CN111934885A - Password device security virtualization method and system based on proxy mechanism - Google Patents

Password device security virtualization method and system based on proxy mechanism Download PDF

Info

Publication number
CN111934885A
CN111934885A CN202010718000.0A CN202010718000A CN111934885A CN 111934885 A CN111934885 A CN 111934885A CN 202010718000 A CN202010718000 A CN 202010718000A CN 111934885 A CN111934885 A CN 111934885A
Authority
CN
China
Prior art keywords
proxy
signature
password
key
virtual machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010718000.0A
Other languages
Chinese (zh)
Other versions
CN111934885B (en
Inventor
涂翠
王茜艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Jahport Technology Co ltd
Original Assignee
Wuhan Jahport Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Jahport Technology Co ltd filed Critical Wuhan Jahport Technology Co ltd
Priority to CN202010718000.0A priority Critical patent/CN111934885B/en
Publication of CN111934885A publication Critical patent/CN111934885A/en
Application granted granted Critical
Publication of CN111934885B publication Critical patent/CN111934885B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a safe virtualization method and a system of cryptographic equipment based on an agent mechanism, which realize a cryptographic algorithm interface based on an agent signature mechanism; the password equipment and the virtual machines sign a proxy protocol through the password algorithm interface, and the password service of the password equipment is entrusted to the plurality of virtual machines; after receiving a password service request of a user, directly calling password equipment to execute the password service corresponding to the password service request, or forwarding the task to an authorized virtual machine so that the authorized virtual machine executes the password service corresponding to the password service request. The method and the system can sign the proxy protocol through the proxy signature algorithm interface, entrust the password service of the password equipment to a plurality of virtual machines, expand the service resources and solve the performance bottleneck problem of the password equipment.

Description

Password device security virtualization method and system based on proxy mechanism
Technical Field
The invention relates to the technical field of information security, in particular to a secure virtualization method and a secure virtualization system for cryptographic equipment based on an agent mechanism.
Background
With the rapid development of the internet and information technology, network communication becomes an indispensable part of daily work and life of people, people store more and more information on the internet, utilize the internet to process various matters, and how to ensure the information security of people in the information era is a long-standing problem.
The cryptographic technology is a key technology for information security, and has a particularly important and effective role in ensuring data security. In order to ensure confidentiality, integrity, authenticable and non-repudiation of data transmission process, both communication parties often encrypt communication data and generate digital signatures. With the advent of the data era, service networks become more and more huge and complicated, the requirements for encryption, decryption, signature verification and calculation in the communication process become more and more large, the use amount of private keys becomes more and more large, and the problem of how to solve the performance bottleneck of a cryptographic operation function provider is also solved.
The importance of cryptographic devices as the primary product in the current market for providing key management and cryptographic services is self-evident. Although cloud password devices have been proposed and developed rapidly, in most industrial field applications, a physical password device is still used. On one hand, people still have doubtful worry about the safety guarantee of cloud password equipment, and on the other hand, due to the cost problem of upgrading and reconstruction, a plurality of industries are not yet transited to the cloud era. With the continuous expansion of services and the increasing demand of service speed, higher requirements are also put forward on the service performance of the password device, and how to improve the machine performance as much as possible under the condition of ensuring the security of the password device becomes a hot research problem.
The inventor of the present application finds that the method of the prior art has at least the following technical problems in the process of implementing the present invention:
the traditional virtualization technology can abstract bottom hardware resources and then transparently provide services for users, and although the performance of the services can be improved to a certain extent, the final pressure of the services still remains on the cryptographic device for storing the private key based on the characteristics of the cryptographic device, such as accessing the interface for operation by the private key and the like, and the service performance cannot be effectively improved no matter how abstract the cryptographic device stores the private key. Expanding the resources of the cryptographic equipment can effectively solve the performance problem, but in view of the over-high price of the entity cryptographic equipment, how to find an economic and efficient solution is bound to become a new direction for the development of the information security industry.
Disclosure of Invention
The invention provides a secure virtualization method and a secure virtualization system for cryptographic equipment based on a proxy mechanism, which are used for solving or at least partially solving the technical problem of poor service performance of the method in the prior art.
In order to solve the above technical problem, a first aspect of the present invention provides a secure virtualization method for a cryptographic device based on an agent mechanism, including:
a cryptographic algorithm interface based on a proxy signature mechanism is realized;
the password equipment and the virtual machines sign a proxy protocol through the password algorithm interface, and the password service of the password equipment is entrusted to the plurality of virtual machines;
after receiving a password service request of a user, directly calling password equipment to execute the password service corresponding to the password service request, or forwarding the task to an authorized virtual machine so that the authorized virtual machine executes the password service corresponding to the password service request.
In one embodiment, the cryptographic algorithm based on the proxy signature mechanism includes a proxy signature algorithm with proxy authorization information and a proxy signature algorithm without proxy authorization information.
In one embodiment, the proxy signature algorithm with proxy authorization information comprises the following steps:
preparing system parameters; wherein, the original signer identity information is IDAWith a key pair: pA=[dA]G, the identity information of the proxy signer is IDBProxy expiration TimeABThe serial number NUM (8 bits) of the key of the proxy, and proxy authorization information w, which is combined into a proxy signer, are IDA||IDB||TimeAB||NUM;
Proxy authorization; the original signer obtains the random number
Figure BDA0002598923900000021
Calculating the point G on the elliptic curveA=[kA]G=(xA,yA) Wherein x isA,yAAre each GAX coordinate of (1), y coordinate ofThe hash value e of proxy authorization information is hash (w) mod n, and the proxy private key dP=kA·xA+e·dAmod n, proxy secret information (w, G)A,dP) Sending the signature to the proxy signer through a secure channel;
verifying the proxy key; the proxy signer calculates a proxy authorization information hash value e ═ hash (w) mod n, and verifies: proxy public key Pp=[xA]GA+[e]PAIf true, then (w, G)A,dP) Is a set of valid proxy keys, dPAnd PpIs a valid proxy key of a group of original keys numbered NUM;
generating a proxy signature; using proxy private key dPGenerating a proxy signature by adopting a generation algorithm of a public key cryptographic algorithm digital signature;
verifying the proxy signature; using a proxy public key PpAnd verifying the proxy signature by adopting a verification algorithm of a public key cryptographic algorithm digital signature.
In one embodiment, the proxy signature algorithm without proxy authorization information comprises the following steps:
preparing system parameters; the original signer has a key pair: pA=[dA]G,PAIs a public key, dAIs a private key, G is a generator;
proxy authorization; the original signer calculates: generating random numbers
Figure BDA0002598923900000031
Calculating the point G on the elliptic curveA=[kA]G=(xA,yA) Proxy private key dP=kA·xA+dAmod n, proxy secret information (G)A,dP) Sending the signature to the proxy signer through a secure channel;
verifying the proxy key; proxy signer verifies proxy public key Pp=[xA]GA+PAIf it is true, the equation is true (G)A,dP) Is a set of valid proxy keys;
generating a proxy signature: utilizing proxy private keysdPGenerating a proxy signature by adopting a generation algorithm of a public key cryptographic algorithm digital signature;
and (3) proxy signature verification: using a proxy public key PpAnd verifying the proxy signature by adopting a verification algorithm of a public key cryptographic algorithm digital signature.
In one embodiment, before the proxy protocol is signed between the cryptographic device and the virtual machine through the cryptographic algorithm interface, the method further comprises:
the virtual machine sends a registration request to a password equipment service center, wherein the registration request comprises the identity information of the virtual machine;
the password equipment service center conducts identity verification on the virtual machine based on the virtual machine identity information in the registration request, if verification is passed, virtual identity information is registered, registration is successful, if verification is not passed, error information is returned, and when verification is passed, a proxy protocol is signed between the password equipment and the virtual machine through the password algorithm interface, wherein the proxy protocol comprises a proxy time limit and a proxy range.
In one embodiment, the signing an agent agreement between the cryptographic device and the virtual machine through the cryptographic algorithm interface to delegate the cryptographic service of the cryptographic device to the plurality of virtual machines includes:
the cryptographic equipment service center receives a request agent sent by a virtual machine through the virtual machine center, wherein the request agent comprises a requested key index number;
examining the proxy protocol content signed by the virtual machine, generating a proxy key corresponding to the key index number requested by the virtual machine through the password equipment after the examination is passed, and storing the information of the proxy key;
and sending the proxy key to the corresponding virtual machine in a preset safety mode, and storing the proxy key after the virtual machine receives the proxy key.
In one embodiment, the cryptographic service that is directly invoked to be executed by the cryptographic device includes a signature service and a signature verification service that are executed by the cryptographic device, and the specific implementation steps include:
receiving a cryptographic equipment signature request or signature verification request sent by a user, wherein input parameters contained in the signature request comprise user identity data, a key password and signature parameters, and input parameters contained in the signature verification request comprise the user identity data, the key password and the signature verification parameters;
if the signature service is adopted, the formats of the user identity data, the key password and the input parameters of the signature request are verified, and after the verification is passed, the signature parameters are forwarded to the password equipment through a forwarding layer, wherein the signature parameters comprise the message to be signed and the index number of the signature key in the password equipment; if the signature verification service is the signature verification service, the formats of the user identity data, the key password and the input parameters of the signature verification request are verified, and after the verification is passed, the signature verification parameters are forwarded to the password equipment through a forwarding layer, wherein the signature verification parameters comprise signature information, signature data to be verified and a signature verification key index number in the password equipment;
and the password equipment executes corresponding signature calculation based on the signature parameters, executes corresponding signature verification calculation based on the signature verification parameters, and returns a calculation result to the forwarding layer so that the forwarding layer sends the calculation result to the user of the service layer.
In one embodiment, the cryptographic service executed by the virtual machine includes a signature service and a signature verification service, and the specific implementation steps include:
receiving a cryptographic equipment signature request or signature verification request sent by a user, wherein input parameters contained in the signature request comprise user identity data, a key password and signature parameters, and input parameters contained in the signature verification request comprise the user identity data, the key password and the signature verification parameters;
if the signature service is adopted, the formats of the user identity data, the key password and the input parameters of the signature request are verified, and after the verification is passed, the signature parameters are forwarded to the password equipment through a forwarding layer, wherein the signature parameters comprise the message to be signed and the signature key index number in the virtual machine; if the signature verification service is adopted, the formats of the user identity data, the key password and the input parameters of the signature verification request are verified, and after the verification is passed, the signature verification parameters are forwarded to the password equipment through a forwarding layer, wherein the signature verification parameters comprise signature information, signature data to be verified and a signature verification key index number in the virtual machine;
and the virtual machine executes corresponding signature calculation based on the signature parameters, executes corresponding signature verification calculation based on the signature verification parameters, and returns a calculation result to the forwarding layer so that the forwarding layer sends the calculation result to a user of the service layer.
Based on the same inventive concept, the second aspect of the present invention provides a secure virtualization system for cryptographic devices based on a proxy mechanism, the system comprising:
the user management center is used for managing the user, including the management of life cycles of registration, suspension, activation, logout and the like of the user, the management of user identity information, the distribution and management of user authority, the generation, the issuance and the verification of a user login token password;
cryptographic device service center: registering and managing the virtual machine for receiving a registration request sent by a virtual machine service center, and after the registration is successful, receiving a request for applying a relevant agent key sent by the virtual machine service center and carrying out entrusting and authorization on the virtual machine;
the password equipment is a carrier for realizing the password service function, and generates an agent key after the password equipment service center entrusts and authorizes the virtual machine;
and the virtual machine service center sends a registration request and a request for applying a related proxy key to the cryptographic equipment service center, and manages the proxy key after the virtual machine is successfully authorized.
In one embodiment, the functions of the cryptographic device service center further include cryptographic device cryptographic service invocation and virtual machine identity information management.
One or more technical solutions in the embodiments of the present application have at least one or more of the following technical effects:
the invention provides a safe virtualization method of password equipment based on an agent mechanism, which comprises the following steps of firstly realizing a password algorithm interface based on an agent signature mechanism; then, signing a proxy protocol between the password equipment and the virtual machines through the password algorithm interface, and entrusting password service of the password equipment to the plurality of virtual machines; after receiving a password service request of a user, directly calling password equipment to execute the password service corresponding to the password service request, or forwarding the task to an authorized virtual machine so that the authorized virtual machine executes the password service corresponding to the password service request. In the invention, the proxy protocol can be signed between the cryptographic equipment and the virtual machines through the proxy signature algorithm interface, the cryptographic service of the cryptographic equipment is entrusted to the plurality of virtual machines, and the cryptographic equipment is authorized to entrust the virtual machines to replace the cryptographic equipment to execute high-demand cryptographic service operation under the condition of ensuring that the security key stored by the cryptographic equipment is not leaked by using the proxy mechanism, so that the service resources are effectively expanded, the problem of performance bottleneck of the cryptographic equipment is solved, and the service performance of the cryptographic equipment can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic diagram of secure virtualized cryptographic service invocation in an embodiment of the present invention.
Fig. 2 is a flow chart of signature verification of a cryptographic device in an embodiment of the present invention.
Fig. 3 is a flowchart of virtual machine authorization delegation in an embodiment of the invention.
Fig. 4 is a flow chart of virtual machine signature verification in the embodiment of the present invention.
Fig. 5 is a schematic diagram of a secure virtualization system of a cryptographic device in an embodiment of the present invention.
Detailed Description
In order to solve the problem of poor service performance of the password equipment in the prior art, the invention provides a password equipment security virtualization method and system based on a proxy mechanism. By using the proxy mechanism, the password device authorizes the entrusted virtual machine to replace the password device to execute high-demand password service operation under the condition of ensuring that a security key stored by the password device is not leaked, so that service resources are effectively expanded, and the problem of performance bottleneck of the password device is solved.
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The embodiment of the invention provides a safe virtualization method of password equipment based on an agent mechanism, which comprises the following steps:
a cryptographic algorithm interface based on a proxy signature mechanism is realized;
the password equipment and the virtual machines sign a proxy protocol through the password algorithm interface, and the password service of the password equipment is entrusted to the plurality of virtual machines;
after receiving a password service request of a user, directly calling password equipment to execute the password service corresponding to the password service request, or forwarding the task to an authorized virtual machine so that the authorized virtual machine executes the password service corresponding to the password service request.
Specifically, a cryptographic algorithm interface based on a proxy signature mechanism, namely a proxy signature algorithm, mainly comprises system parameter setting, proxy authorization and a proxy verification interface; the proxy protocol is signed between the password equipment and the virtual machines through a proxy signature algorithm interface, the password service of the password equipment is entrusted to the plurality of virtual machines, the service resources are expanded, and the problem of performance bottleneck of the password equipment is solved. The system mainly comprises: the system comprises four parts, namely password equipment, a user management center, a password equipment service center and a virtual machine service center. A safe virtualization method and a system of password equipment based on an agent mechanism have the following characteristics:
(1) and ensuring the security of the original key. The original key should only be stored in the original entity cryptographic device and cannot be exported to the original cryptographic device; after the proxy virtual machine obtains the proxy key of the original key, it should be difficult to calculate the original key through the proxy key;
(2) the agent is non-protective. In this type of proxy signature, except for the original signer, only the proxy signer designated by the original signer can sign a valid proxy signature instead of the original signer (i.e., both the original signer and the proxy signer know the proxy key), and an unspecified third party cannot acquire the relevant proxy key or forge a valid proxy signature. Most applications for the original signer need to be able to master the application scenario of the proxy signer key, even if the proxy signer cannot fulfill the proxy role for some unexpected reasons, the original signer can complete the task instead of its location. In a secure virtualization application scenario of the password device, it must be ensured that when the virtual machine is down for some reason and cannot continue to provide services, the password device can replace the virtual machine to complete corresponding work, and therefore, the proxy signature must use a proxy non-protection type;
(3) it is not forgeable. In addition to the cryptographic device, only the specified virtual machine can complete the computing task (including signature verification, encryption and decryption, etc.) of the specified key on behalf of the cryptographic device;
(4) verifiability. From the results given by the virtual machine (e.g., the signature result is a digital signature of a message returned), the user can trust that the cryptographic device agreed with the signed message;
(5) non-repudiation. Once the virtual machine has given the relevant calculation result (e.g. the signature result is a digital signature returned), it cannot deny the cryptographic device the result he has given;
(6) identifiability. The calculation result given by the password device and the calculation result given by the virtual machine are recognizable and distinguishable for the user; for the cryptographic device, the calculation results of the plurality of different virtual machines are distinguishable, and the identity of the virtual machine can be determined from the calculation results;
(7) independent security. After a virtual machine is broken, an attacker cannot obtain the original security key of the password equipment or the proxy keys of other virtual machines from the key of the virtual machine;
(8) based on public key cryptographic algorithms (including but not limited to algorithms such as SM2, SM9, ECC, RSA and the like) and a proxy signature mechanism, the secure virtualization of the cryptographic equipment is realized, the pressure of the cryptographic equipment is relieved, and the system performance is improved.
In one embodiment, the cryptographic algorithm based on the proxy signature mechanism includes a proxy signature algorithm with proxy authorization information and a proxy signature algorithm without proxy authorization information.
Specifically, the invention provides a secure virtualization method of a password device based on a proxy mechanism, which realizes the secure virtualization of the password device by utilizing a proxy signature mechanism. The proxy signature means that the original signer delegates the authority of self signature to the proxy signer, and the proxy signer can generate a valid signature for the message needing to be signed on behalf of the original signer.
Generally, a specific proxy signature algorithm includes the following five stages: the first stage is an initialization process, which completes the preparation of system parameters; the second stage is an authorization entrusting stage, and the original signer generates secret information or an agent secret key and transmits the secret information or the agent secret key to the agent signer; the third phase is an agent verification phase, wherein an agent signer verifies whether the received authorization information is real and valid; the fourth stage is a proxy signing stage, and a proxy signer signs a message to be signed by using a proxy key; and finally, a proxy signature verification stage, wherein a verifier verifies whether the proxy signature is valid. The formal definition of the proxy signature algorithm is given below:
system parameter preparation (prepare): the device is provided with Alice as an original signer and a secret key pair: pA=[dA]G,PAIs a public key, dAIs the private key and G is the generator.
Proxy authorization (proxy) Alice computes: selecting random numbers
Figure BDA0002598923900000081
Calculating the point G on the elliptic curveA=[kA]G=(xA,yA) If xAWhen k is equal to 0, k is regeneratedA. Computing agent private key dP=kA·xA+dAmod n, proxy secret information (G)A,dP) Sent to the agent over a secure channelThe signer Bob. Bob calculates: and (3) verification: [ dP]G=[xA]GA+PAIf true, then (G)A,dP) Is a set of valid proxy keys. Agent private key dPThe corresponding public key is Pp=[xA]GA+PA
Proxy signature verification (verify): and after receiving the proxy signature combination, the verifier calculates a proxy public key by inquiring the public information and verifies the validity of the proxy signature by using the proxy public key.
In one embodiment, the proxy signature algorithm with proxy authorization information comprises the following steps:
preparing system parameters; wherein, the original signer identity information is IDAWith a key pair: pA=[dA]G, the identity information of the proxy signer is IDBProxy expiration TimeABThe serial number NUM (8 bits) of the key of the proxy, and proxy authorization information w, which is combined into a proxy signer, are IDA||IDB||TimeAB||NUM;
Proxy authorization; the original signer obtains the random number
Figure BDA0002598923900000082
Calculating the point G on the elliptic curveA=[kA]G=(xA,yA) Wherein x isA,yAAre each GAX coordinate, y coordinate, proxy authorization information hash value e ═ hash (w) mod n, proxy private key dP=kA·xA+e·dAmod n, proxy secret information (w, G)A,dP) Sending the signature to the proxy signer through a secure channel;
verifying the proxy key; the proxy signer calculates a proxy authorization information hash value e ═ hash (w) mod n, and verifies: proxy public key Pp=[xA]GA+[e]PAIf true, then (w, G)A,dP) Is a set of valid proxy keys, dPAnd PpIs a valid proxy key of a group of original keys numbered NUM;
generating a proxy signature;using proxy private key dPGenerating a proxy signature by adopting a generation algorithm of a public key cryptographic algorithm digital signature;
verifying the proxy signature; using a proxy public key PpAnd verifying the proxy signature by adopting a verification algorithm of a public key cryptographic algorithm digital signature.
It should be noted that, in the present embodiment, the implementation steps of the proxy signature algorithm are given by taking the SM2 elliptic curve public key cryptographic algorithm in combination with the proxy signature mechanism, and other algorithms such as SM9, ECC, RSA, and the like may also be used for implementation, which is not described in detail herein.
In one embodiment, the proxy signature algorithm without proxy authorization information comprises the following steps:
preparing system parameters; the original signer has a key pair: pA=[dA]G,PAIs a public key, dAIs a private key, G is a generator;
proxy authorization; the original signer calculates: generating random numbers
Figure BDA0002598923900000091
Calculating the point G on the elliptic curveA=[kA]G=(xA,yA) Proxy private key dP=kA·xA+dAmod n, proxy secret information (G)A,dP) Sending the signature to the proxy signer through a secure channel;
verifying the proxy key; proxy signer verifies proxy public key Pp=[xA]GA+PAIf it is true, the equation is true (G)A,dP) Is a set of valid proxy keys;
generating a proxy signature: using proxy private key dPGenerating a proxy signature by adopting a generation algorithm of a digital signature of an SM2 elliptic curve public key cryptographic algorithm;
and (3) proxy signature verification: using a proxy public key PpAnd verifying the proxy signature by adopting a verification algorithm of the digital signature of the SM2 elliptic curve public key cryptographic algorithm.
It should be noted that, in the embodiment, the implementation steps of the proxy signature algorithm are given by taking the SM2 public key cryptographic algorithm in combination with the proxy signature mechanism as an example, and other algorithms such as SM9, ECC, RSA, and the like may also be used for implementation, which is not described in detail herein.
The proxy protocol is signed between the password equipment and the virtual machines through the proxy signature algorithm interface, the password service of the password equipment is entrusted to the plurality of virtual machines, the service resources are expanded, and the problem of performance bottleneck of the password equipment is solved.
Fig. 1 shows a schematic diagram of a cryptographic service call implemented by adding an agent mechanism to implement secure virtualization of a cryptographic device based on a traditional cryptographic service system architecture. The system comprises three layers, an execution layer, a forwarding layer and a Server layer (application layer).
Specifically, the Server layer is a user layer, the user is used for making a related password service request, the user is managed by a user management center, the forwarding layer is an intermediate layer and is used for forwarding the user request to the execution layer and forwarding a calculation result of the execution layer to the user, and the execution layer is a password device and a virtual machine. The password equipment service center, the password equipment, the virtual machine service center and the virtual machine are used for completing the operations of entrusting authorization, password service and the like. The cipher device stores the number 1-m cipher keys, firstly authorizes the cipher service function to a plurality of virtual machines through an agent mechanism, and safely transmits the number 1-k cipher keys to the virtual machine A after processing, and the others are similar. After the Server layer receives the password service request, the corresponding task is forwarded to the corresponding virtual machine through the forwarding layer, or the password equipment is directly called to execute the corresponding password service, so that the calculation resources are expanded horizontally and elastically, and the password service performance is improved.
In one embodiment, before the proxy protocol is signed between the cryptographic device and the virtual machine through the cryptographic algorithm interface, the method further comprises:
the virtual machine sends a registration request to a password equipment service center, wherein the registration request comprises the identity information of the virtual machine;
the password equipment service center conducts identity verification on the virtual machine based on the virtual machine identity information in the registration request, if verification is passed, virtual identity information is registered, registration is successful, if verification is not passed, error information is returned, and when verification is passed, a proxy protocol is signed between the password equipment and the virtual machine through the password algorithm interface, wherein the proxy protocol comprises a proxy time limit and a proxy range.
Specifically, the registration process of the virtual machine can be seen in the left part of the flowchart of fig. 3. The virtual machine identity information includes, but is not limited to, name, affiliation, server configuration information. The method for auditing the virtual machine by the cryptographic equipment service center comprises the form of on-line submission of material auditing or off-line auditing, the cryptographic equipment service center verifies the identity of the virtual machine, and the cryptographic equipment service center signs an agent protocol after the verification, and can comprise information such as an agent period, an agent range and the like.
In one embodiment, the signing an agent agreement between the cryptographic device and the virtual machine through the cryptographic algorithm interface to delegate the cryptographic service of the cryptographic device to the plurality of virtual machines includes:
the cryptographic equipment service center receives a request agent sent by a virtual machine through the virtual machine center, wherein the request agent comprises a requested key index number;
examining the proxy protocol content signed by the virtual machine, generating a proxy key corresponding to the key index number requested by the virtual machine through the password equipment after the examination is passed, and storing the information of the proxy key;
and sending the proxy key to the corresponding virtual machine in a preset safety mode, and storing the proxy key after the virtual machine receives the proxy key.
Specifically, the flow of implementation of delegating the cryptographic service of the cryptographic device to multiple virtual machines may be seen in the right flow diagram of fig. 3. The virtual machine sends a request proxy through the virtual machine center, then the password equipment service center performs verification, and after the verification is passed, the password equipment generates a proxy key corresponding to the key index number requested by the virtual machine. The stored proxy key information includes an index number of the key.
The preset security mode comprises an offline mode or sending after encryption processing. After receiving the proxy key, the virtual machine stores the proxy key, verifies the proxy key, safely stores the proxy key in a database after the proxy key is verified, and the access control of the virtual machine can be limited by a password or setting to be available for a certain type of users.
In one embodiment, the cryptographic service that is directly invoked to be executed by the cryptographic device includes a signature service and a signature verification service that are executed by the cryptographic device, and the specific implementation steps include:
receiving a cryptographic equipment signature request or signature verification request sent by a user, wherein input parameters contained in the signature request comprise user identity data, a key password and signature parameters, and input parameters contained in the signature verification request comprise the user identity data, the key password and the signature verification parameters;
if the signature service is adopted, the formats of the user identity data, the key password and the input parameters of the signature request are verified, and after the verification is passed, the signature parameters are forwarded to the password equipment through a forwarding layer, wherein the signature parameters comprise the message to be signed and the index number of the signature key in the password equipment; if the signature verification service is the signature verification service, the formats of the user identity data, the key password and the input parameters of the signature verification request are verified, and after the verification is passed, the signature verification parameters are forwarded to the password equipment through a forwarding layer, wherein the signature verification parameters comprise signature information, signature data to be verified and a signature verification key index number in the password equipment;
and the password equipment executes corresponding signature calculation based on the signature parameters, executes corresponding signature verification calculation based on the signature verification parameters, and returns a calculation result to the forwarding layer so that the forwarding layer sends the calculation result to the user of the service layer.
Specifically, according to different services requested by a user, the password device can be directly called to complete corresponding password services, which mainly comprise a signature service and a signature verification service.
The implementation flow of the cryptographic device cryptographic signature/signature verification service is shown in fig. 2.
The user identity data comprises a user name and a token, wherein the token is acquired from a user management center, a key password is optional, and the key password must be input if password authentication is required. The interface parameters in fig. 2 are input parameters. Key usage rights may also be included.
In one embodiment, the cryptographic service executed by the virtual machine includes a signature service and a signature verification service, and the specific implementation steps include:
receiving a cryptographic equipment signature request or signature verification request sent by a user, wherein input parameters contained in the signature request comprise user identity data, a key password and signature parameters, and input parameters contained in the signature verification request comprise the user identity data, the key password and the signature verification parameters;
if the signature service is adopted, the formats of the user identity data, the key password and the input parameters of the signature request are verified, and after the verification is passed, the signature parameters are forwarded to the password equipment through a forwarding layer, wherein the signature parameters comprise the message to be signed and the signature key index number in the virtual machine; if the signature verification service is adopted, the formats of the user identity data, the key password and the input parameters of the signature verification request are verified, and after the verification is passed, the signature verification parameters are forwarded to the password equipment through a forwarding layer, wherein the signature verification parameters comprise signature information, signature data to be verified and a signature verification key index number in the virtual machine;
and the virtual machine executes corresponding signature calculation based on the signature parameters, executes corresponding signature verification calculation based on the signature verification parameters, and returns a calculation result to the forwarding layer so that the forwarding layer sends the calculation result to a user of the service layer.
Specifically, according to different services requested by a user, a virtual machine can be called to complete corresponding password services, which mainly comprise a signature service and a signature verification service. The virtual machine cryptographic signature/signature verification service implementation flow is shown in fig. 4.
The user identity data comprises a user name and a token, wherein the token is acquired from a user management center, a key password is optional, and the key password must be input if password authentication is required. The interface parameters in fig. 4 are input parameters. Key usage rights may also be included.
And when signature calculation is carried out, the virtual machine acquires the proxy key signature private key corresponding to the signature verification key index number in the virtual machine in the signature parameters, executes signature operation of the message to be signed, acquires a signature value, and returns the signature value serving as a calculation result of the signature service.
Example two
Based on the same inventive concept, a second aspect of the present invention provides a secure virtualization system for cryptographic devices based on a proxy mechanism, please refer to fig. 5, the system includes:
the user management center is used for managing the user, including the management of life cycles of registration, suspension, activation, logout and the like of the user, the management of user identity information, the distribution and management of user authority, the generation, the issuance and the verification of a user login token password;
cryptographic device service center: registering and managing the virtual machine for receiving a registration request sent by a virtual machine service center, and after the registration is successful, receiving a request for applying a relevant agent key sent by the virtual machine service center and carrying out entrusting and authorization on the virtual machine;
the password equipment is a carrier for realizing the password service function, and generates an agent key after the password equipment service center entrusts and authorizes the virtual machine;
and the virtual machine service center sends a registration request and a request for applying a related proxy key to the cryptographic equipment service center, and manages the proxy key after the virtual machine is successfully authorized.
In one embodiment, the functions of the cryptographic device service center further include cryptographic device cryptographic service invocation and virtual machine identity information management.
In particular, (1) the cryptographic device is a carrier that implements cryptographic service functions,
(2) the user management center is mainly used for managing users, including the management of life cycles of registration, suspension, activation, logout and the like of the users; managing user identity information; distributing and managing user rights; generation, issuance, verification and the like of the user login token.
(3) Cryptographic device service center: and interfacing the entity password equipment interface and providing password service for the outside. The password equipment service center comprises a password equipment password service call function, a virtual machine identity information management function, a virtual machine agent authorization management function and the like.
a) Password device password service invocation: and a password service interface provided for the entity password device.
b) Virtual machine identity information management: identity information of a virtual machine registered with a cryptographic device service center is managed. The identity information of the virtual machine comprises: virtual machine ID, affiliated organization, hardware configuration information, agent authorization scope, agent validity period, etc. And providing a life cycle management and related information maintenance function interface of the virtual machine, and the like. After the virtual machine submits the identity registration request, the cryptographic equipment service center verifies the registration request, signs an agent protocol, manages the contents of the agent authorization range, the validity period and the like, and simultaneously carries out certain supervision on the virtual machine, if the virtual machine has dishonest behaviors or needs to stop the protocol due to other reasons, the cryptographic equipment service center uniformly manages the issued agent virtual machine information.
c) Virtual machine agent authorization management: when a key owner puts forward a certain index number key to the cryptographic equipment service center through the virtual machine center for virtualization proxy, the cryptographic equipment service center verifies the request, and the verification can include related contents such as proxy authorization range, valid period and the like. After the verification is passed, calling the newly-added password equipment interface to obtain a related proxy key, storing the proxy key by the password equipment service center, and then sending the key to the virtual machine center in a safe mode. The secure virtualized proxy key application modes of the cryptographic device include the following two modes, corresponding to two different proxy signature schemes, and a key owner initiates a call request for a related interface:
the mode without certificate (proxy signature algorithm without proxy authorization information): the parameters comprise virtual machine ID, key index number to be proxied, corresponding password, type of proxy key (used for encryption, decryption or signature verification), encryption public key (optional) used in proxy key transmission and the like, and after the proxy key is generated, the key can be sent to the requesting virtual machine in a safe mode of offline transmission, online encryption transmission and the like;
a certificate-carrying mode (proxy signature algorithm with proxy authorization information): in addition to the above listed parameters, a proxy certificate (warrant) is also needed, and the certificate content can be customized by the system, and generally includes the identity information of the cryptographic equipment, the identity information of the virtual machine, the validity period, the key index number of the proxy, and the like. And after the key is generated, the key is also sent to the virtual machine in a secure mode.
(4) Virtual machine service center: the method mainly comprises two parts, namely a cryptographic algorithm library and virtual machine proxy key management.
a) A cryptographic algorithm library: the service calling mode is consistent with the calling mode of the interface provided by the entity password equipment.
b) Virtual machine proxy key management: and managing the proxy key generated by the safe virtualization of the cryptographic equipment. The method comprises the steps of applying for a relevant agent key from a cryptographic equipment service center, and safely storing and using the key after the key is received.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications or additions may be made to the described embodiments or alternatives may be employed by those skilled in the art without departing from the spirit or ambit of the invention as defined in the appended claims.

Claims (10)

1. A secure virtualization method for cryptographic devices based on an agent mechanism is characterized by comprising the following steps:
a cryptographic algorithm interface based on a proxy signature mechanism is realized;
the password equipment and the virtual machines sign a proxy protocol through the password algorithm interface, and the password service of the password equipment is entrusted to the plurality of virtual machines;
after receiving a password service request of a user, directly calling password equipment to execute the password service corresponding to the password service request, or forwarding the task to an authorized virtual machine so that the authorized virtual machine executes the password service corresponding to the password service request.
2. The secure virtualization method for a cryptographic device as in claim 1, wherein the cryptographic algorithm based on the proxy signature mechanism comprises a proxy signature algorithm with proxy authorization information and a proxy signature algorithm without proxy authorization information.
3. The secure virtualization method for a cryptographic device as recited in claim 2, wherein the proxy signature algorithm with proxy authorization information comprises the steps of:
preparing system parameters; wherein, the original signer identity information is IDAWith a key pair: pA=[dA]G, the identity information of the proxy signer is IDBProxy expiration TimeABThe serial number NUM (8 bits) of the key of the proxy, and proxy authorization information w, which is combined into a proxy signer, are IDA||IDB||TimeAB||NUM;
Proxy authorization; the original signer obtains the random number
Figure FDA0002598923890000011
Calculating the point G on the elliptic curveA=[kA]G=(xA,yA) Wherein x isA,yAAre each GAX coordinate, y coordinate, proxy authorization information hash value e ═ hash (w) mod n, proxy private key dP=kA·xA+e·dAmod n, proxy secret information (w, G)A,dP) Sending the signature to the proxy signer through a secure channel;
verifying the proxy key; the proxy signer calculates a proxy authorization information hash value e ═ hash (w) mod n, and verifies: proxy public key Pp=[xA]GA+[e]PAIf true, then (w, G)A,dP) Is a set of valid proxy keys, dPAnd PpIs a valid proxy key of a group of original keys numbered NUM;
generating a proxy signature; using proxy private key dPGenerating a proxy signature by adopting a generation algorithm of a public key cryptographic algorithm digital signature;
verifying the proxy signature; using a proxy public key PpAnd verifying the proxy signature by adopting a verification algorithm of a public key cryptographic algorithm digital signature.
4. The secure virtualization method for a cryptographic device as recited in claim 2, wherein the proxy signature algorithm without proxy authorization information comprises the steps of:
preparing system parameters; the original signer has a key pair: pA=[dA]G,PAIs a public key, dAIs a private key, G is a generator;
proxy authorization; the original signer calculates: generating random numbers
Figure FDA0002598923890000021
Calculating the point G on the elliptic curveA=[kA]G=(xA,yA) Proxy private key dP=kA·xA+dAmod n, proxy secret information (G)A,dP) Sending the signature to the proxy signer through a secure channel;
verifying the proxy key; proxy signer verifies proxy public key Pp=[xA]GA+PAIf it is true, the equation is true (G)A,dP) Is a set of valid proxy keys;
generating a proxy signature: using proxy private key dPGenerating a proxy signature by adopting a generation algorithm of a public key cryptographic algorithm digital signature;
and (3) proxy signature verification: using a proxy public key PpAnd verifying the proxy signature by adopting a verification algorithm of a public key cryptographic algorithm digital signature.
5. The secure virtualization method for a cryptographic device as in claim 1, wherein before an agent agreement is entered between the cryptographic device and the virtual machine through the cryptographic algorithm interface, the method further comprises:
the virtual machine sends a registration request to a password equipment service center, wherein the registration request comprises the identity information of the virtual machine;
the password equipment service center conducts identity verification on the virtual machine based on the virtual machine identity information in the registration request, if verification is passed, virtual identity information is registered, registration is successful, if verification is not passed, error information is returned, and when verification is passed, a proxy protocol is signed between the password equipment and the virtual machine through the password algorithm interface, wherein the proxy protocol comprises a proxy time limit and a proxy range.
6. The secure virtualization method for cryptographic devices as claimed in claim 1, wherein the proxy protocol is signed between the cryptographic device and the virtual machines through the cryptographic algorithm interface, and the proxy protocol delegates cryptographic services of the cryptographic device to the plurality of virtual machines, and includes:
the cryptographic equipment service center receives a request agent sent by a virtual machine through the virtual machine center, wherein the request agent comprises a requested key index number;
examining the proxy protocol content signed by the virtual machine, generating a proxy key corresponding to the key index number requested by the virtual machine through the password equipment after the examination is passed, and storing the information of the proxy key;
and sending the proxy key to the corresponding virtual machine in a preset safety mode, and storing the proxy key after the virtual machine receives the proxy key.
7. The secure virtualization method for cryptographic devices according to claim 1, wherein the cryptographic services directly invoked by the cryptographic devices include signature services and signature verification services executed by the cryptographic devices, and the specific implementation steps include:
receiving a cryptographic equipment signature request or signature verification request sent by a user, wherein input parameters contained in the signature request comprise user identity data, a key password and signature parameters, and input parameters contained in the signature verification request comprise the user identity data, the key password and the signature verification parameters;
if the signature service is adopted, the formats of the user identity data, the key password and the input parameters of the signature request are verified, and after the verification is passed, the signature parameters are forwarded to the password equipment through a forwarding layer, wherein the signature parameters comprise the message to be signed and the index number of the signature key in the password equipment; if the signature verification service is the signature verification service, the formats of the user identity data, the key password and the input parameters of the signature verification request are verified, and after the verification is passed, the signature verification parameters are forwarded to the password equipment through a forwarding layer, wherein the signature verification parameters comprise signature information, signature data to be verified and a signature verification key index number in the password equipment;
and the password equipment executes corresponding signature calculation based on the signature parameters, executes corresponding signature verification calculation based on the signature verification parameters, and returns a calculation result to the forwarding layer so that the forwarding layer sends the calculation result to the user of the service layer.
8. The secure virtualization method for cryptographic devices according to claim 1, wherein the cryptographic services executed by the virtual machine include a signature service and a signature verification service, and the specific implementation steps include:
receiving a cryptographic equipment signature request or signature verification request sent by a user, wherein input parameters contained in the signature request comprise user identity data, a key password and signature parameters, and input parameters contained in the signature verification request comprise the user identity data, the key password and the signature verification parameters;
if the signature service is adopted, the formats of the user identity data, the key password and the input parameters of the signature request are verified, and after the verification is passed, the signature parameters are forwarded to the password equipment through a forwarding layer, wherein the signature parameters comprise the message to be signed and the signature key index number in the virtual machine; if the signature verification service is adopted, the formats of the user identity data, the key password and the input parameters of the signature verification request are verified, and after the verification is passed, the signature verification parameters are forwarded to the password equipment through a forwarding layer, wherein the signature verification parameters comprise signature information, signature data to be verified and a signature verification key index number in the virtual machine;
and the virtual machine executes corresponding signature calculation based on the signature parameters, executes corresponding signature verification calculation based on the signature verification parameters, and returns a calculation result to the forwarding layer so that the forwarding layer sends the calculation result to a user of the service layer.
9. A secure virtualization system for cryptographic devices based on a proxy mechanism, the system comprising:
the user management center is used for managing the user, including the management of life cycles of registration, suspension, activation, logout and the like of the user, the management of user identity information, the distribution and management of user authority, the generation, the issuance and the verification of a user login token password;
cryptographic device service center: registering and managing the virtual machine for receiving a registration request sent by a virtual machine service center, and after the registration is successful, receiving a request for applying a relevant agent key sent by the virtual machine service center and carrying out entrusting and authorization on the virtual machine;
the password equipment is a carrier for realizing the password service function, and generates an agent key after the password equipment service center entrusts and authorizes the virtual machine;
and the virtual machine service center sends a registration request and a request for applying a related proxy key to the cryptographic equipment service center, and manages the proxy key after the virtual machine is successfully authorized.
10. The secure virtualization system of a cryptographic device of claim 9, wherein the functions of the cryptographic device service center further comprise cryptographic device cryptographic service invocation and virtual machine identity information management.
CN202010718000.0A 2020-07-23 2020-07-23 Password equipment security virtualization method and system based on proxy mechanism Active CN111934885B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010718000.0A CN111934885B (en) 2020-07-23 2020-07-23 Password equipment security virtualization method and system based on proxy mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010718000.0A CN111934885B (en) 2020-07-23 2020-07-23 Password equipment security virtualization method and system based on proxy mechanism

Publications (2)

Publication Number Publication Date
CN111934885A true CN111934885A (en) 2020-11-13
CN111934885B CN111934885B (en) 2023-07-04

Family

ID=73314466

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010718000.0A Active CN111934885B (en) 2020-07-23 2020-07-23 Password equipment security virtualization method and system based on proxy mechanism

Country Status (1)

Country Link
CN (1) CN111934885B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117097564A (en) * 2023-10-18 2023-11-21 沃通电子认证服务有限公司 Password service calling method, device, terminal equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050005126A1 (en) * 2003-07-04 2005-01-06 Information And Communications University Educational Foundation Method and apparatus for generating and verifying an ID_based proxy signature by using bilinear pairings
CN103051455A (en) * 2012-12-22 2013-04-17 中国船舶重工集团公司第七0九研究所 Method for realizing delegation of cipher function of TCM (trusted cryptographic module) under cloud computing environment
CN105493097A (en) * 2013-09-27 2016-04-13 英特尔公司 Protection scheme for remotely-stored data
CN108228316A (en) * 2017-12-26 2018-06-29 成都卫士通信息产业股份有限公司 A kind of method and apparatus of encryption device virtualization
CN108306972A (en) * 2018-02-06 2018-07-20 山东渔翁信息技术股份有限公司 A kind of cloud cryptographic service method, platform, system and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050005126A1 (en) * 2003-07-04 2005-01-06 Information And Communications University Educational Foundation Method and apparatus for generating and verifying an ID_based proxy signature by using bilinear pairings
CN103051455A (en) * 2012-12-22 2013-04-17 中国船舶重工集团公司第七0九研究所 Method for realizing delegation of cipher function of TCM (trusted cryptographic module) under cloud computing environment
CN105493097A (en) * 2013-09-27 2016-04-13 英特尔公司 Protection scheme for remotely-stored data
CN108228316A (en) * 2017-12-26 2018-06-29 成都卫士通信息产业股份有限公司 A kind of method and apparatus of encryption device virtualization
CN108306972A (en) * 2018-02-06 2018-07-20 山东渔翁信息技术股份有限公司 A kind of cloud cryptographic service method, platform, system and computer readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王玉奇等: "一种椭圆曲线的代理签名方案的分析与改进" *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117097564A (en) * 2023-10-18 2023-11-21 沃通电子认证服务有限公司 Password service calling method, device, terminal equipment and storage medium
CN117097564B (en) * 2023-10-18 2024-02-02 沃通电子认证服务有限公司 Password service calling method, device, terminal equipment and storage medium

Also Published As

Publication number Publication date
CN111934885B (en) 2023-07-04

Similar Documents

Publication Publication Date Title
CN110933108B (en) Data processing method and device based on block chain network, electronic equipment and storage medium
CN108390876B (en) Multi-authorization-center access control method capable of supporting outsourcing revocation and verification and cloud server
TWI701929B (en) Cryptographic calculation, method for creating working key, cryptographic service platform and equipment
US8843415B2 (en) Secure software service systems and methods
WO2021073170A1 (en) Method and apparatus for data provision and fusion
JP2010514000A (en) Method for securely storing program state data in an electronic device
JP2004537095A (en) Information security system
Wesemeyer et al. Formal analysis and implementation of a tpm 2.0-based direct anonymous attestation scheme
Win et al. Privacy enabled digital rights management without trusted third party assumption
Tong et al. CCAP: a complete cross-domain authentication based on blockchain for Internet of Things
CN116432207B (en) Power data authority hierarchical management method based on blockchain
CN115208656B (en) Supply chain data sharing method and system based on blockchain and authority management
CN115694838A (en) Anonymous trusted access control method based on verifiable certificate and zero-knowledge proof
Ramesh et al. PCS-ABE (t, n): a secure threshold multi authority CP-ABE scheme based efficient access control systems for cloud environment
Chin High-confidence design for security: don't trust—verify
CN111934885B (en) Password equipment security virtualization method and system based on proxy mechanism
KR100764882B1 (en) Device and method for pki based single sign-on authentication on low computing security device
CN113132097B (en) Lightweight certificateless cross-domain authentication method, system and application suitable for Internet of things
CN115348077A (en) Virtual machine encryption method, device, equipment and storage medium
CN105187213B (en) A kind of method of computer information safe
Akshay et al. Dynamic list based data integrity verification in cloud environment
JP2000261428A (en) Authentication device in decentralized processing system
Sanchol et al. A Fully Outsourced Attribute-Based Signcryption Scheme Supporting Privacy-Preserving Policy Update in Mobile Cloud Computing
Abdalla et al. Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System.
Gomaa et al. Virtual identity performance evaluations of anonymous authentication in IDaaS framework

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant