CN109361681B - Method, device and equipment for authenticating national secret certificate - Google Patents

Method, device and equipment for authenticating national secret certificate Download PDF

Info

Publication number
CN109361681B
CN109361681B CN201811338997.6A CN201811338997A CN109361681B CN 109361681 B CN109361681 B CN 109361681B CN 201811338997 A CN201811338997 A CN 201811338997A CN 109361681 B CN109361681 B CN 109361681B
Authority
CN
China
Prior art keywords
challenge code
certificate
cryptographic
sending
signature information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811338997.6A
Other languages
Chinese (zh)
Other versions
CN109361681A (en
Inventor
姜超
陈天凯
罗元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Original Assignee
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Topsec Technology Co Ltd, Beijing Topsec Network Security Technology Co Ltd, Beijing Topsec Software Co Ltd filed Critical Beijing Topsec Technology Co Ltd
Priority to CN201811338997.6A priority Critical patent/CN109361681B/en
Publication of CN109361681A publication Critical patent/CN109361681A/en
Application granted granted Critical
Publication of CN109361681B publication Critical patent/CN109361681B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Abstract

The invention discloses a method, a device and equipment for authenticating a national secret certificate, wherein the method for authenticating the national secret certificate is used for a client and comprises the following steps: sending an SSL connection request, thereby establishing a unidirectional SSL connection; sending a cryptographic authentication request through the SSL connection; receiving a challenge code returned based on the cryptographic authentication request; signing the challenge code; sending signature information and a national secret certificate; and receiving a verification result of the signature information and the cryptographic certificate. Based on the establishment of the one-way SSL connection, the national secret authentication is sent, the generated challenge code is signed, then the signature information and the national secret certificate are verified, and the authentication of the national secret certificate is completed by adopting a challenge authentication mode. Therefore, the problem that the national secret certificate authentication cannot be carried out is solved.

Description

Method, device and equipment for authenticating national secret certificate
Technical Field
The invention relates to the field of mobile network security, in particular to a method, a device and equipment for authenticating a national secret certificate.
Background
There are two ways of SSL certificate authentication: international certificate authentication and national secret certificate authentication. The international certificate authentication mode adopts an international protocol, and the authentication is completed by adopting an international algorithm in the SSL connection process. The national cryptographic certificate authentication mode adopts a national cryptographic protocol, the national cryptographic protocol is a set of standard using Chinese commercial cryptographic algorithm, and the national cryptographic protocol comprises four algorithms of SM1, SM2, SM3 and SM 4.
In the existing SSL certificate authentication, the apple and android system libraries only can support international protocols and do not support the cryptographic algorithm. And thus cannot perform national secret certificate authentication.
Disclosure of Invention
The embodiment of the invention provides a method, a device and equipment for authenticating a national secret certificate, which are used for solving the problem that the national secret certificate authentication cannot be carried out in the prior art.
In a first aspect, an embodiment of the present invention provides a method for authenticating a cryptographic certificate, where the method is used for a client, and includes:
sending an SSL connection request, thereby establishing a unidirectional SSL connection;
sending a cryptographic authentication request through the SSL connection;
receiving a challenge code returned based on the cryptographic authentication request;
signing the challenge code;
sending signature information and a national secret certificate;
and receiving a verification result of the signature information and the cryptographic certificate.
As a specific implementation manner of the embodiment of the present invention, the challenge code: the time factor and the random value are encrypted by using a hash algorithm.
As a specific implementation manner of the embodiment of the present invention, the signing the challenge code specifically includes:
the challenge code is encrypted using a private key.
In a second aspect, an embodiment of the present invention provides a method for authenticating a cryptographic certificate, where the method is used at a server side, and includes:
receiving an SSL connection request, thereby establishing a unidirectional SSL connection;
receiving a cryptographic authentication request sent through the SSL connection;
generating a challenge code based on the cryptographic authentication request and sending the challenge code;
receiving signature information and a cryptographic certificate generated by signing the challenge code;
and verifying the signature information and the national password certificate, and sending a verification result.
As a specific implementation manner of the embodiment of the present invention, the generating a challenge code based on the cryptographic authentication request and sending the challenge code includes:
receiving the national secret authentication request;
generating a challenge code based on the cryptographic authentication request;
and saving the challenge code to the local and sending the challenge code.
As a specific implementation manner of the embodiment of the present invention, the verifying the signature information and the cryptographic certificate, and sending a verification result includes:
acquiring a public key of the national secret certificate;
decrypting the signature information by using the public key so as to obtain a challenge code in the signature information;
comparing the challenge code in the signature information with the challenge code stored locally to obtain a verification result;
and sending the verification result.
In a third aspect, an embodiment of the present invention provides a method for authenticating a cryptographic certificate, including:
the client sends an SSL connection request to the server, so that one-way SSL connection is established;
the client sends a cryptographic authentication request to the server through the SSL connection
The server generates a challenge code based on the cryptographic authentication request and sends the challenge code to the client;
the client receives the challenge code;
the client signs the challenge code;
the client sends the signature information and the national password certificate to the server;
the server verifies the signature information and the country password certificate and sends a verification result to the client;
and the client receives the verification result.
In a fourth aspect, an embodiment of the present invention provides a cryptographic certificate authentication apparatus, which is used for a client, and includes:
a connection request module: the SSL connection request is sent, so that a unidirectional SSL connection is established;
a certificate sending module: for sending a cryptographic authentication request over the SSL connection;
the challenge code receiving module: the challenge code is returned based on the national password authentication request;
a signature module: for signing the challenge code;
an information sending module: the system is used for sending signature information and a national secret certificate;
a result receiving module: and the verification module is used for receiving the verification result of the signature information and the cryptographic certificate.
In a fifth aspect, an embodiment of the present invention provides a cryptographic certificate authentication apparatus, which is used at a server side, and includes:
a request receiving module: for receiving an SSL connection request, thereby establishing a unidirectional SSL connection;
an authentication request receiving module: for receiving a cryptographic authentication request sent over the SSL connection;
the challenge code generation module: the password authentication server is used for generating a challenge code based on the password authentication request and sending the challenge code;
a signature information receiving module: receiving signature information and a cryptographic certificate generated by signing the challenge code;
a verification module: and the system is used for verifying the signature information and the cryptographic certificate and sending a verification result.
In a sixth aspect, an embodiment of the present invention provides an electronic device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method of any of the first and second aspects.
The embodiment of the invention sends the national secret authentication on the basis of establishing the one-way SSL connection, signs the generated challenge code, verifies the signature information and the national secret certificate and adopts a challenge authentication mode to finish the authentication of the national secret certificate. Therefore, the problem that the national secret certificate can not be authenticated is solved, and a positive technical effect is achieved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart of a cryptographic certificate authentication method according to an embodiment of the present invention;
fig. 2 is a flowchart of a cryptographic certificate authentication method according to a second embodiment of the present invention;
fig. 3 is a flowchart of generating a challenge code based on the cryptographic authentication request and sending the challenge code according to the second embodiment of the present invention;
fig. 4 is a flowchart illustrating the verification of the signature information and the cryptographic certificate and the transmission of the verification result according to the second embodiment of the present invention;
fig. 5 is a schematic block diagram of a method for authenticating a cryptographic certificate according to a third embodiment of the present invention;
fig. 6 is a schematic block diagram of a cryptographic certificate authentication apparatus according to a fourth embodiment of the present invention;
fig. 7 is a flowchart of the authentication apparatus according to the fifth embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In the prior art, the process of the SSL cryptographic handshake protocol is specifically as follows:
1. the client sends a client hello message to the server, and the server responds to the server hello message, otherwise, a fatal error is generated and the connection is disconnected. The client hello and the server hello are used for carrying out RSA, ECC or IBC-based cryptographic algorithm negotiation with the server, determining the security transmission capability, including the attributes of protocol version, session identification, cipher suite and the like, and generating and exchanging random numbers.
2. The client hello and server hello messages are followed by authentication and key exchange procedures. The method comprises server certificate and server key exchange, and client certificate and client key exchange.
3. After the server has sent the helllo message, it then sends its own certificate message, the server key exchange message. If the server needs to verify the identity of the client, a certificate request message is sent to the client. Then a server hello complete message is sent, indicating that the hello message phase has ended, and the server waits for a return message from the client. If the server sends a credential request message, the client must return a credential message, and then the client sends a key exchange message, the content of which depends on the key exchange algorithm negotiated by the client hello message and the server hello message. If the client sends a certificate message, the client should also send a digitally signed certificate verification message for the server to verify the identity of the client.
4. Then the client sends the message of changing the cipher specification, and then the client uses the just negotiated algorithm and key immediately to encrypt and send the message of finishing the handshake. The server responds to the cipher specification change message, encrypts and sends a handshake end message by using the just negotiated algorithm and key. By the end of the handshake process, the server and the client can start data secure transmission.
As shown in table 1 in detail,
Figure BDA0001862019180000061
table 1: process table of SSL cryptographic handshake protocol.
The first embodiment is as follows:
a first embodiment of the present invention provides a method for authenticating a cryptographic certificate, which is applied to a client, and as shown in fig. 1, the method includes the following specific steps:
step S101: sending an SSL connection request, thereby establishing a unidirectional SSL connection;
the client sends SSL connection request to the server, so that unidirectional SSL connection is established between the client and the server, and the unidirectional SSL connection refers to that the client transmits SSL data to the server in a unidirectional mode.
In a specific application scenario, the establishment of the SSL connection is performed by calling an interface in the openssl library in the prior art.
Step S102: sending a cryptographic authentication request through the SSL connection;
after the unidirectional SSL connection is established between the client and the server, the client sends a cryptographic authentication request to the server through the unidirectional SSL connection.
Step S103: receiving a challenge code returned based on the cryptographic authentication request;
after receiving the national password authentication request of the client, the server generates a challenge code based on the national password authentication request, sends the challenge code back to the client, and simultaneously stores a challenge code in the server.
As a specific implementation of the present invention, the challenge code: the time factor and the random value are encrypted by using a hash algorithm, such as md5 or SHA-1. The random value is generated by calling the system bottom function.
Step S104: signing the challenge code;
and after receiving the challenge code, the client signs the challenge code by using a private key of the client.
Step S105: sending signature information and a national secret certificate;
and the client sends the signing information and the national password certificate after signing the challenge code to the server.
Step S106: and receiving a verification result of the signature information and the cryptographic certificate.
And the server verifies the received signature information and the national password certificate and sends a verification result to the client.
