Public key infrastructure system, local safety apparatus and operation method

A technology of public key infrastructure and security equipment, which is applied in the field of public key infrastructure system devices, and can solve problems such as complex certificate management, large amount of calculation, and complex identity management

Inactive Publication Date: 2007-02-28
SHANGHAI JIAO TONG UNIV +1
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to overcome the problems of complex certificate management, large amount of calculation and complex identity management when the user has multiple public keys in the prior art, and provides a public key infrastructure system and local security equipment And operation method, wherein the technical scheme of method is as follows:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key infrastructure system, local safety apparatus and operation method
  • Public key infrastructure system, local safety apparatus and operation method
  • Public key infrastructure system, local safety apparatus and operation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0097] In order to solve the problems of complex certificate management, large amount of calculation and complex identity management when the user has multiple public keys in the existing public key infrastructure based on digital certificates, this method is to combine a pair of keys with people's The biometric feature is bound locally, and the biometric feature is used as the public key, as shown in Figure 1. The specific steps are as follows:

[0098] Step 101: Store template fingerprint information in the smart card device:

[0099] Under the supervision of a reliable third party, the user uses a smart card device to sample the user's biological characteristics such as fingerprints, obtains the unique fingerprint for digital processing, converts it into a digital code, and further uses these digital codes as template fingerprint information. The digitized fingerprint information is a For larger files, use ID in this embodiment U Indicates that the ID U Stored in the user...

Embodiment 2

[0116] Embodiment 2: In Embodiment 1, the user's private key is independently generated by the trusted private key generator PKG, so there is a private key custody problem. To solve this problem, as shown in Figure 2, the method of this embodiment uses a smart card The device and the non-trusted private key generation device PKG jointly generate the user's private key. The specific steps are as follows:

[0117] After following the same steps as steps 101-103,

[0118] Step 201: Using a method similar to that in step 103, finally publish the user private key generation system parameter param=1 , G 2 , e, n, p, p pub , H 1 , H 2 >,

[0119] The generated user private key will generate the system parameter param=1 , G 2 , e, n, p, p pub , H 1 , H 2 >Stored in the system public parameter storage area of ​​the smart card so as to be called by subsequent steps.

[0120] Step 202: smart card device and PKG with public key fingerprint information ID U As a basis, jointly de...

Embodiment 3

[0127] When the method according to the present invention is applied to securities transactions, further specific instructions will be given below. When users and stock exchanges conduct stock buying and selling transactions through the network, the biometric-based public key infrastructure in embodiment 1 can On the basis of the user’s final signature confirmation of the transaction, that is to say, the signature is implemented on the basis of the fingerprint information as the user’s signature public key. When the user’s securities transaction is signed, the entire transaction system needs to include a private key generation device PKG and The user utilizes the signature device of the biometric signature, such as a smart card device, and also includes a verification server of the stock exchange, as shown in Figure 3, the specific steps of the method of this embodiment are as follows:

[0128] Using the same steps as steps 101-104, after that,

[0129] Step 301: The user invo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a public key basic device, local safety device and operation method. Wherein, it comprises that user via local safety device obtains the biology character information; the identification bond authority server generates the system private key not obtained by user, and generates identification bond system parameter as the system public key to be published; the local safety device via the system private key signs the user biology character information IDU and real identification information to obtain the system sign; the uses biology character information as public key, the private key generator via the biology character information signs to generate user private key, to be stored in local safety device. The invention also provides a relative public key basic device identification system and device. And the electric business platform can be used in mobile communication, etc.

Description

technical field [0001] The invention relates to the field of security infrastructure, in particular to a public key infrastructure system device and an operation method. Background technique [0002] Network authentication is a means to confirm the identity of the network node subject. At present, there are generally two ways of network authentication, the means of using symmetric cryptography and the means of using public key cryptography. For authentication between mobile devices, authentication using symmetric ciphers and shared secrets is not feasible, because the number of nodes communicating with mobile devices is unpredictable, so it is impossible to deploy effective shared secrets before communication . It is a more reasonable approach to use public key cryptographic algorithms or digital signatures. [0003] In order to solve the above-mentioned problems of mobile communication signature and authentication, the following solutions are adopted: [0004] Public ke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32
Inventor 曹珍富周渊董晓蕾郑志彬位继伟
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products