CN108566272A - Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government - Google Patents

Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government Download PDF

Info

Publication number
CN108566272A
CN108566272A CN201810001159.3A CN201810001159A CN108566272A CN 108566272 A CN108566272 A CN 108566272A CN 201810001159 A CN201810001159 A CN 201810001159A CN 108566272 A CN108566272 A CN 108566272A
Authority
CN
China
Prior art keywords
certificate
field
code
public key
government
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810001159.3A
Other languages
Chinese (zh)
Inventor
刘博�
李保印
刘涛
张宝玉
王坤
蒋绪升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GANSU WANWEI INFORMATION TECHNOLOGY CO LTD
Original Assignee
GANSU WANWEI INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GANSU WANWEI INFORMATION TECHNOLOGY CO LTD filed Critical GANSU WANWEI INFORMATION TECHNOLOGY CO LTD
Priority to CN201810001159.3A priority Critical patent/CN108566272A/en
Publication of CN108566272A publication Critical patent/CN108566272A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Educational Administration (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to information systems technology field, method for pushing is recognized each other in especially a kind of Public Key Infrastructure mutual trust based on E-Government.Standards system is recognized each other in the mutual trust of structure E-Government Zhong Duo certification authorities, is solved the compliant applications of more certification authority's digital certificates, is ensured the safety of the authenticity and data of communicating pair identity.The present invention proposes the standard system frame for supporting more certification authority's mutual trusts to recognize each other.Establish the Standardization System towards more certification authority's compliant applications.It can realize that multimachine structure is recognized each other by signing and issuing list and electronic code, sign and issue list and electronic code records detailed public key information situation, and information is quickly read by code field form calculus machine, office efficiency is substantially improved.In addition client can link direct log-on webpage transacting business or browsing by log in page web page address.Push concern log in page can be recorded according to web page browsing.Routine adjustment push content provides for client more to open up service.

Description

Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government
Technical field
The present invention relates to information systems technology field, especially a kind of Public Key Infrastructure mutual trust based on E-Government is mutual Recognize method for pushing.
Background technology
Basis and core of the Public Key Infrastructure as network trust system, are paid close attention to by the public and scholars.In recent years, Service application of the China based on government affairs outer net is continuously increased, and the demand to certification authority's authentication service is also more and more.Due to lacking It is weary it is perfect integrate management, regulation, standard, technology, using PKI System so that service towards the public Public Key Infrastructure trust systems build barrier between different departments outstanding problem, and built Public Key Infrastructure trust systems are substantially at mutually Segmentation, unrelated trust isolated island, thus more certification authority's digital certificates can not be compatible in same operation system, it causes to provide Source utilization rate is low, seriously affects the fast development of China's digital certificate service trade and popularizing for network trust environment.
Individual public keys need a variety of formalities such as government department's audit, encryption and certification of registered capital, public key to actually use above-mentioned hand simultaneously It is continuous clearly to learn, public key is in turn resulted in using chaotic, safety is poor, and it is big, time-consuming to work at the same time personal identification public key difficulty Arduously.The serious use for constraining public key.
Invention content
Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government, is included the following steps:
A, electronic code is generated
Client generates public key using entity certificate in government affairs department, contains electronic code in public key, electronic code includes user class Malapropism section, certificate source field, Customs Assigned Number field, separator, certification authority's code field, certificate code field, safety post Section of becoming literate and passport NO. field, electronic code record certificate information;
B, electronic code mutual trust is recognized each other
When client uses public key, electronic code information is checked by certification authority, and user information, certificate are checked and verify by electronic code information Source, certification authority, certificate code, safety encryption situation and passport NO.;Errorless public key is checked and verify to check and approve use and generate electronics List is signed and issued, it includes version number field, issuer field, effective date and next update date that electronics, which signs and issues list,;
C, list mutual trust is signed and issued to recognize each other
Client signs and issues list with electronics using public key and connects network application, and network applications management personnel check electronic code and sign and issue List information activates network application normal use;
D, PUSH message is sent
Log in page will be paid close attention to according to class of subscriber field, certificate source field, Customs Assigned Number field and certification authority's code field Web page address link push is to client.
In the step B electronics sign and issue list further include signature algorithm field, revoke date field, extension field and by Certificate revocation lists field.
Extension field includes issuing organization key identifier, digital certificate Revocation Lists number, increment in the step B Digital certificate Revocation Lists pointer, digital certificate Revocation Lists publishing point, incremental digital Certificate Revocation Lists publishing point.
Class of subscriber field is 00 and 01,00 expression personal user in the step A, and 01 indicates legal person user;
It is the license certification that government affairs service enforcement body generates, government organs that license source field, which is divided into 00,01,10 and 11,00, The electronics certificate information issued;01 is to have veritified the certificate information passed through, government organs personnel by government affairs service window personnel The electronics certificate information veritified;10 be the license certification that user voluntarily uploads, such as Copy of ID Card;11 be user from saw lumber Material, the testimonial material shot with camera such as user oneself;
Customs Assigned Number field is held the serial number of certificate by certificate user;
Certification authority's code field is 4-digit number after the licensing of certification authority is numbered;
Safety indicates that field is the correspondence of security identifier and passport NO., is divided into 0,1 and 2,0 expression clear text format and signs and issues, 1 Presentation code format is signed and issued, and 2 expression encryption formats are signed and issued;
Passport NO. field is the digital coding on certificate.
Certificate code field is crucial certificate coding, the certificate that certificate user application digital certificate uses in the step A Correspondence between type and certificate code, specific number are as follows:
It is personal:Resident's residence booklet(000000), identity card(000001), interim identity card(000010), officer's identity card(000011)、 People's Armed Police's police officer's identity card(000100), soldier's indentity card(000101), army student card(000110), army non-ranking cadre card(000111)、 Among Retired Army Officers are demonstrate,proved and military employees card(001000), passport(001001), Hong Kong and Macao Compatriot's home return permit(001010), Hongkong and Macro Resident carrys out the pass inside(001011), dealing Hongkong and Macro of the People's Republic of China (PRC) pass(001100), Taiwan residents dealing The continent pass(001101), mainlander come and go the Taiwan pass(001110), residence permit for foreigners(001111), the foreigner Entry and exit card(010000), diplomat card(010001), consulate card(010010), seaman's book(010011)Deng before the deadline The certificate used;
Legal person:Unified social credibility code(000), number of registration(001), organization mechanism code(010)Deng using before the deadline Certificate.
Client is issued in a manner of mail push in the step D.
Beneficial effects of the present invention are:
Standards system is recognized each other in the mutual trust of structure E-Government Zhong Duo certification authorities, and the compatibility for solving more certification authority's digital certificates is answered With the safety of the authenticity and data of guarantee communicating pair identity.The present invention proposes what the more certification authority's mutual trusts of support were recognized each other Standard system frame.Establish the Standardization System towards more certification authority's compliant applications.It can be compiled by signing and issuing list and electronics Code realization multimachine structure is recognized each other, and signs and issues list and electronic code records detailed public key information situation, and pass through code field form meter Calculation machine quickly reads information, and office efficiency is substantially improved.
In addition client can link direct log-on webpage transacting business or browsing by log in page web page address.It can basis Web page browsing record push concern log in page.Routine adjustment push content provides for client more to open up service.
Description of the drawings
Fig. 1 is that the present invention uses schematic diagram;
Fig. 2 is electronic code schematic diagram;
Fig. 3 is to sign and issue list schematic diagram.
Specific implementation mode
Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government, is included the following steps:
A, electronic code is generated
Client generates public key using entity certificate in government affairs department, contains electronic code in public key, electronic code includes user class Malapropism section, certificate source field, Customs Assigned Number field, separator, certification authority's code field, certificate code field, safety post Section of becoming literate and passport NO. field, electronic code record certificate information;
B, electronic code mutual trust is recognized each other
When client uses public key, electronic code information is checked by certification authority, and user information, certificate are checked and verify by electronic code information Source, certification authority, certificate code, safety encryption situation and passport NO.;Errorless public key is checked and verify to check and approve use and generate electronics List is signed and issued, it includes version number field, issuer field, effective date and next update date that electronics, which signs and issues list,;
C, list mutual trust is signed and issued to recognize each other
Client signs and issues list with electronics using public key and connects network application, and network applications management personnel check electronic code and sign and issue List information activates network application normal use;
D, PUSH message is sent
Log in page will be paid close attention to according to class of subscriber field, certificate source field, Customs Assigned Number field and certification authority's code field Web page address link push is to client.
In the step B electronics sign and issue list further include signature algorithm field, revoke date field, extension field and by Certificate revocation lists field.
Extension field includes issuing organization key identifier, digital certificate Revocation Lists number, increment in the step B Digital certificate Revocation Lists pointer, digital certificate Revocation Lists publishing point, incremental digital Certificate Revocation Lists publishing point.
Class of subscriber field is 00 and 01,00 expression personal user in the step A, and 01 indicates legal person user;
It is the license certification that government affairs service enforcement body generates, government organs that license source field, which is divided into 00,01,10 and 11,00, The electronics certificate information issued;01 is to have veritified the certificate information passed through, government organs personnel by government affairs service window personnel The electronics certificate information veritified;10 be the license certification that user voluntarily uploads, such as Copy of ID Card;11 be user from saw lumber Material, the testimonial material shot with camera such as user oneself;
Customs Assigned Number field is held the serial number of certificate by certificate user;
Certification authority's code field is 4-digit number after the licensing of certification authority is numbered;
Safety indicates that field is the correspondence of security identifier and passport NO., is divided into 0,1 and 2,0 expression clear text format and signs and issues, 1 Presentation code format is signed and issued, and 2 expression encryption formats are signed and issued.
Passport NO. field is the digital coding on certificate.
Certificate code field is crucial certificate coding, the certificate that certificate user application digital certificate uses in the step A Correspondence between type and certificate code, specific number are as follows:
It is personal:Resident's residence booklet(000000), identity card(000001), interim identity card(000010), officer's identity card(000011)、 People's Armed Police's police officer's identity card(000100), soldier's indentity card(000101), army student card(000110), army non-ranking cadre card(000111)、 Among Retired Army Officers are demonstrate,proved and military employees card(001000), passport(001001), Hong Kong and Macao Compatriot's home return permit(001010), Hongkong and Macro Resident carrys out the pass inside(001011), dealing Hongkong and Macro of the People's Republic of China (PRC) pass(001100), Taiwan residents dealing The continent pass(001101), mainlander come and go the Taiwan pass(001110), residence permit for foreigners(001111), the foreigner Entry and exit card(010000), diplomat card(010001), consulate card(010010), seaman's book(010011)Deng before the deadline The certificate used;
Legal person:Unified social credibility code(000), number of registration(001), organization mechanism code(010)Deng using before the deadline Certificate.
Client is issued in a manner of mail push in the step D.
From issuing successfully effectively.When digital certificate holder is not intended to using digital certificate, it can apply for digital card Book cancels.Digital certificate Revocation Lists are the verification whether believable key messages of certificate, and the digital certificate originally studied and defined is nullified List basic structure, as shown in Figure 3.
Version number:Digital certificate Revocation Lists version number.
Promulgation person:Certification authority's certificate number.
Effective date:The date/time that this digital certificate Revocation Lists is promulgated.
The next update date:The expired date/time of this digital certificate Revocation Lists.
Signature algorithm:Using traditional crypto signature algorithm RSA signature, Rabin signatures and DSS signatures.
Revoke the date:The date and time that certificate is revoked.
Extension:Issuing organization key identifier, digital certificate Revocation Lists number, incremental digital Certificate Revocation Lists refer to Needle, digital certificate Revocation Lists publishing point, incremental digital Certificate Revocation Lists publishing point.
The list of cert being revoked:Certificate serial number cancels date/time, the extension of digital certificate Revocation Lists entity.
Operation architecture of the present invention includes Network Environment Resource, tomcat middlewares, JAVA basic environments, government intranet, political affairs The software and hardware facilities such as business outer net.
The information such as government affairs, the people's livelihood, health, medical treatment, sport, disaster can be periodically pushed according to legal person and personal information.

Claims (6)

1. method for pushing is recognized each other in the Public Key Infrastructure mutual trust based on E-Government, it is characterised in that include the following steps:
A, electronic code is generated
Client generates public key using entity certificate in government affairs department, contains electronic code in public key, electronic code includes user class Malapropism section, certificate source field, Customs Assigned Number field, separator, certification authority's code field, certificate code field, safety post Section of becoming literate and passport NO. field, electronic code record certificate information;
B, electronic code mutual trust is recognized each other
When client uses public key, electronic code information is checked by certification authority, and user information, certificate are checked and verify by electronic code information Source, certification authority, certificate code, safety encryption situation and passport NO.;Errorless public key is checked and verify to check and approve use and generate electronics List is signed and issued, it includes version number field, issuer field, effective date and next update date that electronics, which signs and issues list,;
C, list mutual trust is signed and issued to recognize each other
Client signs and issues list with electronics using public key and connects network application, and network applications management personnel check electronic code and sign and issue List information activates network application normal use;
D, PUSH message is sent
Log in page will be paid close attention to according to class of subscriber field, certificate source field, Customs Assigned Number field and certification authority's code field Web page address link push is to client.
2. method for pushing is recognized each other in the Public Key Infrastructure mutual trust according to claim 1 based on E-Government, feature exists Electronics signs and issues list and further includes signature algorithm field, revokes date field, extension field and is revoked card in the step B Book list field.
3. method for pushing is recognized each other in the Public Key Infrastructure mutual trust according to claim 2 based on E-Government, feature exists Extension field includes issuing organization key identifier, digital certificate Revocation Lists number, incremental digital card in the step B Book Revocation Lists pointer, digital certificate Revocation Lists publishing point, incremental digital Certificate Revocation Lists publishing point.
4. method for pushing is recognized each other in the Public Key Infrastructure mutual trust according to claim 1 based on E-Government, feature exists Class of subscriber field is 00 and 01,00 expression personal user in the step A, and 01 indicates legal person user;
It is the license certification that government affairs service enforcement body generates, government organs that license source field, which is divided into 00,01,10 and 11,00, The electronics certificate information issued;01 is to have veritified the certificate information passed through, government organs personnel by government affairs service window personnel The electronics certificate information veritified;10 be the license certification that user voluntarily uploads, such as Copy of ID Card;11 be user from saw lumber Material, the testimonial material shot with camera such as user oneself;
Customs Assigned Number field is held the serial number of certificate by certificate user;
Certification authority's code field is 4-digit number after the licensing of certification authority is numbered;
Safety indicates that field is the correspondence of security identifier and passport NO., is divided into 0,1 and 2,0 expression clear text format and signs and issues, 1 Presentation code format is signed and issued, and 2 expression encryption formats are signed and issued;
Passport NO. field is the digital coding on certificate.
5. method for pushing is recognized each other in the Public Key Infrastructure mutual trust according to claim 1 based on E-Government, feature exists In the step A certificate code field be certificate user application digital certificate use crucial certificate coding, certificate type and Correspondence between certificate code, specific number are as follows:
It is personal:Resident's residence booklet(000000), identity card(000001), interim identity card(000010), officer's identity card(000011)、 People's Armed Police's police officer's identity card(000100), soldier's indentity card(000101), army student card(000110), army non-ranking cadre card(000111)、 Among Retired Army Officers are demonstrate,proved and military employees card(001000), passport(001001), Hong Kong and Macao Compatriot's home return permit(001010), Hongkong and Macro Resident carrys out the pass inside(001011), dealing Hongkong and Macro of the People's Republic of China (PRC) pass(001100), Taiwan residents dealing The continent pass(001101), mainlander come and go the Taiwan pass(001110), residence permit for foreigners(001111), the foreigner Entry and exit card(010000), diplomat card(010001), consulate card(010010), seaman's book(010011)Deng before the deadline The certificate used;
Legal person:Unified social credibility code(000), number of registration(001), organization mechanism code(010)Deng using before the deadline Certificate.
6. method for pushing is recognized each other in the Public Key Infrastructure mutual trust according to claim 1 based on E-Government, feature exists Client is issued in a manner of mail push in the step D.
CN201810001159.3A 2018-01-02 2018-01-02 Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government Pending CN108566272A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810001159.3A CN108566272A (en) 2018-01-02 2018-01-02 Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810001159.3A CN108566272A (en) 2018-01-02 2018-01-02 Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government

Publications (1)

Publication Number Publication Date
CN108566272A true CN108566272A (en) 2018-09-21

Family

ID=63530473

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810001159.3A Pending CN108566272A (en) 2018-01-02 2018-01-02 Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government

Country Status (1)

Country Link
CN (1) CN108566272A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111199585A (en) * 2020-01-13 2020-05-26 中国铁道科学研究院集团有限公司电子计算技术研究所 Ticket checking method, device, system, storage medium and computer equipment
CN111262834A (en) * 2020-01-09 2020-06-09 中国信息通信研究院 Authentication and credibility analysis method, device and system for physical entity

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333077A (en) * 2011-07-21 2012-01-25 上海互联网软件有限公司 Safety verification system for electronic document office system and method thereof
US20130311788A1 (en) * 2010-12-31 2013-11-21 Mourad Faher System providing an improved skimming resistance for an electronic identity document
CN103825744A (en) * 2014-03-13 2014-05-28 上海市数字证书认证中心有限公司 Off-site personal digital certificate application method and system
EP3252649A1 (en) * 2016-06-03 2017-12-06 DocuSign, Inc. Universal access to document transaction platform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130311788A1 (en) * 2010-12-31 2013-11-21 Mourad Faher System providing an improved skimming resistance for an electronic identity document
CN102333077A (en) * 2011-07-21 2012-01-25 上海互联网软件有限公司 Safety verification system for electronic document office system and method thereof
CN103825744A (en) * 2014-03-13 2014-05-28 上海市数字证书认证中心有限公司 Off-site personal digital certificate application method and system
EP3252649A1 (en) * 2016-06-03 2017-12-06 DocuSign, Inc. Universal access to document transaction platform

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
刘守义主编: "《智能卡技术》", 31 December 2004, 西安电子科技大学出版社 *
国务院办公厅: "国务院办公厅关于印发"互联网+政务服务"技术体系建设指南的通知", 《国办函[2016]108号》 *
颜海龙: "基于PKI/CA互信互认体系的电子政务", 《深圳大学学报理工版》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111262834A (en) * 2020-01-09 2020-06-09 中国信息通信研究院 Authentication and credibility analysis method, device and system for physical entity
CN111262834B (en) * 2020-01-09 2022-03-29 中国信息通信研究院 Authentication and credibility analysis method, device and system for physical entity
CN111199585A (en) * 2020-01-13 2020-05-26 中国铁道科学研究院集团有限公司电子计算技术研究所 Ticket checking method, device, system, storage medium and computer equipment
CN111199585B (en) * 2020-01-13 2022-04-12 中国铁道科学研究院集团有限公司电子计算技术研究所 Ticket checking method, device, system, storage medium and computer equipment

Similar Documents

Publication Publication Date Title
US11552795B2 (en) Key recovery
EP3560139B1 (en) Distributed blockchain-based method for maintaining the validity of a file
US8635442B2 (en) System and method for long-term digital signature verification utilizing light weight digital signatures
Ellison SPKI requirements
US7028180B1 (en) System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature
EP3853758B1 (en) Systems and computer-based methods of document certification and publication
KR100822596B1 (en) Recording medium having electronic document management program recorded, electronic document management system and electronic document management method
US10992683B2 (en) System and method for authenticating, storing, retrieving, and verifying documents
EP3984164A1 (en) Binding of decentralized identifiers to verified claims
WO2018114587A1 (en) Distributed blockchain-based method for maintaining the validity of a file
WO2019081530A1 (en) Methods for recording and sharing a digital identity of a user using distributed ledgers
US9218589B2 (en) Issuance, conveyance and management of endorsements
CN114944937B (en) Distributed digital identity verification method, system, electronic equipment and storage medium
CN108566272A (en) Method for pushing is recognized each other in Public Key Infrastructure mutual trust based on E-Government
US20230177174A1 (en) Encrypted verifiable credentials
US20230179402A1 (en) Device asserted verifiable credential
EP1164745A2 (en) System and method for usage of a role certificate in encryption, and as a seal, digital stamp, and a signature
Ellison RFC2692: SPKI Requirements
US7958363B2 (en) Toolbar signature
Chandra et al. Novel blockchain-based framework to publish, verify, and store digital academic credentials of universities
US20230179588A1 (en) Verifiable credential with dynamic claim
CN108063669A (en) The mutual verifying method of Public Key Infrastructure mutual trust based on E-Government
Schrahe et al. Privacy preserving vaccinating‐and testing‐pass for the European Union
Minihan Electronic signature technologies: a tutorial.(Cover Story)
Aparna et al. Exploring Blockchain Solutions for Combating Fake Certificates

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180921