CN108111314A - The generation of digital certificate and method of calibration and equipment - Google Patents

The generation of digital certificate and method of calibration and equipment Download PDF

Info

Publication number
CN108111314A
CN108111314A CN201810051996.7A CN201810051996A CN108111314A CN 108111314 A CN108111314 A CN 108111314A CN 201810051996 A CN201810051996 A CN 201810051996A CN 108111314 A CN108111314 A CN 108111314A
Authority
CN
China
Prior art keywords
digital certificate
data
certificate
response
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810051996.7A
Other languages
Chinese (zh)
Other versions
CN108111314B (en
Inventor
康昆彬
路成业
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Caiyouyou Technology Shenzhen Co ltd
Original Assignee
Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chain Technology Co Ltd filed Critical Chain Technology Co Ltd
Priority to CN201810051996.7A priority Critical patent/CN108111314B/en
Publication of CN108111314A publication Critical patent/CN108111314A/en
Application granted granted Critical
Publication of CN108111314B publication Critical patent/CN108111314B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Abstract

Generation and method of calibration and equipment this application provides a kind of digital certificate, the generation method include:Certificates constructing application is received, the certificates constructing application includes public key and identity information;Verify whether the identity information passes through;Pass through in response to identity information verification, certificate content is provided and the certificate content is digitally signed using private key;The digital certificate signed is written to block chain completion certificate and deposits card.The digital certificate signed and issued is deposited into card in block chain, the security of digital certificate is improved, prevents from being distorted by hacker.

Description

The generation of digital certificate and method of calibration and equipment
Technical field
This application involves block chain technologies, and in particular to a kind of generation of digital certificate and method of calibration and equipment.
Background technology
With the development of computer technology, block chain technology (also known as distributed account book technology) with its decentralization, openly It is transparent, can not distort, trusted the advantages that, favor is received, in intelligent contract, securities trading, e-commerce, Internet of Things, social activity Communication, file storage, existence proof, authentication, equity crowd the various fields such as raise and are used widely.
At present, block catenary system can be divided mainly into three classes, be publicly-owned chain (Public Blockchain), privately owned chain respectively (Private Blockchain) and alliance's chain (Consortium Blockchain).The main distinction of this three classes block chain exists In the difference of open object.Publicly-owned chain can open owner, and privately owned chain only opens individually personal or solid tissue, and joins Alliance's chain opens specific personal or solid tissue between publicly-owned chain and privately owned chain, and other people or reality to outside Body tissue is any limitation as.
In block chain, especially in alliance's chain towards specific organization, in order to improve communication security, it will usually design Node card is signed and issued in certificate granting (Certificate Authority, CA) center for each node for participating in the communication of block chain Book so that holding the node of legal certificate can communicate with one another.In the prior art, can by the node certificate signed and issued and with The related information of certificate validity is stored in the server at CA centers;When communication is needed between the node of block chain, will also it adjust With and inquire about the information related with certificate validity of CA central stores, the validity of certificate for confirmation is completed to communicating The verification of journey.The major defect of this mode is:
The digital certificate of node and the information related with certificate validity are stored in CA centers, once CA centers are astonished Visitor, hacker can arbitrarily change the information related with certificate validity, for example, certificate revocation list can be distorted so that hung The warrant recovery of pin is normal.Hacker and then certificate illegally adds in block chain, block the problem of can be originally revoked using these Chain node will also be carried out when confirming certificate validity according to the information being tampered, so as to threaten to the safety of block chain. In addition, the private key at CA centers may also be stolen by hacker, and then hacker unscrupulous can sign and issue digital certificate, threaten block link network The safety of network.
The content of the invention
The embodiment of the present application provides a kind of generation of digital certificate and method of calibration and equipment, to solve due in CA The technical issues of heart is caused Digital Certificate Security to reduce by hacker attacks.
According to the one side of the embodiment of the present application, a kind of generation method of digital certificate is provided, which is characterized in that institute The method of stating includes:Certificates constructing application is received, the certificates constructing application includes public key and identity information;Verify the identity letter Whether breath passes through;In response to the identity information verification pass through, provide certificate content and using private key to the certificate content into Row digital signature;The digital certificate signed is written to block chain completion certificate and deposits card.
According to the another aspect of the embodiment of the present application, a kind of electronic equipment is provided, including:Processor;At storage Manage the memory of device executable instruction;Wherein, the processor is configured as performing above-mentioned digital certificate generation method.
According to the another aspect of the embodiment of the present application, a kind of method of calibration of digital certificate is provided, the described method includes: Data check request is received, the data check request includes data content, data signature and public key;According to the public key from area Block chain querying node simultaneously judges that the corresponding digital certificate of the data whether there is;Exist in response to the digital certificate, utilize Public key carries out sign test to data content and data signature, judges whether sign test passes through;Pass through returned data verification in response to sign test By message.
According to the another aspect of the embodiment of the present application, a kind of electronic equipment is provided, including:Processor;At storage Manage the memory of device executable instruction;Wherein, processor is configured as performing the method for calibration of above-mentioned digital certificate.
The advantageous effect of the embodiment of the present application includes:The digital certificate signed and issued is deposited into card in block chain, improves number The security of certificate prevents from being distorted by hacker;When carrying out data check, the corresponding number card of the data is inquired about from block chain Book simultaneously passes through the digital certificate data is verified.
Description of the drawings
By the description referring to the drawings to the embodiment of the present application, the above-mentioned and other purpose of the application, feature and Advantage will be apparent from, in the accompanying drawings:
Fig. 1 is the configuration diagram of the generation of the embodiment of the present application data certificate and check system;
Fig. 2 is the flow diagram of the embodiment of the present application data certificate generation method;
Fig. 3 is the flow diagram of the embodiment of the present application data certificate generation method;
Fig. 4 is the flow diagram of the embodiment of the present application data certificate generation method;
Fig. 5 is the flow diagram of the embodiment of the present application data certificate method of calibration;
Fig. 6 is the flow diagram of the embodiment of the present application data certificate method of calibration.
Specific embodiment
The application is described below based on embodiment, but the application is not restricted to these embodiments.Under Text is detailed to describe some specific detail sections in the datail description of the application.Do not have for a person skilled in the art The description of these detail sections can also understand the application completely.In order to avoid obscuring the essence of the application, well known method, mistake There is no narrations in detail for journey, flow, element and circuit.
In addition, it should be understood by one skilled in the art that provided herein attached drawing be provided to explanation purpose, and What attached drawing was not necessarily drawn to scale.
Unless the context clearly requires otherwise, otherwise throughout the specification and claims " comprising ", "comprising" etc. are similar Word should be construed to the meaning included rather than exclusive or exhaustive meaning;That is, it is containing for " including but not limited to " Justice.
In the description of the present application, it is to be understood that term " first ", " second " etc. are only used for description purpose, without It is understood that indicate or imply relative importance.In addition, in the description of the present application, unless otherwise indicated, the meaning of " multiple " It is two or more.
The embodiment of the present application deposits card in block chain after digital certificate generation application is received, by the digital certificate signed and issued In, the security of digital certificate is improved, prevents from being distorted by hacker;When carrying out data check, the number is inquired about from block chain According to corresponding digital certificate and pass through the digital certificate data are verified, it is accurate to be provided by safe and reliable digital certificate Data check to ensure data safety.
Fig. 1 is the configuration diagram of the generation of the embodiment of the present application data certificate and check system.Wherein block chain 1 is by issuing End node 20 and cooperation end node 30 are safeguarded jointly.Distribution end refers to the side of signing and issuing of digital certificate, is usually government and authorization machine Structure;Cooperation end (Partnership) refers to partner or the agent at business end (Business) 4, represent business end 4 and its Client 5 (Client) generates digital certificate to the application of distribution end.
The backstage for issuing end services (Backend as a Service, BaaS) system 21, by the digital certificate of generation Block chain 1 is written to so as to carry out depositing card to digital certificate.The software at distribution end i.e. service (Software as a Service, SaaS) system 22 is for generating digital certificate, and the corresponding digital certificate of the data is verified in data check.Distribution The encryption equipment 23 at end is used to sign to the digital certificate of generation using private key.
The BaaS systems 31 at cooperation end, for being inquired about when cooperation end carries out data check from block chain 1 and obtaining number Word certificate.The SaaS systems 32 at cooperation end carry out the certificates constructing application from business end 4 for submitting certificates constructing application Identity information verifies and will be by the SaaS system 22 for being forwarded to distribution end of verification;The SaaS systems 32 at cooperation end are additionally operable to Data are verified during data check.
If the application of digital certificate is generated from cooperation end, as shown in Figure 2, it is necessary to by following processing procedure.
S201, the SaaS systems at cooperation end generate public private key pair at random.
S202, the SaaS systems at cooperation end submit certificates constructing application to the SaaS systems for issuing end.
S203, the SaaS systems for issuing end verify identity information therein, pass through if verified, provide in digital certificate Hold and continue to execute S205.If it verifies not by performing S204.
S204 returns to identity information mistake and remodifies the message of submission to the SaaS systems at cooperation end.
Digital certificate content is sent to encryption equipment by S205.
S206, encryption equipment sign to digital certificate content using private key.
The digital certificate content signed is back to SaaS systems by S207, encryption equipment.
The digital certificate signed is sent to BaaS systems by S208, the SaaS systems for issuing end.
The digital certificate signed is written to block chain and carries out depositing card by S209, the BaaS systems for issuing end.
Wherein, the certificates constructing application that the SaaS systems at cooperation end are submitted includes public key and identity information.Identity information bag Include the information such as title, the number at cooperation end.
Digital certificate content includes:The identity information and public key of digital certificate owner (applying digital certificate person), number The information such as sequence number, version, the term of validity and the signature algorithm of certificate, the title of digital certificate issued mechanism (distribution end).
The digital certificate of generation is written in the block that block chain is newly generated and carries out depositing card, node is got After the digital certificate of signature, broadcasted to the inside of place block chain network.The node each received demonstrate,proves the number signed Book or its data fingerprint are saved in the block main part in the block that will be created, and then each node begins through competition Mechanism (as resolve a difficult math question) come obtain create the new block right.When a node is won in competition, The digital certificate signed or its data fingerprint preserved in the block is broadcasted to the whole network, and core is carried out by the other nodes of the whole network It is right.The correctness of the data fingerprint of the whole network other node checks block record, if it is confirmed that after correct, all nodes will continue Next block is created according to competition mechanism competition, the digital certificate signed is implanted to block chain as a result, in the block Block head preserve the cryptographic Hash of block header, available for the block identified where the digital certificate.Digital certificate is write Enter the security for block chain, improving digital certificate.
If the application of digital certificate is generated from cooperation end, as shown in Figure 3, it is necessary to by following processing procedure.
S210, business end generate public private key pair at random.
Certificates constructing application is submitted to the SaaS systems at cooperation end in S211, business end.
S212, the SaaS systems at cooperation end verify identity information therein, if verified not by performing S213, such as Fruit stone is looked by then performing S202.
S213, the SaaS systems at cooperation end return to identity information mistake and remodify the message of submission to business end.
S202, the SaaS systems at cooperation end submit certificates constructing application to the SaaS systems for issuing end.
The generation of subsequent digital certificate with deposit the process of card with it is described previously identical, be not repeated to illustrate.If it submits For identity information in certificates constructing application not by issuing the SaaS systems at end, the SaaS systems at cooperation end are receiving distribution end The message that returns of SaaS systems after, the identity information mistake and the message that remodifies submission are forwarded to business end.
If the application of digital certificate is generated from cooperation end, as shown in Figure 4, it is necessary to by following processing procedure.
S214, client generate public private key pair at random.
S215, client submit certificates constructing application to business end.
Identity information therein is verified at S216, business end, if verify not by, perform S217, pass through if verified, Then perform S211.
S217, business end return to identity information mistake and remodify the message of submission to client.
Certificates constructing application is submitted to the SaaS systems at cooperation end in S211, business end.
Subsequent processes with it is described previously identical, be not repeated to illustrate.If identity information is in the SaaS systems at cooperation end System is not by verifying, then business end can receive the identity information mistake of the SaaS systems return at cooperation end and remodify submission Message, which can be forwarded to client by business end;Equally, if the identity information of certificates constructing application is at distribution end SaaS systems fail to verify and pass through, then the SaaS systems at cooperation end can receive the identity information that the SaaS systems at distribution end return The message can be forwarded to client by mistake and the message for remodifying submission, the SaaS systems at cooperation end by business end.
The above-mentioned digital certificate for being generated and saved in block chain, available for the number to client, business end and cooperation end According to progress data check.As shown in figure 5, the process that cooperation end carries out data check comprises the following steps.
S301, the SaaS systems at cooperation end receive data check request, and data check request includes data content, data label Name and public key.
S302, according to public key from the corresponding digital certificate of the BaaS system queries at the cooperation end data.
S303 judges that the digital certificate whether there is.If it is present S305 is performed, if it does not exist, then performing S304。
S304, the unsanctioned message of back-checking.
S305 carries out sign test to data content and data signature using public key, judges whether sign test passes through.If sign test is led to It crosses, then performs S306, if sign test is not by performing S304.
S306, back-checking by message.
If the data check request come from business end, by verify whether by message be back to business end;Such as The request of the fruit data check comes from client and is forwarded to cooperation end by business end, then by verify whether by message pass through Business end is forwarded to client.
The SaaS systems at cooperation end can be additionally configured to need to verify digital certificate, at this time as shown in fig. 6, closing The process for making end progress data check comprises the following steps.
S401, the SaaS systems at cooperation end receive data check request, and data check request includes data content, data label Name and public key.
S402, according to public key from the corresponding digital certificate of the BaaS system queries at the cooperation end data.
S403 judges that the digital certificate whether there is.If it is present S405 is performed, if it does not exist, then performing S404。
S404, the unsanctioned message of back-checking.
S405 judges whether to need to verify digital certificate.When needing to verify digital certificate, perform S406 when need not be verified to digital certificate, performs S409.
S406 sends digital certificate to the SaaS systems for issuing end.
S407, distribution end verify digital certificate using the public key of encryption equipment, judge whether that verification passes through.Verification is logical It is out-of-date, perform S409, verification not by when, perform S408.
S408, the SaaS systems of the distribution unsanctioned message of end back-checking to cooperation end.The SaaS systems at cooperation end after It is continuous to perform S404.
S409, the SaaS systems at cooperation end carry out sign test to data content and data signature using public key, judge that sign test is It is no to pass through.If sign test is by performing S410, if sign test is not by performing S404.
S410, back-checking by message.
In the present embodiment, the corresponding digital certificate of the data is inquired about from block chain and pass through the digital certificate to data into Row verification provides accurate data check to ensure data safety by safe and reliable digital certificate.In addition, above-mentioned number card The generating process and checking procedure of book can perform respectively, can also successively be performed according to from the order for being generated to verification, and point Do not reach corresponding technique effect.
Further, it is also possible to realized by hardware processor (hardware processor) generation of above-mentioned digital certificate and Each program step of verification.A kind of electronic equipment for being used to perform above-mentioned digital certificate generation method, including:Processor;With In the memory of storage processor-executable instruction;Wherein, processor is configured as:Receive certificates constructing application, the certificate Generation application includes public key and identity information;Verify whether the identity information passes through;Pass through in response to identity information verification, carry It is digitally signed for certificate content and using private key to certificate content;The digital certificate signed is written to block chain to complete Certificate deposits card.
In one embodiment, the certificate content is digitally signed using private key including:Using in encryption equipment Private key is digitally signed, and receives the digital certificate signed of encryption equipment return.
In one embodiment, receiving certificates constructing application includes:Receive the certificates constructing application from cooperation end;It is described Certificates constructing application from cooperation end further includes:The forwarding of cooperation end comes from client or business end and is believed by identity Cease the certificates constructing application verified.
In one embodiment, processor is configured to:It is verified not in response to identity information by returning to identity The message of certificates constructing application is resubmited after information errors and modification.
A kind of electronic equipment for being used to perform above-mentioned digital certificate method of calibration, including:Processor;For storing processor The memory of executable instruction;Wherein, processor is configured as:Data check request is received, data check request includes data Content, data signature and public key;From block chain querying node and judge that the corresponding digital certificate of data whether there is according to public key; Exist in response to digital certificate, sign test is carried out to data content and data signature using public key, judges whether sign test passes through;Response Pass through the message that returned data verification passes through in sign test.
In one embodiment, exist in response to digital certificate, data content and data signature are tested using public key Whether label, judge sign test by including:
Exist in response to digital certificate, judge whether to need to verify the digital certificate,
In response to needing to verify digital certificate, digital certificate is sent to end is issued, encryption equipment is utilized by issuing end Public key digital certificate is verified;
The message passed through in response to receiving the digital certificate verification from distribution end, using public key to data content sum number Sign test is carried out according to signature, judges whether sign test passes through;
In response to need not be verified to digital certificate, sign test is carried out to data content and data signature using public key, Judge whether sign test passes through.
In one embodiment, receiving data check request includes:
It receives the request of the data check from business end or receives the data school from client forwarded by business end Test request.
In one embodiment, processor is configured to:
Be not present in response to digital certificate or in response to data content and data signature are carried out sign test not by or Person verifies unsanctioned message, the unsanctioned message of back-checking to business in response to receiving the digital certificate from distribution end End.
It will be understood by those skilled in the art that embodiments herein can be provided as method, apparatus (equipment) or computer Program product.Therefore, in terms of the application can be used complete hardware embodiment, complete software embodiment or combine software and hardware Embodiment form.Moreover, the meter for wherein including computer usable program code in one or more can be used in the application The computer journey that calculation machine usable storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of sequence product.
The application is the flow chart with reference to method, apparatus (equipment) and computer program product according to the embodiment of the present application And/or block diagram describes.It should be understood that each flow in flowchart and/or the block diagram can be realized by computer program instructions And/or the flow in box and flowchart and/or the block diagram and/or the combination of box.These computer programs can be provided to refer to The processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is made to generate One machine so that the instruction generation performed by computer or the processor of other programmable data processing devices is used to implement The device for the function of being specified in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction generation being stored in the computer-readable memory includes referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to generate computer implemented processing, so as in computer or The instruction offer performed on other programmable devices is used to implement in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
The foregoing is merely the preferred embodiments of the application, are not limited to the application, for those skilled in the art For, the application can have various modifications and changes.All any modifications made within spirit herein and principle are equal Replace, improve etc., it should be included within the protection domain of the application.

Claims (10)

1. a kind of generation method of digital certificate, which is characterized in that the described method includes:
Certificates constructing application is received, the certificates constructing application includes public key and identity information;
Verify whether the identity information passes through;
Pass through in response to identity information verification, certificate content is provided and digital label are carried out to the certificate content using private key Name;
The digital certificate signed is written to block chain completion certificate and deposits card.
2. according to the method described in claim 1, it is characterized in that, bag is digitally signed to the certificate content using private key It includes:
It is digitally signed using the private key in encryption equipment, and receives the digital certificate signed of encryption equipment return.
3. according to the method described in claim 1, it is characterized in that, receiving certificates constructing application includes:
The certificates constructing application from cooperation end is received, the certificates constructing application from cooperation end further includes:Cooperation end turns Hair passes through the certificates constructing application that identity information is verified from client or business end and.
4. according to the method described in claim 1, it is characterized in that, the method further includes:
It is verified not in response to the identity information by resubmiting certificates constructing after returning to the identity information mistake and modification The message of application.
5. a kind of method of calibration of digital certificate, which is characterized in that the described method includes:
Data check request is received, the data check request includes data content, data signature and public key;
From block chain querying node and judge that the corresponding digital certificate of the data whether there is according to the public key;
Exist in response to the digital certificate, sign test is carried out to data content and data signature using public key, whether judges sign test Pass through;
Pass through the message that returned data verification passes through in response to sign test.
6. according to the method described in claim 5, it is characterized in that, in response to digital certificate presence, public key logarithm is utilized Sign test is carried out according to content and data signature, judges sign test whether by including:
Exist in response to the digital certificate, judge whether to need to verify the digital certificate,
In response to needing to verify the digital certificate, the digital certificate is sent to end is issued, by distribution end profit The digital certificate is verified with the public key of encryption equipment;
The message passed through in response to receiving the digital certificate verification from the distribution end, using public key to data content Sign test is carried out with data signature, judges whether sign test passes through;
In response to need not be verified to the digital certificate, sign test is carried out to data content and data signature using public key, Judge whether sign test passes through.
7. method according to claim 5 or 6, which is characterized in that receiving data check request includes:
It receives the data check request from business end or receives the data school from client forwarded by the business end Test request.
8. the method according to the description of claim 7 is characterized in that the method further includes:
Be not present in response to the digital certificate or in response to data content and data signature are carried out sign test not by or Person verifies unsanctioned message in response to receiving the digital certificate from distribution end, and the unsanctioned message of back-checking is extremely Business end.
9. a kind of electronic equipment, which is characterized in that including:Processor;For storing the memory of processor-executable instruction;Its In, the processor is configured as the method described in perform claim 1 to 4 any one of requirement.
10. a kind of electronic equipment, which is characterized in that including:Processor;For storing the memory of processor-executable instruction; Wherein, the processor is configured as the method described in perform claim 5 to 8 any one of requirement.
CN201810051996.7A 2018-01-19 2018-01-19 Method and equipment for generating and verifying digital certificate Active CN108111314B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810051996.7A CN108111314B (en) 2018-01-19 2018-01-19 Method and equipment for generating and verifying digital certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810051996.7A CN108111314B (en) 2018-01-19 2018-01-19 Method and equipment for generating and verifying digital certificate

Publications (2)

Publication Number Publication Date
CN108111314A true CN108111314A (en) 2018-06-01
CN108111314B CN108111314B (en) 2021-04-02

Family

ID=62220136

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810051996.7A Active CN108111314B (en) 2018-01-19 2018-01-19 Method and equipment for generating and verifying digital certificate

Country Status (1)

Country Link
CN (1) CN108111314B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109118223A (en) * 2018-08-21 2019-01-01 上海点融信息科技有限责任公司 For managing the method, apparatus and medium of electronic data in block chain
CN109150880A (en) * 2018-08-22 2019-01-04 深圳市人民政府金融发展服务办公室 Datagram delivery method, device and computer readable storage medium
CN109493020A (en) * 2018-11-08 2019-03-19 众安信息技术服务有限公司 Method for secure transactions and device based on block chain
CN109547200A (en) * 2018-11-21 2019-03-29 上海点融信息科技有限责任公司 Certificate distribution method and corresponding calculating equipment and medium in block chain network
CN109767218A (en) * 2019-01-08 2019-05-17 中国工商银行股份有限公司 Block chain certificate processing method and system
CN110020869A (en) * 2019-04-19 2019-07-16 阿里巴巴集团控股有限公司 For generating the method, apparatus and system of block chain authorization message
CN110677376A (en) * 2018-07-03 2020-01-10 中国电信股份有限公司 Authentication method, related device and system and computer readable storage medium
WO2020019914A1 (en) * 2018-07-24 2020-01-30 腾讯科技(深圳)有限公司 Digital certificate verification method and apparatus, computer device, and storage medium
CN110851813A (en) * 2019-11-11 2020-02-28 北京海益同展信息科技有限公司 Identity verification method, node device of block chain system and block chain system
CN110929288A (en) * 2018-12-07 2020-03-27 深圳市智税链科技有限公司 Method for generating public key certificate, certificate authority and medium
CN111222970A (en) * 2019-12-31 2020-06-02 航天信息股份有限公司 Method and system for realizing bill verification based on certificate interaction mode
US10790973B2 (en) 2019-04-19 2020-09-29 Alibaba Group Holding Limited Blockchain authorization information generation
WO2021068619A1 (en) * 2019-10-12 2021-04-15 平安国际智慧城市科技股份有限公司 Certificate authentication management method, apparatus and device, and computer-readable storage medium
CN113114625A (en) * 2021-03-16 2021-07-13 上海源庐加佳信息科技有限公司 Block chain-based user identity verification method, system, medium and terminal
CN113221090A (en) * 2021-05-19 2021-08-06 中国银行股份有限公司 Financial system digital certificate management method, device and system based on block chain
CN114679311A (en) * 2022-03-22 2022-06-28 电子科技大学 Block chain-based document data security verification method
CN114844700A (en) * 2022-04-28 2022-08-02 三峡星未来数据科技(宜昌)有限公司 Identity authentication method, system, equipment and storage medium based on trusted storage in distributed environment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101193103A (en) * 2006-11-24 2008-06-04 华为技术有限公司 A method and system for allocating and validating identity identifier
CN102710605A (en) * 2012-05-08 2012-10-03 重庆大学 Information security management and control method under cloud manufacturing environment
CN103856478A (en) * 2012-12-06 2014-06-11 阿里巴巴集团控股有限公司 Certificate signing and issuing method of trusted network, attestation method of trusted network and corresponding devices
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN107276973A (en) * 2016-12-10 2017-10-20 江苏恒为信息科技有限公司 A kind of internet article identity mark is built and verification method
CN107360001A (en) * 2017-07-26 2017-11-17 阿里巴巴集团控股有限公司 A kind of digital certificate management method, device and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101193103A (en) * 2006-11-24 2008-06-04 华为技术有限公司 A method and system for allocating and validating identity identifier
CN102710605A (en) * 2012-05-08 2012-10-03 重庆大学 Information security management and control method under cloud manufacturing environment
CN103856478A (en) * 2012-12-06 2014-06-11 阿里巴巴集团控股有限公司 Certificate signing and issuing method of trusted network, attestation method of trusted network and corresponding devices
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN107276973A (en) * 2016-12-10 2017-10-20 江苏恒为信息科技有限公司 A kind of internet article identity mark is built and verification method
CN107360001A (en) * 2017-07-26 2017-11-17 阿里巴巴集团控股有限公司 A kind of digital certificate management method, device and system

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110677376B (en) * 2018-07-03 2022-03-22 中国电信股份有限公司 Authentication method, related device and system and computer readable storage medium
CN110677376A (en) * 2018-07-03 2020-01-10 中国电信股份有限公司 Authentication method, related device and system and computer readable storage medium
WO2020019914A1 (en) * 2018-07-24 2020-01-30 腾讯科技(深圳)有限公司 Digital certificate verification method and apparatus, computer device, and storage medium
KR102469024B1 (en) 2018-07-24 2022-11-22 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 Digital certificate verification method and apparatus, computer device, and storage medium
KR20200141086A (en) * 2018-07-24 2020-12-17 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 Digital certificate verification method and apparatus, computer device, and storage medium
CN109118223A (en) * 2018-08-21 2019-01-01 上海点融信息科技有限责任公司 For managing the method, apparatus and medium of electronic data in block chain
CN109150880A (en) * 2018-08-22 2019-01-04 深圳市人民政府金融发展服务办公室 Datagram delivery method, device and computer readable storage medium
CN109493020B (en) * 2018-11-08 2022-02-11 众安信息技术服务有限公司 Block chain based secure transaction method and device
CN109493020A (en) * 2018-11-08 2019-03-19 众安信息技术服务有限公司 Method for secure transactions and device based on block chain
CN109547200A (en) * 2018-11-21 2019-03-29 上海点融信息科技有限责任公司 Certificate distribution method and corresponding calculating equipment and medium in block chain network
CN110929288B (en) * 2018-12-07 2021-06-01 深圳市智税链科技有限公司 Method for generating public key certificate, certificate authority and medium
CN110929288A (en) * 2018-12-07 2020-03-27 深圳市智税链科技有限公司 Method for generating public key certificate, certificate authority and medium
CN109767218A (en) * 2019-01-08 2019-05-17 中国工商银行股份有限公司 Block chain certificate processing method and system
CN109767218B (en) * 2019-01-08 2021-11-02 中国工商银行股份有限公司 Block chain certificate processing method and system
US10790973B2 (en) 2019-04-19 2020-09-29 Alibaba Group Holding Limited Blockchain authorization information generation
US10992465B2 (en) 2019-04-19 2021-04-27 Advanced New Technologies Co., Ltd. Blockchain authorization information generation
CN110020869A (en) * 2019-04-19 2019-07-16 阿里巴巴集团控股有限公司 For generating the method, apparatus and system of block chain authorization message
US11218305B2 (en) 2019-04-19 2022-01-04 Advanced New Technologies Co., Ltd. Blockchain authorization information generation
CN110020869B (en) * 2019-04-19 2020-08-07 阿里巴巴集团控股有限公司 Method, device and system for generating block chain authorization information
WO2021068619A1 (en) * 2019-10-12 2021-04-15 平安国际智慧城市科技股份有限公司 Certificate authentication management method, apparatus and device, and computer-readable storage medium
CN110851813A (en) * 2019-11-11 2020-02-28 北京海益同展信息科技有限公司 Identity verification method, node device of block chain system and block chain system
CN111222970A (en) * 2019-12-31 2020-06-02 航天信息股份有限公司 Method and system for realizing bill verification based on certificate interaction mode
CN113114625A (en) * 2021-03-16 2021-07-13 上海源庐加佳信息科技有限公司 Block chain-based user identity verification method, system, medium and terminal
CN113114625B (en) * 2021-03-16 2023-07-18 上海源庐加佳信息科技有限公司 User identity verification method, system, medium and terminal based on block chain
CN113221090A (en) * 2021-05-19 2021-08-06 中国银行股份有限公司 Financial system digital certificate management method, device and system based on block chain
CN114679311B (en) * 2022-03-22 2023-04-07 电子科技大学 Block chain-based document data security verification method
CN114679311A (en) * 2022-03-22 2022-06-28 电子科技大学 Block chain-based document data security verification method
CN114844700A (en) * 2022-04-28 2022-08-02 三峡星未来数据科技(宜昌)有限公司 Identity authentication method, system, equipment and storage medium based on trusted storage in distributed environment

Also Published As

Publication number Publication date
CN108111314B (en) 2021-04-02

Similar Documents

Publication Publication Date Title
CN108111314A (en) The generation of digital certificate and method of calibration and equipment
CN111989893B (en) Method, system and computer readable device for generating and linking zero knowledge proofs
CN106339875B (en) Operation note checking method and device based on publicly-owned block chain
CN110383752B (en) Compact recording protocol
US20190333054A1 (en) System for verification of pseudonymous credentials for digital identities with managed access to personal data on trust networks
CN106357612B (en) Authentication record checking method and device based on publicly-owned block chain
CN102959559B (en) For the method producing certificate
JP7083892B2 (en) Mobile authentication interoperability of digital certificates
CN108848063A (en) Data processing method, system and computer readable storage medium based on block chain
CN107592293A (en) The means of communication, digital certificate management method, device and electronic equipment between block chain node
CN106529946A (en) Method for realizing user identity digitalization based on block chain
CN106911641A (en) For authorizing the client terminal device for accessing, server unit and access control system
CN109639410A (en) Data based on block chain deposit card method and device, electronic equipment
CN108875386A (en) A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism
CN108259438A (en) A kind of method and apparatus of the certification based on block chain technology
CN109768983A (en) Dynamic and Multi dimensional personal identification method, apparatus and system based on block chain
CA2421691A1 (en) A biometric authentication system and method
CN113204783B (en) Privacy protection safety decentralized self-ownership identity authentication protocol method
US11663595B1 (en) Blockchain transactional identity verification
CN110417790A (en) Block chain system of real name queuing system and method
CN114666168B (en) Decentralized identity certificate verification method and device, and electronic equipment
CN110674531B (en) Residential information management method, device, server and medium based on block chain
CN113743921A (en) Digital asset processing method, device, equipment and storage medium
CN110298152A (en) It is a kind of protection privacy of user and system safety line on identity management method
CN108540447A (en) A kind of certification authentication method and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210121

Address after: 215163 No. 9 Xuesen Road, Science and Technology City, Suzhou High-tech Zone, Jiangsu Province

Applicant after: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Address before: 100000 4008, 4 floor, 9 building, 56 half moon street, Xicheng District, Beijing.

Applicant before: SINOCHAIN TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230417

Address after: 518000, 501-503, Baolu Auto Parts Business Center, 195 Chuangye Er Road, Zone 28, Dalang Community, Xin'an Street, Bao'an District, Shenzhen City, Guangdong Province

Patentee after: Caiyouyou Technology (Shenzhen) Co.,Ltd.

Address before: 215163 No. 9 Xuesen Road, Science and Technology City, Suzhou High-tech Zone, Jiangsu Province

Patentee before: Suzhou Lang run innovation intellectual property operation Co.,Ltd.