CN109995697A - A kind of digital certificate authentication method using cryptography - Google Patents
A kind of digital certificate authentication method using cryptography Download PDFInfo
- Publication number
- CN109995697A CN109995697A CN201711470759.6A CN201711470759A CN109995697A CN 109995697 A CN109995697 A CN 109995697A CN 201711470759 A CN201711470759 A CN 201711470759A CN 109995697 A CN109995697 A CN 109995697A
- Authority
- CN
- China
- Prior art keywords
- digital certificate
- access device
- cryptographic algorithm
- user
- login user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of digital certificate authentication methods using cryptography, it include: that digital certificate corresponding with login user is inquired in access device, the digital certificate inquired is back to login user: where the digital certificate of each user is prestored in access device;Access device receives the cryptographic algorithm request that login user is submitted: access device executes corresponding cryptographic algorithm according to cryptographic algorithm request.Operating result is back to login user.
Description
Technical field
The present invention relates to digital certificate technique field more particularly to a kind of digital certificate authentication methods using cryptography.
Background technique
As what internet and operation system were applied gradually gos deep into, e-commerce system technology makes the customer of shopping on the web
The information for easily obtaining businessman and enterprise can extremely be facilitated, but also increase certain sensitive or valuable data quilts simultaneously
The risk of abuse.How to avert risks, enhancing internet safe problem is particularly important.PKI(Public Key
Infrastructure, Public Key Infrastructure), it is a kind of key management platform for following written standards, it can be all nets
Network application provides cryptographic services and necessary key and the certificate management systems such as encrypted and digitally signed, is effectively ensured user's
Identity security and data safety.However digital certificate substantially shows as a data file with user information and key,
How to protect digital certificate itself becomes most weak link in PKI system again, current general way be using USB Key come
Save digital certificate and private key for user.Each USB Key have PIN (Personal Identification Number, it is a
People's recognition code) code protection, the hardware and PIN code of such USB Key, which constitutes, can be used two of the certificate necessary factors, i.e.,
Two-factor authentication.
USB Key is a kind of hardware device of USB interface, and main body is one piece of safety chip, private key and digital certificate store
In this safety chip hardware device.Also, safety chip has computing capability, supports to generate key pair, digital signature and add
The calculating tasks such as decryption.The advantages of USB Key is that the operating system on personal computer can not know PKI certificate, key pair etc.
Information.Therefore, the development cost for increasing manufacturer, affects user experience.In addition, cryptographic algorithm needs in USB Key
It executes, consumes the resource of user terminal.
Summary of the invention
Based on this, the cryptographic algorithm method and one kind that the present invention provides a kind of based on digital certificate are based on digital certificate
Cryptographic algorithm device.
A kind of cryptographic algorithm method based on digital certificate, comprising the following steps:
Digital certificate corresponding with login user is inquired in access device, and the digital certificate inquired is back to
The login user;Wherein, the digital certificate of each user is prestored in the access device;
The access device receives the cryptographic algorithm request that the login user is submitted;
The access device executes corresponding cryptographic algorithm according to cryptographic algorithm request, and operating result is returned
To the login user.
Compared with general technology, it is centrally stored using access device that the present invention is based on the cryptographic algorithm methods of digital certificate
With management customer digital certificate, it can overcome USB Key storage with batch updating certificate, the problem of loss there is no certificate and hold
Measure insufficient problem.User does not need insertion USB Key, and only need to input PIN code achieves that the certification based on digital certificate, mentions
User experience is risen.The invention avoids the exploitation of USB Key, cryptographic algorithm is completed by access device, saves user's end
The resource at end improves user terminal operational efficiency.
In a kind of wherein embodiment, the access device carries out batch more to the digital certificate of each user prestored
Newly.
In a kind of wherein embodiment, in the step for inquiring digital certificate corresponding with login user in access device
Before rapid, comprising the following steps:
The access device carries out authentication to the login user.
In a kind of wherein embodiment, in the step for inquiring digital certificate corresponding with login user in access device
Before rapid, comprising the following steps:
The access device is to being respectively allocated to the digital certificate of each user, private key and for verifying to PIN code
Identifying code prestored;Wherein, the digital certificate, the private key and the identifying code correspond.
In a kind of wherein embodiment, the access device executes corresponding cryptography according to cryptographic algorithm request
The step of operation, comprising the following steps:
If the cryptographic algorithm request does not need private key, the access device executes corresponding cryptographic algorithm;
If the cryptographic algorithm request needs private key, the access device is according to the identifying code to login user
The PIN code of input is verified, and the private key is called to execute corresponding cryptographic algorithm after being verified.
In a kind of wherein embodiment, PIN code that the access device inputs login user according to the identifying code into
The step of row verifying, comprising the following steps:
The access device receives the PIN code of the login user input;
The access device carries out operation to the received PIN code according to preset operation method;
If above-mentioned operation result is consistent with the identifying code, it is verified.
In a kind of wherein embodiment, the access device receives the cryptographic algorithm request that the login user is submitted
Step, comprising the following steps:
The login user submits cryptographic algorithm request by IE;
Cryptographic algorithm request is sent to the Cryptographic Service Provider of user terminal by CryptoAPI by IE;
Cryptographic algorithm request is sent to the access device by the Cryptographic Service Provider;
The access device receives the cryptographic algorithm request;
The step of operating result is back to the login user by the access device, comprising the following steps:
The operating result is sent to the Cryptographic Service Provider of user terminal by the access device;
The operating result is sent to IE by CryptoAPI by the Cryptographic Service Provider.
In a kind of wherein embodiment, the cryptographic algorithm request includes the behaviour of signature, verifying, encryption and/or decryption
It requests.
A kind of cryptographic algorithm device based on digital certificate, including enquiry module, receiving module and execution module;
The enquiry module, for inquiring digital certificate corresponding with login user in access device, by what is inquired
The digital certificate is back to the login user;Wherein, the digital certificate of each user is prestored in the access device;
The receiving module is asked for receiving the cryptographic algorithm that the login user is submitted on the access device
It asks;
The execution module, for executing corresponding password according to cryptographic algorithm request on the access device
Operation is learned, operating result is back to the login user.
Compared with general technology, it is centrally stored using access device that the present invention is based on the cryptographic algorithm devices of digital certificate
With management customer digital certificate, it can overcome USB Key storage with batch updating certificate, the problem of loss there is no certificate and hold
Measure insufficient problem.User does not need insertion USB Key, and only need to input PIN code achieves that the certification based on digital certificate, mentions
User experience is risen.The invention avoids the exploitation of USB Key, cryptographic algorithm is completed by access device, saves user's end
The resource at end improves user terminal operational efficiency.
Detailed description of the invention
Fig. 1 is that the present invention is based on the flow diagrams of the cryptographic algorithm method of digital certificate;
Fig. 2 is that the present invention is based on the system schematics of the cryptographic algorithm method of digital certificate for implementation;
Fig. 3 is that the present invention is based on the flow diagrams of one preferred embodiment of cryptographic algorithm method of digital certificate;
Fig. 4 is that the present invention is based on the structural schematic diagrams of the cryptographic algorithm device of digital certificate.
Specific embodiment
It is with reference to the accompanying drawing and preferably real for the effect for further illustrating technological means adopted by the present invention and acquirement
Example is applied, to technical solution of the present invention, carries out clear and complete description.
Referring to Fig. 1, for the present invention is based on the flow diagrams of the cryptographic algorithm method of digital certificate.The present invention is based on
The cryptographic algorithm method of digital certificate, comprising the following steps:
S101 inquires digital certificate corresponding with login user in access device, and the digital certificate inquired is returned
It is back to the login user;Wherein, the digital certificate of each user is prestored in the access device;
Access device described in S102 receives the cryptographic algorithm request that the login user is submitted;
Access device described in S103 executes corresponding cryptographic algorithm according to cryptographic algorithm request, by operating result
It is back to the login user.
In step s101, each user in local area network distributes a digital certificate, a private key and a PIN
Code, wherein the digital certificate, the private key and the PIN code correspond.The digital certificate and private key of all users all collects
In be stored in access device, also have the identifying code verified to PIN code in access device.User only needs to save PIN
The cryptographic algorithms such as code, certificate management and signature, verifying, encryption, decryption are completed by access device.User can be by virtual
CSP (Cryptographic Service Provider, Cryptographic Service Provider) interface, is grasped certificate by TCP/IP
Make, cryptographic algorithm is transmitted to access device execution.
In a kind of wherein embodiment, inquired before digital certificate corresponding with login user in access device, it is described
Access device is carried out to the digital certificate of each user, private key and identifying code for being verified to PIN code is respectively allocated to
It prestores;Wherein, the digital certificate, the private key and the identifying code correspond.
In a kind of wherein embodiment, the access device carries out batch more to the digital certificate of each user prestored
Newly.It is described digital certificate and the identifying code are centrally stored in an access device after, can be to the access device
The digital certificate of each user of middle storage carries out batch updating, can store the latest digital certificate of user in time in this way, improves
Safety.Also, the mode of batch updating also reduces processing complexity, more efficient.
Virtual CSP can be used instead of the CSP program built in Windows in client.It is used between virtual CSP and IE
The CryptoAPI (i.e. Cryptography API, CryptoAPI) that Microsoft is provided, such IE does not need to do
Any modification, can safety virtual CSP is called by CryptoAPI.It is logical that safety is established between virtual CSP and access device
Road, all cryptographic algorithms are sent to access device by virtual CSP and complete.
Exit passageway can be pre-established between virtual CSP and access device.IE will be by cryptographic application programming interface (i.e.
CryptoAPI) function enumerates virtual CSP, and is communicated by encryption system programming interface (i.e. CryptoAPI) with virtual CSP.
As one of preferred embodiment, referring to Fig. 2, the present invention is based on the cryptography of digital certificate behaviour to implement
Make the system schematic of method.Access device is divided into three modules: certificate management, cryptography calculates and network management module.Card
Digital certificate, private key and the identifying code for being verified to PIN code of book management module keeping all users of local area network.Password
It learns computing module and completes the operations such as signature, verifying, encryption and decryption.Network management module realizes the function of connection network.It is practical
In, access device can be based on the exploitation such as router, gateway.
Referring to Fig. 3, for the present invention is based on the processes of one preferred embodiment of cryptographic algorithm method of digital certificate to show
It is intended to.
In a kind of wherein embodiment, inquired before digital certificate corresponding with login user in access device, it is described
Access device carries out authentication to the login user.
The mode that Portal certification can be used verifies the identity of user, while enhancing safety, reduces
Unnecessary processing operation (query steps are such as executed in the case where no user logs in).
Following steps progress can be used in subscriber authentication: virtual CSP and access device carry out identity identification, verify mutually
The identity of other side, if being verified, access device user bound is used for identifying code, the digital certificate verified to PIN code
And private key, and return to user certificate.Portal certification etc. can be used in specific identification method.
In a kind of wherein embodiment, in step s 102, the access device receives the close of the login user submission
Code learns the step of operation requests, comprising the following steps:
The login user submits cryptographic algorithm request by IE;
Cryptographic algorithm request is sent to the Cryptographic Service Provider of user terminal by CryptoAPI by IE;
Cryptographic algorithm request is sent to the access device by the Cryptographic Service Provider;
The access device receives the cryptographic algorithm request;
In a kind of wherein embodiment, the cryptographic algorithm request includes the behaviour of signature, verifying, encryption and/or decryption
It requests.For those of ordinary skill in the art after reading this patent, the cryptographic algorithm request can also be other classes
Type.
In step s 102, user submits the cryptographic algorithms such as signature, verifying, encryption, decryption on IE;IE passes through
CryptoAPI requests to operate to virtual CSP;If cryptographic algorithm request is not needed using private key for user, virtual CSP sends password
Operation requests are learned to access device;Otherwise, virtual CSP checks whether user inputted PIN code, if inputting and PIN code is correct,
It sends cryptographic algorithm to request to access device, otherwise, it is desirable that user inputs PIN code;User inputs PIN code, and virtual CSP will
PIN code and cryptographic algorithm are sent to access device.
In a kind of wherein embodiment, in step s 103, if cryptographic algorithm request does not need private key, institute
It states access device and executes corresponding cryptographic algorithm;If the cryptographic algorithm request needs private key, the access device
It is verified according to the PIN code that the identifying code inputs login user, calls the private key to execute after being verified corresponding
Cryptographic algorithm.
In a kind of wherein embodiment, the access device receives the PIN code of the login user input;The access is set
It is standby that operation is carried out to the received PIN code according to preset operation method;If above-mentioned operation result and the identifying code one
It causes, is then verified.
For example, can send cryptographic algorithm if cryptographic algorithm request is not needed using private key for user by virtual CSP and ask
It asks to access device, then access device executes cryptographic algorithm, and returns result to virtual CSP.Then passing through virtual CSP will
Operating result returns to IE, and operating result is shown to user by IE.
In step s 103, the step of operating result is back to the login user by the access device, including it is following
Step:
The operating result is sent to the Cryptographic Service Provider of user terminal by the access device;
The operating result is sent to IE by CryptoAPI by the Cryptographic Service Provider.
After operating result is returned to user by the access device, the access device receives stepping on for user's transmission
After requesting out, release between digital certificate described in the user, the private key and the identifying code for being verified to PIN code
Binding.
The process that user publishes can include: user's click Portal authentication website publishes button;IE passes through CryptoAPI
Unloading certificate is requested to virtual CSP;Virtual CSP deletes local certificate, and sends unbinding request to access device;Access is set
After receiving request, the corresponding relationship of de-authentication code and private key for user sends the response to virtual CSP;Virtual CSP receives response
Afterwards, IE is returned to, user publishes success.
