Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for safely downloading certificate

A certificate and security technology, applied in the field of information security, can solve problems such as single authentication method and counterfeit smart key equipment

Active Publication Date: 2013-11-13
FEITIAN TECHNOLOGIES
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after all, the authentication method is single, and theoretically there is still the possibility of forging smart key devices, so reinforcement is required to ensure the security of certificate downloads

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safely downloading certificate
  • Method and system for safely downloading certificate
  • Method and system for safely downloading certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0112] see figure 1 , this embodiment provides a method for securely downloading certificates, the specific process is as follows:

[0113] 101. The smart key device establishes a connection with the client;

[0114] Preferably, the client establishes a connection with the smart key device by calling CryptAcquireContext of a CSP (Cryptographic Service Provider, encryption service provider) interface.

[0115] 102. The client receives the request for downloading the certificate submitted by the user, and sends an instruction to the smart key device to generate a transaction key pair;

[0116] 103. The smart key device generates a transaction public key and a transaction private key after receiving the instruction;

[0117] It should be noted that the transaction private key is used to sign the transaction information during the transaction.

[0118] 104. The smart key device signs the transaction public key according to its stored protection private key, and obtains the tran...

Embodiment 2

[0239] This embodiment provides a system for securely downloading certificates, see figure 2 , including: a smart key device 20, a client 21 and a server 22; wherein, the functions of each device are as follows:

[0240] Smart key device 20 includes:

[0241] The storage unit 200 is used to store the birth certificate, the protection private key and the certificate, wherein the birth certificate and the protection private key have been generated and stored when the smart key device leaves the factory;

[0242] Specifically, the birth certificate includes: type number, birth certificate version information, birth certificate time stamp, shell number, protection public key, first-level authorization key, birth certificate issuance key information, and birth certificate signature. For the description of the item, refer to the relevant description in Embodiment 1, and do not repeat them here;

[0243] It should be noted that when the smart key device generates a protected priva...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for safely downloading a certificate, belonging to the field of information safety. The method for safely downloading a certificate comprises the following steps of: establishing a connection between intelligent key equipment and a client side; after the client side receives a request for downloading a certificate, issuing a command for generating a trading key pair; generating a trading public key and a trading private key by the intelligent key equipment with a generation algorithm, and signing the trading public key according to a locally stored protective private key; generating a certificate request data packet by the client side; acquiring a birth certificate and a trading public key signature, locally stored in the intelligent key equipment, by the client side and sending the birth certificate, the trading public key signature and the certificate request data packet to a service side; judging whether the received birth certificate is legal or not, if not, returning an error to the client side, if so, judging whether the trading public key signature is legal or not, if not, returning an error to the client side, and if so, signing and issuing the certificate and sending the certificate to the client side; and writing the certificate into the intelligent key equipment by the client side.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a method and system for safely downloading certificates. Background technique [0002] In the prior art, the user binds the smart key device with the server at the counter, that is, the server stores the number of the legal smart key device, and when the certificate is downloaded, the server compares whether the number of the smart key device is consistent with the saved number , consistent, the certificate download is allowed, and inconsistent, the certificate download is rejected, although to some extent it can effectively prevent the user from using a fake smart key device to download the certificate. However, after all, the authentication method is single, and there is still the possibility of counterfeiting smart key devices in theory. Therefore, reinforcement is required to ensure the security of certificate downloads. Contents of the invention [0003] The present in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products