As a specific implementation manner of the present invention, the server decrypts the signature information using the public key in the client certificate to obtain the challenge code in the signature information, then compares the challenge code in the obtained signature information with the challenge code stored in the server, and returns the verification result to the client. If the two challenge codes are consistent, the verification is passed, and if the two challenge codes are inconsistent, the verification is not passed.
Example two:
as shown in fig. 2, an embodiment of the present invention provides a method for authenticating a cryptographic certificate, which is used at a server side, and includes:
step S201: receiving an SSL connection request, thereby establishing a unidirectional SSL connection;
step S202: receiving a cryptographic authentication request sent through the SSL connection;
step S203: generating a challenge code based on the cryptographic authentication request and sending the challenge code;
step S204: receiving signature information and a cryptographic certificate generated by signing the challenge code;
step S205: and verifying the signature information and the national password certificate, and sending a verification result.
As a specific implementation manner of the present invention, as shown in fig. 3, step S203: the generating a challenge code based on the cryptographic authentication request and sending the challenge code comprises:
step S301: receiving the national secret authentication request;
step S302: generating a challenge code based on the cryptographic authentication request;
step S303: and saving the challenge code to the local and sending the challenge code.
As a specific implementation manner of the present invention, as shown in fig. 4, step S205: the verifying the signature information and the cryptographic certificate and sending a verification result comprises:
step S401: acquiring a public key of the national secret certificate;
step S402: decrypting the signature information by using the public key so as to obtain a challenge code in the signature information;
step S403: comparing the challenge code in the signature information with the challenge code stored locally to obtain a verification result;
step S404: and sending the verification result.
The specific implementation thereof has been described in detail in the first embodiment, and is not repeated herein.
Example three:
as shown in fig. 5, an embodiment of the present invention provides a method for authenticating a cryptographic certificate, including:
the client sends an SSL connection request to the server, so that one-way SSL connection is established;
the client sends a cryptographic authentication request to the server through the SSL connection
The server generates a challenge code based on the cryptographic authentication request and sends the challenge code to the client;
the client receives the challenge code;
the client signs the challenge code;
the client sends the signature information and the national password certificate to the server;
the server verifies the signature information and the country password certificate and sends a verification result to the client;
and the client receives the verification result.
In the technical scheme, the client and the server are mainly combined for description, and the specific implementation of the technical scheme is described in detail in the first embodiment, which is not described herein again.
Example four:
as shown in fig. 6, in a fourth aspect, an embodiment of the present invention provides a cryptographic certificate authentication apparatus for a client, including:
the connection request module 601: the SSL connection request is sent, so that a unidirectional SSL connection is established;
the certificate sending module 602: for sending a cryptographic authentication request over the SSL connection;
the challenge code receiving module 603: the challenge code is returned based on the national password authentication request;
the signature module 604: for signing the challenge code;
the information sending module 605: the system is used for sending signature information and a national secret certificate;
the result receiving module 606: and the verification module is used for receiving the verification result of the signature information and the cryptographic certificate.
As a specific implementation manner of the present invention, the challenge code: the time factor and the random value are encrypted by using a hash algorithm.
As a specific implementation manner of the present invention, the signing the challenge code specifically includes: the challenge code is encrypted using a private key.
Example five:
as shown in fig. 7, in a fifth aspect, an embodiment of the present invention provides a cryptographic certificate authentication apparatus, which is used on a server side, and includes:
the request receiving module 701: for receiving an SSL connection request, thereby establishing a unidirectional SSL connection;
authentication request receiving module 702: for receiving a cryptographic authentication request sent over the SSL connection;
the challenge code generation module 703: the password authentication server is used for generating a challenge code based on the password authentication request and sending the challenge code;
signature information reception module 704: receiving signature information and a cryptographic certificate generated by signing the challenge code;
the verification module 705: and the system is used for verifying the signature information and the cryptographic certificate and sending a verification result.
As a specific implementation manner of the present invention, the challenge code generating module 703 is further configured to:
receiving the national secret authentication request;
generating a challenge code based on the cryptographic authentication request;
and saving the challenge code to the local and sending the challenge code.
As a specific implementation manner of the present invention, the verification module 705 is further configured to:
acquiring a public key of the national secret certificate;
decrypting the signature information by using the public key so as to obtain a challenge code in the signature information;
comparing the challenge code in the signature information with the challenge code stored locally to obtain a verification result;
and sending the verification result.
The technical solution is mainly to express a function module in a server, and the specific implementation manner of the function module is described in detail in the first to fourth embodiments, which are not described herein again.
