CN101977193A - Method and system for safely downloading certificate - Google Patents

Method and system for safely downloading certificate Download PDF

Info

Publication number
CN101977193A
CN101977193A CN2010105232613A CN201010523261A CN101977193A CN 101977193 A CN101977193 A CN 101977193A CN 2010105232613 A CN2010105232613 A CN 2010105232613A CN 201010523261 A CN201010523261 A CN 201010523261A CN 101977193 A CN101977193 A CN 101977193A
Authority
CN
China
Prior art keywords
certificate
signature
birth certificate
transaction
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010105232613A
Other languages
Chinese (zh)
Other versions
CN101977193B (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CN2010105232613A priority Critical patent/CN101977193B/en
Publication of CN101977193A publication Critical patent/CN101977193A/en
Application granted granted Critical
Publication of CN101977193B publication Critical patent/CN101977193B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method and a system for safely downloading a certificate, belonging to the field of information safety. The method for safely downloading a certificate comprises the following steps of: establishing a connection between intelligent key equipment and a client side; after the client side receives a request for downloading a certificate, issuing a command for generating a trading key pair; generating a trading public key and a trading private key by the intelligent key equipment with a generation algorithm, and signing the trading public key according to a locally stored protective private key; generating a certificate request data packet by the client side; acquiring a birth certificate and a trading public key signature, locally stored in the intelligent key equipment, by the client side and sending the birth certificate, the trading public key signature and the certificate request data packet to a service side; judging whether the received birth certificate is legal or not, if not, returning an error to the client side, if so, judging whether the trading public key signature is legal or not, if not, returning an error to the client side, and if so, signing and issuing the certificate and sending the certificate to the client side; and writing the certificate into the intelligent key equipment by the client side.

Description

The method and system of secure download certificate
Technical field
The invention belongs to information security field, relate in particular to a kind of method and system of secure download certificate.
Background technology
In the prior art, the user binds intelligent cipher key equipment and server at sales counter, it is the numbering that stores legal intelligent cipher key equipment in the server, when certificate was downloaded, whether the numbering of server contrast intelligent cipher key equipment was consistent with the numbering of preserving, unanimity, then allow certificate to download, inconsistent, then refuse the download of certificate, though can prevent effectively that to a certain extent the intelligent cipher key equipment of forgery that the user uses from carrying out the download of certificate.But authentication mode is single after all, still exist in theory and forge the possible of intelligent cipher key equipment, so, need reinforcement with the fail safe of guaranteeing that certificate is downloaded.
Summary of the invention
The invention provides a kind of method and system of secure download certificate, concrete technical scheme is as follows:
A kind of method of secure download certificate, described method comprises:
Intelligent cipher key equipment and client connect;
After described client receives the request of the downloadable authentication that the user submits to, issue to described intelligent cipher key equipment and to generate the right instruction of transaction key;
Described intelligent cipher key equipment generates transaction PKI and transaction private key according to built-in key schedule, and according to the protection private key of self storing described transaction PKI is signed, and obtains the public key signature of concluding the business;
The described client request data package that Generates Certificate;
Described client is obtained the birth certificate and the described transaction public key signature of described intelligent cipher key equipment self storage, and described birth certificate, described transaction public key signature and described certificate request packet are sent to service end;
Described service end judges whether the described birth certificate that receives is legal, if it is illegal, to the error message of described client return authentication, if legal, judge then whether described transaction public key signature is legal, if illegal, to the error message of described client return authentication, if legal, grant a certificate then, and described certificate sent to described client;
Described client is written to described certificate in the described intelligent cipher key equipment.
The Generate Certificate step of request data package of described client is specially:
Read the transaction public key information in the described intelligent cipher key equipment;
Generating one includes the packet of conclude the business public key information, user profile and certificate purposes information and sends it to described intelligent cipher key equipment;
Signature value after the transaction private key of reception in described intelligent cipher key equipment signed to described packet;
Described packet and the combination of described signature value are generated a digital certificate request packet.
Described method also comprises: described service end is verified described signature value with the transaction PKI that carries in the described certificate request packet after receiving described certificate request packet.
Described intelligent cipher key equipment is promptly signed to described transaction PKI according to the protection private key of self storing after generating the transaction PKI according to built-in key schedule;
Or
Described intelligent cipher key equipment is signed to described transaction PKI according to the protection private key of self storage after receiving the instruction that described transaction PKI is signed that described client issues.
Described intelligent cipher key equipment is signed to described transaction PKI according to the protection private key of self storing and is comprised:
Described intelligent cipher key equipment uses the protection private key of self storing that first data are signed, obtain the first data signature value, described first data comprise: additional data, transaction PKI first preset length part, the second data cryptographic Hash, and described second data comprise: described additional data and transaction PKI;
To protect PKI length, the described first data signature value and transaction PKI residue length partly to splice, obtain the public key signature of concluding the business.
Described additional data comprises described protection PKI length, birth certificate version, intelligent cipher key equipment shell number, key attribute.
Described birth certificate comprises: intelligent cipher key equipment type number, birth certificate version information, birth certificate timestamp, intelligent cipher key equipment shell number, protection PKI, one-level authorization key information, class origin card are signed and issued key information and birth certificate signature.
The trust starting point of described one-level authorization key during for the described intelligent cipher key equipment of authentication;
Described birth certificate is signed and issued key and is signed and issued by described one-level authorization key, is used for described birth certificate is signed.
Described one-level authorization key information comprises: authorization key version, mandate PKI;
Described birth certificate is signed and issued key information and comprised: birth certificate signs and issues the key version, sign and issue the signature that PKI and described birth certificate are signed and issued key information;
Wherein, the described birth certificate signature of signing and issuing key information is signed and is obtained by authorizing private key that described birth certificate is signed and issued key information.
Described service end is judged the birth certificate that receives legal comprising whether:
Described service end judges in the described birth certificate that receives whether birth certificate is signed and issued key information legal, if it is illegal, judge that then described birth certificate is illegal, if it is legal, judge then whether the birth certificate signature is legal in the described birth certificate, if legal, judges that then described birth certificate is legal, if illegal, judge that then described birth certificate is illegal.
Described service end judges in the described birth certificate that receives that birth certificate signs and issues key information legal comprising whether:
Described client is calculated according to the signature of authorizing PKI that described birth certificate is signed and issued key information in the one-level authorization key information in the described birth certificate, contrast described result of calculation whether with described birth certificate in birth certificate to sign and issue key information consistent, if it is consistent, it is legal that then described birth certificate is signed and issued key information, otherwise it is illegal that described birth certificate is signed and issued key information.
Describedly judge in the described birth certificate birth certificate signature legal comprising whether:
The PKI of signing and issuing that described service end is signed and issued in the key information according to birth certificate in the described birth certificate that receives calculates described birth certificate signature, whether contrast described result of calculation consistent with described birth certificate information, if it is consistent, then described birth certificate signature is legal, otherwise described birth certificate signature is illegal.
Describedly judge described transaction public key signature legal comprising whether:
The part of expression protection PKI length in the described transaction public key signature is removed;
According to the protection PKI in the described birth certificate that receives the first data signature value part described in the described transaction public key signature is calculated, obtained described first data;
Remove the additional data in described first data, the PKI first preset length part obtains concluding the business;
Transaction PKI residue length in described transaction PKI first preset length part and the described transaction public key signature partly spliced obtain described transaction PKI;
Go out second data according to described first data splicing, described second data are carried out Hash operation, the second data cryptographic Hash in operation result and described first data is compared, consistent, then described transaction public key signature is legal, inconsistent, and then described transaction public key signature is illegal.
A kind of system of secure download certificate, described system comprises: intelligent cipher key equipment, client and service end;
Intelligent cipher key equipment comprises:
Memory cell is used to store birth certificate, protection private key and certificate;
The key generation unit is used for generating transaction PKI and transaction private key according to built-in key schedule;
Signature unit is used for according to the protection private key of cell stores the transaction PKI that the key generation unit generates being signed;
The certificate writing unit is used for certificate is written to memory cell;
Transmitting element is used for returning certificate and transaction public key signature to client.
Client comprises:
Receiving element is used to receive the request of the downloadable authentication of user's input, and the certificate that sends of described service end transmitting element;
The certificate request generation unit is used for when described receiving element receives the request of downloadable authentication, and request data package Generates Certificate;
First interface unit is used to obtain the birth certificate of intelligent cipher key equipment;
Second interface unit is used to obtain the transaction public key signature of intelligent cipher key equipment;
Transmitting element is used for sending the transaction public key signature that certificate request packet that the certificate request generation unit generates, birth certificate that first interface unit obtains and second interface unit obtain to service end;
Service end comprises:
Receiving element is used to receive birth certificate and the transaction public key signature that the client transmitting element sends;
The birth certificate authentication unit is used to verify whether the birth certificate that receiving element receives is legal;
Transaction public key verifications unit is used for after first authentication unit checking birth certificate is legal, and whether the transaction public key signature that the checking receiving element receives is legal;
The certificate issuance unit is used for after second authentication unit checking transaction public key signature is legal grant a certificate;
Transmitting element is used for the certificate that the certificate issuance unit is signed and issued is sent to client.
Described signature unit comprises:
Signature blocks, be used for first data being signed according to the protection private key of cell stores, obtain the first data signature value, described first data comprise: additional data, transaction PKI first preset length part, the second data cryptographic Hash, and described second data comprise: described additional data and transaction PKI;
Concatenation module is used for protection PKI length, described signature value and transaction PKI residue length are partly spliced, and obtains the public key signature of concluding the business.
Described birth certificate authentication unit comprises:
First judge module is used for judging whether described birth certificate birth certificate is signed and issued key information legal;
Second judge module is used for judging whether described birth certificate birth certificate signature is legal.
Describedly judge in the described birth certificate that birth certificate signs and issues key information legal comprising whether:
The signature that described service end is signed and issued key information according to the mandate PKI in the one-level authorization key information in the described birth certificate to described birth certificate calculates, contrast described result of calculation whether with described birth certificate in described birth certificate to sign and issue key information consistent, if it is consistent, it is legal that then described birth certificate is signed and issued key information, otherwise it is illegal that described birth certificate is signed and issued key information.
Describedly judge in the described birth certificate birth certificate signature legal comprising whether:
The PKI of signing and issuing that described service end is signed and issued in the key information according to birth certificate described in the described birth certificate that receives calculates described birth certificate signature, whether contrast described result of calculation consistent with the described birth certificate information that receives, if it is consistent, then described birth certificate signature is legal, otherwise described birth certificate signature is illegal.
Described transaction public key verifications unit comprises:
First processing module is used for the part of described transaction public key signature expression protection PKI length is removed;
First computing module is used for according to the protection PKI of the described birth certificate that receives the first data signature value part described in the described transaction public key signature being calculated, and obtains described first data;
Second processing module is used for removing the additional data of described first data, and the PKI first preset length part obtains concluding the business;
First concatenation module, transaction PKI first preset length part that is used for described second processing module is obtained is partly spliced with described transaction public key signature transaction PKI residue length, obtains described transaction PKI;
Second concatenation module is used for going out second data according to described first data splicing;
Second computing module is used for described second data are carried out Hash operation;
The contrast module, the cryptographic Hash and described first data, the second data cryptographic Hash that are used for described second computing module is obtained compare, unanimity, then described transaction public key signature is legal, inconsistent, and then described transaction public key signature is illegal.
Beneficial effect: server passes through the checking of the validity of the legitimacy to birth certificate, the public key signature of concluding the business, and the request that has guaranteed downloadable authentication is to be sent by legal intelligent cipher key equipment, thereby has guaranteed the fail safe that certificate is downloaded.
Description of drawings
The method flow diagram of a kind of secure download certificate that Fig. 1 provides for embodiment 1;
The system construction drawing of a kind of secure download certificate that Fig. 2 provides for embodiment 2.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, embodiment of the present invention is described further in detail below in conjunction with accompanying drawing.
The notion that has added the intelligent cipher key equipment birth certificate in the method for the secure download certificate that the embodiment of the invention provided; birth certificate is kept at intelligent cipher key equipment inside; be a string data of proof intelligent cipher key equipment legitimacy, comprise: the type number of intelligent cipher key equipment, birth certificate version information, birth certificate timestamp, shell number, protection PKI, one-level authorization key, birth certificate are signed and issued key information and birth certificate signature.Birth certificate shows as the form of TLV, (length is represented not necessarily accurate, and the numerical value understanding according to reality in the application gets final product) as shown in table 1:
Table 1
Figure BSA00000322561200071
Figure BSA00000322561200081
Particularly, the type number of intelligent cipher key equipment: form by two ACSII sign indicating numbers, identify different intelligent cipher key equipments, simultaneously, also search the PKI of the corresponding manufacturer of birth certificate for convenience, for example: numbering 11, identifying this intelligent cipher key equipment by vendor A production, is not have the soft type that drives;
The birth certificate version information: extended field, need the TLV structure of birth certificate be adjusted as the later stage, can increase its version number accordingly, so that different processing modes is taked according to version number in the backstage;
The birth certificate timestamp: refer to sign and issue the time of this birth certificate, for example " 20100618150100 " represent 2010 06 month 15: 01: 00 on the 18th;
Shell number: being made up of three parts, is respectively device code, hardware sequence number and check digit, and the coding rule of shell number can be self-defining; For example:
1, the reading format of shell number is: digital hardware sequence number (oneself provides manufacturer)+1 a bit check position, 2 device code+9, and totally 12, wherein, device code is specified by certificate supplier (as bank) is unified;
2, only deposit 9 hardware sequence number in the intelligent cipher key equipment, device code and check bit can not leave in the intelligent cipher key equipment;
3,9 the hardware sequence number that manufacturer provided can be extra-large by flowing water, and number software modification function must not be provided;
4, check algorithm for example uses 2121 checking algorithms.
Wherein, 2121 checking algorithms are as follows:
Shell number: 4580658811003057
x x x x x x x x x x x x x x x
2 1 2 1 2 1 2 1 2 1 2 1 2 1 2
8 5?16 0 12?5?16 8 2 1 0 0 6 0?10
8+5+1+6+0+1+2+5+1+6+8+2+1+0+0+6+0+1+0=53
Check digit 10-(53mod 10)=7
The protection PKI: generated by intelligent cipher key equipment, can not destroy, the corresponding relation of the shell of protection PKI and intelligent cipher key equipment number is kept in the server;
In addition, need to prove that intelligent cipher key equipment has also generated the protection private key when generating the protection PKI, this protection private key is kept at the inside of intelligent cipher key equipment.
The one-level authorization key: independently generated by each manufacturer, among the present invention, this one-level authorization key is that safety is legal as the trust starting point of authentication;
Birth certificate is signed and issued key: be used for birth certificate is signed, use the one-level authorization key that its public key information is signed to guarantee its validity;
Birth certificate signature: use birth certificate to sign and issue key (private key) to label 0001,0002,0003,0004,0005 and the signature of data, the birth certificate signature formula is as follows:
Particularly, birth certificate signature=RSASign birth certificate sign and issue private key (SHA (and the birth certificate supplier number || the birth certificate version information || the birth certificate timestamp || shell number || protection PKI N|| protection PKI E || one-level authorization key (PKI) information || birth certificate is signed and issued key (PKI) information)).
Be exemplified below:
RSASign(SHA(000100023532||000200023031||0003000e20100618150100||0004000c52XXXXXXXXXX||00050080...||00070003...||8008...||8009...))。
From the above, the shell of PKI (protection PKI, one-level authorization key (PKI), birth certificate are signed and issued key (PKI)) and intelligent cipher key equipment number has just constituted the main body of birth certificate, and uses higher level's key trusty that birth certificate is signed; In the certificate downloading process, intelligent cipher key equipment also can produce the transaction PKI, and uses the protection private key that the transaction PKI is signed.Server is after the request that receives downloadable authentication, will verify the legitimacy of birth certificate and the validity of transaction public key signature, and when both's checking is passed through, be that intelligent cipher key equipment is not forged, and the request of downloadable authentication is to be sent by legal intelligent cipher key equipment, thereby has guaranteed the fail safe that certificate is downloaded.Below will describe this process in detail.
Embodiment 1
Referring to Fig. 1, present embodiment provides a kind of method of secure download certificate, and detailed process is as follows:
101, intelligent cipher key equipment and client connect;
Preferably, client connects by CryptAcquireContext and the intelligent cipher key equipment that calls CSP (Cryptographic Service Provider, CSP) interface.
102, client receives the request of the downloadable authentication of user's submission, issues to intelligent cipher key equipment and generates the right instruction of transaction key;
103, intelligent cipher key equipment is receiving instruction back generation transaction PKI and transaction private key;
Need to prove that this transaction private key is used for Transaction Information is signed when concluding the business.
104, intelligent cipher key equipment is signed to the transaction PKI according to the protection private key of self storing, and obtains the public key signature of concluding the business;
Particularly, intelligent cipher key equipment is when dispatching from the factory, and is inner right with regard to having generated and preserved the protection key, promptly protects PKI and protection private key.
Preferably, intelligent cipher key equipment generate transaction key to the time, promptly the transaction PKI that generates is signed according to the protection private key of self storage;
Correspondingly, intelligent cipher key equipment when specifying transaction PKI to be signed in this signature command, is signed to the signature transaction PKI for the treatment of of appointment according to the protection private key of self storage after receiving the signature command that main frame issues; If, specify transaction PKI to be signed in the signature command that receives, then the transaction PKI of acquiescence to be signed according to the protection private key of self storing, this acquiescence transaction PKI is meant, repeatedly produces the transaction PKI of the PKCS#10 request up-to-date generation in back.
Particularly, according to the protection private key of self storage the transaction PKI is signed and is:
Intelligent cipher key equipment uses the protection private key of self storing that first data are signed, obtain the first data signature value, wherein, first data comprise: additional data, transaction PKI first preset length part, the second data cryptographic Hash, and second data comprise: additional data and transaction PKI;
Protection PKI length, the first data signature value that calculates and transaction PKI residue length are partly spliced, obtain the public key signature of concluding the business.
Particularly, the transaction PKI signed adopt the mode of PKCS#1, the equation expression of aforementioned calculation signature is as follows:
Transaction public key signature=HEADER||PrivateKeyCalculate (Data0) || the N remainder of transaction PKI || transaction PKI E;
PrivateKeyCalculate: expression uses protection key (private key) to calculate;
The length of HEADER:00 80 expression protection PKIs is 1024Bit, and the length of 01 00 expression protection PKIs is 2048Bit;
Preferably, the protection PKI adopts 1024Bit.
The first data Data0 content is specifically as shown in table 2:
Table 2
Figure BSA00000322561200111
As shown in Table 2, additional data comprises: protection PKI length, birth certificate version, intelligent cipher key equipment shell number, key property set server random number;
Wherein, the HASH value is the cryptographic Hash of the second data DATA1, is specially: HASH=SHA (DATA1), preferably, the HASH algorithm adopts the SHA1 algorithm.
The content of the second data DATA1 is as shown in table 3:
Table 3
Figure BSA00000322561200112
Figure BSA00000322561200121
As shown in Table 3, second data comprise additional data and transaction PKI.
105, client Generate Certificate request data package;
Particularly, produce PKCS#10 (Public-Key Cryptography Standards) certificate request packet, comprising: public key information, user profile and some optional attribute information (as information such as certificate purposes);
Particularly, the step of Generate Certificate request data package is:
Read the transaction public key information in the intelligent cipher key equipment;
Generating one includes the packet of conclude the business public key information, user profile and certificate purposes information and sends it to intelligent cipher key equipment;
Signature value after the transaction private key of reception in intelligent cipher key equipment signed to described packet;
Described packet and the combination of described signature value are generated a digital certificate request packet.
Particularly, the user submits the request of downloadable authentication to by Web bank's certificate downloading page of client demonstration.
Preferably, client generates the PKCS#10 request by calling the rep order;
Particularly, the rep command context is as follows:
opensslreq[-inform?PEM|DER][-outform?PEM|DER][-in?filename][-passin?arg][-out?filename][-passout?arg][-text][-pubkey][-noout][-verify][-modulus][-new][-rand?file(s)][-newkeyrsa:bits][-newkey?dsa:file][-nodes][-key?filename][-keyform?PEM|DER][-keyout?filename][-[md5|sha1|md2|mdc2]][-config?filename][-subj?arg][-x509][-days?n][-set_serialn][-asn1-kludge][-newhdr][-extensions?section][-reqextssection][-utf8][-nameopt][-batch][-verbose][-engine?id]
Content to the rep order describes, and is as follows:
-inform PEM|DER: the form that is used to specify input is DER or PEM;
-outform PEM|DER: be used to specify output form be DER or PEM;
-in filename: the filename that is used to specify input;
-text: print certificate request or come self-signed certificate information with text formatting;
-new: be used to generate a certificate request, the prompting user is about the value of some fields, can check the field that acquiescence is inquired, maximum/little length restriction etc. by/usr/share/ssl/openssl.cnf; If it is designated that-key option does not have, then can generate a new private key automatically, be defaulted as 1024 bits;
-newkey: set up a new certificate request and a new private key, form is rsa:bits or dsa:filename; If the user does not know the private key file title that generates, acquiescence adopts privkey.pem, the request of Generating Certificate; If the user not the designated document output parameter format (out), then with certificate request file printout on screen, the file of the private key of generation can be specified with-Keyout;
-key: the private key of specifying input;
-keyform: specifying the form of key is PEM or DER, and acquiescence is PEM;
-keyout: be used for newly-established private key is outputed to specified file;
-nodes: represent that newly-established private key do not encrypt;
-md5|sha1: the digital digest algorithm that is used to specify use is md5 or sha1;
-config: specified configuration file, acquiescence are/usr/share/ssl/openssl.cnf;
-subj arg: be used to specify the user profile of the certificate request of generation, replace with designated parameter when perhaps handling certificate request; When Generating Certificate request, if do not specify this option, will point out the user to import each user profile, comprising: information such as name of the country, tissue if adopt this selection, then do not need the user to import user profile; For example :-subj/CN=chian/0U=test/0=abc/CN=forxy, attribute must be capitalized;
-x509: expression generates a certificate from signature, rather than a certificate request, unless use-set_serial option, sequence number is 0;
-days and-x509 option one reinstates, the term of validity of expression certificate, acquiescence is 30 days;
-set_serial and-x509 uses together, and the numbering of this certificate is set, and can be that 10 systems also can be the values (0x beginning) of 16 systems, can use the value of negative, but not advise using negative;
-utf8: the value of expression field is understood as the UTF8 coding, and acquiescence is the ASCII coding;
-batch: be non-interactive mode;
-verbose: be redundant mode.
For example: call the req order and set up a private key and generate a certificate request, then the rep order is as follows:
openssl?genrsa-out?key.pem?1024openssl?req-new-key?key.pem-out?req.pem
The?same?but?just?using?req:
For example: call CSR (certificate request) file that req order generates a PEM form, newly set up a private key, RSA Algorithm, 1024bit, and newly-generated private key saved as file key.pem, then rep orders as follows:
openssl?req-newkey?rsa:1024-keyout?key.pem-out?req.pem
Generate?a?self?signed?root?certificate:
106, client is obtained the birth certificate of intelligent cipher key equipment;
Particularly, client is obtained the birth certificate that the birth certificate interface obtains intelligent cipher key equipment by calling;
Particularly, obtaining the birth certificate interface comprises: management DLL interface cdecl GetIDValue and control invokes interface HRESULT GetIDValue;
Wherein, interface cdecl GetIDValue is defined as follows:
int__cdecl?GetIDValue(char*strMediaID,char*strBirthID,int*nStrBirthID);
Parameter declaration is as follows:
StrMediaID: input parameter is the shell of intelligent cipher key equipment number.
StrBirthID: output parameter is used for exporting shell number and is the pairing birth certificate information of strMediaID.
NStrBirthID: output parameter.When strBirthID is NULL, the space that the strBirthID that nStrBirthID returns should open up; When strBirthID had value, what return was the physical length of strBirthID.
Like this, client just can obtain specifying the birth certificate of the intelligent cipher key equipment of shell number by calling interface cdecl GetIDValue.
Wherein, interface HRESULT GetIDValue is defined as follows:
HRESULT?GetIDValue([IN]BSTR?bstrType,[IN]BSTRbstrShellNum,[OUT,retval]BSTR*bstrID);
Parameter declaration:
BstrType: input parameter, intelligent cipher key equipment type number.
BstrShellNum: input parameter, expression intelligent cipher key equipment shell number.With similar " 52xxxxxxxxxx " form input.
BstrID: output parameter is used for exporting shell and number is the birth certificate information of bstrShellNum correspondence to be the Base64 form of birth certificate.
Like this, client just can have been obtained the birth certificate of the intelligent cipher key equipment of specifying shell number by calling the control invokes interface.
107, after client receives the birth certificate information that intelligent cipher key equipment returns, obtain the transaction public key signature;
Particularly, client is obtained transaction public key signature interface and is obtained the transaction public key signature by calling;
Particularly, transaction public key signature interface comprises: management DLL interface cdeclGetPubKeySignValue and control invokes interface HRESULT GetPubKeySignValue;
Wherein, interface cdecl GetPubKeySignValue is defined as follows:
int__cdecl?GetPubKeySignValue(char*strMediaID,char*strSign,int*nStrSign);
Parameter declaration:
StrMediaID: input parameter, expression intelligent cipher key equipment shell number.With similar " 52xxxxxxxxxx " form input.
StrSign: output parameter, the protection private key of expression birth certificate is to transaction public key signature value.
NStrSign: output parameter.When strSign is NULL, this value representation should be the space size that strSign opens up; When strSign has value, the size of this value representation strSign reality.
Like this, client just can obtain protecting in the intelligent cipher key equipment private key to having concluded the business public key signature by calling interface cdecl GetPubKeySignValue.
Interface HRESULT GetPubKeySignValue is defined as follows:
HRESULT?GetPubKeySignValue([IN]BSTR?bstrType;[IN]BSTRbstrShellNum,[OUT,retval]BSTR*bstrSign)
Parameter declaration:
BstrType: input parameter, expression intelligent cipher key equipment type.
BstrShellNum: input parameter, expression intelligent cipher key equipment shell number.With similar " 52xxxxxxxxxx " form input.
BstrSign: output parameter, the private key of expression birth certificate is to the signature value of bPubKey.
Like this, client just can obtain protecting in the intelligent cipher key equipment private key to having concluded the business public key signature by calling interface HRESULT GetPubKeySignValue.
108, client sends to server with birth certificate, transaction public key signature and the PKCS#10 certificate request packet that obtains;
Further, client can be packed transaction public key signature, birth certificate and the PKCS#10 request data package obtained, and the result that will pack sends to server.
Need to prove that service end is also used the PKI that carries in the described certificate request packet described signature value is verified after receiving PKCS#10 certificate request packet, checking is passed through, continue to carry out following operation, otherwise, to the information of client return authentication mistake.
109, server judges whether the birth certificate that receives is legal, if legal, carries out 110, otherwise, carry out 113;
When birth certificate is described, mention: the one-level authorization key is as the starting point of trusting in the intelligent cipher key equipment birth certificate, and sign and issue the generation birth certificate and sign and issue key information, this birth certificate is signed and issued key and is used for birth certificate is signed, wherein, birth certificate is signed and issued key information and is comprised the key version, signs and issues the signature that PKI and birth certificate are signed and issued key, and the signature that this birth certificate is signed and issued key is to use one-level authorization key (private key) birth certificate to be signed and issued the signature (as described in Table 1) of key information; Hence one can see that, when whether the checking birth certificate is legal, needs the checking birth certificate sign and issue the legitimacy of the signature and the birth certificate signature of key; Specific as follows:
Particularly, whether the server authentication birth certificate is signed and issued the signature of key legal, comprise: the signature of birth certificate being signed and issued key with the one-level authorization key (PKI) in the birth certificate calculates, and compare signing and issuing key information in result of calculation and the birth certificate, unanimity thinks that then it is legal that birth certificate is signed and issued key, and promptly birth certificate is legal, otherwise birth certificate is illegal.
Particularly, whether server authentication birth certificate signature is legal, comprising: with the PKI of signing and issuing in the birth certificate birth certificate signature is calculated, and result of calculation and birth certificate information are compared, and unanimity, then legal, otherwise, illegal.
Coded representation is as follows:
int?VerifyBirthCert(string?birthCert)
Parameter declaration:
BirthCert: birth certificate
110, the transaction public key signature that receives of server authentication if the verification passes, carries out 111, if authentication failed carries out 113;
Particularly, the part of expression protection PKI length in the described transaction public key signature is removed;
According to the protection PKI in the described birth certificate that receives the value part (PrivateKeyCalculate (Data0)) of signing described in the described transaction public key signature is calculated, obtained described first data;
Remove the additional data in described first data, the PKI first preset length part obtains concluding the business;
Transaction PKI residue length is partly spliced and is obtained described transaction PKI in transaction PKI first preset length part that obtains described and the described transaction public key signature;
Go out second data according to described first data splicing, described second data are carried out Hash operation, the second data cryptographic Hash in operation result and described first data is compared, consistent, then described transaction public key signature is legal, inconsistent, and then described transaction public key signature is illegal.
Coded representation is as follows:
struct?RstVfy
{int?rst;
string?random;
string?n;
stirng?e;
}
RstVfy?VerifyTransSign(string?signedText)
Parameter declaration:
ProtectKey: protection PKI;
TradeKey: transaction public key information;
SignedText: the signature that uses the protection private key that the transaction PKI is carried out.
111, server response certificate download request, grant a certificate, and certificate sent to client;
112, client is written to certificate in the intelligent cipher key equipment;
113, the server refusal is carried out the certificate download request, and returns the information of transaction public key signature authentication failed to client.
In the invention process, server passes through the checking of the validity of the legitimacy to birth certificate, the public key signature of concluding the business, and the request that has guaranteed downloadable authentication is to be sent by legal intelligent cipher key equipment, thereby has guaranteed the fail safe that certificate is downloaded.
Embodiment 2
Present embodiment provides a kind of system of secure download certificate, referring to Fig. 2, comprising: intelligent cipher key equipment 20, client 21 and service end 22; Wherein, each functions of the equipments is as follows:
Intelligent cipher key equipment 20 comprises:
Memory cell 200 is used to store birth certificate, protection private key and certificate, and wherein, birth certificate and protection private key all generate when intelligent cipher key equipment dispatches from the factory and preserve;
Particularly, birth certificate comprises: type number, birth certificate version information, birth certificate timestamp, shell number, protection PKI, one-level authorization key, birth certificate are signed and issued key information and birth certificate signature, wherein, the every explanation of relevant birth certificate just repeats no more referring to the related description among the embodiment 1 herein;
Need to prove that when intelligent cipher key equipment generated the protection private key before dispatching from the factory, also generating simultaneously had the protection PKI;
Key generation unit 201 is used for generating transaction PKI and transaction private key;
Need to prove, the private key of concluding the business in addition that key generation unit 201 generates when generating the transaction PKI, this transaction private key is used for Transaction Information is signed when concluding the business.
Signature unit 202 is used for according to the protection private key of memory cell 200 storages the transaction PKI that key generation unit 201 generates being signed, and obtains the public key signature of concluding the business;
Particularly, signature unit 202 comprises:
Signature blocks 2020; be used for first data being signed according to the protection private key of memory cell 200 storages; obtain the signature value; first data comprise: additional data, transaction PKI first preset length part, the second data cryptographic Hash; described second data comprise: additional data and transaction PKI; the related description among the embodiment 1 is participated in the detailed description of relevant first data and second data, just repeats no more herein.
Concatenation module 2021, the signature value and the transaction PKI residue length that are used for protection PKI length, signature blocks 2020 are calculated are partly spliced, and obtain the public key signature of concluding the business.
Certificate writing unit 203, the certificate that is used for downloading is written to memory cell;
Transmitting element 204 is used for returning certificate and transaction public key signature to client 21.
Client 21 comprises:
Receiving element 210 is used to receive the request of the downloadable authentication of user's input, and the certificate signed and issued of service end 22;
Certificate request generation unit 211 is used for when receiving element 210 receives the request of downloadable authentication, and the request of Generating Certificate particularly, is used to generate the PKCS#10 certificate request;
Particularly, the PKCS#10 certificate request comprises: transaction PKI, user profile and some optional attribute information;
First interface unit 212 is used to obtain the birth certificate of intelligent cipher key equipment;
Particularly, first interface unit 212 is management DLL interface cdecl GetIDValue or control invokes interface HRESULT GetIDValue;
Wherein, the explanation of relevant management DLL interface cdecl GetIDValue or control invokes interface HRESULT GetIDValue just repeats no more referring to the associated description among the embodiment 1 herein;
Second interface unit 213 is used to obtain the transaction public key signature of intelligent key;
Particularly, second interface unit 213 is management DLL interface cdeclGetPubKeySignValue or control invokes interface HRESULT GetPubKeySignValue;
Wherein, the explanation of relevant management DLL interface cdecl GetPubKeySignValue or control invokes interface HRESULT GetPubKeySignValue just repeats no more referring to the related description among the embodiment 1 herein;
Transmitting element 214 is used for sending the transaction public key signature that certificate request packet that certificate request generation units 211 generate, birth certificate that first interface unit 212 is obtained and second interface unit 213 obtain to service end 22;
Service end 22 comprises:
Receiving element 220 is used to receive certificate request packet, birth certificate and the transaction public key signature that client transmitting element 214 sends;
Birth certificate authentication unit 221 is used to verify whether the birth certificate that receiving element 220 receives is legal;
Specifically comprise:
First judge module 2210 is used for judging whether birth certificate is signed and issued key information legal;
Particularly, whether the server authentication birth certificate is signed and issued key information legal, comprise: the signature of birth certificate being signed and issued key information according to the mandate PKI in the one-level authorization key information in the described birth certificate calculates, comparison between calculation results whether with birth certificate in birth certificate to sign and issue key information consistent, if it is consistent, then to sign and issue key information legal for birth certificate, otherwise it is illegal that birth certificate is signed and issued key information.
Second judge module 2211 is used for judging whether birth certificate birth certificate signature is legal;
Particularly, whether service end checking birth certificate signature is legal, comprise: the PKI of signing and issuing in the key information according to birth certificate in the birth certificate that receives of signing and issuing calculates the birth certificate signature, whether comparison between calculation results is consistent with the birth certificate information that receives, if it is consistent, then the birth certificate signature is legal, otherwise the birth certificate signature is illegal.
Transaction public key verifications unit 222 is used for after birth certificate authentication unit 211 checking birth certificate information are legal, and whether the transaction public key signature that checking receiving element 220 receives is legal;
Specifically comprise:
First processing module 2220 is used for the part of transaction public key signature expression protection PKI length is removed;
First computing module 2221 is used for according to the protection PKI of the birth certificate that receives signature value part in the transaction public key signature being calculated, and obtains first data;
Second processing module 2222 is used for removing the additional data of first data, and the PKI first preset length part obtains concluding the business;
First concatenation module 2223, transaction PKI first preset length part that is used for second processing module is obtained is partly spliced with transaction public key signature transaction PKI residue length, obtain the PKI of concluding the business, this transaction PKI is the real transaction PKI that generates in the intelligent cipher key equipment;
Second concatenation module 2224 is used for going out second data according to first data splicing;
Second computing module 2225 adopts the hash algorithm identical with the second data cryptographic Hash algorithm in first data that second data are carried out Hash operation;
Contrast module 2226, the cryptographic Hash and first data, the second data cryptographic Hash that are used for second computing module is obtained compare, unanimity, the public key signature of then concluding the business is legal, inconsistent, and the public key signature of then concluding the business is illegal.
Certificate issuance unit 223 is used for after transaction public key verifications unit 222 checking transaction public key signature information are legal grant a certificate;
Transmitting element 224 is used for the certificate that certificate issuance unit 223 is signed and issued is sent to client;
Server passes through the checking of the validity of the legitimacy to birth certificate, the public key signature of concluding the business, and the request that has guaranteed downloadable authentication is to be sent by legal intelligent cipher key equipment, thereby has guaranteed the fail safe that certificate is downloaded.
The above; only be the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion by described protection range with claim.

Claims (19)

1. the method for a secure download certificate is characterized in that, described method comprises:
Intelligent cipher key equipment and client connect;
After described client receives the request of the downloadable authentication that the user submits to, issue to described intelligent cipher key equipment and to generate the right instruction of transaction key;
Described intelligent cipher key equipment generates transaction PKI and transaction private key according to built-in key schedule, and according to the protection private key of self storing described transaction PKI is signed, and obtains the public key signature of concluding the business;
The described client request data package that Generates Certificate;
Described client is obtained the birth certificate and the described transaction public key signature of described intelligent cipher key equipment self storage, and described birth certificate, described transaction public key signature and described certificate request packet are sent to service end;
Described service end judges whether the described birth certificate that receives is legal, if it is illegal, to the error message of described client return authentication, if legal, judge then whether described transaction public key signature is legal, if illegal, to the error message of described client return authentication, if legal, grant a certificate then, and described certificate sent to described client;
Described client is written to described certificate in the described intelligent cipher key equipment.
2. method according to claim 1 is characterized in that, the Generate Certificate step of request data package of described client is specially:
Read the transaction public key information in the described intelligent cipher key equipment;
Generating one includes the packet of conclude the business public key information, user profile and certificate purposes information and sends it to described intelligent cipher key equipment;
Signature value after the transaction private key of reception in described intelligent cipher key equipment signed to described packet;
Described packet and the combination of described signature value are generated a digital certificate request packet.
3. method according to claim 2 is characterized in that, described method also comprises: described service end is verified described signature value with the transaction PKI that carries in the described certificate request packet after receiving described certificate request packet.
4. method according to claim 1 is characterized in that, described intelligent cipher key equipment is promptly signed to described transaction PKI according to the protection private key of self storing after generating the transaction PKI according to built-in key schedule;
Or
Described intelligent cipher key equipment is signed to described transaction PKI according to the protection private key of self storage after receiving the instruction that described transaction PKI is signed that described client issues.
5. method according to claim 1 is characterized in that, described intelligent cipher key equipment is signed to described transaction PKI according to the protection private key of self storing and comprised:
Described intelligent cipher key equipment uses the protection private key of self storing that first data are signed, obtain the first data signature value, described first data comprise: additional data, transaction PKI first preset length part, the second data cryptographic Hash, and described second data comprise: described additional data and transaction PKI;
To protect PKI length, the described first data signature value and transaction PKI residue length partly to splice, obtain the public key signature of concluding the business.
6. method according to claim 5 is characterized in that, described additional data comprises described protection PKI length, birth certificate version, intelligent cipher key equipment shell number, key attribute.
7. method according to claim 1; it is characterized in that described birth certificate comprises: intelligent cipher key equipment type number, birth certificate version information, birth certificate timestamp, intelligent cipher key equipment shell number, protection PKI, one-level authorization key information, class origin card are signed and issued key information and birth certificate signature.
8. method according to claim 7 is characterized in that, the trust starting point of described one-level authorization key during for the described intelligent cipher key equipment of authentication;
Described birth certificate is signed and issued key and is signed and issued by described one-level authorization key, is used for described birth certificate is signed.
9. method according to claim 8 is characterized in that, described one-level authorization key information comprises: authorization key version, mandate PKI;
Described birth certificate is signed and issued key information and comprised: birth certificate signs and issues the key version, sign and issue the signature that PKI and described birth certificate are signed and issued key information;
Wherein, the described birth certificate signature of signing and issuing key information is signed and is obtained by authorizing private key that described birth certificate is signed and issued key information.
10. method according to claim 9 is characterized in that, described service end is judged the birth certificate that receives legal comprising whether:
Described service end judges in the described birth certificate that receives whether birth certificate is signed and issued key information legal, if it is illegal, judge that then described birth certificate is illegal, if it is legal, judge then whether the birth certificate signature is legal in the described birth certificate, if legal, judges that then described birth certificate is legal, if illegal, judge that then described birth certificate is illegal.
11. method according to claim 10 is characterized in that, described service end judges in the described birth certificate that receives that birth certificate signs and issues key information legal comprising whether:
Described client is calculated according to the signature of authorizing PKI that described birth certificate is signed and issued key information in the one-level authorization key information in the described birth certificate, contrast described result of calculation whether with described birth certificate in birth certificate to sign and issue key information consistent, if it is consistent, it is legal that then described birth certificate is signed and issued key information, otherwise it is illegal that described birth certificate is signed and issued key information.
12. method according to claim 10 is characterized in that, describedly judges in the described birth certificate birth certificate signature legal comprising whether:
The PKI of signing and issuing that described service end is signed and issued in the key information according to birth certificate in the described birth certificate that receives calculates described birth certificate signature, whether contrast described result of calculation consistent with described birth certificate information, if it is consistent, then described birth certificate signature is legal, otherwise described birth certificate signature is illegal.
13. method according to claim 5 is characterized in that, describedly judges described transaction public key signature legal comprising whether:
The part of expression protection PKI length in the described transaction public key signature is removed;
According to the protection PKI in the described birth certificate that receives the first data signature value part described in the described transaction public key signature is calculated, obtained described first data;
Remove the additional data in described first data, the PKI first preset length part obtains concluding the business;
Transaction PKI residue length in described transaction PKI first preset length part and the described transaction public key signature partly spliced obtain described transaction PKI;
Go out second data according to described first data splicing, described second data are carried out Hash operation, the second data cryptographic Hash in operation result and described first data is compared, consistent, then described transaction public key signature is legal, inconsistent, and then described transaction public key signature is illegal.
14. the system of a secure download certificate is characterized in that, described system comprises: intelligent cipher key equipment, client and service end;
Intelligent cipher key equipment comprises:
Memory cell is used to store birth certificate, protection private key and certificate;
The key generation unit is used for generating transaction PKI and transaction private key according to built-in key schedule;
Signature unit is used for according to the protection private key of cell stores the transaction PKI that the key generation unit generates being signed;
The certificate writing unit is used for certificate is written to memory cell;
Transmitting element is used for returning certificate and transaction public key signature to client.
Client comprises:
Receiving element is used to receive the request of the downloadable authentication of user's input, and the certificate that sends of described service end transmitting element;
The certificate request generation unit is used for when described receiving element receives the request of downloadable authentication, and request data package Generates Certificate;
First interface unit is used to obtain the birth certificate of intelligent cipher key equipment;
Second interface unit is used to obtain the transaction public key signature of intelligent cipher key equipment;
Transmitting element is used for sending the transaction public key signature that certificate request packet that the certificate request generation unit generates, birth certificate that first interface unit obtains and second interface unit obtain to service end;
Service end comprises:
Receiving element is used to receive birth certificate and the transaction public key signature that the client transmitting element sends;
The birth certificate authentication unit is used to verify whether the birth certificate that receiving element receives is legal;
Transaction public key verifications unit is used for after first authentication unit checking birth certificate is legal, and whether the transaction public key signature that the checking receiving element receives is legal;
The certificate issuance unit is used for after second authentication unit checking transaction public key signature is legal grant a certificate;
Transmitting element is used for the certificate that the certificate issuance unit is signed and issued is sent to client.
15. system according to claim 14 is characterized in that, described signature unit comprises:
Signature blocks, be used for first data being signed according to the protection private key of cell stores, obtain the first data signature value, described first data comprise: additional data, transaction PKI first preset length part, the second data cryptographic Hash, and described second data comprise: described additional data and transaction PKI;
Concatenation module is used for protection PKI length, described signature value and transaction PKI residue length are partly spliced, and obtains the public key signature of concluding the business.
16. system according to claim 14 is characterized in that, described birth certificate authentication unit comprises:
First judge module is used for judging whether described birth certificate birth certificate is signed and issued key information legal;
Second judge module is used for judging whether described birth certificate birth certificate signature is legal.
17. system according to claim 16 is characterized in that, describedly judges in the described birth certificate that birth certificate signs and issues key information legal comprising whether:
The signature that described service end is signed and issued key information according to the mandate PKI in the one-level authorization key information in the described birth certificate to described birth certificate calculates, contrast described result of calculation whether with described birth certificate in described birth certificate to sign and issue key information consistent, if it is consistent, it is legal that then described birth certificate is signed and issued key information, otherwise it is illegal that described birth certificate is signed and issued key information.
18. system according to claim 16 is characterized in that, describedly judges in the described birth certificate birth certificate signature legal comprising whether:
The PKI of signing and issuing that described service end is signed and issued in the key information according to birth certificate described in the described birth certificate that receives calculates described birth certificate signature, whether contrast described result of calculation consistent with the described birth certificate information that receives, if it is consistent, then described birth certificate signature is legal, otherwise described birth certificate signature is illegal.
19. system according to claim 14 is characterized in that, described transaction public key verifications unit comprises:
First processing module is used for the part of described transaction public key signature expression protection PKI length is removed;
First computing module is used for according to the protection PKI of the described birth certificate that receives the first data signature value part described in the described transaction public key signature being calculated, and obtains described first data;
Second processing module is used for removing the additional data of described first data, and the PKI first preset length part obtains concluding the business;
First concatenation module, transaction PKI first preset length part that is used for described second processing module is obtained is partly spliced with described transaction public key signature transaction PKI residue length, obtains described transaction PKI;
Second concatenation module is used for going out second data according to described first data splicing;
Second computing module is used for described second data are carried out Hash operation;
The contrast module, the cryptographic Hash and described first data, the second data cryptographic Hash that are used for described second computing module is obtained compare, unanimity, then described transaction public key signature is legal, inconsistent, and then described transaction public key signature is illegal.
CN2010105232613A 2010-10-28 2010-10-28 Method and system for safely downloading certificate Active CN101977193B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105232613A CN101977193B (en) 2010-10-28 2010-10-28 Method and system for safely downloading certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105232613A CN101977193B (en) 2010-10-28 2010-10-28 Method and system for safely downloading certificate

Publications (2)

Publication Number Publication Date
CN101977193A true CN101977193A (en) 2011-02-16
CN101977193B CN101977193B (en) 2013-11-13

Family

ID=43577038

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105232613A Active CN101977193B (en) 2010-10-28 2010-10-28 Method and system for safely downloading certificate

Country Status (1)

Country Link
CN (1) CN101977193B (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761420A (en) * 2012-08-08 2012-10-31 飞天诚信科技股份有限公司 Security certification method
CN102932343A (en) * 2012-10-26 2013-02-13 飞天诚信科技股份有限公司 Method and device for downloading digital certificate
CN103078746A (en) * 2013-02-07 2013-05-01 飞天诚信科技股份有限公司 Generation method for data packet
CN103516524A (en) * 2013-10-21 2014-01-15 北京旋极信息技术股份有限公司 Security authentication method and system
CN104348792A (en) * 2013-07-30 2015-02-11 阿里巴巴集团控股有限公司 Data processing method, device and system
CN104836671A (en) * 2015-05-15 2015-08-12 安一恒通(北京)科技有限公司 Inspection method and inspection device for adding digital certificate
CN105141420A (en) * 2015-07-29 2015-12-09 飞天诚信科技股份有限公司 Method, device and server for securely introducing and issuing certificates
CN106411504A (en) * 2015-07-31 2017-02-15 腾讯科技(深圳)有限公司 Data encryption system, method and apparatus
CN106603238A (en) * 2015-10-20 2017-04-26 飞天诚信科技股份有限公司 Multi-digital-certificate issuing system and equipment, and working methods thereof
CN107612697A (en) * 2017-10-20 2018-01-19 阿里巴巴集团控股有限公司 Applying digital certificate method and apparatus
CN107864038A (en) * 2017-10-25 2018-03-30 中国平安人寿保险股份有限公司 Certificate management method, device, equipment and computer-readable recording medium
CN107948182A (en) * 2017-12-06 2018-04-20 上海格尔安全科技有限公司 A kind of WEB application configuration file tamper resistant method based on PKI
CN108900305A (en) * 2018-06-28 2018-11-27 公安部第三研究所 More certificate issuances and verification method based on intelligent and safe chip
CN108989325A (en) * 2018-08-03 2018-12-11 华数传媒网络有限公司 Encryption communication method, apparatus and system
CN109039597A (en) * 2017-06-08 2018-12-18 佳能株式会社 Information processing unit, the control method and storage medium for controlling information processing unit
CN109150548A (en) * 2015-12-01 2019-01-04 神州融安科技(北京)有限公司 A kind of digital certificate signature, sign test method and system, digital certificate system
CN109886011A (en) * 2018-12-28 2019-06-14 北京思源互联科技有限公司 A kind of safety protecting method and device
CN109981278A (en) * 2017-12-28 2019-07-05 中国移动通信集团辽宁有限公司 Applying digital certificate method, system, subscriber identification card, equipment and medium
CN110138562A (en) * 2018-02-09 2019-08-16 腾讯科技(北京)有限公司 The certificate issuance method, apparatus and system of smart machine
CN111414638A (en) * 2020-04-23 2020-07-14 飞天诚信科技股份有限公司 Method and device for realizing distinguishing key generation mode
CN111641502A (en) * 2020-06-01 2020-09-08 中国农业银行股份有限公司 Electronic certificate downloading method and device based on super counter
CN111953496A (en) * 2015-12-21 2020-11-17 万事达卡国际股份有限公司 Method and system for blockchain variants using digital signatures
CN112487391A (en) * 2020-11-27 2021-03-12 交通银行股份有限公司 Certificate pre-planting system and method thereof
CN112529574A (en) * 2020-11-19 2021-03-19 北京握奇智能科技有限公司 Protection method for certificate of intelligent password equipment and intelligent password equipment
CN113676330A (en) * 2021-08-10 2021-11-19 上海瓶钵信息科技有限公司 Digital certificate application system and method based on secondary key

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2002330834A1 (en) * 2002-08-30 2004-04-23 Agency For Science, Technology And Research Public key cryptography and a framework therefor
CN101340285A (en) * 2007-07-05 2009-01-07 杭州中正生物认证技术有限公司 Method and system for identity authentication by finger print USBkey
CN101527633A (en) * 2008-12-31 2009-09-09 北京飞天诚信科技有限公司 System and method for intelligent key devices to obtain digital certificates
CN101527714A (en) * 2008-12-31 2009-09-09 北京飞天诚信科技有限公司 Method, device and system for accreditation
CN101527630A (en) * 2008-12-31 2009-09-09 北京飞天诚信科技有限公司 Method, server and system for manufacturing certificate remotely

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2002330834A1 (en) * 2002-08-30 2004-04-23 Agency For Science, Technology And Research Public key cryptography and a framework therefor
CN101340285A (en) * 2007-07-05 2009-01-07 杭州中正生物认证技术有限公司 Method and system for identity authentication by finger print USBkey
CN101527633A (en) * 2008-12-31 2009-09-09 北京飞天诚信科技有限公司 System and method for intelligent key devices to obtain digital certificates
CN101527714A (en) * 2008-12-31 2009-09-09 北京飞天诚信科技有限公司 Method, device and system for accreditation
CN101527630A (en) * 2008-12-31 2009-09-09 北京飞天诚信科技有限公司 Method, server and system for manufacturing certificate remotely

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张燕燕: "《电子商务中证书认证系统的设计与实现》", 《中国优秀硕士学位论文全文数据库》, no. 3, 15 September 2007 (2007-09-15) *

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761420A (en) * 2012-08-08 2012-10-31 飞天诚信科技股份有限公司 Security certification method
CN102761420B (en) * 2012-08-08 2014-10-29 飞天诚信科技股份有限公司 Security certification method
CN102932343A (en) * 2012-10-26 2013-02-13 飞天诚信科技股份有限公司 Method and device for downloading digital certificate
CN102932343B (en) * 2012-10-26 2015-01-14 飞天诚信科技股份有限公司 Method and device for downloading digital certificate
CN103078746A (en) * 2013-02-07 2013-05-01 飞天诚信科技股份有限公司 Generation method for data packet
CN103078746B (en) * 2013-02-07 2015-06-17 飞天诚信科技股份有限公司 Generation method for data packet
CN104348792B (en) * 2013-07-30 2018-06-19 阿里巴巴集团控股有限公司 Data processing method, device and system
CN104348792A (en) * 2013-07-30 2015-02-11 阿里巴巴集团控股有限公司 Data processing method, device and system
CN103516524A (en) * 2013-10-21 2014-01-15 北京旋极信息技术股份有限公司 Security authentication method and system
CN104836671A (en) * 2015-05-15 2015-08-12 安一恒通(北京)科技有限公司 Inspection method and inspection device for adding digital certificate
CN105141420A (en) * 2015-07-29 2015-12-09 飞天诚信科技股份有限公司 Method, device and server for securely introducing and issuing certificates
CN105141420B (en) * 2015-07-29 2018-09-25 飞天诚信科技股份有限公司 A kind of importing, the method for grant a certificate, equipment and server safely
CN106411504A (en) * 2015-07-31 2017-02-15 腾讯科技(深圳)有限公司 Data encryption system, method and apparatus
CN106411504B (en) * 2015-07-31 2020-10-09 腾讯科技(深圳)有限公司 Data encryption system, method and device
CN106603238B (en) * 2015-10-20 2019-06-18 飞天诚信科技股份有限公司 A kind of multi-digital certificate signs and issues system, certificate management end, issue apparatus and its working method
CN106603238A (en) * 2015-10-20 2017-04-26 飞天诚信科技股份有限公司 Multi-digital-certificate issuing system and equipment, and working methods thereof
CN109150548B (en) * 2015-12-01 2021-10-08 神州融安科技(北京)有限公司 Digital certificate signing and signature checking method and system and digital certificate system
CN109150548A (en) * 2015-12-01 2019-01-04 神州融安科技(北京)有限公司 A kind of digital certificate signature, sign test method and system, digital certificate system
CN111953496B (en) * 2015-12-21 2024-04-02 万事达卡国际股份有限公司 Method and system for blockchain modification using digital signatures
CN111953496A (en) * 2015-12-21 2020-11-17 万事达卡国际股份有限公司 Method and system for blockchain variants using digital signatures
US11212116B2 (en) 2017-06-08 2021-12-28 Canon Kabushiki Kaisha Information processing apparatus, control method for controlling information processing apparatus, and storage medium
CN109039597A (en) * 2017-06-08 2018-12-18 佳能株式会社 Information processing unit, the control method and storage medium for controlling information processing unit
CN107612697A (en) * 2017-10-20 2018-01-19 阿里巴巴集团控股有限公司 Applying digital certificate method and apparatus
US11106775B2 (en) 2017-10-20 2021-08-31 Advanced New Technologies Co., Ltd. Digital certificate application
CN107612697B (en) * 2017-10-20 2020-04-14 阿里巴巴集团控股有限公司 Digital certificate application method and device
US11106776B2 (en) 2017-10-20 2021-08-31 Advanced New Technologies Co., Ltd. Digital certificate application
CN107864038A (en) * 2017-10-25 2018-03-30 中国平安人寿保险股份有限公司 Certificate management method, device, equipment and computer-readable recording medium
CN107948182B (en) * 2017-12-06 2021-03-19 上海格尔安全科技有限公司 WEB application configuration file tamper-proof method based on PKI
CN107948182A (en) * 2017-12-06 2018-04-20 上海格尔安全科技有限公司 A kind of WEB application configuration file tamper resistant method based on PKI
CN109981278A (en) * 2017-12-28 2019-07-05 中国移动通信集团辽宁有限公司 Applying digital certificate method, system, subscriber identification card, equipment and medium
CN110138562A (en) * 2018-02-09 2019-08-16 腾讯科技(北京)有限公司 The certificate issuance method, apparatus and system of smart machine
CN110138562B (en) * 2018-02-09 2023-05-26 腾讯科技(北京)有限公司 Certificate issuing method, device and system of intelligent equipment
CN108900305B (en) * 2018-06-28 2021-06-04 公安部第三研究所 Multi-certificate issuing and verifying method based on intelligent security chip
CN108900305A (en) * 2018-06-28 2018-11-27 公安部第三研究所 More certificate issuances and verification method based on intelligent and safe chip
CN108989325A (en) * 2018-08-03 2018-12-11 华数传媒网络有限公司 Encryption communication method, apparatus and system
CN109886011A (en) * 2018-12-28 2019-06-14 北京思源互联科技有限公司 A kind of safety protecting method and device
CN109886011B (en) * 2018-12-28 2021-02-12 北京思源理想控股集团有限公司 Safety protection method and device
CN111414638B (en) * 2020-04-23 2023-03-24 飞天诚信科技股份有限公司 Method and device for realizing distinguishing key generation mode
CN111414638A (en) * 2020-04-23 2020-07-14 飞天诚信科技股份有限公司 Method and device for realizing distinguishing key generation mode
CN111641502A (en) * 2020-06-01 2020-09-08 中国农业银行股份有限公司 Electronic certificate downloading method and device based on super counter
CN112529574A (en) * 2020-11-19 2021-03-19 北京握奇智能科技有限公司 Protection method for certificate of intelligent password equipment and intelligent password equipment
CN112487391A (en) * 2020-11-27 2021-03-12 交通银行股份有限公司 Certificate pre-planting system and method thereof
CN113676330A (en) * 2021-08-10 2021-11-19 上海瓶钵信息科技有限公司 Digital certificate application system and method based on secondary key
CN113676330B (en) * 2021-08-10 2023-08-01 上海瓶钵信息科技有限公司 Digital certificate application system and method based on secondary secret key

Also Published As

Publication number Publication date
CN101977193B (en) 2013-11-13

Similar Documents

Publication Publication Date Title
CN101977193B (en) Method and system for safely downloading certificate
CN103905207B (en) Method and system for unifying APK signature
US11888974B1 (en) Secret sharing information management and security system
JP3858527B2 (en) Data generation apparatus, data verification apparatus and method
EP2999156B1 (en) Device authenticity determination system and device authenticity determination method
CN104537293B (en) Authenticating device and system
CN102594558B (en) Anonymous digital certificate system and verification method of trustable computing environment
EP2302834B1 (en) System and method for providing credentials
CN107786550B (en) A kind of safety communicating method of self-service device, safe communication system and self-service device
US8522014B2 (en) Method and system for storing a key in a remote security module
CA3164765A1 (en) Secure communication method and device based on identity authentication
CN106341493A (en) Entity rights oriented digitalized electronic contract signing method
CN105635049A (en) Anti-counterfeit tax control method and device based on client identifier password
CN111131278A (en) Data processing method and device, computer storage medium and electronic equipment
US20130039495A1 (en) Secure key management
CN107888379A (en) A kind of method of secure connection, POS terminal and code keypad
CN106790045A (en) One kind is based on cloud environment distributed virtual machine broker architecture and data integrity support method
CN108011719A (en) A kind of endorsement method, device and digital signature system
CN109039656A (en) SM9 Combination with Digital endorsement method, device and computer equipment
CN105281910A (en) Internet of things lock with CA digital certificate serving as network access identity identifier and network access identity identification method
CN104012036A (en) Combined digital certificate
CN113536329A (en) Electronic device for cryptographic communication and cryptographic communication system
CN111654371A (en) Trusted computing-based hybrid encryption secure data transmission method
CN101639957A (en) Method and terminal for realizing loading or unloading as well as banking system
CN104735064A (en) Safety revocation and updating method for identification in identification password system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 17th floor, building B, Huizhi building, No.9, Xueqing Road, Haidian District, Beijing 100085

Patentee after: Feitian Technologies Co.,Ltd.

Country or region after: China

Address before: 100085 17th floor, block B, Huizhi building, No.9 Xueqing Road, Haidian District, Beijing

Patentee before: Feitian Technologies Co.,Ltd.

Country or region before: China