Public key certificate state obtaining and verification method

A technology of public key certificate and verification method, which is applied in the field of obtaining and verifying the state of public key certificate in network communication, can solve the problems of complex use of the background technology, and achieve the goal of saving bandwidth and computing resources, ensuring freshness, and high security Effect

Active Publication Date: 2007-03-14
CHINA IWNCOMM
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The purpose of the present invention is to provide a method for obtaining and verifying the state of a public key certificate, which solves the technical problems in the background technology that are complex and unsuitable for the network architecture of user equipment, general access points and servers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key certificate state obtaining and verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The participating entity user equipment, universal access point and server of the present invention have all been assigned public key certificates before running the method. The server may provide signatures of certificate authorities trusted by the user equipment and the universal access point respectively. After running this method, the user equipment and the universal access point can obtain the certificate of the other party, and verify the status of the certificate of the other party and itself. The user equipment and the universal access point can obtain their respective public key certificates and the state of the public key certificates of each other through the server. In the present invention,

[0061] m means message;

[0062] U_CA indicates the certificate authority trusted by the user device;

[0063] U_Cert represents the user equipment certificate stored locally by the user equipment;

[0064] U_CA_Cert represents the certificate of the certificate au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to common key identification acquiring and test method, which comprises the following steps: forming and sending identification and index demands; forming and sending compound identification demands; forming and sending compound identification status responding; transferring identification status for interface test for user device testing. This invention adopts user identification catch method through interface to provide user or user device for common interface point.

Description

technical field [0001] The invention relates to a management of public key certificates in network communication, in particular to a method for acquiring and verifying the state of public key certificates in network communication. Background technique [0002] When a user equipment accesses the Internet environment, it usually needs some kind of access service. Providers of such access services include wired digital subscriber line (DSL), cable system (Cable), wireless local area network access (WLAN), and wireless metropolitan area network access (WiMAX). Usually, the terminal accessing the system is called a universal access point. For example, the universal access point can be a WLAN access point AP, a WiMAX base station BS, or an access device of a DSL system end office. [0003] When the user equipment accesses the Internet through the general access point, there is a security problem on the link between the user equipment and the general access point. For example: ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30G06F21/00G06F21/33
CPCH04L63/0823H04L2209/80H04L63/08H04L2209/60H04L63/06H04L9/3268
Inventor 田海博曹军庞辽军铁满霞黄振海张变玲
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products