Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and method for repealing public key certificate in trusted computing

A public key certificate and trusted computing technology, applied in computer security devices, computing, digital data authentication, etc., can solve the problem of insecure transactions between TCPs, reduce the possibility and improve security

Inactive Publication Date: 2010-10-06
THE PLA INFORMATION ENG UNIV
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] It can be seen that the defect of the existing technology is that the public key certificate whose private key information has been leaked is not processed, which will lead to unsafe transactions between TCP

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and method for repealing public key certificate in trusted computing
  • Method, device and method for repealing public key certificate in trusted computing
  • Method, device and method for repealing public key certificate in trusted computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] In order for those skilled in the art to further understand the features and technical contents of the present invention, please refer to the following detailed description and accompanying drawings of the present invention. The accompanying drawings are provided for reference and illustration only, and are not intended to limit the present invention.

[0071] The technical solutions of the present invention will be described below in conjunction with the drawings and embodiments.

[0072] refer to figure 1 , is a flowchart of a method for revocation of a public key certificate in trusted computing according to an embodiment of the present invention. The method may include the steps of:

[0073] Step 101, the privacy CA receives the revocation request sent by TCP and the public key certificate requesting revocation, wherein the revocation request is pre-signed with a private key corresponding to the public key in the public key certificate, the The public key certific...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a device and a system for repealing a public key certificate in trusted computing. The method comprises the following steps: a privacy certificate authority receives a repealing request and the public key certificate requested to be repealed sent by a trusted computation platform, wherein the repealing request uses a privacy key to sign in advance, the privacy key corresponds to the public key in the public key certificate which is a signing certificate or an effective certificate; and the privacy certificate authority verifies whether the repealing request is effective or not through the public key in the public key certificate, and if so, the public key certificate is repealed. The embodiment of the invention leads the ineffective certificate caused by privacy key information leakage and the like not to be reused for transaction, thereby improving safety of transactions between TCPs.

Description

technical field [0001] The invention relates to the technical field of trusted computing, in particular to a method, device and system for revoking public key certificates in trusted computing. Background technique [0002] TCG (Trusted Computing Group, Trusted Computing Working Group) is an industrial standardization organization aimed at enhancing the security of various heterogeneous computing platforms. Based on the specifications of security-enhanced hardware and software, evaluation criteria have also been published to measure whether computing devices using TCG technology meet trustworthiness requirements. [0003] The TCP defined by TCG is to embed TPM (Trusted Platform Module, Trusted Platform Module) on the main board, and add TSS (Trusted Software Stack, Trusted Software Stack) to the software layer, through the mutual cooperation of TCP and TSS for the upper layer application Provide trusted computing capabilities. Among them, each TCP TPM has an EK certificate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/33
Inventor 周雁舟李立新李超零户家富郭锦娣
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products