CN1547341A - Method for Trust Domain spanning intercommunication of digital certificate - Google Patents

Method for Trust Domain spanning intercommunication of digital certificate Download PDF

Info

Publication number
CN1547341A
CN1547341A CNA2003101090562A CN200310109056A CN1547341A CN 1547341 A CN1547341 A CN 1547341A CN A2003101090562 A CNA2003101090562 A CN A2003101090562A CN 200310109056 A CN200310109056 A CN 200310109056A CN 1547341 A CN1547341 A CN 1547341A
Authority
CN
China
Prior art keywords
certificate
gateway
client
digital
trust domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2003101090562A
Other languages
Chinese (zh)
Other versions
CN1306749C (en
Inventor
吴海明
林宗芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GEER SOFTWARE CO Ltd SHANGHAI
Original Assignee
GEER SOFTWARE CO Ltd SHANGHAI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GEER SOFTWARE CO Ltd SHANGHAI filed Critical GEER SOFTWARE CO Ltd SHANGHAI
Priority to CNB2003101090562A priority Critical patent/CN1306749C/en
Publication of CN1547341A publication Critical patent/CN1547341A/en
Application granted granted Critical
Publication of CN1306749C publication Critical patent/CN1306749C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The invention is a kind of digital certification confidence domain spanning mutual connection method, which belongs to computer and information security technology field. The invention uses certification applied gateway, at first, the user applies the certification between the two confidence domains, there has two digital certifications which two are a digital certification an and a certification b, the two certifications accord the X.509V3 standards certification format, and uses the same personal key structure, which are signed with two confidence domains CA, thus realizes the certification conversion, data transmission through the gateway, namely that the gateway receives the digital certification an and the correspondent SSL protocol package, replaces the digital certification b and the correspondent SSL protocol is transmitted to the safe certification gateway, thus the certification a can be converted into the digital certification b, the certification application gateway can be used to testify the digital certification a.

Description

Digital certificate is striden the trust domain interoperability methods
Technical field
What the present invention relates to is a kind of digital certificate authentication method, and particularly a kind of digital certificate is striden the trust domain interoperability methods, belongs to computer and field of information security technology.
Background technology
Current China PKI trust systems is built, particularly towards the public the PKI trust systems of service to build the barrier between different departments problem outstanding, traditional view is exactly only to emphasize that network identity differentiates a kind of function in the middle of interconnected.In other words, the PKI certificate only plays the network identity card.Country can set up CA management organization, is responsible for that on the one hand CA is carried out safety examination and authoritative examination and approval and sets up and cancel; Be responsible for instructing the solution of national PKI interconnect problem on the other hand by it.Realize that interconnected technology mode mainly contains three kinds.First kind of pattern is that the whole nation is unified under the root CA, and other CA can be in respectively on the trusted node of secondary CA or three grades of CA by the status at its importance and place.The user of different CA just reviews with the trust chain under the root by digital certificate and can realize mutual authentication.Second kind of pattern is the cross-certification mode under adopting different root CA.Under this pattern, the PKI of the certificate that different CA will send out other CA carries out digital signature, realizes cross-certification between the different CA certificates by the authentication to digital signature then.But this latticed trust chain is obviously than first kind of tree-shaped trust chain complexity.The third mode is to build a bridge joint CA again by country on different CA, realizes the connection of the mutual trusting relationship between each CA.These three kinds of patterns all respectively have merits and demerits.But they only satisfy a kind of like this function of online identity identification, and also having the reality that must face is that all trades and professions authentication web aspect may have special requirement.If this information requirement is indispensable, will bring obstacle to carrying out interactive authentication between the different industries CA.
Find that by literature search the digital certificate authentication systematic research mainly concentrates on digital certificate on the using method of single application, Chinese patent application number: 00123530.3, title: universal electronic information network authentication system and method.This patent provides the electronic information of creating for the user that network signatures and corresponding signature verification are provided, but does not consider and at present use and how to realize that a certificate strides actual environments such as using intercommunication.
Summary of the invention
The present invention is directed to the deficiency and the defective that exist in the background technology, provide a kind of digital certificate to stride the trust domain interoperability methods, make it when the certificate trust service is provided, certificate can be included the various application messages of entity, satisfy the different requirements of using to entity information, thereby in CA is interconnected, can satisfy the actual demand of using simultaneously, solve above-mentioned the application and especially stride the trust domain intercommunication and bring disadvantageous problem, the popularization of acceleration digital certificate authentication to certificate.
The present invention is achieved by the following technical solutions, the present invention takes certificate application gateway method, at first the user applies for certificate between two trust domain, have two digital certificates, be respectively digital certificate a and digital certificate b, two certificates all meet X.509V3 standard certificate format, and use identical private key to construct, sign and issue by two trust domain CA respectively, realize the certificate conversion by the certificate application gateway then, data forwarding, be that the certificate application gateway is accepted digital certificate a and the corresponding ssl protocol bag that the user sends, replace digital certificate b and corresponding ssl protocol bag is sent to Security Certificate gateway, thereby before Security Certificate gateway, customer digital certificate a is converted to digital certificate b.Be equivalent to user and Security Certificate gateway and set up the ssl protocol passage, and the certificate application gateway is replaced certificate in the centre, and communication key is not had influence (certificate a is the same with the PKI of certificate b).Wherein be responsible for checking to customer digital certificate a by the certificate application gateway.And it seems that for application service the user is to use digital certificate b to land, so can utilize corresponding application message among the digital certificate b.
Below the present invention is further illustrated, comprise following content:
1, the certificate request between the trust domain
Two trust domain A and trust domain B, one common user is arranged between them, A has issued a customer digital certificate a for this user, this user at first arrives employing digital certificate b X.509V3 of B place application, the private key of this digital certificate b is the private key of customer digital certificate a, this that is to say that digital certificate a and b all use same PKI to construct, but the certificate information of being filled among digital certificate a and the b basis certificate policy CPS of CA separately determines, do not write in the certificate medium of access customer after digital certificate b has signed and issued simultaneously, but directly be distributed to the certificate issuance point, if write the certificate medium, what see in that user's hand is exactly two certificates.
The user has applied for digital certificate a in trust domain A after, the certificate that the hand-held trust domain A of user is issued uses " card is logical ", trust domain B also needs to issue certificate, this be because: (1) be not the certificate user of all trust domain A all are users of trust domain B, and trust domain B also needs the user of oneself is managed simultaneously; (2) CPS of the CPS of trust domain B and trust domain A can be different, and the certificate that trust domain B is issued may comprise the application message in more this trust domain; (3) application in the trust domain can be accepted the certificate that this trust domain CA is issued for general for uniformity and convenience.
Digital certificate b that trust domain B is issued and common certificate are different.The user can't see this digital certificate b in the process of using, the application that they use digital certificate a to remove to visit trust domain B is digital certificate b and the application of trust domain B is seen.User's identity has a process of conversion automatically in access process, promptly change user's (application is limited) of trust domain B into from the user of trust domain A.
The flow process of certificate request, granting can have dual mode, and a kind of is that the user directly arrives trust domain B place application certificate, and another kind then can be by trust domain A to trust domain B application certificate.But different with common certificate request flow process is that the user need submit to digital certificate a to prove own identity in trust domain A.Trust domain B is when certificate issuance simultaneously, and digital certificate a and digital certificate b need bundle, and can set up corresponding relation by the ID of certificate, promptly can find digital certificate b by digital certificate a on the certificate issuance point of trust domain B.
2, certificate application gateway
The certificate application gateway is to be structured on the SSLV3 agreement, is before the SSL Security Certificate gateway customer digital certificate a to be converted to digital certificate b.The certificate application gateway plays functions such as conversion certificate, data forwarding.SSLV3 standard agreement flow process by client-access SSL Security Certificate gateway is as follows:
When (1) client and SSL Security Certificate gateway connect, at first send client (Client Hello) information of shaking hands by client;
(2) after the SSL Security Certificate gateway is received the client handshake information, i.e. response, send server is shaken hands, the certificate of service end, client certificate request, server handshaking finish (Server Hello Done) information;
(3) then, after client is received the server handshaking end, promptly send client certificate, client key exchange, service end certification authentication, selection algorithm tabulation, client end (finished) information;
(4) after the SSL Security Certificate gateway receives that service end finishes, the checking client certificate, checking by after i.e. response send the selection algorithm tabulation, service end finishes.At this moment, client and SSL Security Certificate gateway are shaken hands and are finished.
(5) like this, client gets final product the transmission application request of safety, is transmitted to WEB SERVER by the SSL Security Certificate gateway, after the WEB SERVER response, the result is sent to the SSL Security Certificate gateway, the SSL Security Certificate gateway just with this as a result safety feed back to client, go down so alternately.
In the certificate application gateway,, specific as follows by the authentication gateway of client by certificate application gateway access application:
When (1) client and SSL Security Certificate gateway connect, at first send the client handshaking information by client;
(2) after the certificate application gateway is received the client handshake information, transmit to the SSL Security Certificate gateway.The SSL Security Certificate gateway responds after receiving this message, by the certificate application gateway to the client send server shake hands, the certificate of service end, client certificate request, server handshaking ending message;
(3) then, after client is received the server handshaking end, promptly send client certificate, client key exchange, service end certification authentication, selection algorithm tabulation, client ending message;
(4) after the certificate application gateway is received client certificate message, the authentication certificate legitimacy, checking is replaced certificate by the back, be about to digital certificate a and replace with digital certificate b, simultaneously client certificate (replacing), client key exchange, service end certification authentication, selection algorithm tabulation, service end ending message are sent to the SSL Security Certificate gateway;
(5) after the SSL Security Certificate gateway receives that service end finishes, the checking client certificate, checking by after i.e. response send the selection algorithm tabulation, service end finishes, send to client by the certificate application gateway.At this moment, client is shaken hands by certificate application gateway and SSL Security Certificate gateway and is finished.
(6) like this, client gets final product the transmission application request of safety, be transmitted to WEB SERVER by the certificate application gateway by the SSL Security Certificate gateway, after the WEB SERVER response, the result is sent to the SSL Security Certificate gateway, the SSL Security Certificate gateway just with this as a result safety feed back to client, go down so alternately.
Among the present invention, certificate application gateway mode does not need to carry out any transformation to using service end, but before Security Certificate gateway customer digital certificate a is converted to digital certificate b.In fact the certificate application gateway plays the effect of identity conversion, is about to the identity a of user in trust domain A and is converted to b among the trust domain B, and bring in for client and application service and to say so transparently, does not need to participate in.
Compared with prior art, by the certificate application gateway can be very convenient, realize " card is logical " apace, promptly use a certificate can visit zones of different, the application of different industries.This gateway has proposed how to provide the inter-trade interoperability methods of entity certificate in a kind of digital certificate authentication system, it is solved above-mentionedly use especially inter-trade intercommunication to certificate and bring disadvantageous problem, quickens the popularization of digital certificate authentication system.
Description of drawings
Fig. 1 the present invention adopts the certificate applicating flow chart behind the certificate application gateway
Embodiment
As shown in Figure 1, for the present invention adopts certificate applicating flow chart behind the certificate application gateway, provide following examples in conjunction with content of the present invention:
Building the barrier between different departments problem with the PKI trust systems of service towards the public is example." piece " can be regarded as the CA that the aspect, region is built, and as Shanghai ECA, Zhejiang CA etc., " bar " can be regarded as the CA that the industry aspect is built, as CFCA etc.Suppose that a provincial digital certificate authentication system is trust domain A, the digital certificate authentication system of industrial and commercial industry is trust domain B.The user has applied for digital certificate a in A.Desire uses digital certificate a to use the national application of industrial and commercial industry.
At first the user uses digital certificate a to apply for digital certificate b to trust domain B, so his application that can use digital certificate a to land industrial and commercial industry by the certificate application gateway.The certificate application gateway plays functions such as conversion certificate, data forwarding.This gateway can be placed in regional CA or the regional industry, is responsible for transmitting to national industry by it.
The concrete effect of implementing: the user uses digital certificate a by certificate application gateway access security authentication gateway, and set up SSL safety and connect, the certificate application gateway is transmitted corresponding message, and the legitimacy of checking digital certificate a, checking by after customer digital certificate a is converted to digital certificate b.The SSL Security Certificate gateway is accepted corresponding message and is responded, the legitimacy of simultaneous verification digital certificate b.Checking by after can set up SSL by certificate application gateway and client and be connected, transmit data.Client is used the application of digital certificate a in can access application server.The present invention can satisfy the actual demand of using simultaneously in CA is interconnected, solution is striden the trust domain intercommunication and brought disadvantageous problem, quickens the popularization of digital certificate authentication.

Claims (5)

1, a kind of digital certificate is striden the trust domain interoperability methods, it is characterized in that, take certificate application gateway method, at first the user applies for certificate between two trust domain, have two digital certificates, be respectively digital certificate a and digital certificate b, two certificates all meet X.509V3 standard certificate format, and use identical private key to construct, sign and issue by two trust domain CA respectively, realize the certificate conversion by the certificate application gateway then, data forwarding, be that the certificate application gateway is accepted digital certificate a and the corresponding ssl protocol bag that the user sends, replace digital certificate b and corresponding ssl protocol bag is sent to Security Certificate gateway, thereby before Security Certificate gateway, customer digital certificate a is converted to digital certificate b, wherein be responsible for checking customer digital certificate a by the certificate application gateway.
2, digital certificate according to claim 1 is striden the trust domain interoperability methods, it is characterized in that, the certificate request between the described trust domain is specific as follows:
Two trust domain A and trust domain B, one common user is arranged between them, A has issued a customer digital certificate a for this user, this user at first arrives employing digital certificate b X.509V3 of B place application, digital certificate a and b all use same PKI to construct, but the certificate information of being filled among digital certificate a and the b basis certificate policy CPS of CA separately determines, directly be distributed to the certificate issuance point after digital certificate b has signed and issued simultaneously, if write the certificate medium, what see in that user's hand is exactly two certificates.
3, digital certificate according to claim 2 is striden the trust domain interoperability methods, it is characterized in that, certificate request, the flow process of providing has dual mode, a kind of is that the user directly arrives trust domain B place application certificate, another kind is then applied for certificate by trust domain A to trust domain B, but the user need submit to digital certificate a to prove own identity in trust domain A, trust domain B is when certificate issuance simultaneously, digital certificate a and digital certificate b must bundle, ID by certificate sets up corresponding relation, promptly finds digital certificate b by digital certificate a on the certificate issuance point of trust domain B.
4, digital certificate according to claim 1 is striden the trust domain interoperability methods, it is characterized in that, described certificate application gateway, be to be structured on the SSLV3 agreement, be before the SSL Security Certificate gateway, customer digital certificate a to be converted to digital certificate b, as follows by the SSLV3 standard agreement flow process of client-access SSL Security Certificate gateway:
When (1) client and SSL Security Certificate gateway connect, at first send the client handshaking information by client;
(2) after the SSL Security Certificate gateway is received the client handshake information, i.e. response, send server is shaken hands, the certificate of service end, client certificate request, server handshaking ending message;
(3) then, after client is received the server handshaking end, promptly send client certificate, client key exchange, service end certification authentication, selection algorithm tabulation, client ending message;
(4) after the SSL Security Certificate gateway receives that service end finishes, the checking client certificate, checking by after i.e. response send the selection algorithm tabulation, service end finishes, at this moment, client and SSL Security Certificate gateway are shaken hands and are finished;
(5) like this, client gets final product the transmission application request of safety, is transmitted to WEB SERVER by the SSL Security Certificate gateway, after the WEB SERVER response, the result is sent to the SSL Security Certificate gateway, the SSL Security Certificate gateway just with this as a result safety feed back to client, go down so alternately.
5, stride the trust domain interoperability methods according to claim 1 or 4 described digital certificates, it is characterized in that, in the certificate application gateway, by the authentication gateway of client by certificate application gateway access application, idiographic flow is as follows:
When (1) client and SSL Security Certificate gateway connect, at first send the client handshaking information by client;
(2) after the certificate application gateway is received the client handshake information, transmit to the SSL Security Certificate gateway, the SSL Security Certificate gateway responds after receiving this message, by the certificate application gateway to the client send server shake hands, the certificate of service end, client certificate request, server handshaking ending message;
(3) then, after client is received the server handshaking end, promptly send client certificate, client key exchange, service end certification authentication, selection algorithm tabulation, client ending message;
(4) after the certificate application gateway is received client certificate message, the authentication certificate legitimacy, checking is replaced certificate by the back, be about to digital certificate a and replace with digital certificate b, the client certificate that will replace, client key exchange, service end certification authentication, selection algorithm tabulation, service end ending message are sent to the SSL Security Certificate gateway simultaneously;
(5) after the SSL Security Certificate gateway receives that service end finishes, the checking client certificate, checking by after i.e. response send selection algorithm tabulation, service end finishes, send to client by the certificate application gateway, at this moment, client is shaken hands by certificate application gateway and SSL Security Certificate gateway and is finished;
(6) like this, client gets final product the transmission application request of safety, be transmitted to WEB SERVER by the certificate application gateway by the SSL Security Certificate gateway, after the WEB SERVER response, the result is sent to the SSL Security Certificate gateway, the SSL Security Certificate gateway with this as a result safety feedback give client, go down so alternately.
CNB2003101090562A 2003-12-04 2003-12-04 Method for Trust Domain spanning intercommunication of digital certificate Expired - Lifetime CN1306749C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2003101090562A CN1306749C (en) 2003-12-04 2003-12-04 Method for Trust Domain spanning intercommunication of digital certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2003101090562A CN1306749C (en) 2003-12-04 2003-12-04 Method for Trust Domain spanning intercommunication of digital certificate

Publications (2)

Publication Number Publication Date
CN1547341A true CN1547341A (en) 2004-11-17
CN1306749C CN1306749C (en) 2007-03-21

Family

ID=34335000

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2003101090562A Expired - Lifetime CN1306749C (en) 2003-12-04 2003-12-04 Method for Trust Domain spanning intercommunication of digital certificate

Country Status (1)

Country Link
CN (1) CN1306749C (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1838593B (en) * 2005-03-07 2010-12-01 富士施乐株式会社 Certificate acquisition system, certificate acquisition method, management communication apparatus and certification authority
CN105099679A (en) * 2014-05-05 2015-11-25 中国电子信息产业发展研究院 Method of applying digital certificate to user identity authentication and device
CN105227313A (en) * 2014-06-27 2016-01-06 罗伯特·博世有限公司 Reduce the storage demand of cryptographic key
CN109842626A (en) * 2019-02-14 2019-06-04 众安信息技术服务有限公司 The method and apparatus for distributing safety zone access credentials
CN109995737A (en) * 2018-01-02 2019-07-09 中国移动通信有限公司研究院 The digital certificate management method and device of decentralization, node, system
CN110463160A (en) * 2017-04-03 2019-11-15 微软技术许可有限责任公司 Elastic public key infrastructure for cloud computing
CN111049798A (en) * 2019-11-11 2020-04-21 深信服科技股份有限公司 Information processing method and device and computer readable storage medium
CN111339537A (en) * 2018-12-18 2020-06-26 武汉信安珞珈科技有限公司 Method and system for detecting digital certificate
CN111342968A (en) * 2018-12-18 2020-06-26 武汉信安珞珈科技有限公司 Method and system for issuing double digital certificates
CN113824566A (en) * 2021-10-19 2021-12-21 恒宝股份有限公司 Certificate authentication method, code number downloading method, device, server and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10075417B2 (en) 2016-09-12 2018-09-11 International Business Machines Corporation Verifying trustworthiness of redirection targets in a tiered web delivery network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7107248B1 (en) * 2000-09-11 2006-09-12 Nokia Corporation System and method of bootstrapping a temporary public-key infrastructure from a cellular telecommunication authentication and billing infrastructure
CN1265609C (en) * 2002-02-08 2006-07-19 泰康亚洲(北京)科技有限公司 Confirmation method for safe mobile e-business platform digital certificate

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1838593B (en) * 2005-03-07 2010-12-01 富士施乐株式会社 Certificate acquisition system, certificate acquisition method, management communication apparatus and certification authority
CN105099679A (en) * 2014-05-05 2015-11-25 中国电子信息产业发展研究院 Method of applying digital certificate to user identity authentication and device
CN105227313A (en) * 2014-06-27 2016-01-06 罗伯特·博世有限公司 Reduce the storage demand of cryptographic key
CN105227313B (en) * 2014-06-27 2021-03-19 罗伯特·博世有限公司 Method for providing certificates and for communicating over multiple protocols and related devices
CN110463160A (en) * 2017-04-03 2019-11-15 微软技术许可有限责任公司 Elastic public key infrastructure for cloud computing
CN109995737A (en) * 2018-01-02 2019-07-09 中国移动通信有限公司研究院 The digital certificate management method and device of decentralization, node, system
CN109995737B (en) * 2018-01-02 2021-08-10 中国移动通信有限公司研究院 Decentralized digital certificate management method and device, node and system
CN111339537B (en) * 2018-12-18 2023-03-14 武汉信安珞珈科技有限公司 Method and system for detecting digital certificate
CN111342968B (en) * 2018-12-18 2023-04-07 武汉信安珞珈科技有限公司 Method and system for issuing double digital certificates
CN111339537A (en) * 2018-12-18 2020-06-26 武汉信安珞珈科技有限公司 Method and system for detecting digital certificate
CN111342968A (en) * 2018-12-18 2020-06-26 武汉信安珞珈科技有限公司 Method and system for issuing double digital certificates
CN109842626A (en) * 2019-02-14 2019-06-04 众安信息技术服务有限公司 The method and apparatus for distributing safety zone access credentials
CN111049798B (en) * 2019-11-11 2022-08-09 深信服科技股份有限公司 Information processing method and device and computer readable storage medium
CN111049798A (en) * 2019-11-11 2020-04-21 深信服科技股份有限公司 Information processing method and device and computer readable storage medium
CN113824566A (en) * 2021-10-19 2021-12-21 恒宝股份有限公司 Certificate authentication method, code number downloading method, device, server and storage medium

Also Published As

Publication number Publication date
CN1306749C (en) 2007-03-21

Similar Documents

Publication Publication Date Title
CN107767267B (en) Virtual resource transfer method and device
US6367009B1 (en) Extending SSL to a multi-tier environment using delegation of authentication and authority
EP2586179B1 (en) Federation among services for supporting virtual-network overlays
US20040003247A1 (en) Non-centralized secure communication services
US20030131232A1 (en) Directory-based secure communities
CN1306749C (en) Method for Trust Domain spanning intercommunication of digital certificate
US20010021928A1 (en) Method for inter-enterprise role-based authorization
CN101355557B (en) Method and system for implementing network access control in MPLS/VPN network
CN101193103B (en) A method and system for allocating and validating identity identifier
WO2010139167A1 (en) Expert support application system platform for government affair and business affair decision-making and its construction method
CN102497356A (en) Public service platform integrated system of internet medicine trading market
WO2011062596A1 (en) Binding resources in a shared computing environment
CN107135081A (en) A kind of double certificate CA systems and its implementation
Fahrenholtz et al. Transactional security for a distributed reputation management system
CN1300721C (en) Method for realizing peer-to-peer network system architecture
Liu et al. Cross-heterogeneous domain authentication scheme based on blockchain
WO2009089697A1 (en) A kind of network plane, a station and a method for realizing the multiple stations cooperation service on them
CN107071016A (en) A kind of cloud AC management platforms and its multi-domain authentication power supply management method
CN100512306C (en) Service network safety system structure plan based on reciprocity calculation
Johnston et al. A use-condition centered approach to authenticated global capabilities: Security architectures for large-scale distributed collaboratory environments
US20030200322A1 (en) Autonomic system for selective administation isolation of a secure remote management of systems in a computer network
CN112991031A (en) Electronic account book management system based on block chain technology
CN114553527A (en) Block chain-based identity authentication service system crossing CA trust domain
Gritzalis, D. Gritzalis, C. Moulinos, J. Iliadis An integrated architecture for deploying a virtual private medical network over the Web
Khurana et al. Integrated security services for dynamic coalitions

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Assignee: Shanghai best information technology Co.,Ltd.

Assignor: SHANGHAI KOAL SOFTWARE Co.,Ltd.

Contract record no.: 2010310000166

Denomination of invention: Method for Trust Domain spanning intercommunication of digital certificate

Granted publication date: 20070321

License type: Exclusive License

Open date: 20041117

Record date: 20100909

CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20070321