CN109995697A - A kind of digital certificate authentication method using cryptography - Google Patents

A kind of digital certificate authentication method using cryptography Download PDF

Info

Publication number
CN109995697A
CN109995697A CN201711470759.6A CN201711470759A CN109995697A CN 109995697 A CN109995697 A CN 109995697A CN 201711470759 A CN201711470759 A CN 201711470759A CN 109995697 A CN109995697 A CN 109995697A
Authority
CN
China
Prior art keywords
digital certificate
access device
cryptographic algorithm
user
login user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711470759.6A
Other languages
Chinese (zh)
Inventor
吴文斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Weiyan Technology Co ltd
Original Assignee
Guangzhou Weiyan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Weiyan Technology Co ltd filed Critical Guangzhou Weiyan Technology Co ltd
Priority to CN201711470759.6A priority Critical patent/CN109995697A/en
Publication of CN109995697A publication Critical patent/CN109995697A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Abstract

The invention discloses a kind of digital certificate authentication methods using cryptography, it include: that digital certificate corresponding with login user is inquired in access device, the digital certificate inquired is back to login user: where the digital certificate of each user is prestored in access device;Access device receives the cryptographic algorithm request that login user is submitted: access device executes corresponding cryptographic algorithm according to cryptographic algorithm request.Operating result is back to login user.

