Generating method, application method, management system and application system of trusted application identification

A technology of application identification and management system, applied in application method, generation method of trusted application identification, management system and application system, can solve problems such as difficult interconnection, key escrow, privacy leakage, etc., to enhance system security performance, make up for defects and deficiencies, and improve the effect of management timeliness

Active Publication Date: 2019-07-26
鄂尔多斯市迪曼森密码科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the CA certificate authentication system, the private key is a random number, and the public key is generated by calculation of the private key. The public key has no calculation relationship with the entity identity (hereinafter also referred to as the entity identification EID), and a trusted third-party CA center is required for authentication. The center needs to maintain a large number of certificates in a unified manner, which is difficult to support large-scale applications. An entity usually holds certificates from multiple CA centers and it is difficult to communicate with each other. The center conducts data query or regularly synchronizes data; at the same time, the basic information of the entity users audited and registered when the digital certificate is issued adopts a standard (such as X.500) format in the certificate, which is out of touch with the application, has poor practicability, and has the possibility of privacy leakage. risk; in addition, all digital certificates are issued by the private key of the CA center, there is a large systemic risk, once the central root key is leaked, the entire system will be destroyed
[0004] Identity-Based Cryptograph (Identity-Based Cryptograph) is the latest development based on the CA certification system. It was first proposed by Israeli cryptographer Shamir. The main idea is to use the identity as the public key to technically simplify the public key management and certificate exchange process of the CA center. , but the existing identification cryptographic system still has defects or deficiencies such as complex algorithms, low efficiency, and key escrow
[0005] With the rapid development of the network and the popularization and application of electronic certification, especially the development of the mobile Internet, Internet of Things, and blockchain networks, the existing CA certification system has been difficult to meet the requirements, and its drawbacks and shortcomings in the application have gradually emerged. The cryptographic system also needs to change from pure technical simplification to practicality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generating method, application method, management system and application system of trusted application identification
  • Generating method, application method, management system and application system of trusted application identification
  • Generating method, application method, management system and application system of trusted application identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The present invention will be described in detail below based on specific embodiments with reference to the accompanying drawings. For the sake of clarity, steps or structures that are known to those skilled in the art are not described in detail herein. Additionally, while the invention has been described in conjunction with particular embodiments, it should be understood that such description is not intended to limit the invention to the described embodiments. On the contrary, the description is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the invention as defined by the appended claims.

[0074] First, the outline of the present invention will be described. The invention relates to a generation method and an application method of a trusted application identifier. In the present invention, the trusted application identifier TAID (Trusted Application Identity) is a trusted network identity based o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a trusted application identification generation method, application method and system, and management system. The trusted application identification generation method comprises the steps of: an entity attribute obtaining step: a trusted application identification management system obtains entity attributes related to the entity; a safety domain coding generation step: the trusted application identification management system generates safety domain codes corresponding to the entity attributes; an entity identification generation step: the trusted application identification management system combines the entity attributes and the safety domain codes to form an entity identification; and a trusted application identification generation step: the trusted application identification management system performs calculation of the entity identification to generate an identification secret key and perform signature to obtain the trusted application identification. The trusted application identification generation method, application method and system, and management system can effectively extend the application method, the range and the efficiency of the identification secret key system, can effectively make up the defects and deficiencies of a CA certificate system and are innovation and development of the identification password system.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a generation method, an application method, a management system and an application system of a trusted application identifier. Background technique [0002] The existing electronic certification system adopts an asymmetric key system, which usually checks the basic information of registered entity users through a third-party trusted organization—the certification center CA (Certificate Authority), and realizes entity identity and security by issuing digital certificates through the CA center. Binding of public keys. [0003] In the CA certificate authentication system, the private key is a random number, and the public key is generated by calculation of the private key. The public key has no calculation relationship with the entity identity (hereinafter also referred to as the entity identification EID), and a trusted third-party CA center is required for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0866H04L63/0815H04L63/0861H04L63/0876
Inventor 何晓涛
Owner 鄂尔多斯市迪曼森密码科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products