Compared with general technology, it is centrally stored using access device that the present invention is based on the cryptographic algorithm methods of digital certificate
With management customer digital certificate, it can overcome USB Key storage with batch updating certificate, the problem of loss there is no certificate and hold
Measure insufficient problem.User does not need insertion USB Key, and only need to input PIN code achieves that the certification based on digital certificate, mentions
User experience is risen.The invention avoids the exploitation of USB Key, cryptographic algorithm is completed by access device, saves user's end
The resource at end improves user terminal operational efficiency.
Each user distributes a certificate and a PIN code in local area network, and certificate and PIN code correspond, own
The certificate of user and corresponding PIN code are all centrally stored in an access device.User only needs to save PIN code, certificate pipe
The cryptographic algorithms such as reason and signature, verifying, encryption, decryption are completed by access device.User can pass through virtual CSP (encryption
Service providing program) interface, certificate operation, cryptographic algorithm are transmitted to access device and executed by TCP/IP.
In some specific areas, such as bank, government bodies, user number is fewer, and fixation is also compared in application, can be with
It is centrally stored and by the way of using using a kind of certificate, it can not only realize the advantage highly-safe, not easy to lose of USB Key, but also can
It solves the problems, such as USB Key lack of memory capacity, and user experience can be improved, reduce development cost.The present invention is not changing user
Under conditions of experience, cryptographic algorithm is transferred to server-side (i.e. access device), the application program of user terminal is not required to be changed
It makes.
Referring to Fig. 4, for the present invention is based on the structural schematic diagrams of the cryptographic algorithm device of digital certificate.The present invention is based on
The cryptographic algorithm device of digital certificate, including enquiry module 401, receiving module 402 and execution module 403;
The enquiry module 401 will be inquired for inquiring digital certificate corresponding with login user in access device
The digital certificate be back to the login user;Wherein, the digital certificate of each user is prestored in the access device;
The receiving module 402, the cryptographic algorithm submitted for receiving the login user on the access device
Request;
The execution module 403, it is corresponding for being executed on the access device according to cryptographic algorithm request
Operating result is back to the login user by cryptographic algorithm.
It further include in one of the embodiments, update module the present invention is based on the cryptographic algorithm device of digital certificate,
The update module is for carrying out batch updating to the digital certificate of each user prestored on the access device.
It further include in one of the embodiments, authentication mould the present invention is based on the cryptographic algorithm device of digital certificate
Block is inquired before digital certificate corresponding with login user in access device, and the authentication module described for connecing
Enter and authentication is carried out to the login user in equipment.
In one of the embodiments:
The login user submits cryptographic algorithm request by IE;
Cryptographic algorithm request is sent to the Cryptographic Service Provider of user terminal by CryptoAPI by IE;
Cryptographic algorithm request is sent to the access device by the Cryptographic Service Provider;
The receiving module 402 receives the cryptographic algorithm request on the access device;
Cryptographic algorithm device the present invention is based on digital certificate further includes sending module, and the sending module is used in institute
State the Cryptographic Service Provider that the operating result is sent to user terminal on access device;
The operating result is sent to IE by CryptoAPI by the Cryptographic Service Provider.
The cryptographic algorithm request may include signature, verifying, encryption and/or decryption in one of the embodiments,
Operation requests.
Compared with general technology, it is centrally stored using access device that the present invention is based on the cryptographic algorithm devices of digital certificate
With management customer digital certificate, it can overcome USB Key storage with batch updating certificate, the problem of loss there is no certificate and hold
Measure insufficient problem.User does not need insertion USB Key, and only need to input PIN code achieves that the certification based on digital certificate, mentions
User experience is risen.The invention avoids the exploitation of USB Key, cryptographic algorithm is completed by access device, saves user's end
The resource at end improves user terminal operational efficiency.
Cryptographic algorithm is transferred to server-side and (accessed by the present invention under conditions of not changing user's operation complexity
Equipment), the application program of user terminal is not required to be transformed.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously
Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention
Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.
Claims (5)
1. a kind of digital certificate authentication method using cryptography, which comprises the following steps: looked into access device
Digital certificate corresponding with login user is ask, the digital certificate inquired is back to the login user: where described
The digital certificate of each user is prestored in access device:
The access device receives the cryptographic algorithm request that the login user is submitted;
The access device executes corresponding cryptographic algorithm according to cryptographic algorithm request, and operating result is back to institute
State login user.
2. the cryptographic algorithm method according to claim 1 based on digital certificate, which is characterized in that the access device
Batch updating is carried out to the digital certificate of each user prestored.
3. the cryptographic algorithm method according to claim 1 based on digital certificate, which is characterized in that accessed described
Before the step of inquiring digital certificate corresponding with login user in equipment, comprising the following steps:
The access device carries out authentication to the login user.
4. the cryptographic algorithm method according to claim 1 based on digital certificate, which is characterized in that accessed described
Before the step of inquiring digital certificate corresponding with login user in equipment, comprising the following steps:
The access device is to being respectively allocated to the digital certificate of each user, private key and test for what is verified to PIN code
Card code is prestored: where the digital certificate, the private key and the identifying code correspond.
5. the cryptographic algorithm method according to claim 4 based on digital certificate, which is characterized in that the access device
The step of executing corresponding cryptographic algorithm is requested according to the cryptographic algorithm, comprising the following steps:
If the cryptographic algorithm request does not need private key, the access device executes corresponding cryptographic algorithm: if
The cryptographic algorithm request needs private key, then the PIN code that the access device inputs login user according to the identifying code
It is verified, the private key is called to execute corresponding cryptographic algorithm after being verified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711470759.6A CN109995697A (en) | 2017-12-29 | 2017-12-29 | A kind of digital certificate authentication method using cryptography |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711470759.6A CN109995697A (en) | 2017-12-29 | 2017-12-29 | A kind of digital certificate authentication method using cryptography |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109995697A true CN109995697A (en) | 2019-07-09 |
Family
ID=67108395
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711470759.6A Pending CN109995697A (en) | 2017-12-29 | 2017-12-29 | A kind of digital certificate authentication method using cryptography |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109995697A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110704834A (en) * | 2019-10-17 | 2020-01-17 | 淮北师范大学 | Digital certificate authentication method using cryptography |
CN111274591A (en) * | 2020-01-19 | 2020-06-12 | 北京百度网讯科技有限公司 | Method, device, electronic equipment and medium for accessing Kubernetes cluster |
-
2017
- 2017-12-29 CN CN201711470759.6A patent/CN109995697A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110704834A (en) * | 2019-10-17 | 2020-01-17 | 淮北师范大学 | Digital certificate authentication method using cryptography |
CN111274591A (en) * | 2020-01-19 | 2020-06-12 | 北京百度网讯科技有限公司 | Method, device, electronic equipment and medium for accessing Kubernetes cluster |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200236147A1 (en) | Brokered authentication with risk sharing | |
US10783260B2 (en) | Method for providing simplified account registration service and user authentication service, and authentication server using same | |
US10887275B2 (en) | Token based network service among IoT applications | |
US9621355B1 (en) | Securely authorizing client applications on devices to hosted services | |
CN105306490B (en) | Payment verifying system, method and device | |
US8819437B2 (en) | Cryptographic device that binds an additional authentication factor to multiple identities | |
CN106850201B (en) | Intelligent terminal multiple-factor authentication method, intelligent terminal, certificate server and system | |
CN108769020B (en) | Privacy-protecting identity attribute certification system and method | |
CN111431719A (en) | Mobile terminal password protection module, mobile terminal and password protection method | |
US6748532B1 (en) | Universal smart card access system | |
CN111062023B (en) | Method and device for realizing single sign-on of multi-application system | |
CN107872455A (en) | A kind of cross-domain single login system and its method | |
CN112953970A (en) | Identity authentication method and identity authentication system | |
CN105635168A (en) | Off-line transaction device and security key using method thereof | |
CN110069909A (en) | It is a kind of to exempt from the close method and device for logging in third party system | |
CN107819766B (en) | Security authentication method, system and computer readable storage medium | |
CN104821951B (en) | A kind of method and apparatus of secure communication | |
CN112994897A (en) | Certificate query method, device, equipment and computer readable storage medium | |
MX2007013310A (en) | Method, system, and program product for connecting a client to a network. | |
CN103152344B (en) | Cryptographic algorithm method and device based on digital certificate | |
CN106209735A (en) | A kind of information processing method, device and Electronic Health Record system | |
CN109995697A (en) | A kind of digital certificate authentication method using cryptography | |
CN114584381A (en) | Security authentication method and device based on gateway, electronic equipment and storage medium | |
KR101769861B1 (en) | User biometric authentication method and system using HSM smart card without password exposure | |
US20230379336A1 (en) | Systems and methods for multi-factor authentication by a commerce platform using a cloud services provider |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190709 |
|
WD01 | Invention patent application deemed withdrawn after publication |