Description

A kind of digital certificate authentication method using cryptography
Technical field
The present invention relates to digital certificate technique field more particularly to a kind of digital certificate authentication methods using cryptography.
Background technique
As what internet and operation system were applied gradually gos deep into, e-commerce system technology makes the customer of shopping on the web The information for easily obtaining businessman and enterprise can extremely be facilitated, but also increase certain sensitive or valuable data quilts simultaneously The risk of abuse.How to avert risks, enhancing internet safe problem is particularly important.PKI(Public Key Infrastructure, Public Key Infrastructure), it is a kind of key management platform for following written standards, it can be all nets Network application provides cryptographic services and necessary key and the certificate management systems such as encrypted and digitally signed, is effectively ensured user's Identity security and data safety.However digital certificate substantially shows as a data file with user information and key, How to protect digital certificate itself becomes most weak link in PKI system again, current general way be using USB Key come Save digital certificate and private key for user.Each USB Key have PIN (Personal Identification Number, it is a People's recognition code) code protection, the hardware and PIN code of such USB Key, which constitutes, can be used two of the certificate necessary factors, i.e., Two-factor authentication.
USB Key is a kind of hardware device of USB interface, and main body is one piece of safety chip, private key and digital certificate store In this safety chip hardware device.Also, safety chip has computing capability, supports to generate key pair, digital signature and add The calculating tasks such as decryption.The advantages of USB Key is that the operating system on personal computer can not know PKI certificate, key pair etc. Information.Therefore, the development cost for increasing manufacturer, affects user experience.In addition, cryptographic algorithm needs in USB Key It executes, consumes the resource of user terminal.
Summary of the invention
Based on this, the cryptographic algorithm method and one kind that the present invention provides a kind of based on digital certificate are based on digital certificate Cryptographic algorithm device.
A kind of cryptographic algorithm method based on digital certificate, comprising the following steps:
Digital certificate corresponding with login user is inquired in access device, and the digital certificate inquired is back to The login user;Wherein, the digital certificate of each user is prestored in the access device;
The access device receives the cryptographic algorithm request that the login user is submitted;
The access device executes corresponding cryptographic algorithm according to cryptographic algorithm request, and operating result is returned To the login user.
Compared with general technology, it is centrally stored using access device that the present invention is based on the cryptographic algorithm methods of digital certificate With management customer digital certificate, it can overcome USB Key storage with batch updating certificate, the problem of loss there is no certificate and hold Measure insufficient problem.User does not need insertion USB Key, and only need to input PIN code achieves that the certification based on digital certificate, mentions User experience is risen.The invention avoids the exploitation of USB Key, cryptographic algorithm is completed by access device, saves user's end The resource at end improves user terminal operational efficiency.
In a kind of wherein embodiment, the access device carries out batch more to the digital certificate of each user prestored Newly.
In a kind of wherein embodiment, in the step for inquiring digital certificate corresponding with login user in access device Before rapid, comprising the following steps:
The access device carries out authentication to the login user.
In a kind of wherein embodiment, in the step for inquiring digital certificate corresponding with login user in access device Before rapid, comprising the following steps:
The access device is to being respectively allocated to the digital certificate of each user, private key and for verifying to PIN code Identifying code prestored;Wherein, the digital certificate, the private key and the identifying code correspond.
In a kind of wherein embodiment, the access device executes corresponding cryptography according to cryptographic algorithm request The step of operation, comprising the following steps:
If the cryptographic algorithm request does not need private key, the access device executes corresponding cryptographic algorithm;
If the cryptographic algorithm request needs private key, the access device is according to the identifying code to login user The PIN code of input is verified, and the private key is called to execute corresponding cryptographic algorithm after being verified.
In a kind of wherein embodiment, PIN code that the access device inputs login user according to the identifying code into The step of row verifying, comprising the following steps:
The access device receives the PIN code of the login user input;
The access device carries out operation to the received PIN code according to preset operation method;
If above-mentioned operation result is consistent with the identifying code, it is verified.
In a kind of wherein embodiment, the access device receives the cryptographic algorithm request that the login user is submitted Step, comprising the following steps:
The login user submits cryptographic algorithm request by IE;
Cryptographic algorithm request is sent to the Cryptographic Service Provider of user terminal by CryptoAPI by IE;
Cryptographic algorithm request is sent to the access device by the Cryptographic Service Provider;
The access device receives the cryptographic algorithm request;
The step of operating result is back to the login user by the access device, comprising the following steps:
The operating result is sent to the Cryptographic Service Provider of user terminal by the access device;
The operating result is sent to IE by CryptoAPI by the Cryptographic Service Provider.
In a kind of wherein embodiment, the cryptographic algorithm request includes the behaviour of signature, verifying, encryption and/or decryption It requests.
A kind of cryptographic algorithm device based on digital certificate, including enquiry module, receiving module and execution module;
The enquiry module, for inquiring digital certificate corresponding with login user in access device, by what is inquired The digital certificate is back to the login user;Wherein, the digital certificate of each user is prestored in the access device;
The receiving module is asked for receiving the cryptographic algorithm that the login user is submitted on the access device It asks;
The execution module, for executing corresponding password according to cryptographic algorithm request on the access device Operation is learned, operating result is back to the login user.
Compared with general technology, it is centrally stored using access device that the present invention is based on the cryptographic algorithm devices of digital certificate With management customer digital certificate, it can overcome USB Key storage with batch updating certificate, the problem of loss there is no certificate and hold Measure insufficient problem.User does not need insertion USB Key, and only need to input PIN code achieves that the certification based on digital certificate, mentions User experience is risen.The invention avoids the exploitation of USB Key, cryptographic algorithm is completed by access device, saves user's end The resource at end improves user terminal operational efficiency.
Detailed description of the invention
Fig. 1 is that the present invention is based on the flow diagrams of the cryptographic algorithm method of digital certificate;
Fig. 2 is that the present invention is based on the system schematics of the cryptographic algorithm method of digital certificate for implementation;
Fig. 3 is that the present invention is based on the flow diagrams of one preferred embodiment of cryptographic algorithm method of digital certificate;
Fig. 4 is that the present invention is based on the structural schematic diagrams of the cryptographic algorithm device of digital certificate.
Specific embodiment
It is with reference to the accompanying drawing and preferably real for the effect for further illustrating technological means adopted by the present invention and acquirement Example is applied, to technical solution of the present invention, carries out clear and complete description.
Referring to Fig. 1, for the present invention is based on the flow diagrams of the cryptographic algorithm method of digital certificate.The present invention is based on The cryptographic algorithm method of digital certificate, comprising the following steps:
S101 inquires digital certificate corresponding with login user in access device, and the digital certificate inquired is returned It is back to the login user;Wherein, the digital certificate of each user is prestored in the access device;
Access device described in S102 receives the cryptographic algorithm request that the login user is submitted;
Access device described in S103 executes corresponding cryptographic algorithm according to cryptographic algorithm request, by operating result It is back to the login user.
In step s101, each user in local area network distributes a digital certificate, a private key and a PIN Code, wherein the digital certificate, the private key and the PIN code correspond.The digital certificate and private key of all users all collects In be stored in access device, also have the identifying code verified to PIN code in access device.User only needs to save PIN The cryptographic algorithms such as code, certificate management and signature, verifying, encryption, decryption are completed by access device.User can be by virtual CSP (Cryptographic Service Provider, Cryptographic Service Provider) interface, is grasped certificate by TCP/IP Make, cryptographic algorithm is transmitted to access device execution.
In a kind of wherein embodiment, inquired before digital certificate corresponding with login user in access device, it is described Access device is carried out to the digital certificate of each user, private key and identifying code for being verified to PIN code is respectively allocated to It prestores;Wherein, the digital certificate, the private key and the identifying code correspond.
In a kind of wherein embodiment, the access device carries out batch more to the digital certificate of each user prestored Newly.It is described digital certificate and the identifying code are centrally stored in an access device after, can be to the access device The digital certificate of each user of middle storage carries out batch updating, can store the latest digital certificate of user in time in this way, improves Safety.Also, the mode of batch updating also reduces processing complexity, more efficient.