In a sixth aspect, an embodiment of the present invention provides an electronic device, where the electronic device includes: a memory, a processor and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the method steps of embodiment one or embodiment two.
The Processor may be a general-purpose Processor, such as a Central Processing Unit (CPU), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement embodiments of the present invention. Wherein the memory is used for storing executable instructions of the processor; a memory for storing the program code and transmitting the program code to the processor. The Memory may include Volatile Memory (Volatile Memory), such as Random Access Memory (RAM); Non-Volatile Memory (Non-Volatile Memory) such as Read-Only Memory (ROM), Flash Memory (Flash Memory), Hard Disk (HDD), or Solid-State Drive (SSD) may also be included; combinations of the above categories of memory may also be included.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and the computer program, when executed by a processor, implements the method steps of the first embodiment.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. A national secret certificate authentication method is used for a client, and is characterized by comprising the following steps:
sending an SSL connection request, thereby establishing a unidirectional SSL connection;
sending a cryptographic authentication request through the SSL connection;
receiving a challenge code returned based on the cryptographic authentication request;
signing the challenge code;
sending signature information and a national secret certificate;
and receiving a verification result of the signature information and the cryptographic certificate.
2. The cryptographic certificate authentication method of claim 1, wherein the challenge code:
the time factor and the random value are encrypted by using a hash algorithm.
3. The method according to claim 1, wherein the signing the challenge code comprises:
the challenge code is encrypted using a private key.
4. A national secret certificate authentication method is used for a server side, and is characterized by comprising the following steps:
receiving an SSL connection request, thereby establishing a unidirectional SSL connection;
receiving a cryptographic authentication request sent through the SSL connection;
generating a challenge code based on the cryptographic authentication request and sending the challenge code;
receiving signature information and a cryptographic certificate generated by signing the challenge code;
and verifying the signature information and the national password certificate, and sending a verification result.
5. The method according to claim 4, wherein the generating a challenge code based on the cryptographic authentication request and sending the challenge code comprises:
receiving the national secret authentication request;
generating a challenge code based on the cryptographic authentication request;
and saving the challenge code to the local and sending the challenge code.
6. The method according to claim 5, wherein the verifying the signature information and the cryptographic certificate and sending a verification result comprises:
acquiring a public key of the national secret certificate;
decrypting the signature information by using the public key so as to obtain a challenge code in the signature information;
comparing the challenge code in the signature information with the challenge code stored locally to obtain a verification result;
and sending the verification result.
7. A method for authenticating a cryptographic certificate, comprising:
the client sends an SSL connection request to the server, so that one-way SSL connection is established;
the client sends a cryptographic authentication request to the server through the SSL connection
The server generates a challenge code based on the cryptographic authentication request and sends the challenge code to the client;
the client receives the challenge code;
the client signs the challenge code;
the client sends the signature information and the national password certificate to the server;
the server verifies the signature information and the country password certificate and sends a verification result to the client;
and the client receives the verification result.
8. A cryptographic certificate authentication apparatus for a client, comprising:
a connection request module: the SSL connection request is sent, so that a unidirectional SSL connection is established;
a certificate sending module: for sending a cryptographic authentication request over the SSL connection;
the challenge code receiving module: the challenge code is returned based on the national password authentication request;
a signature module: for signing the challenge code;
an information sending module: the system is used for sending signature information and a national secret certificate;
a result receiving module: and the verification module is used for receiving the verification result of the signature information and the cryptographic certificate.
9. A national secret certificate authentication device is used for a server side, and is characterized by comprising:
a request receiving module: for receiving an SSL connection request, thereby establishing a unidirectional SSL connection;
an authentication request receiving module: for receiving a cryptographic authentication request sent over the SSL connection;
the challenge code generation module: the password authentication server is used for generating a challenge code based on the password authentication request and sending the challenge code;
a signature information receiving module: receiving signature information and a cryptographic certificate generated by signing the challenge code;
a verification module: and the system is used for verifying the signature information and the cryptographic certificate and sending a verification result.
10. An electronic device, characterized in that the electronic device comprises: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to any one of claims 1 to 6.
CN201811338997.6A 2018-11-12 2018-11-12 Method, device and equipment for authenticating national secret certificate Active CN109361681B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811338997.6A CN109361681B (en) 2018-11-12 2018-11-12 Method, device and equipment for authenticating national secret certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811338997.6A CN109361681B (en) 2018-11-12 2018-11-12 Method, device and equipment for authenticating national secret certificate

Publications (2)

Publication Number Publication Date
CN109361681A CN109361681A (en) 2019-02-19
CN109361681B true CN109361681B (en) 2021-10-15

Family

ID=65344870

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811338997.6A Active CN109361681B (en) 2018-11-12 2018-11-12 Method, device and equipment for authenticating national secret certificate

Country Status (1)

Country Link
CN (1) CN109361681B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112448958B (en) * 2020-11-30 2022-08-30 南方电网科学研究院有限责任公司 Domain policy issuing method and device, electronic equipment and storage medium
CN113364776A (en) * 2021-06-04 2021-09-07 北银金融科技有限责任公司 Method and system for verifying block link point usage cryptographic algorithm communication
CN113839927B (en) * 2021-09-01 2023-06-09 北京天融信网络安全技术有限公司 Method and system for performing mutual authentication based on third party
CN114615046A (en) * 2022-03-07 2022-06-10 中国大唐集团科学技术研究总院有限公司 Administrator double-factor authentication method based on national secret certificate

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188074A (en) * 2011-12-28 2013-07-03 上海格尔软件股份有限公司 Proxy method for improving SSL algorithm intensity of browser
CN104283886A (en) * 2014-10-14 2015-01-14 中国科学院信息工程研究所 Web safety access implementation method based on intelligent terminal local authentication
CN104735068A (en) * 2015-03-24 2015-06-24 江苏物联网研究发展中心 SIP security authentication method based on commercial passwords
CN105337977A (en) * 2015-11-16 2016-02-17 苏州通付盾信息技术有限公司 Secure mobile communication architecture with dynamic two-way authentication and implementation method thereof
CN105847247A (en) * 2016-03-21 2016-08-10 飞天诚信科技股份有限公司 Authentication system and working method thereof
CN106330838A (en) * 2015-07-01 2017-01-11 阿里巴巴集团控股有限公司 Dynamic signature method, client using the same and server
CN106936790A (en) * 2015-12-30 2017-07-07 上海格尔软件股份有限公司 The method that client and server end carries out two-way authentication is realized based on digital certificate
CN108064440A (en) * 2017-05-25 2018-05-22 深圳前海达闼云端智能科技有限公司 FIDO authentication method, device and system based on block chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8707031B2 (en) * 2009-04-07 2014-04-22 Secureauth Corporation Identity-based certificate management
CN103747001B (en) * 2014-01-14 2017-02-01 中电长城(长沙)信息技术有限公司 Audio-access mobile payment communication method based on security algorithm

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188074A (en) * 2011-12-28 2013-07-03 上海格尔软件股份有限公司 Proxy method for improving SSL algorithm intensity of browser
CN104283886A (en) * 2014-10-14 2015-01-14 中国科学院信息工程研究所 Web safety access implementation method based on intelligent terminal local authentication
CN104735068A (en) * 2015-03-24 2015-06-24 江苏物联网研究发展中心 SIP security authentication method based on commercial passwords
CN106330838A (en) * 2015-07-01 2017-01-11 阿里巴巴集团控股有限公司 Dynamic signature method, client using the same and server
CN105337977A (en) * 2015-11-16 2016-02-17 苏州通付盾信息技术有限公司 Secure mobile communication architecture with dynamic two-way authentication and implementation method thereof
CN106936790A (en) * 2015-12-30 2017-07-07 上海格尔软件股份有限公司 The method that client and server end carries out two-way authentication is realized based on digital certificate
CN105847247A (en) * 2016-03-21 2016-08-10 飞天诚信科技股份有限公司 Authentication system and working method thereof
CN108064440A (en) * 2017-05-25 2018-05-22 深圳前海达闼云端智能科技有限公司 FIDO authentication method, device and system based on block chain

Also Published As

Publication number Publication date
CN109361681A (en) 2019-02-19

Similar Documents

Publication Publication Date Title
US9621545B2 (en) System and method for connecting client devices to a network
CN110380852B (en) Bidirectional authentication method and communication system
KR102018971B1 (en) Method for enabling network access device to access wireless network access point, network access device, application server and non-volatile computer readable storage medium
CN109361681B (en) Method, device and equipment for authenticating national secret certificate
WO2018076365A1 (en) Key negotiation method and device
WO2022021992A1 (en) Data transmission method and system based on nb-iot communication, and medium
US20160269176A1 (en) Key Configuration Method, System, and Apparatus
CN109150897B (en) End-to-end communication encryption method and device
WO2015165325A1 (en) Secure terminal authentication method, device and system
CN108111497B (en) Mutual authentication method and device for camera and server
CN108366063B (en) Data communication method and device of intelligent equipment and equipment thereof
CN109981562B (en) Software development kit authorization method and device
CN109818747B (en) Digital signature method and device
JP7292263B2 (en) Method and apparatus for managing digital certificates
CN110958209B (en) Bidirectional authentication method, system and terminal based on shared secret key
US20160219045A1 (en) Method and System for Authenticating a User of a Device
CN110650478B (en) OTA method, system, device, SE module, program server and medium
CN104836784A (en) Information processing method, client, and server
WO2016011588A1 (en) Mobility management entity, home server, terminal, and identity authentication system and method
CN111654481B (en) Identity authentication method, identity authentication device and storage medium
CN114125832A (en) Network connection method and terminal, network device to be configured and storage medium
CN114374522B (en) Trusted device authentication method and device, computer device and storage medium
CN111836260B (en) Authentication information processing method, terminal and network equipment
CN114500055B (en) Password verification method and device, electronic equipment and storage medium
KR20200043855A (en) Method and apparatus for authenticating drone using dim

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant