CN103152344A - Digital-certificate-based cryptographic operation method and device - Google Patents

Digital-certificate-based cryptographic operation method and device Download PDF

Info

Publication number
CN103152344A
CN103152344A CN2013100720953A CN201310072095A CN103152344A CN 103152344 A CN103152344 A CN 103152344A CN 2013100720953 A CN2013100720953 A CN 2013100720953A CN 201310072095 A CN201310072095 A CN 201310072095A CN 103152344 A CN103152344 A CN 103152344A
Authority
CN
China
Prior art keywords
cryptographic algorithm
access device
digital certificate
user
login user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100720953A
Other languages
Chinese (zh)
Other versions
CN103152344B (en
Inventor
王胜男
黎晋廷
李斌
张永强
刘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Age of security Polytron Technologies Inc
Original Assignee
GUANGDONG CERTIFICATE AUTHORITY CENTER CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG CERTIFICATE AUTHORITY CENTER CO Ltd filed Critical GUANGDONG CERTIFICATE AUTHORITY CENTER CO Ltd
Priority to CN201310072095.3A priority Critical patent/CN103152344B/en
Publication of CN103152344A publication Critical patent/CN103152344A/en
Application granted granted Critical
Publication of CN103152344B publication Critical patent/CN103152344B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a digital-certificate-based cryptographic operation method, which comprises the following steps of: querying a digital certificate corresponding to a login user from access equipment, and returning the found digital certificate to the login user, wherein digital certificates of each user are pre-stored in the access equipment; receiving a cryptographic operation request submitted by the login user by using the access equipment; and executing corresponding cryptographic operation according to the cryptographic operation request, and returning an operation result to the login user by using the access equipment. The invention also discloses a digital-certificate-based cryptographic operation device. The access equipment is used for storing and managing the digital certificates of the users in a centralized way, and the certificates can be updated in batches, so that the problem of insufficient storage capacity of a universal serial bus (USB) Key is solved. The users can be authenticated based on the digital certificates only by inputting personal identification numbers (PINs), so that user experiences are improved. The development of the USB Key is avoided, and the cryptographic operation is finished by the access equipment, so that the resources of user terminals are saved, and the running efficiency of the user terminals is improved.

Description

Cryptographic algorithm method and device based on digital certificate
Technical field
The present invention relates to the digital certificate technique field, relate in particular to a kind of cryptographic algorithm method based on digital certificate and a kind of cryptographic algorithm device based on digital certificate.
Background technology
Along with progressively going deep into that the Internet and operation system are used, the e-commerce system technology makes the client of shopping on the net can extremely facilitate the information that obtains like a cork businessman and enterprise, but has also increased some responsive or valuable data are abused risk simultaneously.How to avert risks, strengthen the internet safe problem and seem particularly important.PKI(Public Key Infrastructure, PKIX), it is a kind of key management platform of following set standard, it can use cryptographic service and necessary key and the certificate management systems such as encryption and digital signature are provided for all-network, effectively guarantees user's identity security and data security.Yet digital certificate shows as in fact a data file with user profile and key, how to protect digital certificate itself to become again the weakest link in the PKI system, and general way is to adopt USB Key to preserve digital certificate and private key for user at present.Each USB Key is with PIN(Personal Identification Number, individual recognition code) the code protection, the hardware of USB Key and PIN code have consisted of two the necessary factors, i.e. two-factor authentication can using certificate like this.
USB Key is a kind of hardware device of USB interface, and main body is a safety chip, and private key and digital certificate store are in this safety chip hardware unit.And safety chip possesses computing capability, support to generate key to calculation tasks such as, digital signature and encryption and decryption.The advantage of USB Key is that the operating system on personal computer can't be known PKI certificate, key peer-to-peer information.But the memory capacity of USB Key safety chip is very limited, usually only has 32KB, has limited USB Key as general solution.In addition, driving although USB Key need not to install, is hardware device after all, the CSP program that can't use Windows to carry.Therefore the manufacturer of USB Key need to develop and provide can this hardware device of management and using the CSP program, and the user need install this CSP program and could use USB Key.Therefore, increase the development cost of manufacturer, affected user's experience.In addition, cryptographic algorithm need to be carried out in USB Key, has consumed the resource of user terminal.
Summary of the invention
Based on this, the invention provides a kind of cryptographic algorithm method based on digital certificate and a kind of cryptographic algorithm device based on digital certificate.
A kind of cryptographic algorithm method based on digital certificate comprises the following steps:
The inquiry digital certificate corresponding with login user, be back to described login user with the described digital certificate that inquires in access device; Wherein, prestore each user's digital certificate in described access device;
Described access device receives the cryptographic algorithm request that described login user is submitted to;
Described access device is carried out corresponding cryptographic algorithm according to described cryptographic algorithm request, and operating result is back to described login user.
Compare with general technology, the cryptographic algorithm method that the present invention is based on digital certificate adopts access device centralized stores and leading subscriber digital certificate, can the batch updating certificate, and the problem that does not exist certificate to lose has overcome the problem of USB Key lack of memory capacity.The user does not need to insert USB Key, and only need input PIN code just can realize the authentication based on digital certificate, has promoted user's experience.The present invention has avoided the exploitation of USB Key, and cryptographic algorithm is completed by access device, has saved the resource of user terminal, improves the user terminal operational efficiency.
Therein in a kind of embodiment, described access device carries out batch updating to each user's of prestoring digital certificate.
Therein in a kind of embodiment, before the step of the inquiry digital certificate corresponding with login user, comprise the following steps in access device described:
Described access device carries out authentication to described login user.
Therein in a kind of embodiment, before the step of the inquiry digital certificate corresponding with login user, comprise the following steps in access device described:
Described access device prestores to digital certificate, the private key of distributing to respectively each user and the identifying code that is used for PIN code is verified; Wherein, described digital certificate, described private key and described identifying code are corresponding one by one.
In a kind of embodiment, described access device is carried out the step of corresponding cryptographic algorithm according to described cryptographic algorithm request, comprise the following steps therein:
If described cryptographic algorithm request does not need private key, described access device is carried out corresponding cryptographic algorithm;
If described cryptographic algorithm request needs private key, described access device is verified the PIN code of login user input according to described identifying code, calls described private key after being verified and carries out corresponding cryptographic algorithm.
In a kind of embodiment, the step that described access device is verified the PIN code of login user input according to described identifying code comprises the following steps therein:
Described access device receives the PIN code of described login user input;
Described access device carries out computing according to default operation method to the described PIN code that receives;
If above-mentioned operation result is consistent with described identifying code, be verified.
In a kind of embodiment, described access device receives the step of the cryptographic algorithm request of described login user submission, comprises the following steps therein:
Described login user is submitted the cryptographic algorithm request to by IE;
IE is sent to described cryptographic algorithm request by CryptoAPI the CSP of user side;
Described CSP is sent to described access device with described cryptographic algorithm request;
Described access device receives described cryptographic algorithm request;
Described access device is back to operating result the step of described login user, comprises the following steps:
Described access device is sent to described operating result the CSP of user side;
Described CSP is sent to IE by CryptoAPI with described operating result.
In a kind of embodiment, described cryptographic algorithm request comprises the operation requests of signature, checking, encryption and/or deciphering therein.
A kind of cryptographic algorithm device based on digital certificate comprises enquiry module, receiver module and Executive Module;
Described enquiry module is used at the access device inquiry digital certificate corresponding with login user, the described digital certificate that inquires being back to described login user; Wherein, prestore each user's digital certificate in described access device;
Described receiver module is used for receiving the cryptographic algorithm request that described login user is submitted on described access device;
Described Executive Module is used for carrying out corresponding cryptographic algorithm according to described cryptographic algorithm request on described access device, and operating result is back to described login user.
Compare with general technology, the cryptographic algorithm device that the present invention is based on digital certificate adopts access device centralized stores and leading subscriber digital certificate, can the batch updating certificate, and the problem that does not exist certificate to lose has overcome the problem of USB Key lack of memory capacity.The user does not need to insert USB Key, and only need input PIN code just can realize the authentication based on digital certificate, has promoted user's experience.The present invention has avoided the exploitation of USB Key, and cryptographic algorithm is completed by access device, has saved the resource of user terminal, improves the user terminal operational efficiency.
Therein in a kind of embodiment, the cryptographic algorithm device that the present invention is based on digital certificate also comprises pre-storing module, and described pre-storing module prestores to digital certificate, the private key of distributing to respectively each user and the identifying code that is used for PIN code is verified on described access device; Wherein, described digital certificate, described private key and described identifying code are corresponding one by one.
Description of drawings
Fig. 1 is the schematic flow sheet that the present invention is based on the cryptographic algorithm method of digital certificate;
Fig. 2 the present invention is based on the system schematic of the cryptographic algorithm method of digital certificate for enforcement;
Fig. 3 is the schematic flow sheet that the present invention is based on a preferred embodiment of cryptographic algorithm method of digital certificate;
Fig. 4 is the structural representation that the present invention is based on the cryptographic algorithm device of digital certificate.
Embodiment
For further setting forth the technological means that the present invention takes and the effect that obtains, below in conjunction with accompanying drawing and preferred embodiment, to technical scheme of the present invention, know and complete description.
See also Fig. 1, be the schematic flow sheet of the cryptographic algorithm method that the present invention is based on digital certificate.The present invention is based on the cryptographic algorithm method of digital certificate, comprise the following steps:
S101 inquires about the digital certificate corresponding with login user in access device, the described digital certificate that inquires is back to described login user; Wherein, prestore each user's digital certificate in described access device;
The described access device of S102 receives the cryptographic algorithm request that described login user is submitted to;
The described access device of S103 is carried out corresponding cryptographic algorithm according to described cryptographic algorithm request, and operating result is back to described login user.
In step S101, digital certificate of each user assignment, a private key and a PIN code in local area network, wherein, described digital certificate, described private key and described PIN code are corresponding one by one.All users' digital certificate and private key all centralized stores in access device, also have the identifying code that PIN code is verified in access device.The user only need to preserve PIN code, and the cryptographic algorithms such as certificate management and signature, checking, encryption, deciphering are completed by access device.The user can pass through virtual CSP(Cryptographic Service Provider, CSP) interface, by TCP/IP, certificate operation, cryptographic algorithm are sent to access device and carry out.
In a kind of embodiment, inquire about the digital certificate corresponding with login user in access device before, described access device prestores to digital certificate, the private key of distributing to respectively each user and the identifying code that is used for PIN code is verified therein; Wherein, described digital certificate, described private key and described identifying code are corresponding one by one.
Therein in a kind of embodiment, described access device carries out batch updating to each user's of prestoring digital certificate.With after digital certificate and described identifying code centralized stores are in an access device, can carry out batch updating described to each user's of storing in described access device digital certificate, can in time store like this user's latest digital certificate, improve fail safe.And the mode of batch updating has also reduced the processing complexity, and efficient is higher.
Client can adopt virtual CSP to replace the built-in CSP program of Windows.The CryptoAPI (being Cryptography API, CryptoAPI) that adopts Microsoft to provide between virtual CSP and IE, IE does not need to make any modification like this, and what get final product safety calls virtual CSP by CryptoAPI.Set up escape way between virtual CSP and access device, all cryptographic algorithms are sent to access device by virtual CSP and complete.
Can establish in advance escape way between virtual CSP and access device.IE will enumerate virtual CSP by cryptographic application programming interface (being CryptoAPI) function, and communicate by letter with virtual CSP by encryption system DLL (dynamic link library) (being CryptoAPI).
As one of them preferred embodiment, see also Fig. 2, the present invention is based on the system schematic of the cryptographic algorithm method of digital certificate for enforcement.Access device is divided into three modules: certificate management, cryptography are calculated and network management module.The identifying code that the certificate management module is taken care of all users' of local area network (LAN) digital certificate, private key and is used for PIN code is verified.The cryptography computing module is completed the operations such as signature, checking, encryption and decryption.Network management module is realized the function of interconnection network.In practical application, access device can be based on exploitations such as router, gateways.
See also Fig. 3, be the schematic flow sheet of the preferred embodiment of cryptographic algorithm method that the present invention is based on digital certificate.
In a kind of embodiment, inquire about the digital certificate corresponding with login user in access device before, described access device carries out authentication to described login user therein.
Can adopt the mode of Portal authentication that user's identity is verified, when strengthening fail safe, reduce unnecessary processing operation (as in the situation that query steps etc. is carried out in the no user login).
Subscriber authentication can adopt following steps to carry out: virtual CSP and access device carry out identity and differentiate, verify mutually the other side's identity, if be verified, the access device user bound is used for identifying code, digital certificate and private key that PIN code is verified, and returns to user certificate.Concrete identification method can adopt Portal authentication etc.
In a kind of embodiment, in step S102, described access device receives the step of the cryptographic algorithm request of described login user submission, comprises the following steps therein:
Described login user is submitted the cryptographic algorithm request to by IE;
IE is sent to described cryptographic algorithm request by CryptoAPI the CSP of user side;
Described CSP is sent to described access device with described cryptographic algorithm request;
Described access device receives described cryptographic algorithm request;
In a kind of embodiment, described cryptographic algorithm request comprises the operation requests of signature, checking, encryption and/or deciphering therein.After reading this patent, described cryptographic algorithm request can also be other type for those of ordinary skills.
In step S102, the user submits the cryptographic algorithms such as signature, checking, encryption, deciphering on IE; IE by CryptoAPI to virtual CSP solicit operation; If the cryptographic algorithm request does not need user's private key, virtual CSP sends the cryptographic algorithm request to access device; Otherwise virtual CSP checks whether the user inputted PIN code, if input and PIN code correct, the request of transmission cryptographic algorithm is to access device, otherwise, require the user to input PIN code; The user inputs PIN code, and virtual CSP sends to access device with PIN code and cryptographic algorithm.
In a kind of embodiment, in step S103, if described cryptographic algorithm request does not need private key, described access device is carried out corresponding cryptographic algorithm therein; If described cryptographic algorithm request needs private key, described access device is verified the PIN code of login user input according to described identifying code, calls described private key after being verified and carries out corresponding cryptographic algorithm.
In a kind of embodiment, described access device receives the PIN code of described login user input therein; Described access device carries out computing according to default operation method to the described PIN code that receives; If above-mentioned operation result is consistent with described identifying code, be verified.
For example, if the cryptographic algorithm request does not need user's private key, can send the cryptographic algorithm request to access device by virtual CSP, access device is carried out cryptographic algorithm, and result is returned to virtual CSP.Then by virtual CSP, operating result is returned to IE, IE is shown to the user with operating result.
In step S103, described access device is back to operating result the step of described login user, comprises the following steps:
Described access device is sent to described operating result the CSP of user side;
Described CSP is sent to IE by CryptoAPI with described operating result.
After described access device returns to the user with operating result, described access device receives that the user sends publish request after, remove the binding between the described digital certificate of this user, described private key and described identifying code for PIN code is verified.
The process that the user publishes can comprise: the user clicks the button of publishing of Portal authentication website; IE unloads certificate by CryptoAPI to virtual CSP request; The local certificate of virtual CSP deletion, and send the unbind request to access device; After access device was received request, the corresponding relation of de-authentication code and private key for user sent response to virtual CSP; After virtual CSP receives response, return to IE, the user publishes successfully.
Compare with general technology, the cryptographic algorithm method that the present invention is based on digital certificate adopts access device centralized stores and leading subscriber digital certificate, can the batch updating certificate, and the problem that does not exist certificate to lose has overcome the problem of USB Key lack of memory capacity.The user does not need to insert USB Key, and only need input PIN code just can realize the authentication based on digital certificate, has promoted user's experience.The present invention has avoided the exploitation of USB Key, and cryptographic algorithm is completed by access device, has saved the resource of user terminal, improves the user terminal operational efficiency.
