence point for all the users in its own domain. It adopts a net PKI/CA structure between all the autonomous domains, only the root identifying center can make a confidence relation with other autonomous domains. It avoids the disadvantage of a single confidence point in the whole system; largely reduces the number of nodes and complexity of trans-domain certificate path treatment, and solving the excessively complex problem of extending and finding a certificate path.

Description

technical field [0001] The invention belongs to the field of computer authentication and safety, and in particular relates to an authentication method and a realization system based on a network topology. Background technique [0002] While enjoying the convenience brought by the network and computer, people also taste the bitterness of security issues. The rapid spread of viruses, the rampant intrusion of computer "hackers", and the leakage of important information... These problems have threatened government services, finance, telecommunications, electricity and other national infrastructure. In order to prevent these hidden dangers, many new security technical specifications are constantly emerging, and public key infrastructure / certification authority (PKI / CA for short) technology is one of them. [0003] A Certificate Authority (CA for short) can verify the legitimacy of an online identity. However, since it is difficult for the certification center to solve the secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32
Inventor 金海黄琛吴松冉龙波王志平陈勇
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products