Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

38 results about "Proxy certificate" patented technology

The term Proxy Certificate is used to describe a certificate that is derived from, and signed by, a normal X.509 Public Key End Entity Certificate or by another Proxy Certificate for the purpose of providing restricted proxying and delegation within a PKI based authentication system.

HTTPS connection verification method and device

The invention relates to an HTTPS connection verification method and device. The method comprises the following steps: when an HTTPS connection request is initiated to a website, a certificate of the website is obtained; the certificate and other father certificates of the certificate except for a root certificate are verified; if verifications of the certificate and the other father certificates are passed, whether the root certificate is in a preset approval certificate library is judged; if the root certificate is in the preset approval certificate library, the certificate verifications are passed, HTTPS connection is continued; if the root certificate is not in the preset approval certificate library, the certificate, the root certificate and a uniform resource locator of the website accessed by the HTTPS connection are verified, whether the certificate, the root certificate and the uniform resource locator of the website accessed by the HTTPS connection are in a preconfigured certificate verification set; if the certificate, the root certificate and the uniform resource locator of the website accessed by the HTTPS connection are in the preconfigured certificate verification set, the certificate verifications are passed, and the HTTPS connection is continued; and, if the certificate, the root certificate and the uniform resource locator of the website accessed by the HTTPS connection are not in the preconfigured certificate verification set, the process is ended. The HTTPS connection verification method and device do not need to install the root certificate, prevent a system from a threat, and improve safety of the system.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Internet data collection method and system based on man-in-the-middle

The invention provides an Internet data collection method and system based on a man-in-the-middle. The method comprises the steps that a man-in-the-middle proxy certificate is installed to webpage information collection equipment, a man-in-the-middle of the webpage information collection equipment is established, and when the webpage information collection equipment accesses webpage information inthe Internet, the man-in-the-middle proxy certificate acts on all network traffic of the webpage information collection equipment; the man-in-the-middle acquires an collection task accommodating a URL regular expression of a to-be-acquired webpage, captures traffic conforming to the URL regular expression in all network traffic as intermediate traffic, injects the collection task into an HTML page of the intermediate traffic to obtain a to-be-analyzed page, and stores the to-be-analyzed page into a first database; and the analysis module distributes the to-be-analyzed page to the analyzer instance for analysis according to the URL information of the to-be-analyzed page in the first database, acquires a webpage collection result accommodating the structured data from the analyzer instanceand stores the webpage collection result into the second database. According to the invention, data collection of all applications which provide information by integrating browser kernel functions canbe supported.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI

A method and system for proxy re-encryption based on certificate condition

InactiveCN104363218BSimplify the management processControl re-encryption capabilitiesTransmissionPlaintextCryptographic key generation
The invention discloses a proxy re-encryption system on the basis of certificate conditions. The proxy re-encryption system comprises a system parameter setting module, a user key generation module, a certificate generation module, an encryption module, a proxy re-encryption key generation module, a proxy re-encryption module and a decryption module, wherein the system parameter setting module generates a system master key and system public parameters; the user key generation module generates public keys and private key pairs of various users; the certificate generation module endorses the identity of the users and the public keys and generates certificates of the users; the encryption module is used for encrypting messages and transmitting the messages to the decryption module and the proxy re-encryption key generation module; the proxy re-encryption key generation module generates proxy re-encryption keys and transmits the same to the proxy re-encryption module; the proxy re-encryption module re-encrypts original cryptographs to generate re-encryption cryptographs to be transmitted to the decryption module; the decryption module restores corresponding plaintexts. The invention further discloses a proxy re-encryption method on the basis of certificate conditions. On the premise of guaranteeing safety of the system, the original cryptographs can be flexibly subjected to proxy re-encryption, and rights of proxies are strictly controlled.
Owner:HOHAI UNIV

Certificate chain electronic agent certificate system

InactiveCN109635654AMonitor sales in real timePrevent being forgedMatching and classificationCommerceProxy certificateAuthorization
A certificate chain electronic agent certificate system carries out identity verification, biological verification and certificate verification on enterprise managers through a multi-center verification module, and verification records are stored through a multi-center storage module. A manager initiates a request for generating an electronic agent certificate or an electronic franchischer certificate at an electronic agent certificate terminal; the electronic agent certificate server receives the request. An authorized enterprise electronic certificate ID and an authorized enterprise electronic certificate ID are acquired through a multi-certificate center module. The electronic certificate ID of the enterprise is authorized. A unique enterprise electronic agent certificate or an enterprise electronic franchise certificate is generated by combining an encryption algorithm with a combination mode of a random number according to the ID and the authorization information of the authorizedenterprise electronic certificate, a verifier can verify the authenticity of the electronic agent certificate and verify the identity information of a certificate holder in real time, and the phenomenon that the agent certificate is forged and tampered is eradicated.
Owner:GLOBAL PRESTIGE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products