A Mimic Defense System Based on Certificate Identity Authentication and Certificate Issuing Method
A certificate issuance and defense system technology, applied in the field of mimic defense system and certificate issuance based on certificate identity authentication, can solve the problems of issuance and inability to find out, and achieve the effect of high security and high security performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] The scheme will be further described and explained below in conjunction with the accompanying drawings.
[0040] as attached figure 2 And attached image 3 As shown, a mimetic defense system based on certificate identity authentication includes the underlying device that needs to install a certificate, an intermediate controller, and a certificate issuance center. The intermediate controller and the certificate issuance center each have a unique certificate, and the certificate stores its own public information. key, and the corresponding private key is kept privately by each device and is not disclosed to the public.
[0041] Devices are devices that need to access the network, such as routers, PCs, mobile phones, etc. The devices include a certificate request module, which is used to generate public-private key pairs, encrypt and decrypt, generate certificate request files, and install certificates.
[0042] Among them, the intermediate controller includes a controll...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com