Virtual CSP can be used instead of the CSP program built in Windows in client.It is used between virtual CSP and IE The CryptoAPI (i.e. Cryptography API, CryptoAPI) that Microsoft is provided, such IE does not need to do Any modification, can safety virtual CSP is called by CryptoAPI.It is logical that safety is established between virtual CSP and access device Road, all cryptographic algorithms are sent to access device by virtual CSP and complete.
Exit passageway can be pre-established between virtual CSP and access device.IE will be by cryptographic application programming interface (i.e. CryptoAPI) function enumerates virtual CSP, and is communicated by encryption system programming interface (i.e. CryptoAPI) with virtual CSP.
As one of preferred embodiment, referring to Fig. 2, the present invention is based on the cryptography of digital certificate behaviour to implement Make the system schematic of method.Access device is divided into three modules: certificate management, cryptography calculates and network management module.Card Digital certificate, private key and the identifying code for being verified to PIN code of book management module keeping all users of local area network.Password It learns computing module and completes the operations such as signature, verifying, encryption and decryption.Network management module realizes the function of connection network.It is practical In, access device can be based on the exploitation such as router, gateway.
Referring to Fig. 3, for the present invention is based on the processes of one preferred embodiment of cryptographic algorithm method of digital certificate to show It is intended to.
In a kind of wherein embodiment, inquired before digital certificate corresponding with login user in access device, it is described Access device carries out authentication to the login user.
The mode that Portal certification can be used verifies the identity of user, while enhancing safety, reduces Unnecessary processing operation (query steps are such as executed in the case where no user logs in).
Following steps progress can be used in subscriber authentication: virtual CSP and access device carry out identity identification, verify mutually The identity of other side, if being verified, access device user bound is used for identifying code, the digital certificate verified to PIN code And private key, and return to user certificate.Portal certification etc. can be used in specific identification method.
In a kind of wherein embodiment, in step s 102, the access device receives the close of the login user submission Code learns the step of operation requests, comprising the following steps:
The login user submits cryptographic algorithm request by IE;
Cryptographic algorithm request is sent to the Cryptographic Service Provider of user terminal by CryptoAPI by IE;
Cryptographic algorithm request is sent to the access device by the Cryptographic Service Provider;
The access device receives the cryptographic algorithm request;
In a kind of wherein embodiment, the cryptographic algorithm request includes the behaviour of signature, verifying, encryption and/or decryption It requests.For those of ordinary skill in the art after reading this patent, the cryptographic algorithm request can also be other classes Type.
In step s 102, user submits the cryptographic algorithms such as signature, verifying, encryption, decryption on IE;IE passes through CryptoAPI requests to operate to virtual CSP;If cryptographic algorithm request is not needed using private key for user, virtual CSP sends password Operation requests are learned to access device;Otherwise, virtual CSP checks whether user inputted PIN code, if inputting and PIN code is correct, It sends cryptographic algorithm to request to access device, otherwise, it is desirable that user inputs PIN code;User inputs PIN code, and virtual CSP will PIN code and cryptographic algorithm are sent to access device.
In a kind of wherein embodiment, in step s 103, if cryptographic algorithm request does not need private key, institute It states access device and executes corresponding cryptographic algorithm;If the cryptographic algorithm request needs private key, the access device It is verified according to the PIN code that the identifying code inputs login user, calls the private key to execute after being verified corresponding Cryptographic algorithm.
In a kind of wherein embodiment, the access device receives the PIN code of the login user input;The access is set It is standby that operation is carried out to the received PIN code according to preset operation method;If above-mentioned operation result and the identifying code one It causes, is then verified.
For example, can send cryptographic algorithm if cryptographic algorithm request is not needed using private key for user by virtual CSP and ask It asks to access device, then access device executes cryptographic algorithm, and returns result to virtual CSP.Then passing through virtual CSP will Operating result returns to IE, and operating result is shown to user by IE.
In step s 103, the step of operating result is back to the login user by the access device, including it is following Step:
The operating result is sent to the Cryptographic Service Provider of user terminal by the access device;
The operating result is sent to IE by CryptoAPI by the Cryptographic Service Provider.
After operating result is returned to user by the access device, the access device receives stepping on for user's transmission After requesting out, release between digital certificate described in the user, the private key and the identifying code for being verified to PIN code Binding.
The process that user publishes can include: user's click Portal authentication website publishes button;IE passes through CryptoAPI Unloading certificate is requested to virtual CSP;Virtual CSP deletes local certificate, and sends unbinding request to access device;Access is set After receiving request, the corresponding relationship of de-authentication code and private key for user sends the response to virtual CSP;Virtual CSP receives response Afterwards, IE is returned to, user publishes success.
Compared with general technology, it is centrally stored using access device that the present invention is based on the cryptographic algorithm methods of digital certificate With management customer digital certificate, it can overcome USB Key storage with batch updating certificate, the problem of loss there is no certificate and hold Measure insufficient problem.User does not need insertion USB Key, and only need to input PIN code achieves that the certification based on digital certificate, mentions User experience is risen.The invention avoids the exploitation of USB Key, cryptographic algorithm is completed by access device, saves user's end The resource at end improves user terminal operational efficiency.
Each user distributes a certificate and a PIN code in local area network, and certificate and PIN code correspond, own The certificate of user and corresponding PIN code are all centrally stored in an access device.User only needs to save PIN code, certificate pipe The cryptographic algorithms such as reason and signature, verifying, encryption, decryption are completed by access device.User can pass through virtual CSP (encryption Service providing program) interface, certificate operation, cryptographic algorithm are transmitted to access device and executed by TCP/IP.
In some specific areas, such as bank, government bodies, user number is fewer, and fixation is also compared in application, can be with It is centrally stored and by the way of using using a kind of certificate, it can not only realize the advantage highly-safe, not easy to lose of USB Key, but also can It solves the problems, such as USB Key lack of memory capacity, and user experience can be improved, reduce development cost.The present invention is not changing user Under conditions of experience, cryptographic algorithm is transferred to server-side (i.e. access device), the application program of user terminal is not required to be changed It makes.
Referring to Fig. 4, for the present invention is based on the structural schematic diagrams of the cryptographic algorithm device of digital certificate.The present invention is based on The cryptographic algorithm device of digital certificate, including enquiry module 401, receiving module 402 and execution module 403;
The enquiry module 401 will be inquired for inquiring digital certificate corresponding with login user in access device The digital certificate be back to the login user;Wherein, the digital certificate of each user is prestored in the access device;
The receiving module 402, the cryptographic algorithm submitted for receiving the login user on the access device Request;
The execution module 403, it is corresponding for being executed on the access device according to cryptographic algorithm request Operating result is back to the login user by cryptographic algorithm.
It further include in one of the embodiments, update module the present invention is based on the cryptographic algorithm device of digital certificate, The update module is for carrying out batch updating to the digital certificate of each user prestored on the access device.
It further include in one of the embodiments, authentication mould the present invention is based on the cryptographic algorithm device of digital certificate Block is inquired before digital certificate corresponding with login user in access device, and the authentication module described for connecing Enter and authentication is carried out to the login user in equipment.
In one of the embodiments:
The login user submits cryptographic algorithm request by IE;
Cryptographic algorithm request is sent to the Cryptographic Service Provider of user terminal by CryptoAPI by IE;
Cryptographic algorithm request is sent to the access device by the Cryptographic Service Provider;
The receiving module 402 receives the cryptographic algorithm request on the access device;
Cryptographic algorithm device the present invention is based on digital certificate further includes sending module, and the sending module is used in institute State the Cryptographic Service Provider that the operating result is sent to user terminal on access device;
The operating result is sent to IE by CryptoAPI by the Cryptographic Service Provider.
The cryptographic algorithm request may include signature, verifying, encryption and/or decryption in one of the embodiments, Operation requests.
Compared with general technology, it is centrally stored using access device that the present invention is based on the cryptographic algorithm devices of digital certificate With management customer digital certificate, it can overcome USB Key storage with batch updating certificate, the problem of loss there is no certificate and hold Measure insufficient problem.User does not need insertion USB Key, and only need to input PIN code achieves that the certification based on digital certificate, mentions User experience is risen.The invention avoids the exploitation of USB Key, cryptographic algorithm is completed by access device, saves user's end The resource at end improves user terminal operational efficiency.
Cryptographic algorithm is transferred to server-side and (accessed by the present invention under conditions of not changing user's operation complexity Equipment), the application program of user terminal is not required to be transformed.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (5)

1. a kind of digital certificate authentication method using cryptography, which comprises the following steps: looked into access device Digital certificate corresponding with login user is ask, the digital certificate inquired is back to the login user: where described The digital certificate of each user is prestored in access device:
The access device receives the cryptographic algorithm request that the login user is submitted;
The access device executes corresponding cryptographic algorithm according to cryptographic algorithm request, and operating result is back to institute State login user.
2. the cryptographic algorithm method according to claim 1 based on digital certificate, which is characterized in that the access device Batch updating is carried out to the digital certificate of each user prestored.
3. the cryptographic algorithm method according to claim 1 based on digital certificate, which is characterized in that accessed described Before the step of inquiring digital certificate corresponding with login user in equipment, comprising the following steps:
The access device carries out authentication to the login user.
4. the cryptographic algorithm method according to claim 1 based on digital certificate, which is characterized in that accessed described Before the step of inquiring digital certificate corresponding with login user in equipment, comprising the following steps:
The access device is to being respectively allocated to the digital certificate of each user, private key and test for what is verified to PIN code Card code is prestored: where the digital certificate, the private key and the identifying code correspond.
5. the cryptographic algorithm method according to claim 4 based on digital certificate, which is characterized in that the access device The step of executing corresponding cryptographic algorithm is requested according to the cryptographic algorithm, comprising the following steps:
If the cryptographic algorithm request does not need private key, the access device executes corresponding cryptographic algorithm: if The cryptographic algorithm request needs private key, then the PIN code that the access device inputs login user according to the identifying code It is verified, the private key is called to execute corresponding cryptographic algorithm after being verified.
CN201711470759.6A 2017-12-29 2017-12-29 A kind of digital certificate authentication method using cryptography Pending CN109995697A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711470759.6A CN109995697A (en) 2017-12-29 2017-12-29 A kind of digital certificate authentication method using cryptography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711470759.6A CN109995697A (en) 2017-12-29 2017-12-29 A kind of digital certificate authentication method using cryptography

Publications (1)

Publication Number Publication Date
CN109995697A true CN109995697A (en) 2019-07-09

Family

ID=67108395

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711470759.6A Pending CN109995697A (en) 2017-12-29 2017-12-29 A kind of digital certificate authentication method using cryptography

Country Status (1)

Country Link
CN (1) CN109995697A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110704834A (en) * 2019-10-17 2020-01-17 淮北师范大学 Digital certificate authentication method using cryptography
CN111274591A (en) * 2020-01-19 2020-06-12 北京百度网讯科技有限公司 Method, device, electronic equipment and medium for accessing Kubernetes cluster

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110704834A (en) * 2019-10-17 2020-01-17 淮北师范大学 Digital certificate authentication method using cryptography
CN111274591A (en) * 2020-01-19 2020-06-12 北京百度网讯科技有限公司 Method, device, electronic equipment and medium for accessing Kubernetes cluster

Similar Documents

Publication Publication Date Title
US20200236147A1 (en) Brokered authentication with risk sharing
US10783260B2 (en) Method for providing simplified account registration service and user authentication service, and authentication server using same
US10887275B2 (en) Token based network service among IoT applications
US9621355B1 (en) Securely authorizing client applications on devices to hosted services
US9264232B2 (en) Cryptographic device that binds an additional authentication factor to multiple identities
CN105306490B (en) Payment verifying system, method and device
CN106850201B (en) Intelligent terminal multiple-factor authentication method, intelligent terminal, certificate server and system
CN108769020B (en) Privacy-protecting identity attribute certification system and method
CN111431719A (en) Mobile terminal password protection module, mobile terminal and password protection method
US6748532B1 (en) Universal smart card access system
CN107872455A (en) A kind of cross-domain single login system and its method
CN112953970A (en) Identity authentication method and identity authentication system
CN105635168A (en) Off-line transaction device and security key using method thereof
CN104821951B (en) A kind of method and apparatus of secure communication
CN112994897A (en) Certificate query method, device, equipment and computer readable storage medium
MX2007013310A (en) Method, system, and program product for connecting a client to a network.
KR101792220B1 (en) Method, mobile terminal, device and program for providing user authentication service of combining biometric authentication
CN103152344B (en) Cryptographic algorithm method and device based on digital certificate
CN106209735A (en) A kind of information processing method, device and Electronic Health Record system
CN109995697A (en) A kind of digital certificate authentication method using cryptography
KR101769861B1 (en) User biometric authentication method and system using HSM smart card without password exposure
US20230379336A1 (en) Systems and methods for multi-factor authentication by a commerce platform using a cloud services provider
CN106936760A (en) A kind of apparatus and method of login Openstack cloud system virtual machines
US20230336361A1 (en) Cryptographic signature delegation
KR101666243B1 (en) Method for generating an identifier

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190709

WD01 Invention patent application deemed withdrawn after publication