Certificate of each user assignment and a PIN code in local area network, certificate and PIN code are corresponding one by one, all users' certificate and corresponding PIN code all centralized stores in an access device.The user only need to preserve PIN code, and the cryptographic algorithms such as certificate management and signature, checking, encryption, deciphering are completed by access device.The user can pass through virtual CSP(CSP) interface, by TCP/IP, certificate operation, cryptographic algorithm are sent to access device and carry out.
At some specific areas, as bank, government bodies etc., user number is fewer, and use also more fixing, can adopt the mode of a kind of certificate centralized stores and use, both can realize safe, the difficult advantage of losing of USB Key, can solve again USB Key lack of memory capacity problem, and can improve the user and experience, reduce development cost.The present invention transfers to service end (being access device) with cryptographic algorithm under the condition that does not change user's experience, the application program of user side need not transformed.
See also Fig. 4, be the structural representation of the cryptographic algorithm device that the present invention is based on digital certificate.The present invention is based on the cryptographic algorithm device of digital certificate, comprise enquiry module 401, receiver module 402 and Executive Module 403;
Described enquiry module 401 is used at the access device inquiry digital certificate corresponding with login user, the described digital certificate that inquires being back to described login user; Wherein, prestore each user's digital certificate in described access device;
Described receiver module 402 is used for receiving the cryptographic algorithm request that described login user is submitted on described access device;
Described Executive Module 403 is used for carrying out corresponding cryptographic algorithm according to described cryptographic algorithm request on described access device, and operating result is back to described login user.
In embodiment, the cryptographic algorithm device that the present invention is based on digital certificate also comprises update module therein, and described update module is used on described access device each user's who prestores digital certificate is carried out batch updating.
Therein in embodiment, the cryptographic algorithm device that the present invention is based on digital certificate also comprises authentication module, inquire about the digital certificate corresponding with login user in access device before, described authentication module is used on described access device, described login user being carried out authentication.
Therein in embodiment, the cryptographic algorithm device that the present invention is based on digital certificate also comprises pre-storing module, inquire about the digital certificate corresponding with login user in access device before, described pre-storing module prestores to digital certificate, the private key of distributing to respectively each user and the identifying code that is used for PIN code is verified on described access device; Wherein, described digital certificate, described private key and described identifying code are corresponding one by one.
In embodiment, if the described cryptographic algorithm request that described receiver module 402 receives does not need private key, described Executive Module 403 is carried out corresponding cryptographic algorithm on described access device therein;
If the described cryptographic algorithm request that described receiver module 402 receives needs private key, described Executive Module 403 is verified the PIN code of login user input according to described identifying code on described access device, calls described private key after being verified and carries out corresponding cryptographic algorithm.
In embodiment, the cryptographic algorithm device that the present invention is based on digital certificate also comprises the PIN code authentication module therein, and described PIN code authentication module is used for receiving the PIN code of described login user input on described access device; And according to default operation method, the described PIN code that receives is carried out computing on described access device; If above-mentioned operation result is consistent with described identifying code, described PIN code authentication module is by this PIN code checking.
Therein in embodiment:
Described login user is submitted the cryptographic algorithm request to by IE;
IE is sent to described cryptographic algorithm request by CryptoAPI the CSP of user side;
Described CSP is sent to described access device with described cryptographic algorithm request;
Described receiver module 402 receives described cryptographic algorithm request on described access device;
The cryptographic algorithm device that the present invention is based on digital certificate also comprises sending module, and described sending module is used on described access device, described operating result being sent to the CSP of user side;
Described CSP is sent to IE by CryptoAPI with described operating result.
Therein in embodiment, described cryptographic algorithm request can comprise signature, checking, encrypt and/or the operation requests of deciphering.
Compare with general technology, the cryptographic algorithm device that the present invention is based on digital certificate adopts access device centralized stores and leading subscriber digital certificate, can the batch updating certificate, and the problem that does not exist certificate to lose has overcome the problem of USB Key lack of memory capacity.The user does not need to insert USB Key, and only need input PIN code just can realize the authentication based on digital certificate, has promoted user's experience.The present invention has avoided the exploitation of USB Key, and cryptographic algorithm is completed by access device, has saved the resource of user terminal, improves the user terminal operational efficiency.
The present invention transfers to service end (being access device) with cryptographic algorithm under the condition that does not change user's operation complexity, the application program of user side need not transformed.
The above embodiment has only expressed several execution mode of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the scope of the claims of the present invention.Should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.

Claims (10)

1. the cryptographic algorithm method based on digital certificate, is characterized in that, comprises the following steps:
The inquiry digital certificate corresponding with login user, be back to described login user with the described digital certificate that inquires in access device; Wherein, prestore each user's digital certificate in described access device;
Described access device receives the cryptographic algorithm request that described login user is submitted to;
Described access device is carried out corresponding cryptographic algorithm according to described cryptographic algorithm request, and operating result is back to described login user.
2. the cryptographic algorithm method based on digital certificate according to claim 1, is characterized in that, described access device carries out batch updating to each user's of prestoring digital certificate.
3. the cryptographic algorithm method based on digital certificate according to claim 1, is characterized in that, before the step of the inquiry digital certificate corresponding with login user, comprises the following steps in access device described:
Described access device carries out authentication to described login user.
4. the cryptographic algorithm method based on digital certificate according to claim 1, is characterized in that, before the step of the inquiry digital certificate corresponding with login user, comprises the following steps in access device described:
Described access device prestores to digital certificate, the private key of distributing to respectively each user and the identifying code that is used for PIN code is verified; Wherein, described digital certificate, described private key and described identifying code are corresponding one by one.
5. the cryptographic algorithm method based on digital certificate according to claim 4, is characterized in that, described access device is carried out the step of corresponding cryptographic algorithm according to described cryptographic algorithm request, comprise the following steps:
If described cryptographic algorithm request does not need private key, described access device is carried out corresponding cryptographic algorithm;
If described cryptographic algorithm request needs private key, described access device is verified the PIN code of login user input according to described identifying code, calls described private key after being verified and carries out corresponding cryptographic algorithm.
6. the cryptographic algorithm method based on digital certificate according to claim 5, is characterized in that, the step that described access device is verified the PIN code of login user input according to described identifying code comprises the following steps:
Described access device receives the PIN code of described login user input;
Described access device carries out computing according to default operation method to the described PIN code that receives;
If above-mentioned operation result is consistent with described identifying code, be verified.
7. the cryptographic algorithm method based on digital certificate according to claim 1, is characterized in that, described access device receives the step of the cryptographic algorithm request of described login user submission, comprises the following steps:
Described login user is submitted the cryptographic algorithm request to by IE;
IE is sent to described cryptographic algorithm request by CryptoAPI the CSP of user side;
Described CSP is sent to described access device with described cryptographic algorithm request;
Described access device receives described cryptographic algorithm request;
Described access device is back to operating result the step of described login user, comprises the following steps:
Described access device is sent to described operating result the CSP of user side;
Described CSP is sent to IE by CryptoAPI with described operating result.
8. the described cryptographic algorithm method based on digital certificate of any one according to claim 1 to 7, is characterized in that, described cryptographic algorithm request comprises the operation requests of signature, checking, encryption and/or deciphering.
9. the cryptographic algorithm device based on digital certificate, is characterized in that, comprises enquiry module, receiver module and Executive Module;
Described enquiry module is used at the access device inquiry digital certificate corresponding with login user, the described digital certificate that inquires being back to described login user; Wherein, prestore each user's digital certificate in described access device;
Described receiver module is used for receiving the cryptographic algorithm request that described login user is submitted on described access device;
Described Executive Module is used for carrying out corresponding cryptographic algorithm according to described cryptographic algorithm request on described access device, and operating result is back to described login user.
10. the cryptographic algorithm device based on digital certificate according to claim 9, it is characterized in that, also comprise pre-storing module, described pre-storing module prestores to digital certificate, the private key of distributing to respectively each user and the identifying code that is used for PIN code is verified on described access device; Wherein, described digital certificate, described private key and described identifying code are corresponding one by one.
CN201310072095.3A 2013-03-06 2013-03-06 Cryptographic algorithm method and device based on digital certificate Active CN103152344B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310072095.3A CN103152344B (en) 2013-03-06 2013-03-06 Cryptographic algorithm method and device based on digital certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310072095.3A CN103152344B (en) 2013-03-06 2013-03-06 Cryptographic algorithm method and device based on digital certificate

Publications (2)

Publication Number Publication Date
CN103152344A true CN103152344A (en) 2013-06-12
CN103152344B CN103152344B (en) 2016-07-06

Family

ID=48550206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310072095.3A Active CN103152344B (en) 2013-03-06 2013-03-06 Cryptographic algorithm method and device based on digital certificate

Country Status (1)

Country Link
CN (1) CN103152344B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368746A (en) * 2013-07-24 2013-10-23 飞天诚信科技股份有限公司 A kind of endorsement method
CN104468116A (en) * 2014-11-06 2015-03-25 飞天诚信科技股份有限公司 Method for achieving multi-application of intelligent secret key equipment
CN108200055A (en) * 2017-12-29 2018-06-22 深圳市安佳威视信息技术有限公司 A kind of software approach of embedded product intellectual property protection
CN110704834A (en) * 2019-10-17 2020-01-17 淮北师范大学 Digital certificate authentication method using cryptography

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1838141A (en) * 2006-02-05 2006-09-27 刘亚威 Technology for improving security of accessing computer application system by mobile phone

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1838141A (en) * 2006-02-05 2006-09-27 刘亚威 Technology for improving security of accessing computer application system by mobile phone

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368746A (en) * 2013-07-24 2013-10-23 飞天诚信科技股份有限公司 A kind of endorsement method
CN103368746B (en) * 2013-07-24 2016-02-24 飞天诚信科技股份有限公司 A kind of endorsement method
CN104468116A (en) * 2014-11-06 2015-03-25 飞天诚信科技股份有限公司 Method for achieving multi-application of intelligent secret key equipment
CN104468116B (en) * 2014-11-06 2017-10-31 飞天诚信科技股份有限公司 It is a kind of to realize the method applied intelligent cipher key equipment more
CN108200055A (en) * 2017-12-29 2018-06-22 深圳市安佳威视信息技术有限公司 A kind of software approach of embedded product intellectual property protection
CN108200055B (en) * 2017-12-29 2020-10-27 深圳市安佳威视信息技术有限公司 Software method for protecting intellectual property of embedded product
CN110704834A (en) * 2019-10-17 2020-01-17 淮北师范大学 Digital certificate authentication method using cryptography

Also Published As

Publication number Publication date
CN103152344B (en) 2016-07-06

Similar Documents

Publication Publication Date Title
KR101904177B1 (en) Data processing method and apparatus
US9787659B2 (en) Techniques for secure access management in virtual environments
US8532620B2 (en) Trusted mobile device based security
US20170270285A1 (en) Security system for verification of user credentials
US20210014061A1 (en) Identity proofing offering for customers and non-customers
US20180060559A1 (en) Disposition engine for single sign on (sso) requests
US11849044B2 (en) Local device authentication system
CN102315945A (en) Unified identity authentication method based on private agreement
KR101744747B1 (en) Mobile terminal, terminal and method for authentication using security cookie
CN103944890A (en) Virtual interaction system and method based on client/server mode
CN113347206A (en) Network access method and device
CN101562621A (en) User authorization method and system and device thereof
HUE030543T2 (en) Mobile handset identification and communication authentication
US10678906B1 (en) Multi-service and multi-protocol credential provider
US11102204B1 (en) Agreement and enforcement of rules for a shared resource
CN107819766B (en) Security authentication method, system and computer readable storage medium
CN103152344A (en) Digital-certificate-based cryptographic operation method and device
EP2926527B1 (en) Virtual smartcard authentication
EP3172884B1 (en) Establishing secure computing devices for virtualization and administration
US10666644B2 (en) Enterprise key and password management system
CN106936760A (en) A kind of apparatus and method of login Openstack cloud system virtual machines
Urien Cloud of secure elements perspectives for mobile and cloud applications security
Moghaddam et al. Applying a single sign-on algorithm based on cloud computing concepts for SaaS applications
EP3289724B1 (en) A first entity, a second entity, an intermediate node, methods for setting up a secure session between a first and second entity, and computer program products
CN104243488A (en) Login authentication method of cross-website server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: 528200 science and technology road, Nanhai Software Science Park, Nanhai Town, Nanhai District, Foshan, Guangdong

Patentee after: Age of security Polytron Technologies Inc

Address before: 528200 science and technology road, Nanhai Software Science Park, Nanhai Town, Nanhai District, Foshan, Guangdong

Patentee before: Guangdong Certificate Authority Center Co., Ltd.