CN108566272A - Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government - Google Patents
Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government Download PDFInfo
- Publication number
- CN108566272A CN108566272A CN201810001159.3A CN201810001159A CN108566272A CN 108566272 A CN108566272 A CN 108566272A CN 201810001159 A CN201810001159 A CN 201810001159A CN 108566272 A CN108566272 A CN 108566272A
- Authority
- CN
- China
- Prior art keywords
- certificate
- field
- code
- public key
- government
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 12
- 230000008520 organization Effects 0.000 claims description 7
- 210000000056 organ Anatomy 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- TVZRAEYQIKYCPH-UHFFFAOYSA-N 3-(trimethylsilyl)propane-1-sulfonic acid Chemical compound C[Si](C)(C)CCCS(O)(=O)=O TVZRAEYQIKYCPH-UHFFFAOYSA-N 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000000739 chaotic effect Effects 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Educational Administration (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to information systems technology field, method for pushing is recognized each other in especially a kind of Public Key Infrastructure mutual trust based on E-Government.Standards system is recognized each other in the mutual trust of structure E-Government Zhong Duo certification authorities, is solved the compliant applications of more certification authority's digital certificates, is ensured the safety of the authenticity and data of communicating pair identity.The present invention proposes the standard system frame for supporting more certification authority's mutual trusts to recognize each other.Establish the Standardization System towards more certification authority's compliant applications.It can realize that multimachine structure is recognized each other by signing and issuing list and electronic code, sign and issue list and electronic code records detailed public key information situation, and information is quickly read by code field form calculus machine, office efficiency is substantially improved.In addition client can link direct log-on webpage transacting business or browsing by log in page web page address.Push concern log in page can be recorded according to web page browsing.Routine adjustment push content provides for client more to open up service.
Description
Technical field
The present invention relates to information systems technology field, especially a kind of Public Key Infrastructure mutual trust based on E-Government is mutual
Recognize method for pushing.
Background technology
Basis and core of the Public Key Infrastructure as network trust system, are paid close attention to by the public and scholars.In recent years,
Service application of the China based on government affairs outer net is continuously increased, and the demand to certification authority's authentication service is also more and more.Due to lacking
It is weary it is perfect integrate management, regulation, standard, technology, using PKI System so that service towards the public
Public Key Infrastructure trust systems build barrier between different departments outstanding problem, and built Public Key Infrastructure trust systems are substantially at mutually
Segmentation, unrelated trust isolated island, thus more certification authority's digital certificates can not be compatible in same operation system, it causes to provide
Source utilization rate is low, seriously affects the fast development of China's digital certificate service trade and popularizing for network trust environment.
Individual public keys need a variety of formalities such as government department's audit, encryption and certification of registered capital, public key to actually use above-mentioned hand simultaneously
It is continuous clearly to learn, public key is in turn resulted in using chaotic, safety is poor, and it is big, time-consuming to work at the same time personal identification public key difficulty
Arduously.The serious use for constraining public key.
Invention content
Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government, is included the following steps:
A, electronic code is generated
Client generates public key using entity certificate in government affairs department, contains electronic code in public key, electronic code includes user class
Malapropism section, certificate source field, Customs Assigned Number field, separator, certification authority's code field, certificate code field, safety post
Section of becoming literate and passport NO. field, electronic code record certificate information;
B, electronic code mutual trust is recognized each other
When client uses public key, electronic code information is checked by certification authority, and user information, certificate are checked and verify by electronic code information
Source, certification authority, certificate code, safety encryption situation and passport NO.;Errorless public key is checked and verify to check and approve use and generate electronics
List is signed and issued, it includes version number field, issuer field, effective date and next update date that electronics, which signs and issues list,;
C, list mutual trust is signed and issued to recognize each other
Client signs and issues list with electronics using public key and connects network application, and network applications management personnel check electronic code and sign and issue
List information activates network application normal use;
D, PUSH message is sent
Log in page will be paid close attention to according to class of subscriber field, certificate source field, Customs Assigned Number field and certification authority's code field
Web page address link push is to client.
In the step B electronics sign and issue list further include signature algorithm field, revoke date field, extension field and by
Certificate revocation lists field.
Extension field includes issuing organization key identifier, digital certificate Revocation Lists number, increment in the step B
Digital certificate Revocation Lists pointer, digital certificate Revocation Lists publishing point, incremental digital Certificate Revocation Lists publishing point.
Class of subscriber field is 00 and 01,00 expression personal user in the step A, and 01 indicates legal person user;
It is the license certification that government affairs service enforcement body generates, government organs that license source field, which is divided into 00,01,10 and 11,00,
The electronics certificate information issued;01 is to have veritified the certificate information passed through, government organs personnel by government affairs service window personnel
The electronics certificate information veritified;10 be the license certification that user voluntarily uploads, such as Copy of ID Card;11 be user from saw lumber
Material, the testimonial material shot with camera such as user oneself;
Customs Assigned Number field is held the serial number of certificate by certificate user;
Certification authority's code field is 4-digit number after the licensing of certification authority is numbered;
Safety indicates that field is the correspondence of security identifier and passport NO., is divided into 0,1 and 2,0 expression clear text format and signs and issues, 1
Presentation code format is signed and issued, and 2 expression encryption formats are signed and issued;
Passport NO. field is the digital coding on certificate.
Certificate code field is crucial certificate coding, the certificate that certificate user application digital certificate uses in the step A
Correspondence between type and certificate code, specific number are as follows:
It is personal:Resident's residence booklet(000000), identity card(000001), interim identity card(000010), officer's identity card(000011)、
People's Armed Police's police officer's identity card(000100), soldier's indentity card(000101), army student card(000110), army non-ranking cadre card(000111)、
Among Retired Army Officers are demonstrate,proved and military employees card(001000), passport(001001), Hong Kong and Macao Compatriot's home return permit(001010), Hongkong and Macro
Resident carrys out the pass inside(001011), dealing Hongkong and Macro of the People's Republic of China (PRC) pass(001100), Taiwan residents dealing
The continent pass(001101), mainlander come and go the Taiwan pass(001110), residence permit for foreigners(001111), the foreigner
Entry and exit card(010000), diplomat card(010001), consulate card(010010), seaman's book(010011)Deng before the deadline
The certificate used;
Legal person:Unified social credibility code(000), number of registration(001), organization mechanism code(010)Deng using before the deadline
Certificate.
Client is issued in a manner of mail push in the step D.
Beneficial effects of the present invention are:
Standards system is recognized each other in the mutual trust of structure E-Government Zhong Duo certification authorities, and the compatibility for solving more certification authority's digital certificates is answered
With the safety of the authenticity and data of guarantee communicating pair identity.The present invention proposes what the more certification authority's mutual trusts of support were recognized each other
Standard system frame.Establish the Standardization System towards more certification authority's compliant applications.It can be compiled by signing and issuing list and electronics
Code realization multimachine structure is recognized each other, and signs and issues list and electronic code records detailed public key information situation, and pass through code field form meter
Calculation machine quickly reads information, and office efficiency is substantially improved.
In addition client can link direct log-on webpage transacting business or browsing by log in page web page address.It can basis
Web page browsing record push concern log in page.Routine adjustment push content provides for client more to open up service.
Description of the drawings
Fig. 1 is that the present invention uses schematic diagram;
Fig. 2 is electronic code schematic diagram;
Fig. 3 is to sign and issue list schematic diagram.
Specific implementation mode
Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government, is included the following steps:
A, electronic code is generated
Client generates public key using entity certificate in government affairs department, contains electronic code in public key, electronic code includes user class
Malapropism section, certificate source field, Customs Assigned Number field, separator, certification authority's code field, certificate code field, safety post
Section of becoming literate and passport NO. field, electronic code record certificate information;
B, electronic code mutual trust is recognized each other
When client uses public key, electronic code information is checked by certification authority, and user information, certificate are checked and verify by electronic code information
Source, certification authority, certificate code, safety encryption situation and passport NO.;Errorless public key is checked and verify to check and approve use and generate electronics
List is signed and issued, it includes version number field, issuer field, effective date and next update date that electronics, which signs and issues list,;
C, list mutual trust is signed and issued to recognize each other
Client signs and issues list with electronics using public key and connects network application, and network applications management personnel check electronic code and sign and issue
List information activates network application normal use;
D, PUSH message is sent
Log in page will be paid close attention to according to class of subscriber field, certificate source field, Customs Assigned Number field and certification authority's code field
Web page address link push is to client.
In the step B electronics sign and issue list further include signature algorithm field, revoke date field, extension field and by
Certificate revocation lists field.
Extension field includes issuing organization key identifier, digital certificate Revocation Lists number, increment in the step B
Digital certificate Revocation Lists pointer, digital certificate Revocation Lists publishing point, incremental digital Certificate Revocation Lists publishing point.
Class of subscriber field is 00 and 01,00 expression personal user in the step A, and 01 indicates legal person user;
It is the license certification that government affairs service enforcement body generates, government organs that license source field, which is divided into 00,01,10 and 11,00,
The electronics certificate information issued;01 is to have veritified the certificate information passed through, government organs personnel by government affairs service window personnel
The electronics certificate information veritified;10 be the license certification that user voluntarily uploads, such as Copy of ID Card;11 be user from saw lumber
Material, the testimonial material shot with camera such as user oneself;
Customs Assigned Number field is held the serial number of certificate by certificate user;
Certification authority's code field is 4-digit number after the licensing of certification authority is numbered;
Safety indicates that field is the correspondence of security identifier and passport NO., is divided into 0,1 and 2,0 expression clear text format and signs and issues, 1
Presentation code format is signed and issued, and 2 expression encryption formats are signed and issued.
Passport NO. field is the digital coding on certificate.
Certificate code field is crucial certificate coding, the certificate that certificate user application digital certificate uses in the step A
Correspondence between type and certificate code, specific number are as follows:
It is personal:Resident's residence booklet(000000), identity card(000001), interim identity card(000010), officer's identity card(000011)、
People's Armed Police's police officer's identity card(000100), soldier's indentity card(000101), army student card(000110), army non-ranking cadre card(000111)、
Among Retired Army Officers are demonstrate,proved and military employees card(001000), passport(001001), Hong Kong and Macao Compatriot's home return permit(001010), Hongkong and Macro
Resident carrys out the pass inside(001011), dealing Hongkong and Macro of the People's Republic of China (PRC) pass(001100), Taiwan residents dealing
The continent pass(001101), mainlander come and go the Taiwan pass(001110), residence permit for foreigners(001111), the foreigner
Entry and exit card(010000), diplomat card(010001), consulate card(010010), seaman's book(010011)Deng before the deadline
The certificate used;
Legal person:Unified social credibility code(000), number of registration(001), organization mechanism code(010)Deng using before the deadline
Certificate.
Client is issued in a manner of mail push in the step D.
From issuing successfully effectively.When digital certificate holder is not intended to using digital certificate, it can apply for digital card
Book cancels.Digital certificate Revocation Lists are the verification whether believable key messages of certificate, and the digital certificate originally studied and defined is nullified
List basic structure, as shown in Figure 3.
Version number:Digital certificate Revocation Lists version number.
Promulgation person:Certification authority's certificate number.
Effective date:The date/time that this digital certificate Revocation Lists is promulgated.
The next update date:The expired date/time of this digital certificate Revocation Lists.
Signature algorithm:Using traditional crypto signature algorithm RSA signature, Rabin signatures and DSS signatures.
Revoke the date:The date and time that certificate is revoked.
Extension:Issuing organization key identifier, digital certificate Revocation Lists number, incremental digital Certificate Revocation Lists refer to
Needle, digital certificate Revocation Lists publishing point, incremental digital Certificate Revocation Lists publishing point.
The list of cert being revoked:Certificate serial number cancels date/time, the extension of digital certificate Revocation Lists entity.
Operation architecture of the present invention includes Network Environment Resource, tomcat middlewares, JAVA basic environments, government intranet, political affairs
The software and hardware facilities such as business outer net.
The information such as government affairs, the people's livelihood, health, medical treatment, sport, disaster can be periodically pushed according to legal person and personal information.
Claims (6)
1. method for pushing is recognized each other in the Public Key Infrastructure mutual trust based on E-Government, it is characterised in that include the following steps:
A, electronic code is generated
Client generates public key using entity certificate in government affairs department, contains electronic code in public key, electronic code includes user class
Malapropism section, certificate source field, Customs Assigned Number field, separator, certification authority's code field, certificate code field, safety post
Section of becoming literate and passport NO. field, electronic code record certificate information;
B, electronic code mutual trust is recognized each other
When client uses public key, electronic code information is checked by certification authority, and user information, certificate are checked and verify by electronic code information
Source, certification authority, certificate code, safety encryption situation and passport NO.;Errorless public key is checked and verify to check and approve use and generate electronics
List is signed and issued, it includes version number field, issuer field, effective date and next update date that electronics, which signs and issues list,;
C, list mutual trust is signed and issued to recognize each other
Client signs and issues list with electronics using public key and connects network application, and network applications management personnel check electronic code and sign and issue
List information activates network application normal use;
D, PUSH message is sent
Log in page will be paid close attention to according to class of subscriber field, certificate source field, Customs Assigned Number field and certification authority's code field
Web page address link push is to client.
2. method for pushing is recognized each other in the Public Key Infrastructure mutual trust according to claim 1 based on E-Government, feature exists
Electronics signs and issues list and further includes signature algorithm field, revokes date field, extension field and is revoked card in the step B
Book list field.
3. method for pushing is recognized each other in the Public Key Infrastructure mutual trust according to claim 2 based on E-Government, feature exists
Extension field includes issuing organization key identifier, digital certificate Revocation Lists number, incremental digital card in the step B
Book Revocation Lists pointer, digital certificate Revocation Lists publishing point, incremental digital Certificate Revocation Lists publishing point.
4. method for pushing is recognized each other in the Public Key Infrastructure mutual trust according to claim 1 based on E-Government, feature exists
Class of subscriber field is 00 and 01,00 expression personal user in the step A, and 01 indicates legal person user;
It is the license certification that government affairs service enforcement body generates, government organs that license source field, which is divided into 00,01,10 and 11,00,
The electronics certificate information issued;01 is to have veritified the certificate information passed through, government organs personnel by government affairs service window personnel
The electronics certificate information veritified;10 be the license certification that user voluntarily uploads, such as Copy of ID Card;11 be user from saw lumber
Material, the testimonial material shot with camera such as user oneself;
Customs Assigned Number field is held the serial number of certificate by certificate user;
Certification authority's code field is 4-digit number after the licensing of certification authority is numbered;
Safety indicates that field is the correspondence of security identifier and passport NO., is divided into 0,1 and 2,0 expression clear text format and signs and issues, 1
Presentation code format is signed and issued, and 2 expression encryption formats are signed and issued;
Passport NO. field is the digital coding on certificate.
5. method for pushing is recognized each other in the Public Key Infrastructure mutual trust according to claim 1 based on E-Government, feature exists
In the step A certificate code field be certificate user application digital certificate use crucial certificate coding, certificate type and
Correspondence between certificate code, specific number are as follows:
It is personal:Resident's residence booklet(000000), identity card(000001), interim identity card(000010), officer's identity card(000011)、
People's Armed Police's police officer's identity card(000100), soldier's indentity card(000101), army student card(000110), army non-ranking cadre card(000111)、
Among Retired Army Officers are demonstrate,proved and military employees card(001000), passport(001001), Hong Kong and Macao Compatriot's home return permit(001010), Hongkong and Macro
Resident carrys out the pass inside(001011), dealing Hongkong and Macro of the People's Republic of China (PRC) pass(001100), Taiwan residents dealing
The continent pass(001101), mainlander come and go the Taiwan pass(001110), residence permit for foreigners(001111), the foreigner
Entry and exit card(010000), diplomat card(010001), consulate card(010010), seaman's book(010011)Deng before the deadline
The certificate used;
Legal person:Unified social credibility code(000), number of registration(001), organization mechanism code(010)Deng using before the deadline
Certificate.
6. method for pushing is recognized each other in the Public Key Infrastructure mutual trust according to claim 1 based on E-Government, feature exists
Client is issued in a manner of mail push in the step D.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810001159.3A CN108566272A (en) | 2018-01-02 | 2018-01-02 | Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810001159.3A CN108566272A (en) | 2018-01-02 | 2018-01-02 | Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108566272A true CN108566272A (en) | 2018-09-21 |
Family
ID=63530473
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810001159.3A Pending CN108566272A (en) | 2018-01-02 | 2018-01-02 | Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108566272A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111199585A (en) * | 2020-01-13 | 2020-05-26 | 中国铁道科学研究院集团有限公司电子计算技术研究所 | Ticket checking method, device, system, storage medium and computer equipment |
CN111262834A (en) * | 2020-01-09 | 2020-06-09 | 中国信息通信研究院 | Authentication and credibility analysis method, device and system for physical entity |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102333077A (en) * | 2011-07-21 | 2012-01-25 | 上海互联网软件有限公司 | Safety verification system for electronic document office system and method thereof |
US20130311788A1 (en) * | 2010-12-31 | 2013-11-21 | Mourad Faher | System providing an improved skimming resistance for an electronic identity document |
CN103825744A (en) * | 2014-03-13 | 2014-05-28 | 上海市数字证书认证中心有限公司 | Off-site personal digital certificate application method and system |
EP3252649A1 (en) * | 2016-06-03 | 2017-12-06 | DocuSign, Inc. | Universal access to document transaction platform |
-
2018
- 2018-01-02 CN CN201810001159.3A patent/CN108566272A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130311788A1 (en) * | 2010-12-31 | 2013-11-21 | Mourad Faher | System providing an improved skimming resistance for an electronic identity document |
CN102333077A (en) * | 2011-07-21 | 2012-01-25 | 上海互联网软件有限公司 | Safety verification system for electronic document office system and method thereof |
CN103825744A (en) * | 2014-03-13 | 2014-05-28 | 上海市数字证书认证中心有限公司 | Off-site personal digital certificate application method and system |
EP3252649A1 (en) * | 2016-06-03 | 2017-12-06 | DocuSign, Inc. | Universal access to document transaction platform |
Non-Patent Citations (3)
Title |
---|
刘守义主编: "《智能卡技术》", 31 December 2004, 西安电子科技大学出版社 * |
国务院办公厅: "国务院办公厅关于印发"互联网+政务服务"技术体系建设指南的通知", 《国办函[2016]108号》 * |
颜海龙: "基于PKI/CA互信互认体系的电子政务", 《深圳大学学报理工版》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111262834A (en) * | 2020-01-09 | 2020-06-09 | 中国信息通信研究院 | Authentication and credibility analysis method, device and system for physical entity |
CN111262834B (en) * | 2020-01-09 | 2022-03-29 | 中国信息通信研究院 | Authentication and credibility analysis method, device and system for physical entity |
CN111199585A (en) * | 2020-01-13 | 2020-05-26 | 中国铁道科学研究院集团有限公司电子计算技术研究所 | Ticket checking method, device, system, storage medium and computer equipment |
CN111199585B (en) * | 2020-01-13 | 2022-04-12 | 中国铁道科学研究院集团有限公司电子计算技术研究所 | Ticket checking method, device, system, storage medium and computer equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11552795B2 (en) | Key recovery | |
EP3560139B1 (en) | Distributed blockchain-based method for maintaining the validity of a file | |
US8635442B2 (en) | System and method for long-term digital signature verification utilizing light weight digital signatures | |
Ellison | SPKI requirements | |
US7028180B1 (en) | System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature | |
EP3853758B1 (en) | Systems and computer-based methods of document certification and publication | |
KR100822596B1 (en) | Recording medium having electronic document management program recorded, electronic document management system and electronic document management method | |
US10992683B2 (en) | System and method for authenticating, storing, retrieving, and verifying documents | |
EP3984164A1 (en) | Binding of decentralized identifiers to verified claims | |
WO2018114587A1 (en) | Distributed blockchain-based method for maintaining the validity of a file | |
WO2019081530A1 (en) | Methods for recording and sharing a digital identity of a user using distributed ledgers | |
US9218589B2 (en) | Issuance, conveyance and management of endorsements | |
CN114944937B (en) | Distributed digital identity verification method, system, electronic equipment and storage medium | |
CN108566272A (en) | Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government | |
US20230177174A1 (en) | Encrypted verifiable credentials | |
US20230179402A1 (en) | Device asserted verifiable credential | |
EP1164745A2 (en) | System and method for usage of a role certificate in encryption, and as a seal, digital stamp, and a signature | |
Ellison | RFC2692: SPKI Requirements | |
US7958363B2 (en) | Toolbar signature | |
Chandra et al. | Novel blockchain-based framework to publish, verify, and store digital academic credentials of universities | |
US20230179588A1 (en) | Verifiable credential with dynamic claim | |
CN108063669A (en) | The mutual verifying method of Public Key Infrastructure mutual trust based on E-Government | |
Schrahe et al. | Privacy preserving vaccinating‐and testing‐pass for the European Union | |
Minihan | Electronic signature technologies: a tutorial.(Cover Story) | |
Aparna et al. | Exploring Blockchain Solutions for Combating Fake Certificates |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180921 |