CN113343202A - Mutual authentication method based on digital certificate under condition of limited participation - Google Patents

Mutual authentication method based on digital certificate under condition of limited participation Download PDF

Info

Publication number
CN113343202A
CN113343202A CN202110624207.6A CN202110624207A CN113343202A CN 113343202 A CN113343202 A CN 113343202A CN 202110624207 A CN202110624207 A CN 202110624207A CN 113343202 A CN113343202 A CN 113343202A
Authority
CN
China
Prior art keywords
digital certificate
certificate
digital
issuer
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110624207.6A
Other languages
Chinese (zh)
Inventor
庄昱垚
李昊春
詹嘉俐
宋扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Syan Technology Co ltd
Original Assignee
Jiangsu Syan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Syan Technology Co ltd filed Critical Jiangsu Syan Technology Co ltd
Priority to CN202110624207.6A priority Critical patent/CN113343202A/en
Publication of CN113343202A publication Critical patent/CN113343202A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a mutual authentication method under the condition of limited participants based on a digital certificate, wherein a digital certificate authentication mechanism carries out digital signature operation according to specific information in a digital certificate signing and issuing request, and when the digital certificate is signed and issued, an issuer signature and an issuer public key are embedded; the digital certificates authenticated with each other are issued by the same digital certificate certification authority; and when mutual authentication is carried out: one digital certificate obtains an issuer public key embedded by the digital certificate, and the issuer public key is used for verifying whether the signature of the issuer of the other digital certificate is correct; if the verification is correct, the verification is passed; if not, the verification fails. The use cost of the holder of the certificate needing mutual authentication is greatly simplified, the verification process of the digital certificate is greatly simplified, and the advantages of space cost and performance cost are obvious.

Description

Mutual authentication method based on digital certificate under condition of limited participation
Technical Field
The invention belongs to the technical field of digital certificates, and particularly relates to a mutual authentication method under the condition of limited participation.
Background
Digital certificates are important means for various personalized high-value application services to confirm user identities and prevent repudiation, and are widely used in applications such as online banking and electronic contracts.
Conventional digital certificates, whether digital certificates in x.509 format or V2X certificates based on IEEE1609.2, have a similar authentication manner, i.e. a chain trust relationship of "entity certificate-CA certificate-root certificate", also referred to as "certificate chain". The format of a conventional digital certificate is shown in fig. 1.
For example, chinese patent 201210338461.0 discloses a method for associating and verifying multiple digital certificates, which uses one or more digital certificates as a primary certificate, and performs operations such as digital signature on specific information in an issuance request of a secondary certificate through the primary certificate to obtain a primary certificate-specific identifier, and an issuing authority (CA) of the secondary certificate includes the primary certificate-specific identifier as a component in the content of the secondary certificate in the issued secondary certificate. And during verification, extracting the special identification of the main certificate in the secondary certificate, and verifying the validity of the special identification by methods such as signature verification and the like so as to obtain the validity of the association.
Under the 'certificate chain' system, if an entity certificate A is to be authenticated, a CA signature on the certificate A needs to be verified firstly, then a root CA signature on a certificate of an issuer (CA) of the certificate A is verified, and finally a self-signature on the certificate of the issuer (root CA) of the CA certificate is verified; therefore, in the authentication process, 3 certificates, namely an a certificate, a signer (CA) certificate of the a certificate, and a CA certificate signer (root CA) certificate, need to be accessed, wherein the latter two certificates are called as preset certificates, because the a certificate cannot be verified without the two certificates, and meanwhile, in order to prevent the two certificates from being maliciously replaced (further, the a certificate can be forged by breaking a trust chain), a verifier needs to acquire the two certificates through a reliable channel in advance and keep the certificates properly. Here, we have found a problem that the acquisition, storage, and update of the CA certificate and the root CA certificate need to be performed in a highly secure environment, which also causes high use cost for the user.
The above use costs, while unjustified, are effective and necessary if the trusted party is unlimited; but at the same time, the "certificate chain" puts requirements on the capacity of the storage space and the security of the storage location. For the internet of things embedded module, any additional space requirement and security requirement bring additional cost, and the cost is multiplied by the huge number of modules, and finally, the cost can be a huge number.
Disclosure of Invention
Aiming at the technical problems, the technical problems to be solved by the invention are as follows: under the condition that the participation is limited, the same safety as the certificate chain can be realized without using the certificate chain, and the method is more convenient and faster and has lower use cost.
In order to achieve the purpose, the invention adopts the technical scheme that: a mutual authentication method under the condition of limited participators based on digital certificate, 1, entity certificate includes one or more public keys of issuers; 2. when another entity certificate is verified, the public key of the issuer is obtained from the own or opposite end entity certificate, and then the public key is used to complete the certificate verification process.
The digital certificate certification authority carries out digital signature operation according to the specific information in the digital certificate signing request, and embeds the signer signature and the public key of the signer when the digital certificate is signed;
the digital certificates authenticated with each other are issued by the same digital certificate certification authority;
and when mutual authentication is carried out: one digital certificate obtains an issuer public key embedded by the digital certificate, and the issuer public key is used for verifying whether the signature of the issuer of the other digital certificate is correct; if the verification is correct, the verification is passed; if not, the verification fails.
Further, one digital certificate comprises an issuer signature and an issuer public key of one or more digital certificate authorities; the mutually authenticated digital certificates comprise one or more issuer public keys that are identical.
Further, when the digital certificate is issued, the public key of the issuer is attached to the subject item, the issuer item, the certificate extension item or other certificate contents of the digital certificate. More preferably, in order to improve the independence of the issuer public key and avoid the influence of the digital certificate issuing program, the issuer public key is attached to the certificate extension of the digital certificate.
The invention has the following beneficial effects: in the verification process, the participation of a certificate chain is not needed, and the verification can be carried out only by the certificate of the participator. The use cost of the holder of the certificate needing mutual authentication is greatly simplified, the verification process of the digital certificate is greatly simplified, and the advantages of space cost and performance cost are obvious. The invention is an innovative invention which breaks through the traditional thinking and creatively uses the certificate and public key algorithm principle from the practical aspect.
Drawings
Fig. 1 is a prior art digital certificate format.
Fig. 2 is a digital certificate format of a mutual authentication method under a limited participant condition according to an embodiment of the present invention.
Detailed Description
In order to facilitate understanding of those skilled in the art, the present invention will be further described with reference to the following embodiments and accompanying drawings.
The digital certificate is an online identification for proving the identity of the user, identifies the identities of all communication parties in the network, and can ensure that the transaction performed on the network is safe and credible. The digital certificate mainly has the following functions:
1. identity authentication: the digital certificate includes the following main contents: identity information of the certificate owner, the public key of the certificate owner, the validity period of the public key, the name of the CA issuing the digital certificate, the digital signature of the CA, etc.
2. Encrypting transmission information: data is transmitted over the network by means of digital certificates, which are encrypted and then transmitted over the network in the form of a password. The sender encrypts the file by using the public key of the receiver, and the receiver decrypts the file by using the private key unique to the receiver to obtain the file plaintext.
3. Digital signature anti-repudiation: the anti-repudiation realized by official seal, signature and the like in real life can be realized by digital signature of a digital certificate on the network.
Digital Certificate Authority (CA): is the issuing authority of the certificate. The CA is the authority responsible for issuing certificates, authenticating certificates, and managing issued certificates. It makes policies and specific steps to verify, identify the user's identity, and sign the user's certificate to ensure ownership of the certificate holder's identity and public key.
The traditional digital certificate only contains the signature of the CA. In the new digital certificate shown in fig. 2, when the certificate is issued, the CA not only adds its own signature, but also embeds its own public key (PUBK-CA) as a part of the certificate into the issued digital certificate.
Consider that in the above-described model, the CA signed two entity certificates a and B, which contain the public key of the CA (pub-CA) in addition to the CA signature.
The holder of certificate a, when authenticating certificate B, can verify according to the following steps:
1) obtaining a public CA key (PUBK-CA) from a certificate of the user;
2) the certificate B's CA signature is verified to be correct using the PUBK-CA. If the verification is correct, the verification is passed; if not, the verification is not passed;
in the verification process, the participation of a certificate chain is not needed, and the verification can be carried out only by the certificate of the participator. Greatly simplifying the use cost of the certificate A and the certificate B holders and also greatly simplifying the certificate verification process.
The certificate verification process seems to have many limitations in use, and compared with the traditional certificate chain mode, the certificate verification process is not flexible enough and has poor expansibility. In fact, however, this approach is inventive to achieve both increased convenience and preservation of security by giving up a portion of the flexibility.
A scenario is envisaged in which: there are 3 independent components on a certain device, and these 3 components need to pass mutual authentication before they can work. The traditional digital certificate scenario needs to issue entity certificates for the 3 components respectively, and needs to install complete certificate chains on the 3 components respectively, which puts requirements on the capacity of the storage space and the security of the storage location. For the internet of things embedded module, any additional space requirement and security requirement bring additional cost, and the cost is multiplied by the huge number of modules, and finally, the cost can be a huge number.
The scheme designed by the invention only needs to store 1 certificate, and the verification process only needs 1 step, so that the space cost and performance cost advantages are obvious. The components on the same device use certificates from the same CA, so that the application mode is difficult without increasing any cost; the flexibility sacrificed by the invention is not needed in the scene, and the invention is an innovative invention which breaks through the traditional thinking and creatively uses the certificate and public key algorithm principle from the practical point of view.
The above embodiments are only for illustrating the technical idea of the present invention, and the protection scope of the present invention is not limited thereby, and any modification made on the basis of the technical solution according to the technical idea of the present invention falls within the protection scope of the present invention.

Claims (3)

1. A mutual authentication method based on digital certificates under the condition of limited participants is characterized in that:
the digital certificate certification authority carries out digital signature operation according to the specific information in the digital certificate signing request, and embeds the signer signature and the public key of the signer when the digital certificate is signed;
the digital certificates authenticated with each other are issued by the same digital certificate certification authority;
and when mutual authentication is carried out: one digital certificate obtains an issuer public key embedded by the digital certificate, and the issuer public key is used for verifying whether the signature of the issuer of the other digital certificate is correct; if the verification is correct, the verification is passed; if not, the verification fails.
2. The digital certificate based mutual authentication method under limited party conditions according to claim 1, characterized in that:
a digital certificate including an issuer signature and an issuer public key of one or more digital certificate authorities; the mutually authenticated digital certificates comprise one or more issuer public keys that are identical.
3. The mutual authentication method under limited party conditions based on digital certificates according to claim 1 or 2, characterized in that:
when the digital certificate is issued, the public key of the issuer is attached to the subject item, the issuer item and the certificate extension item of the digital certificate.
CN202110624207.6A 2021-06-04 2021-06-04 Mutual authentication method based on digital certificate under condition of limited participation Pending CN113343202A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110624207.6A CN113343202A (en) 2021-06-04 2021-06-04 Mutual authentication method based on digital certificate under condition of limited participation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110624207.6A CN113343202A (en) 2021-06-04 2021-06-04 Mutual authentication method based on digital certificate under condition of limited participation

Publications (1)

Publication Number Publication Date
CN113343202A true CN113343202A (en) 2021-09-03

Family

ID=77473905

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110624207.6A Pending CN113343202A (en) 2021-06-04 2021-06-04 Mutual authentication method based on digital certificate under condition of limited participation

Country Status (1)

Country Link
CN (1) CN113343202A (en)

Similar Documents

Publication Publication Date Title
CN107196966B (en) Identity authentication method and system based on block chain multi-party trust
CN102932149B (en) Integrated identity based encryption (IBE) data encryption system
CN108599954B (en) Identity verification method based on distributed account book
EP1249095B1 (en) Method for issuing an electronic identity
US7937584B2 (en) Method and system for key certification
US8819813B2 (en) Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
CN109687965B (en) Real-name authentication method for protecting user identity information in network
US6738912B2 (en) Method for securing data relating to users of a public-key infrastructure
US20060206433A1 (en) Secure and authenticated delivery of data from an automated meter reading system
CN101136748B (en) Identification authentication method and system
CN109450843B (en) SSL certificate management method and system based on block chain
US10742426B2 (en) Public key infrastructure and method of distribution
CN1980121B (en) Electronic signing mobile terminal, system and method
CN108243166A (en) A kind of identity identifying method and system based on USBKey
CN103312691A (en) Method and system for authenticating and accessing cloud platform
WO2000030292A1 (en) Method and system for authenticating and utilizing secure resources in a computer system
US20030126085A1 (en) Dynamic authentication of electronic messages using a reference to a certificate
US20160344725A1 (en) Signal haystacks
MX2012011105A (en) Certificate authority.
CN103684798A (en) Authentication system used in distributed user service
CN113536347A (en) Bidding method and system based on digital signature
CN112565294A (en) Identity authentication method based on block chain electronic signature
CN113676330B (en) Digital certificate application system and method based on secondary secret key
CN113343202A (en) Mutual authentication method based on digital certificate under condition of limited participation
CN108768958B (en) Verification method for data integrity and source based on no leakage of verified information by third party

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination