CN105812388B - A kind of management method and system of user certificate and private key - Google Patents

A kind of management method and system of user certificate and private key Download PDF

Info

Publication number
CN105812388B
CN105812388B CN201610320149.7A CN201610320149A CN105812388B CN 105812388 B CN105812388 B CN 105812388B CN 201610320149 A CN201610320149 A CN 201610320149A CN 105812388 B CN105812388 B CN 105812388B
Authority
CN
China
Prior art keywords
user
private key
data
certificate
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610320149.7A
Other languages
Chinese (zh)
Other versions
CN105812388A (en
Inventor
谭智勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN201610320149.7A priority Critical patent/CN105812388B/en
Publication of CN105812388A publication Critical patent/CN105812388A/en
Application granted granted Critical
Publication of CN105812388B publication Critical patent/CN105812388B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides the management method and system of a kind of user certificate and private key, and method includes: when getting using certificate request information after the first public key encryption: generating and simultaneously sends the first random coded to user;Obtain certificate request information, user's unique index mark and first random coded that user sends;Judge to identify in database with the presence or absence of user's unique index, checks successful information for characterizing user's unique index mark if not, sending to user;Second level private key data, first random coded and the second public key that user sends are obtained, the second level private key data is after symmetric key encryption, corresponding with second public key private key data;The certificate request information, user's unique index mark, the second public key and second level private key data are written in copending integer request list.It is effectively guaranteed the safety of private key for user data through the above scheme.

Description

A kind of management method and system of user certificate and private key
Technical field
The present invention relates to digital certificate technique fields, and in particular to a kind of suitable for cloud computing and lucidification disposal isotype The management method and system of server-side user certificate and private key.
Background technique
With the development of the science and technology such as computer technology, network technology, virtual computing technology, traditional form of calculation hair Huge change is given birth to.It is gradually risen with mobile phone, personal plate etc. for the mobile computing and mobile network's terminal of representative, cloud computing Great development has also been obtained with lucidification disposal.How the information of in cloud computing and lucidification disposal isotype FTP client FTP is ensured Safely, the problem of becoming information technology field urgent need to resolve.
Public Key Infrastructure (public key infrastructure, hereinafter referred to as PKI) system is that current industry compares Generally acknowledged guarantee open network environment lower network and information system security is feasible and effective measures.The system utilizes public and private key Cryptographic algorithm principle and technology are realized and provide the security service with versatility.Due to moulds such as cloud computing or lucidification disposals Client is not perhaps locally stored ability or ability is not locally stored reliably in formula, therefore user certificate is locally stored Book and private key safety are problematic in that.And due to the particularity of mobile terminal device interface, common USB-KEY is (a kind of The hardware device of USB interface) being directly accessed equipment, there is also biggish obstacles, so directly applying traditional PKI deployment scheme There can be certain implementation barrier.
Summary of the invention
In view of this, the embodiment of the present invention provides the management method and system of a kind of user certificate and private key, to solve this The safety issue of ground storage user certificate and private key.
To achieve the above object, the embodiment of the present invention provides the following technical solutions:
A kind of management method of user certificate and private key, comprising:
Obtain the solicited message that user sends;
When the solicited message is using certificate request information after the first public key encryption:
It generates and sends one group of first random coded after the first private key encryption, first public key and first to user Private key is one group of public private key pair;
Obtain user sends, certificate request information after first public key encryption, user's unique index mark and First random coded;
Judge to identify in database with the presence or absence of user's unique index, if so, exporting to user through described first Information after private key encryption, that failure is checked for characterizing user's unique index mark;Otherwise it sends to user through described first It is after private key encryption, check successful information for characterizing user's unique index mark;
Obtain user sends, second level private key data after first public key encryption, first random coded with And second public key, the second level private key data are after symmetric key encryption, corresponding with second public key private key data;
The certificate request information, user's unique index mark, the second public key and the write-in of second level private key data is copending Integer request list in.
Preferably, in the management method of above-mentioned user certificate and private key, further includes:
Obtain the certificate and private key data request information through the first public key encryption that user sends;
It generates and sends one group of second random coded after the first private key encryption to user;
Obtain user's unique index mark that user sends, after first public key encryption and the second random coded;
Judge to identify in database with the presence or absence of user's unique index, if so, will be through first private key encryption Afterwards, corresponding with user's unique index mark certificate data, second level private key data and second random coded send To user;If not, sending information after the first private key encryption, for characterizing request operation failure to user.
Preferably, in the management method of above-mentioned user certificate and private key, by it is after first private key encryption, with it is described User's unique index identifies corresponding certificate data, second level private key data and second random coded and is sent to after user, Further include:
Judge whether to get in preset time period user's transmission, get through first private key for characterizing user Certificate data encrypted, corresponding with user's unique index mark, second level private key data and second random coded Information, if not, again to user send it is after first private key encryption, corresponding with user's unique index mark Certificate data, second level private key data and second random coded.
Preferably, in the management method of above-mentioned user certificate and private key, by it is after first private key encryption, with it is described User's unique index identifies corresponding certificate data, second level private key data and second random coded and is sent to after user, Further include:
Judge whether that the requirement for getting user's transmission carries out the information of certificate and private key data encryption key modification, if It is to continue to execute;
It generates and sends one group of third random coded after the first private key encryption to user;
It obtains user's unique index mark that user sends, after first public key encryption and second level third is compiled at random Code, the second level random coded are to carry out encrypted third to the third random coded using the private key data to compile at random Code;
Using the first private key to it is described after first public key encryption user's unique index mark and second level third with Machine coding is decrypted;
User's integer corresponding with user's unique index mark and private key ciphertext are judged whether there is, if so, adopting The second level third random coded is decrypted with second public key, random plaintext is obtained, judges that the random plaintext is It is no consistent with the third random coded, if unanimously, to user send for characterize it is after the first private key encryption, be used for table It takes over family private key data encryption key modification application information for use and verifies successful message;If there is no with user's unique index It identifies corresponding user's integer and private key ciphertext or whether the random plaintext is inconsistent with the third random coded, to user Send information after the first private key encryption, for characterizing request operation failure;
It obtains user sends, new second level private key data after first public key encryption and the third is compiled at random Code, the new second level private key data are that user encrypts private key data using modified symmetric key in plain text, The private key data is that user is decrypted second level private key data using former symmetric key in plain text;
The second level private key data is updated using the new second level private key data.
Preferably, in the management method of above-mentioned user certificate and private key, user's unique index is identified as characterizing Data information user information, with uniqueness.
A kind of management system of user certificate and private key, comprising:
Acquisition unit, for obtaining the data information of user's transmission;
Information transmitting unit, for sending data information to user;
First data processing unit, for the certificate request after acquisition unit is got using the first public key encryption When information, generates and one group of first random coded after the first private key encryption, institute are sent to user by information transmitting unit It states the first public key and the first private key is one group of public private key pair;
Second data processing unit is asked for getting the certificate after first public key encryption when the acquisition unit When asking information, user's unique index mark and first random coded, judge unique with the presence or absence of the user in database Index mark, if so, by the information transmitting unit to user output after first private key encryption, for characterizing User's unique index mark checks the information of failure;Otherwise, it is sent to user through described first by the information transmitting unit It is after private key encryption, check successful information for characterizing user's unique index mark;
Third data processing unit, for getting the private of the second level after first public key encryption when the acquisition unit When key data, first random coded and the second public key, by the certificate request information, user's unique index mark, the Two public keys and second level private key data are written in copending integer request list, wherein the second level private key data is through symmetrical Key is encrypted, private key data corresponding with second public key.
Preferably, in the management system of above-mentioned user certificate and private key, first data processing unit is also used to:
When the acquisition unit get using after the first public key encryption user certificate and private key data obtain agreement when, It generates and one group of second random coded after the first private key encryption is sent to user by the information transmitting unit;
The management system of the user certificate and private key, further includes:
4th data processing unit, when the acquisition unit gets the unique rope of user after first public key encryption When tendering is known with the second random coded, judge to identify in database with the presence or absence of user's unique index, if so, passing through institute State information transmitting unit by certificate data after first private key encryption, corresponding with user's unique index mark, Second level private key data and second random coded are sent to user;If not, being sent out by the information transmitting unit to user Information after the first private key encryption of the warp let-off, for characterizing request operation failure.
Preferably, in the management system of above-mentioned user certificate and private key, further includes:
Judging unit, for that will be added through first private key when the 4th data processing unit by the information transmitting unit Certificate data after close, corresponding with user's unique index mark, second level private key data and second random coded hair After giving user, judge the acquisition unit whether get within a preset period of time user's transmission, obtain for characterizing user Get certificate data after first private key encryption, corresponding with user's unique index mark, second level private key data With the information of second random coded, sent if not, controlling the 4th data processing unit again by the information Unit is by certificate data after first private key encryption, corresponding with user's unique index mark, second level private key number User is sent to according to second random coded.
Preferably, in the management system of above-mentioned user certificate and private key, first data processing unit is also used to:
When the 4th data processing unit by the information transmitting unit by it is after first private key encryption, with it is described After the corresponding certificate data of user's unique index mark, second level private key data and second random coded are sent to user, and When the acquisition unit gets the information for requiring to carry out the modification of certificate and private key data encryption key, generates and pass through the information Transmission unit sends one group of third random coded after the first private key encryption to user;
The management system of the user certificate and private key, further includes:
5th data processing unit, for getting the user after first public key encryption only when the acquisition unit One index mark and second level third random coded after, using the first private key to the user after first public key encryption only One index mark and second level third random coded are decrypted;It judges whether there is corresponding with user's unique index mark User's integer and private key ciphertext are obtained if so, the second level third random coded is decrypted using second public key Whether consistent with the third random coded random plaintext, judge the random plaintext, if unanimously, sent by the information Unit to user send for characterize it is after the first private key encryption, for characterize private key for user data encryption key modification apply The successful message of information checking;If there is no user's integer corresponding with user's unique index mark and private key ciphertext or Whether the random plaintext is inconsistent with the third random coded, is sent to user through first by the information transmitting unit Information after private key encryption, for characterizing request operation failure;Wherein, the second level random coded is to use the private key number Encrypted third random coded is carried out according to the third random coded;
6th data processing unit, for getting the new second level after first public key encryption when the acquisition unit After private key data and the third random coded, the second level private key data is updated using the new second level private key data, wherein The new second level private key data is that user encrypts private key data using modified symmetric key in plain text, described Private key data is that user is decrypted second level private key data using former symmetric key in plain text.
Preferably, in the management system of above-mentioned user certificate and private key, user's unique index is identified as characterizing Data information user information, with uniqueness.
It based on the above-mentioned technical proposal, can by the management method and system of user certificate provided in an embodiment of the present invention and private key See, disclosed in the embodiment of the present application in scheme, the second level private key data is stored in server-side.The generation of symmetric key, two The decryption of grade private key data and the specific place that uses carry out in user terminal, and user, which possesses, is decrypted second level private key data Symmetric key can be decrypted and use to the second level private key data.Only have user itself that could obtain and use in this way The safety of private key for user data has been effectively ensured in the private key data of oneself.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is the flow chart of the management method of a kind of user certificate disclosed in the embodiment of the present application and private key;
Fig. 2 is the flow chart of the management method of a kind of user certificate disclosed in another embodiment of the application and private key;
Fig. 3 is the flow chart of the management method of a kind of user certificate disclosed in another embodiment of the application and private key;
Fig. 4 is the flow chart of the management method of a kind of user certificate disclosed in another embodiment of the application and private key;
Fig. 5 is a kind of flow chart of user certificate application protocol embodiment corresponding with Fig. 1 disclosed in the embodiment of the present application;
Fig. 6 is a kind of stream of private key for user data acquisition protocols embodiment corresponding with Fig. 2 disclosed in the embodiment of the present application Cheng Tu;
Fig. 7 is that a kind of private key for user data encryption key modification agreement corresponding with Fig. 4 disclosed in the embodiment of the present application is real Apply the flow chart of example;
Fig. 8 is the structural schematic diagram of the management system of a kind of user certificate disclosed in the embodiment of the present application and private key;
Fig. 9 is the structural schematic diagram of the management system of a kind of user certificate disclosed in another embodiment of the application and private key.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The purpose of the present invention is to provide a kind of user certificates and private key suitable for cloud computing and Transparent Calculation Model Management method.Another object of the present invention is to provide a kind of users suitable for cloud computing and the safety of Transparent Calculation Model Certificate request agreement, user certificate and private key data obtain agreement.The management method of user certificate and private key provided by the invention The characteristics of be that server-side is stored in after private key for user data encryption (second level private key data), but the generation of private key data, decryption With use then at client (user terminal).
The embodiment of the present application discloses the management method of a kind of user certificate and private key, and this method is applied to RA server In, referring to Fig. 1 to Fig. 4, detailed process may include:
Step S101: the solicited message that user sends is obtained;
Step S102: judge the information type of the solicited message;When the solicited message is using the first public key encryption When rear certificate request information, step S103 is executed, the user after user request information is using the first public key encryption When certificate and private key data obtain agreement, step S201 is executed, after the user request information is using the first public key encryption Requirement carry out the modification of certificate and private key data encryption key information when, execute step S401;
Referring to Fig. 1:
Step S103: generating and sends one group of first random coded after the first private key encryption to user, and described first Public key and the first private key are one group of public private key pair, execute step S104;
In this step, the RA server generates a new random number (as the first random coded), will it is described with Machine number is sent to user after private key (referring to the first private key) encryption using oneself;
Step S104: that user sends, the certificate request information after first public key encryption, the unique rope of user are obtained Tendering knows and first random coded, executes step S105;
The anti-generation certificate request information of user, and generate the public private key pair (user side's public private key pair) of oneself, when getting After first random coded, certificate request information, user's unique index mark, the first random coded are used together RA service RA server is sent to after device public key (the first public key) encryption;
Step S105: judge to identify in database with the presence or absence of user's unique index, if so, executing step S106, it is no to then follow the steps S107;
After the RA server receives user's unique index mark that user sends, in the database of the RA server Existing record is compared, if do not have under RA server checks user's unique index identification name movable user certificate and Private key ciphertext shows that there is no user's unique indexs to identify in database, then goes to step S107, otherwise, executes step S106 sends user's unique index mark using the private key encryption of oneself and checks that failure news to user, requests operation failure;
Step S106: to user output after first private key encryption, for characterize user's unique index mark inspection The information of failure is looked into, step S108 is executed;
In this step, the RA server, which identifies user's unique index, checks that the message of success message uses the private of oneself User is sent to after key encryption;
Step S107: to user send after first private key encryption, for characterize user's unique index mark inspection Look into successful information;
Step S108: obtain user sends, second level private key data after first public key encryption, described first with Machine coding and the second public key, the second level private key data are after symmetric key encryption, corresponding with second public key private Key data execute step S109;
In this step, user encrypts its private key data with the symmetric key (symmetric key) of oneself, by encrypted private key Data and first random coded, oneself user oneself the second public key be used together the encryption of RA server public key after transmit Give RA server;
Step S109: the certificate request information, user's unique index mark, the second public key and second level private key data are write Enter in copending integer request list;
In this step, the RA server is certificate request information, user's unique index mark, client public key (second Public key) and the information such as encrypted private key for user data (second level private key data) copending certificate request list is written together In, certainly, after the step S109, the RA server can also be by requesting success message to use oneself user certificate Private key encryption after be sent to the mode of user user prompted.
Referring to fig. 2, it is equivalent to the certificate and private key request of data through the first public key encryption that the application gets user's transmission Implementation procedure after information, specifically:
Step S201: generating and sends one group of second random coded after the first private key encryption to user;
In this step, the RA server generates a new random number (the second random coded), and uses oneself User is sent to after private key encryption;
Step S202: user's unique index mark that user sends, after first public key encryption and second are obtained Random coded;
In this step, the unique index mark of oneself is used together RA with second random coded obtained by user RA server is sent to after server public key encryption;
Step S203: judge to identify in database with the presence or absence of user's unique index, if so, executing step S204, it is no to then follow the steps S205;
In this step, the RA server by the user's unique index received mark with database in it is existing record into Row compares.If there are user's unique indexs to identify corresponding record in the valid certificate list of the RA server, turn To step S204, otherwise, step S205 is executed, sends corresponding error messages to user, request using the private key encryption of oneself Operation failure;
Step S204: by certificate number after first private key encryption, corresponding with user's unique index mark User is sent to according to, second level private key data and second random coded;
In this step, which is identified corresponding certificate data, encrypted private by the RA server Key data (second level private key data) and second random coded are combined, and are sent to use after the private key encryption using oneself Family;
Step S205: information after the first private key encryption, for characterizing request operation failure is sent to user;
In this step, user receives certificate and private key data to send after success message is encrypted using RA server public key Give RA server.
Referring to Fig. 3, after the step S204, can also include:
Step S206: judging whether user gets the data sent in step S204, if not, executing step S204;
Judge whether to get in preset time period user's transmission, get through first private key for characterizing user Certificate data encrypted, corresponding with user's unique index mark, second level private key data and second random coded Information.
Referring to fig. 4:
Step S401: judge whether that the requirement for getting user's transmission carries out the letter of certificate and private key data encryption key modification Breath, if so, executing step S402;
Scheme in Fig. 4 is established after the scheme implementation success in Fig. 2, i.e., the described step 401 is implemented in the step After S204;
Step S402: generating and sends one group of third random coded after the first private key encryption to user, executes step S403;
In this step, the RA server generates a new random number (the third random coded), using oneself User is sent to after private key encryption;
Step S403: user's unique index mark that user sends, after first public key encryption and second level are obtained Third random coded, executes step S404, and the second level random coded is to be compiled at random using the private key data to the third Code carries out encrypted third random coded;
In this step, user encrypts the third random coded of acquisition using the private key data of oneself, then oneself User's unique index mark and the ciphertext (using the encrypted third random coded of the private key data of user) as data group Unify and recycled the encryption of RA server public key, and has been sent to the RA server;
Step S404: using the first private key to user's unique index mark and two after first public key encryption Grade third random coded is decrypted, and executes step S405;
In this step, the RA server decrypts user's unique index mark after the first public key encryption with the private key of oneself Know and second level third random coded;
Step S405: judging whether there is user's integer corresponding with user's unique index mark and private key ciphertext, If so, executing step S406, otherwise, step S407 is executed;
In this step, carried out pair after the user's unique index mark obtained using decryption with existing record in RA server Than.If have movable user certificate and private key ciphertext under RA server checks user's unique index identification name, step is executed Rapid S406, it is no to then follow the steps S407;
Step S406: being decrypted the second level third random coded using second public key, obtains random plaintext, Judge whether the random plaintext is consistent with the third random coded, if so, step S408 is executed, it is no to then follow the steps S407;
In this step, using user public key (the second public key) to the second level third random coded be decrypted acquisition with In plain text (random plaintext), the third random coded that the random number plain text and the RA server are sent to user is carried out for machine number Comparison executes step S408 if the two is identical, otherwise, executes step S407, and it is private to send user using the private key encryption of oneself Key data encryption key modifies application information verification failure news to user, requests operation failure;
Step S407: information after the first private key encryption, for characterizing request operation failure is sent to user;
Step S408: to user send for characterize it is after the first private key encryption, add for characterizing private key for user data Key modifies application information and verifies successful message, executes step S409;
In this step, private key for user data encryption key modification application information is verified successful message by the RA server User is sent to after private key encryption using oneself;
Step S409: user sends, new second level private key data after first public key encryption and described the are obtained Three random codeds, execute step S410, and the new second level private key data is that user uses modified symmetric key to private key number According to what is encrypted in plain text, the private key data is that user solves second level private key data using former symmetric key in plain text It is close to obtain;
In this step, user is decrypted encrypted private key data (second level private key data) with the symmetric key of oneself Operation obtains private key data in plain text, then again with oneself modified symmetric key (modified symmetric key) to the private Key data clear text carries out cryptographic calculation, obtains new second level private key data, then user is the new second level private key data of acquisition and institute It states after third random coded is used together the encryption of RA server public key and sends the RA server to;
Step S410: the second level private key data is updated using the new second level private key data;
In this step, second level private key data of the RA server before the update of new second level private key data, certainly, in institute After stating step S410, the RA server can also be by using the successfully modified message of private key for user data encryption key certainly The mode that user is sent to after oneself private key encryption prompts user.
Wherein, in method disclosed in the above embodiments of the present application, user's unique index is identified as characterizing user Data information information, with uniqueness.According to the present invention, it is contemplated that client system in cloud computing or Transparent Calculation Model System is not perhaps locally stored ability or ability is not locally stored reliably, it is contemplated that the absolute confidentiality of private key information, So user certificate and private key for user information ciphertext (second level private key data) are stored in server-side by this method.Private key in the present invention The storage of information ciphertext must be to hold unique identification's (identifying for unique index) of private key main body as indexing, and realization has Sequence storage is inquired and is asked for.The uniqueness of this user's unique index mark both can by stringent cryptography principle Lai Guarantee, can also be guaranteed according to the natural quality that the index identifies.In actual application, a kind of suitable scheme is direct Using applicant's ID card No. as user's unique index mark or by ID card No. generate Lai some uniqueness mark Know and is identified as user's unique index.
Referring to technical solution disclosed in the above embodiment of the present invention, private key for user data encryption (second level private key data) is saved In server-side.The generation of user's public affairs symmetric key, the decryption of second level private key data and the specific place used are in client, user Possess the decruption key of second level private key data, can decrypt and uses final private key data (the second private key).It only uses in this way Family itself could obtain and using oneself private key data, the safety of private key for user data can be effectively ensured in this way.In reality Application in, a kind of suitable scheme is the generation of user's public affairs private key data, the decryption of private key data and using on the client The application program of specifically used user certificate and symmetric key is completed.
In above scheme, user certificate application agreement of the user according to the safety for being suitable for cloud computing and Transparent Calculation Model It is close that (step S101-S109), user certificate and private key data obtain agreement (step S201-S205), private key for user data encryption Key modifies agreement (step S401-S410), realize user to user certificate and second level private key data application and legal acquisition and Modification.To sum up, user certificate application agreement of the invention, user certificate and private key data obtain agreement, private key for user data add Key, which modifies agreement, has characteristic below:
Random coded is used to prevent Replay Attack in agreement;
The generation of user certificate and symmetric key is completed in client;
User possesses the encryption key of oneself, transmits after private key data is used encryption keys and is stored in server End;
User possesses the decruption key of oneself, for close using the decryption of oneself after obtaining second level private key data from server-side Key is decrypted and is finally used.
Just analyze below common attack method to above-mentioned user certificate application agreement, private key for user data acquisition protocols and The attack effect of private key for user data encryption key modification agreement.
Network intercepting
In the above-mentioned methods, in user key application and access process, the symmetric key of user encryption oneself private key data Information not in transmission over networks, and what the propagation of private key data was also transmitted after encryption, so network intercepting is attacked In vain.Application information and user's unique index mark of user is all transmitted after server public key encryption, user The application that user sends out in private key data encryption key modification agreement also passes through private key for user and carries out encrypted transmission, listener Useful information can not be obtained in message from listening to.
Replay Attack
Since the random coded that certificate server is chosen every time is different, so the request that can not be listened to by resetting front Message completes later request.
The conjecture sexual violence of symmetric key is attacked
Since user to the protection of oneself private key data is guaranteed by symmetric key algorithm, to the symmetric key Violence guesses that sexual assault is also important attack type.For this purpose, RA server can be considered in key application client journey Increase the checking mechanism to the symmetric key intensity in sequence.Such as if using password as symmetric key when, need to keep away Exempt from password there are length too short, the defects of doing password using user name, doing password etc. using single English word.With The symmetric key at family and the symmetric encipherment algorithm (for example, by using AES256 Encryption Algorithm) of use have enough attack resistance intensity items Under part, it is believed that the agreement is safe to the conjecture sexual violence attack of symmetric key.And this protocol family supports user to repair Change private key data encryption key, further improves the safety of agreement.
Man-in-the-middle attack
Since the data-message issued with user orientation server is transmitted after server public key encrypts, so attack Person can not obtain effective informations more more than network intercepting method using Session Hijack, i.e. the agreement is safety to man-in-the-middle attack 's.
In summary 4 points, illustrate that method disclosed in the above embodiments of the present application can effectively resist network intercepting, reset and attack Hit, the conjecture sexual violence of symmetric key attack and man-in-the-middle attack, i.e., this agreement is safe under existing attack means.
The invention proposes a kind of management method of user certificate and private key suitable for cloud computing and Transparent Calculation Model, Compared with other schemes, the major advantage of the program is:
Firstly, the design scheme based on RA server for encrypting storage private key for user, the program are deposited without external key Equipment is stored up, saves the hardware spending of system while guaranteeing digital certificate system safety, and reduce implementation complexity.
Again, the generation of private key data, encrypt and decrypt operation are all completed in user terminal, effectively reduces server Pressure increases the scalability of system.The private key data of user is only remained in client in plain text so simultaneously, it is accurate for be It is only remained in the program process of client digital certificate system, further improves the safety of system.
Finally, being repaired to user certificate application agreement, private key for user data acquisition protocols and private key for user data encryption key The safety analysis for changing agreement shows that the agreement can effectively resist the conjecture sexual violence of network intercepting, Replay Attack, symmetric key Attack and man-in-the-middle attack, i.e., this agreement is safe under existing attack means.
Technical solution disclosed in the above embodiments of the present application is understood in order to facilitate user is more detailed, and the application is also with tool The above method is illustrated in body example way, and safe user certificate application agreement is described referring to Fig. 5-Fig. 7, Fig. 5 Embodiment, the symbolic significance in figure are as follows: Info is certificate solicited message;KSFor RA server public key (the first public key), KS -1For RA privacy key (the first private key), KUFor certificate Requestor's public key (the second public key), KU -1For certificate Requestor's private key (second Private key);Na is the random coded that RA server generates;IdUIt is identified for user's unique index of user;KEUFor user encryption oneself The symmetric key of private key, K`EUFor the new symmetric key of user encryption oneself private key, m1-13For identifying specific protocol step Message, respectively m1(user certificate request), m2(unique index mark checks successfully), m3(unique index mark checks failure), m4(certificate request is handled successfully), m5(request of user certificate private key data), m6(certificate request that do not examine), m7It (is rejected Certificate request), m8(certificate has cancelled), m9(user's unique index identity verification mistake), m10(user certificate private key data request Handle successfully), m11(user applies for certificate and private key data encryption key modification request), m12(private key for user check errors) and m13 (user applies for that the modification request of certificate and private key data encryption key is handled successfully), C is the certificate of user, and Hash3 is monodrome hash Function.
Assuming that user has got (the first public affairs of digital certificate disclosed in RA server from digital certificate system at this time Key).
The each step of user certificate application agreement is described in detail as follows referring to Fig. 5:
Step 1, user send { m to RA server1}KSMessage, it is desirable that carry out certificate request;
Step 2, RA server generate random coded Na, and send { Na } KS -1Message is to user;
Step 3, user generate certificate request information Info, and the solicited message, the user's unique index mark of oneself IdURa server public key K is used together with NaSData Data1 is generated after encryption is sent to RA server:
Data1={ Info, IdU, Na } and KS
Step 4, RA server receive user's unique index mark Id that user sendsUAfterwards with have note in oneself database Record is (including copending certificate request list, the unsanctioned certificate request list of examination & approval, valid certificate list and the card cancelled Book list) it is compared.If RA server does not find the case where user's unique index duplicate identity, step 5 is gone to, it is no Then send { m3}KSMessage requests operation failure to user;
Step 5, RA server send { m2}KSMessage is to user;
Step 6, user are with oneself symmetric key KEUEncrypt its private key data KU -1, with Na and the public key K of oneselfU -1Together Use RA server public key KSData Data2 is generated after encryption is sent to RA server:
Data2={ { KU -1}KEU, KU, Na } and KS
Certainly, in some specific agreements, for example standard certificate request of the ITU-T X.509 in international standard has been wrapped K is containedU, it means that included K in the Info information in step 3U, this step also can choose no longer in this case Send KU, i.e., only send { { KU -1}KEU, Na } and KSGive RA server.
Certificate request information Info, user's unique index are identified Id by step 7, RA serverU, client public key KUAnd encryption Private key for user data { KU -1}KEUEtc. information be written in copending certificate request list together;
Step 8, RA server send { m4}KSMessage is to user.
If user certificate request generation phase smoothly completes, server database " copending certificate request column User's respective record is had in table ", including data such as certificate request information, user identifier and the private key datas of encryption , RA server can examine this application at this time.If examination & approval do not pass through, directly the record is transferred to and " is examined not By certificate request list ".If the above method can also include: that this is recorded corresponding data delivery after examination & approval pass through To CA server, the latter generates user certificate using the private key and the certificate issuance certificate request of oneself, and certificate data is sent out Return to RA server;Then RA server is written to the data item such as certificate data, user identifier and the private key data of encryption and " has Imitate list of cert " in.
The each step of private key for user data acquisition protocols is described in detail as follows referring to Fig. 6:
Step S11, user send { m to RA server5}KSMessage, it is desirable that carry out certificate and private key request of data;
Step S12, RA server generates random coded Na, and sends { Na } KS -1Message is to user;
Step S13, user identifies the user's unique index of oneself and is used together RA with the step S12 random coded obtained Data Data3, which is generated, after server public key encryption is sent to RA server;
Data3={ IdU, Na } and KS
Step S14, RA server by the user's unique index received identify and oneself database in it is existing record (" to The certificate request list of examination & approval ", " examining unsanctioned certificate request list ", " valid certificate list " and " certificate cancelled List ") it is compared.If there are user's unique indexs to identify corresponding record in the valid certificate list of RA server, Step S15 is then gone to, relevant error message { m is otherwise returned6}KS -1、{m7}KS -1、{m8}KS -1Or { m9}KS -1To user, number Fail according to request;
Step S15, RA server is the corresponding certificate data of user's unique index mark and through KEUEncrypted private key Data are combined, and use KS -1Data4 is generated after encryption to user:
Data4={ C, { KU -1}KEU, Na } and KS -1
User sends { m10}KSMessage gives RA server.
Fig. 7 is described in detail as follows the private key for user data encryption key modification each step of agreement:
Private key for user data encryption key modification protocol steps are described in detail as follows:
Step S21, user send { m to RA server5}KSMessage, it is desirable that carry out certificate and private key request of data;
Step S22, RA server generates random coded Na1, and sends { Na1 } KS -1Message is to user;
Step S23, user identifies the user's unique index of oneself and is used together RA with the step S22 random coded obtained Data Data5, which is generated, after server public key encryption is sent to RA server;
Data5={ IdU, Na } and KS
Step S24, RA server by the user's unique index received identify and oneself database in it is existing record (" to The certificate request list of examination & approval ", " examining unsanctioned certificate request list ", " valid certificate list " and " certificate cancelled List ") it is compared.If there are user's unique indexs to identify corresponding record in the valid certificate list of RA server, Step S25 is then gone to, relevant error message { m is otherwise returned6}KS -1、{m7}KS -1、{m8}KS -1Or { m9}KS -1To user, number Fail according to request;
Step S25, RA server is the corresponding certificate data of user's unique index mark and through KEUEncrypted private key Data are combined, and use KS -1Data6 is generated after encryption to user:
Data6={ C, { KU -1}KEU, Na1 } and KS -1
Step S26, user sends { m to RA server11}KSMessage, it is desirable that carry out certificate and private key data encryption key and repair Change;
Step S27, RA server generates new random coded Na2, and sends { Na2 } KS -1Message is to user;
Step S28, user encrypts to obtain random coded ciphertext using the private key data of oneself to the random coded, then with Family unique index mark and random coded ciphertext have been unified as data group recycles KS -1Data Data7 is generated after encryption to send Give RA server;
Data7={ IdU, { Na2 } KU -1}KS
Step S29, RA server KS -1Decrypt Data7, using user's unique index therein mark after with existing note Record compares.RA server is (" copending by record existing in the user's unique index received mark and oneself database Certificate request list ", " examining unsanctioned certificate request list ", " valid certificate list " and " list of cert cancelled ") It is compared.If the corresponding record of the user identifier is not present in the valid certificate list of RA server, return relevant Error message { m6}KS -1、{m7}KS -1、{m8}KS -1Or { m9}KS -1To user, request of data failure.If RA server is effective There are the corresponding record of the user identifier in list of cert, then the second public key for obtaining user continues decrypted random coding ciphertext and obtains Obtain random coded in plain text, the random coded for being sent to user with RA server compares, if the two is identical, goes to step Otherwise S30 returns to relevant error message { m12}KS -1To user, operation failure is requested.
Step S30, RA server sends { m13}KS -1Message shows that private key for user data encryption key modifies Shen to user It please information checking success;
Step S31, operation is decrypted to encrypted private key data with the symmetric key of oneself in user, obtains private key number According in plain text, cryptographic calculation then is carried out in plain text to private key data with oneself modified symmetric key again, then user is acquisition New private key data ciphertext, be used together K with Na2SData Data8 is generated after encryption sends RA server to;
Data8={ { KU -1}K`EU, Na2 } and KS
Step S32, the private key for user data ciphertext before RA server is updated with new private key data ciphertext uses { KU -1}K`EUReplace { KU -1}KEU
Step S33, RA server sends { m13}KS -1Message is to user.
It is directed to method disclosed in above-described embodiment, disclosed herein as well is a kind of system using the above method, referring to Fig. 8, the system include:
Acquisition unit 100, for obtaining the data information of user's transmission;
Information transmitting unit 200, for sending data information to user;
First data processing unit 300, first data processing unit 300 is corresponding with step S103, for working as institute When stating acquisition unit 100 and getting using certificate request information after the first public key encryption, generates and pass through information transmitting unit 200 send one group of first random coded after the first private key encryption to user, and first public key and the first private key are one group Public private key pair;
Second data processing unit 400, second data processing unit 400 is corresponding with the step S104-S107, For getting the certificate request information after first public key encryption, user's unique index mark when the acquisition unit 100 When knowing with first random coded, judge to identify in database with the presence or absence of user's unique index, if so, passing through institute State information transmitting unit 200 to user output after first private key encryption, for characterize user's unique index mark inspection Look into the information of failure;Otherwise, after first private key encryption, use is sent to user by the information transmitting unit 200 Successful information is checked in characterization user's unique index mark;
Third data processing unit 500, the third data processing unit 500 is corresponding with step S108-S109, is used for When the acquisition unit 100 get the second level private key data after first public key encryption, first random coded with And when the second public key, by the certificate request information, user's unique index mark, the second public key and second level private key data write-in to In the integer request list of examination & approval, wherein the second level private key data is after symmetric key encryption and second public key Corresponding private key data.
It corresponds to the above method, corresponding with the step S202, first data processing unit 300 is also used to:
User certificate and private key data after the acquisition unit 100 is got using the first public key encryption obtain agreement When, it generates and one group of second random coded after the first private key encryption is sent to user by the information transmitting unit 200;
It is corresponding with step S203-S205 in the above method referring to Fig. 9, the management system of the user certificate and private key, Further include:
4th data processing unit 600, when the acquisition unit 100 gets the user after first public key encryption When unique index mark and the second random coded, judge to identify in database with the presence or absence of user's unique index, if so, It will be after first private key encryption, corresponding with user's unique index mark by the information transmitting unit 200 Certificate data, second level private key data and second random coded are sent to user;If not, passing through the information transmitting unit 200 send information after the first private key encryption, for characterizing request operation failure to user.
It is corresponding with step S206 in the above method, the management system of the user certificate and private key, further includes:
Judging unit 700, will be through described by the information transmitting unit 200 for working as the 4th data processing unit 600 Certificate data after first private key encryption, corresponding with user's unique index mark, second level private key data and described second After random coded is sent to user, judge whether the acquisition unit 100 gets user's transmission, use within a preset period of time In characterization user get certificate data after first private key encryption, corresponding with user's unique index mark, The information of second level private key data and second random coded, if not, control the 4th data processing unit 600 leads to again The information transmitting unit 200 is crossed by card after first private key encryption, corresponding with user's unique index mark Book data, second level private key data and second random coded are sent to user.
It is corresponding with step S402 in the above method, in the management system of above-mentioned user certificate and private key, first number It is also used to according to processing unit 300:
When the 4th data processing unit 600 by the information transmitting unit 200 by it is after first private key encryption, Certificate data corresponding with user's unique index mark, second level private key data and second random coded are sent to user Afterwards, it when and the acquisition unit 100 gets the information for requiring to carry out the modification of certificate and private key data encryption key, generates and passes through The information transmitting unit 200 sends one group of third random coded after the first private key encryption to user;
With the management system of user certificate described in the above method and private key, further includes:
5th data processing unit 800, the 5th data processing unit 800 is corresponding with step S403-S408, is used for It is compiled at random when the acquisition unit 100 gets the mark of user's unique index after first public key encryption with second level third After code, user's unique index mark after first public key encryption and second level third are compiled at random using the first private key Code is decrypted;User's integer corresponding with user's unique index mark and private key ciphertext are judged whether there is, if so, The second level third random coded is decrypted using second public key, random plaintext is obtained, judges the random plaintext It is whether consistent with the third random coded, if unanimously, sent to user for characterizing by the information transmitting unit 200 It is after the first private key encryption, verify successful message for characterizing private key for user data encryption key modification application information;Such as Fruit there is no user's integer corresponding with user's unique index mark and private key ciphertext or the random plaintext whether with institute State that third random coded is inconsistent, by the information transmitting unit 200 to user send it is after the first private key encryption, be used for The information of characterization request operation failure;Wherein, the second level random coded is random to the third using the private key data Coding carries out encrypted third random coded;
6th data processing unit 900, the 6th data processing unit 900 is corresponding with the step S409-S410, For getting the new second level private key data after first public key encryption and the third is random when the acquisition unit 100 After coding, the second level private key data is updated using the new second level private key data, wherein the new second level private key data is to use Family encrypts private key data using modified symmetric key in plain text, and the private key data is that user uses in plain text Second level private key data is decrypted in former symmetric key.
For convenience of description, it is divided into various modules when description system above with function to describe respectively.Certainly, implementing this The function of each module can be realized in the same or multiple software and or hardware when application.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system or For system embodiment, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to method The part of embodiment illustrates.System and system embodiment described above is only schematical, wherein the conduct The unit of separate part description may or may not be physically separated, component shown as a unit can be or Person may not be physical unit, it can and it is in one place, or may be distributed over multiple network units.It can root According to actual need that some or all of the modules therein is selected to achieve the purpose of the solution of this embodiment.Ordinary skill Personnel can understand and implement without creative efforts.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain Lid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (10)

1. the management method of a kind of user certificate and private key characterized by comprising
Obtain the solicited message that user sends;
When the solicited message is using certificate request information after the first public key encryption:
It generates and sends one group of first random coded after the first private key encryption, first public key and the first private key to user For one group of public private key pair;
Obtain user sends, certificate request information after first public key encryption, user's unique index mark and described First random coded;
Judge to identify in database with the presence or absence of user's unique index, if so, exporting to user through first private key Information encrypted, that failure is checked for characterizing user's unique index mark;Otherwise it sends to user through first private key It is encrypted, check successful information for characterizing user's unique index mark;
It is described to user send after first private key encryption, for characterize user's unique index mark check successfully letter After breath, user sends, second level private key data after first public key encryption, first random coded and the are obtained Two public keys, the second level private key data are after symmetric key encryption, corresponding with second public key private key data;
The certificate request information, user's unique index mark, the second public key and second level private key data are written copending whole In number request list.
2. the management method of user certificate according to claim 1 and private key, which is characterized in that further include:
Obtain the certificate and private key data request information through the first public key encryption that user sends;
It generates and sends one group of second random coded after the first private key encryption to user;
Obtain user's unique index mark that user sends, after first public key encryption and the second random coded;
Judge in database with the presence or absence of user's unique index identify, if so, by it is after first private key encryption, Certificate data corresponding with user's unique index mark, second level private key data and second random coded are sent to use Family;If not, sending information after the first private key encryption, for characterizing request operation failure to user.
3. the management method of user certificate according to claim 2 and private key, which is characterized in that will be through first private key Certificate data encrypted, corresponding with user's unique index mark, second level private key data and second random coded It is sent to after user, further includes:
Judge whether to get in preset time period user's transmission, get through first private key encryption for characterizing user Afterwards, the letter that identifies with user's unique index corresponding certificate data, second level private key data and second random coded Breath, if not, sending after first private key encryption, corresponding with user's unique index mark card to user again Book data, second level private key data and second random coded.
4. the management method of user certificate according to claim 2 and private key, which is characterized in that will be through first private key Certificate data encrypted, corresponding with user's unique index mark, second level private key data and second random coded It is sent to after user, further includes:
Judge whether that the requirement for getting user's transmission carries out the information of certificate and private key data encryption key modification, if so, after It is continuous to execute;
It generates and sends one group of third random coded after the first private key encryption to user;
User's unique index mark that user sends, after first public key encryption and second level third random coded are obtained, The second level random coded is to carry out encrypted third random coded to the third random coded using the private key data;
User's unique index mark after first public key encryption and second level third are compiled at random using the first private key Code is decrypted;
User's integer corresponding with user's unique index mark and private key ciphertext are judged whether there is, if so, using institute The second public key is stated the second level third random coded is decrypted, obtain it is random in plain text, judge the random plaintext whether with The third random coded is consistent, if unanimously, to user send for characterize it is after the first private key encryption, for characterize use Family private key data encryption key modification application information verifies successful message;It is identified if there is no with user's unique index Whether corresponding user's integer and private key ciphertext or the random plaintext are inconsistent with the third random coded, send to user Information after the first private key encryption, for characterizing request operation failure;
Obtain user sends, new second level private key data after first public key encryption and the third random coded, institute Stating new second level private key data is that user encrypts private key data using modified symmetric key in plain text, the private Key data clear text is that user is decrypted second level private key data using former symmetric key;
The second level private key data is updated using the new second level private key data.
5. the management method of user certificate according to any one of claims 1-4 and private key, which is characterized in that the use Family unique index is identified as characterizing user information, data information with uniqueness.
6. the management system of a kind of user certificate and private key characterized by comprising
Acquisition unit, for obtaining the data information of user's transmission;
Information transmitting unit, for sending data information to user;
First data processing unit, for the certificate request information after acquisition unit is got using the first public key encryption When, it generates and one group of first random coded after the first private key encryption is sent to user by information transmitting unit, described the One public key and the first private key are one group of public private key pair;
Second data processing unit, for getting the letter of the certificate request after first public key encryption when the acquisition unit When breath, user's unique index mark and first random coded, judge in database with the presence or absence of user's unique index Mark, if so, by the information transmitting unit to user output after first private key encryption, for characterizing user Unique index mark checks the information of failure;Otherwise, it is sent to user through first private key by the information transmitting unit It is encrypted, check successful information for characterizing user's unique index mark;
Third data processing unit, for user send after first private key encryption, for characterizing the unique rope of user After the successful information of inspection is known in tendering, when the acquisition unit gets the second level private key number after first public key encryption When according to, first random coded and the second public key, by the certificate request information, user's unique index mark, second public Key and second level private key data are written in copending integer request list, wherein the second level private key data is through symmetric key Private key data encrypted, corresponding with second public key.
7. the management system of user certificate according to claim 6 and private key, which is characterized in that first data processing Unit is also used to:
When the acquisition unit get using after the first public key encryption user certificate and private key data obtain agreement when, generate And one group of second random coded after the first private key encryption is sent to user by the information transmitting unit;
The management system of the user certificate and private key, further includes:
4th data processing unit, when the acquisition unit gets user's unique index mark after first public key encryption When knowing with the second random coded, judge to identify in database with the presence or absence of user's unique index, if so, passing through the letter Transmission unit is ceased by certificate data after first private key encryption, corresponding with user's unique index mark, second level Private key data and second random coded are sent to user;It is passed through if not, being sent by the information transmitting unit to user Information after first private key encryption, for characterizing request operation failure.
8. the management system of user certificate according to claim 7 and private key, which is characterized in that further include:
Judging unit is used for when the 4th data processing unit will be after first private key encryption by the information transmitting unit , corresponding with user's unique index mark certificate data, second level private key data and second random coded be sent to After user, judge the acquisition unit whether get within a preset period of time user's transmission, get for characterizing user Certificate data after first private key encryption, corresponding with user's unique index mark, second level private key data and institute The information of the second random coded is stated, if not, control the 4th data processing unit is again by the information transmitting unit By certificate data after first private key encryption, corresponding with user's unique index mark, second level private key data and Second random coded is sent to user.
9. the management system of user certificate according to claim 7 and private key, which is characterized in that first data processing Unit is also used to:
When the 4th data processing unit by the information transmitting unit by it is after first private key encryption, with the user After the corresponding certificate data of unique index mark, second level private key data and second random coded are sent to user, and it is described When acquisition unit gets the information for requiring to carry out the modification of certificate and private key data encryption key, generates and sent by the information Unit sends one group of third random coded after the first private key encryption to user;
The management system of the user certificate and private key, further includes:
5th data processing unit, for getting the unique rope of user after first public key encryption when the acquisition unit After tendering knowledge and second level third random coded, using the first private key to the unique rope of user after first public key encryption Tendering knowledge and second level third random coded are decrypted;Judge whether there is user corresponding with user's unique index mark Integer and private key ciphertext are obtained random if so, the second level third random coded is decrypted using second public key In plain text, whether consistent with the third random coded the random plaintext is judged, if unanimously, passing through the information transmitting unit To user send for characterize it is after the first private key encryption, for characterize private key for user data encryption key modify application information Verify successful message;If there is no user's integer corresponding with user's unique index mark and private key ciphertext or described It is random whether inconsistent with the third random coded in plain text, it is sent to user through the first private key by the information transmitting unit Information encrypted, for characterizing request operation failure;Wherein, the second level random coded is to use the private key data pair The third random coded carries out encrypted third random coded;
6th data processing unit, for getting the new second level private key after first public key encryption when the acquisition unit After data and the third random coded, the second level private key data is updated using the new second level private key data, wherein described New second level private key data is that user encrypts private key data using modified symmetric key in plain text, the private key Data clear text is that user is decrypted second level private key data using former symmetric key.
10. according to the management system of user certificate and private key described in claim 6-9 any one, which is characterized in that described User's unique index is identified as characterizing user information, data information with uniqueness.
CN201610320149.7A 2016-05-13 2016-05-13 A kind of management method and system of user certificate and private key Active CN105812388B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610320149.7A CN105812388B (en) 2016-05-13 2016-05-13 A kind of management method and system of user certificate and private key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610320149.7A CN105812388B (en) 2016-05-13 2016-05-13 A kind of management method and system of user certificate and private key

Publications (2)

Publication Number Publication Date
CN105812388A CN105812388A (en) 2016-07-27
CN105812388B true CN105812388B (en) 2018-12-07

Family

ID=56456839

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610320149.7A Active CN105812388B (en) 2016-05-13 2016-05-13 A kind of management method and system of user certificate and private key

Country Status (1)

Country Link
CN (1) CN105812388B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10805080B2 (en) * 2017-01-06 2020-10-13 Microsoft Technology Licensing, Llc Strong resource identity in a cloud hosted system
CN109905243B (en) * 2017-12-11 2022-06-03 航天信息股份有限公司 Method and server for processing digital certificate updating request
US11018871B2 (en) * 2018-03-30 2021-05-25 Intel Corporation Key protection for computing platform
DE102019206302A1 (en) 2019-05-02 2020-11-05 Continental Automotive Gmbh Method and device for transmitting a boot code with improved data security
CN112948851A (en) * 2021-02-25 2021-06-11 深圳壹账通智能科技有限公司 User authentication method, device, server and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103583030A (en) * 2011-05-25 2014-02-12 阿尔卡特朗讯公司 Method and apparatus for achieving data security in a distributed cloud computing environment
CN104717217A (en) * 2015-03-18 2015-06-17 电子科技大学 Certifiable security data possession verifying method in cloud storage based on partial delegation
CN104917772A (en) * 2015-06-12 2015-09-16 深圳大学 Access control system for cloud store service platform and access control method thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2584057T3 (en) * 2010-08-12 2016-09-23 Security First Corp. System and method of secure remote data storage

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103583030A (en) * 2011-05-25 2014-02-12 阿尔卡特朗讯公司 Method and apparatus for achieving data security in a distributed cloud computing environment
CN104717217A (en) * 2015-03-18 2015-06-17 电子科技大学 Certifiable security data possession verifying method in cloud storage based on partial delegation
CN104917772A (en) * 2015-06-12 2015-09-16 深圳大学 Access control system for cloud store service platform and access control method thereof

Also Published As

Publication number Publication date
CN105812388A (en) 2016-07-27

Similar Documents

Publication Publication Date Title
CN105812388B (en) A kind of management method and system of user certificate and private key
CN106899410B (en) A kind of method and device of equipment identities certification
CN106534175B (en) Open platform authorization identifying system and method based on OAuth agreement
CN102932149B (en) Integrated identity based encryption (IBE) data encryption system
CN105493435B (en) Virtual Service provider memory block
CN102932136B (en) Systems and methods for managing cryptographic keys
CN104980477B (en) Data access control method and system under cloud storage environment
CN103490881B (en) Authentication service system, user authentication method, and authentication information processing method and system
Künnemann et al. YubiSecure? Formal security analysis results for the Yubikey and YubiHSM
CN108476133A (en) The key carried out by the believable third party in part exchanges
CN106060078B (en) User information encryption method, register method and verification method applied to cloud platform
CN105574445B (en) A kind of safety communicating method and device of self-help terminal equipment hardware
CN105933315A (en) Network service security communication method, device and system
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
CN110401629A (en) A kind of method and relevant apparatus of activation authorization
CN109194523A (en) The multi-party diagnostic model fusion method and system, cloud server of secret protection
CN105447715A (en) Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party
CN102984273B (en) Encryption method, decryption method, encryption device and decryption device of virtual disk and cloud server
CN109347832A (en) A kind of dynamic data sharing method, terminal device and proxy server
CN107871081A (en) A kind of computer information safe system
CN106936579A (en) Cloud storage data storage and read method based on trusted third party agency
CN109150528A (en) A kind of ammeter data access method, device, equipment and readable storage medium storing program for executing
CN106487786A (en) A kind of cloud data integrity verification method based on biological characteristic and system
CN106790296A (en) Domain name records verification method and device
CN104767766A (en) Web Service interface verification method, Web Service server and client side

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant