WO2016165662A1 - 一种手机准数字证书子系统及其系统及其方法 - Google Patents

一种手机准数字证书子系统及其系统及其方法 Download PDF

Info

Publication number
WO2016165662A1
WO2016165662A1 PCT/CN2016/079508 CN2016079508W WO2016165662A1 WO 2016165662 A1 WO2016165662 A1 WO 2016165662A1 CN 2016079508 W CN2016079508 W CN 2016079508W WO 2016165662 A1 WO2016165662 A1 WO 2016165662A1
Authority
WO
WIPO (PCT)
Prior art keywords
digital certificate
mobile phone
certificate subsystem
quasi
phone quasi
Prior art date
Application number
PCT/CN2016/079508
Other languages
English (en)
French (fr)
Inventor
李京海
Original Assignee
李京海
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 李京海 filed Critical 李京海
Publication of WO2016165662A1 publication Critical patent/WO2016165662A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present invention relates to the field of digital certificate application technologies, and more particularly to a mobile phone quasi-digital certificate subsystem and system thereof and method thereof.
  • the existing digital certificate subsystem (such as the USB Key digital certificate subsystem) is a commercial password product specially controlled by the CA and its application system that issue digital certificates. From the process point of view, its product design, production, testing, sales and use, all have strict safety certification standards; and must pass the safety certification of CA and national third-party certification bodies.
  • the CA In the whole process, the most critical part is that when the CA registers to establish a digital certificate subsystem-based user digital certificate, the CA must determine that the digital certificate subsystem is a commercial password product that is securely certified by CA and a national third-party certification authority. ". Because the existing digital certificate subsystem is a commercial password product specially controlled by the CA that issues the digital certificate and its application system, when the CA registers the user digital certificate based on the digital certificate subsystem, the CA There is no need to recertify the digital certificate subsystem.
  • the digital certificate subsystem when the digital certificate subsystem is integrated into the mobile phone for widespread sales, the security certification of all aspects of its sales and circulation, CA and the national third-party certification body are difficult to control.
  • the CA cannot register to establish a user digital certificate in the digital certificate subsystem.
  • the digital certificate subsystem conforms to the various specifications of the existing digital certificate technology when the CA registers the user digital certificate in the digital certificate subsystem.
  • the digital certificate subsystem when the digital certificate subsystem is integrated into a mobile phone and widely sold and purchased by a user, The user generally does not immediately apply to the CA to "register and establish a user digital certificate in the digital certificate subsystem.”
  • the user may apply to the CA for “registering and establishing a user digital certificate in the digital certificate subsystem of the mobile phone” after purchase, that is, “When the digital certificate subsystem is integrated into the mobile phone, the user generally purchases the mobile phone first. Then, at the time when it is needed, the mobile phone is applied to the CA to "register and establish a user digital certificate in the digital certificate subsystem.”
  • This is completely different from the prior art process.
  • the CA cannot register the user digital certificate in the digital certificate subsystem. Unless there is a new technical solution, it can be proved that the digital certificate can be guaranteed when the CA registers the user digital certificate in the digital certificate subsystem.
  • the system is in compliance with various specifications of existing digital certificate technology.”
  • the existing digital certificate subsystem (such as the USB Key digital certificate subsystem) is a commercial password product specially controlled by the CA that issues the digital certificate and its application system.
  • the digital certificate subsystem of each CA is independent. Development, incompatibility. According to the prior art, the digital certificate subsystems of existing CAs are difficult to be integrated into the mobile phone system.
  • each CA is independently developed and incompatible with each other, so that the USB Key user digital certificate issued by each CA can only be used for the designated service provider, and cannot be used universally.
  • many users have USB Key digital certificates from different banks such as China Merchants Bank, ICBC, and CCB, which not only has high waste and high cost, but also has troublesome management.
  • ICBC China Merchants Bank
  • CCB China Merchants Bank
  • the present invention provides a mobile phone quasi-digital certificate subsystem and an authentication system thereof and a method thereof, which can solve the above problems of the prior art, integrate the digital certificate subsystem and the mobile phone system, and can CA's digital certificate subsystem is compatible with mobile phone systems.
  • the present invention is an improvement over the prior art based on the prior art.
  • Hash which is generally translated as “hash”, can also be transliterated directly into “hash”. This article uses its English directly.
  • Hash algorithm is an algorithm that maps binary values of arbitrary length into shorter fixed-length binary values.
  • Hash digest using the hash algorithm to map binary values of arbitrary length to shorter fixed-length binary values. This small binary value is called a hash summary or a hash value. It is a unique and extremely compact numerical representation of a piece of data. Finding two different inputs for the Hash digest to the same value is basically computationally impossible, so the Hash digest of the data can verify the integrity of the data.
  • a symmetric encryption algorithm refers to an encryption algorithm in which the encryption key and the decryption key are the same or can be derived from each other.
  • the key used by the symmetric encryption algorithm is called a symmetric key.
  • the encryption key of the symmetric encryption algorithm can be derived from the decryption key, and the decryption key can also be derived from the encryption key. In most symmetric algorithms, the encryption key and the decryption key are the same.
  • An asymmetric encryption algorithm refers to an encryption algorithm in which the encryption key and the decryption key are different.
  • the two keys used by the asymmetric encryption algorithm are a public key (public key) and a private key (private key). They are a pair, but it is basically impossible to calculate each other. It is calculated from each other and is called an asymmetric key pair.
  • the data is encrypted with the public key and the algorithm, only the corresponding private key and the algorithm can be used for decryption; if the data is encrypted with the private key and the algorithm, only the corresponding public key and the algorithm can be used for decryption.
  • a digital certificate is a file that is digitally signed by a certificate authority and contains public key and public key owner information.
  • the sender first calculates a message digest according to the agreed HASH algorithm (also known as: HASH summary); the message digest is encrypted by the sender's private key and asymmetric encryption algorithm, and the obtained ciphertext is called "the sender digitally signs the message".
  • HASH summary also known as: HASH summary
  • the message digest is encrypted by the sender's private key and asymmetric encryption algorithm, and the obtained ciphertext is called "the sender digitally signs the message”.
  • the digital signature needs to be bound to the original message and sent to the recipient.
  • the receiver After receiving the digital signature and the original message, the receiver uses the same HASH algorithm to calculate the message digest for the original message, abbreviated as A; then use the "public key in the sender's digital certificate” and “same” "Asymmetric encryption algorithm", the original message digest obtained by decrypting the digital signature, abbreviated as B". Compare the message digest A and the message digest B; if the two are equal, the digital signature verification is successful, indicating the message and The digital signature comes from the "owner of the public key in the digital certificate", which is the sender.
  • the existing USB Key digital certificate subsystem is a computer subsystem including an independent processor, memory and software system, and encryption and decryption module, and a key generation module; the hardware is mainly adopted by a national third-party certification body. Certified SOC security chip.
  • the existing USB Key digital certificate subsystem is a commercial password product specially controlled by the CA that issues the digital certificate and its application system. It does not need to be authenticated when registering to establish a user digital certificate.
  • USB Key digital certificate which is a user digital certificate issued by CA based on the USB Key digital certificate subsystem.
  • the user's private key is uniquely stored and applied to the USB Key digital certificate subsystem and cannot be exported, so it is very secure. It has been widely used in banking and other fields.
  • Other digital certificate subsystems include: SIM card digital certificate subsystem, SD card digital certificate subsystem, and digital certificate subsystem based on ARM TrustZone technology.
  • the object of the present invention is to provide a mobile phone quasi-digital certificate subsystem, a system thereof and a method thereof, and solve the above problems existing in the existing digital certificate technology, so that the digital certificate subsystem can be integrated into a mobile phone and widely used at low cost; Compatible with "applications of digital certificates issued by CAs"; more reliable and safer.
  • the general idea of the invention is mainly:
  • the “mobile phone quasi-digital certificate subsystem” is a computer subsystem with the function of the existing digital certificate subsystem in accordance with the national commercial password product standard.
  • the existing digital certificate subsystem On the basis of the existing digital certificate subsystem, it mainly adds a “registered authentication management module” to solve the problem that the “mobile phone quasi-digital certificate subsystem” is uncontrollable in the sales circulation, and needs to be re-authenticated when it registers its application. problem.
  • the design of the “authentication system for the mobile phone quasi-digital certificate subsystem” is used for the integrity verification of the “mobile phone quasi-digital certificate subsystem” when registering the application; the “mobile phone quasi-digital certificate subsystem” can be Upgrade to the "official digital certificate subsystem.”
  • the existing digital certificate authentication system improves the existing CA's digital certificate authentication system and method, so that CA can certify and issue the user digital certificate based on the mobile phone quasi-digital certificate subsystem. That is, in the existing digital certificate authentication system, the "authentication system of the mobile phone quasi-digital certificate subsystem" of the present invention is added, and when the user applies for registration of the user digital certificate based on the mobile phone quasi-digital certificate subsystem, the invention is The “authentication system for the mobile phone quasi-digital certificate subsystem” first authenticates the integrity of the “mobile phone quasi-digital certificate subsystem”; after its integrity certification is passed, the “mobile phone quasi-digital certificate subsystem” is upgraded to “formal digital certificate”. After the subsystem, register and establish a user digital certificate based on the mobile phone quasi-digital certificate subsystem.
  • the mobile phone quasi-digital certificate subsystem provided by the present invention can be various under the overall concept of the present invention. Different options. To fully describe the various aspects of the present general inventive concept, various different aspects of the mobile phone quasi-digital certificate subsystem of the present invention are described below in a hierarchical modular structure.
  • a mobile phone quasi-digital certificate subsystem provided by the present invention is a computer subsystem having the functions and functions of the existing digital certificate subsystem, comprising: an independent processor, a memory and software system, and an encryption and decryption module, And key generation module.
  • the utility model is characterized in that it comprises a “registered authentication management module” for managing “completely downloading and establishing the authentication system from the mobile phone quasi-digital certificate subsystem in the quasi-digital certificate subsystem, and completing the quasi-digital certificate subsystem of the mobile phone.
  • the detection module ' and starts the execution of the 'mobile phone quasi-digital certificate subsystem integrity detection module' to perform the detection operation on the program and data in the memory of the mobile phone quasi-digital certificate subsystem. Its features include the following steps:
  • the “mobile phone quasi-digital certificate subsystem” receives the "integrity detection module of the mobile phone quasi-digital certificate subsystem" and its command;
  • the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” runs in the mobile phone quasi-digital certificate subsystem, and performs the detection operation on "the program and data in the memory of the mobile phone quasi-digital certificate subsystem”;
  • the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” outputs the "information data required to be outputted by the above detection operation" to be reported for determining "the integrity of the mobile phone quasi-digital certificate subsystem”.
  • the mobile phone quasi-digital certificate subsystem according to the above 1, further characterized in that it comprises: "a public key of a mobile phone quasi-digital certificate subsystem authenticator” and a "registered authentication management module” for managing "in the The "integrity detection module of the mobile phone quasi-digital certificate subsystem” is downloaded and created in the quasi-digital certificate subsystem.
  • the “mobile phone quasi-digital certificate subsystem authenticator” may be “mobile phone quasi-digital certificate subsystem management platform”, which may be “third-party certification body” or “other certification authority or authentication system”.
  • the "Mobile Phone Quasi-Digital Certificate Subsystem” receives the "Digital Signature of the Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module and its authenticator” to be downloaded and downloaded in the mobile digital quasi-digital certificate subsystem;
  • the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” runs in the mobile phone quasi-digital certificate subsystem, and performs the detection operation on "the program and data in the memory of the mobile phone quasi-digital certificate subsystem”;
  • the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” outputs the "information data required to be outputted by the above detection operation" to be reported for determining "the integrity of the mobile phone quasi-digital certificate subsystem”.
  • the mobile phone quasi-digital certificate subsystem according to the above 1, further characterized in that it comprises a "symmetric key pre-agreed by the mobile phone quasi-digital certificate subsystem authenticator and the mobile phone quasi-digital certificate subsystem” and its “registration” Authentication Management Module” for managing the "Downloading in the Quasi-Digital Certificate Subsystem”
  • the integrity check module of the machine-based digital certificate subsystem is characterized by the following steps:
  • the "Mobile Phone Quasi-Digital Certificate Subsystem” receives the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module and its Authentication Data" to be downloaded and downloaded in the mobile phone quasi-digital certificate subsystem;
  • the “authentication data of the mobile phone quasi-digital certificate subsystem integrity detection module” is “a symmetric key pre-agreed by the mobile phone quasi-digital certificate subsystem authenticator” with the mobile phone quasi-digital certificate subsystem.
  • the pre-agreed symmetric key may be a static symmetric key pre-agreed by the 'mobile phone quasi-digital certificate subsystem authenticator' and the mobile phone quasi-digital certificate subsystem; or may be a 'mobile phone quasi-digital certificate subsystem
  • the dynamic symmetric key generated by the authenticator's dynamic token between the mobile phone and the digital certificate subsystem;
  • mobile phone quasi-digital certificate subsystem authenticator may be “mobile phone quasi-digital certificate subsystem management platform", which may be "third-party certification body” or “other certification authority or authentication system”.
  • the “registration authentication management module” applies the Hash algorithm to the received “mobile phone quasi-digital certificate subsystem integrity detection module” to obtain the “mobile phone digital certificate”.
  • Hash summary information of the book subsystem integrity detection module abbreviated by B;
  • the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Authentication Module” runs in the mobile phone quasi-digital certificate subsystem, and performs the detection operation on "the program and data in the memory of the mobile phone quasi-digital certificate subsystem”;
  • the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Authentication Module” outputs the "information data required to be outputted by the above detection operation” to report "the integrity of the mobile phone quasi-digital certificate subsystem”.
  • the mobile phone quasi-digital certificate subsystem according to one of the above 1, 2, and 3, wherein the mobile phone quasi-digital certificate subsystem integrity detecting module is “downloaded and established” when the user is registered and authenticated. It includes the function of “starting to generate an asymmetric key pair of the mobile phone quasi-digital certificate subsystem". After the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” performs the integrity detection operation on the "mobile phone quasi-digital certificate subsystem", the module continues to execute the "generate” asymmetric signature of the mobile phone quasi-digital certificate subsystem.
  • the mobile phone quasi-digital certificate subsystem according to one of the above 1, 2, and 3, further characterized by: It includes the “public key of the mobile phone quasi-digital certificate subsystem management platform” and the “trusted digital certificate establishment management module” for managing the generation of asymmetric key pairs in the “mobile digital quasi-digital certificate subsystem” (private key and public Key), where “trusted digital certificate” refers to “a digital certificate established in the mobile digital quasi-digital certificate subsystem and required to have a private key signature authentication of the mobile phone quasi-digital certificate subsystem management platform”.
  • the mobile phone quasi-digital certificate subsystem receives the “request to generate an asymmetric key pair in the mobile phone quasi-digital certificate subsystem” and its “digital signature of the mobile phone quasi-digital certificate subsystem management platform”;
  • the "trusted digital certificate establishment management module” starts the “asymmetric key generation process” to generate an asymmetric key pair (private key and public) of the "mobile phone quasi-digital certificate subsystem” key).
  • the mobile phone quasi-digital certificate subsystem according to one of the above 1, 2, 3, 4, and 5, further characterized in that it comprises: "a public key of a mobile phone quasi-digital certificate subsystem management platform" and "trusted”
  • a digital certificate establishment management module is used to manage "establishing a trusted digital certificate in the digital certificate subsystem of the quasi-mobile phone".
  • the “trusted digital certificate” refers to “a digital certificate established in the quasi-digital certificate subsystem of the mobile phone and required to have a private key signature authentication of the mobile phone quasi-digital certificate subsystem management platform”.
  • the “trusted digital certificate” may be “a digital certificate of a mobile phone quasi-digital certificate subsystem user” or a “commercial digital certificate downloaded and downloaded in the mobile phone quasi-digital certificate subsystem”.
  • the "mobile phone quasi-digital certificate subsystem” receives the "download request for establishing a digital certificate, and its digital certificate and its digital signature";
  • the "trusted digital certificate establishment management module” downloads and establishes the digital certificate in the "mobile phone quasi-digital certificate subsystem".
  • the authentication system of the mobile phone quasi-digital certificate subsystem provided by the present invention is a computer system for performing integrity verification on the mobile phone quasi-digital certificate subsystem of the present invention.
  • the "integrity authentication of the mobile phone quasi-digital certificate subsystem” of the present invention refers to the "integrity authentication of the software system of the mobile phone quasi-digital certificate subsystem".
  • the "software system of the mobile phone quasi-digital certificate subsystem” is actually a "collection of known binary data of known storage addresses in the memory of the mobile phone quasi-digital certificate subsystem”. Therefore, the "integrity authentication of the mobile phone quasi-digital certificate subsystem” is the integrity authentication of the known binary data set of the known storage address in the memory of the mobile phone quasi-digital certificate subsystem.
  • each mobile phone quasi-digital certificate subsystem is the same. Data part, referred to as: general data. Such as: general modules and data. 2.
  • the dedicated but not proprietary data portion of each mobile phone quasi-digital certificate subsystem referred to as: dedicated non-proprietary data. Such as: ID data, public key of asymmetric key pair and symmetric key.
  • the “Mobile Quasi-Digital Certificate Subsystem Management Platform” stores the “Special Non-Proprietary Data of the Mobile Phone Quasi-Digital Certificate Subsystem” for management.
  • the dedicated and proprietary data portion of each mobile phone quasi-digital certificate subsystem referred to as: proprietary proprietary data. For example: the private key of an asymmetric key pair.
  • the integrity authentication of the mobile phone quasi-digital certificate subsystem is the integrity of the known "universal data, dedicated non-proprietary data and proprietary proprietary data" of the storage address of the mobile phone quasi-digital certificate subsystem. Certification.
  • Hash Digest A Compare Hash Digest A with Hash Digest B; if they are the same, their integrity authentication is passed; if not, their integrity authentication fails.
  • the proprietary private key data of the mobile phone quasi-digital certificate subsystem has two methods for integrity authentication.
  • the ciphertext B is decrypted by using the public key of the known private key to obtain the original C;
  • the authentication system of the mobile phone quasi-digital certificate subsystem provided by the present invention can have a variety of different solutions under the overall concept of the present invention. To fully describe the various aspects of the present general inventive concept, various different aspects of the registration authentication system of the mobile phone quasi-digital certificate subsystem of the present invention are described below in a hierarchical modular structure.
  • the authentication system for the mobile phone quasi-digital certificate subsystem provided by the present invention is a computer system for performing integrity verification on the mobile phone quasi-digital certificate subsystem of the present invention.
  • the utility model is characterized in that it comprises a "intelligence detection module of the mobile phone quasi-digital certificate subsystem"; the module can be sent to the mobile phone quasi-digital certificate subsystem and downloaded and established in the mobile phone quasi-digital certificate subsystem; Starting the execution; the module is operated in the mobile digital quasi-digital certificate subsystem, and the program and data of the mobile phone quasi-digital certificate subsystem in the memory of the mobile quasi-digital certificate subsystem are detected; The program and data of the digital certificate subsystem perform the detection operation and the information data that needs to be outputted is processed and output by the module for determining the integrity of the mobile phone quasi-digital certificate subsystem. It is also characterized by the following steps:
  • the "authentication system for the mobile phone quasi-digital certificate subsystem” sends the "mobile phone quasi-digital certificate subsystem integrity detection module” and its commands to the "mobile phone quasi-digital certificate subsystem”;
  • the “mobile phone quasi-digital certificate subsystem” downloads and establishes the “mobile phone quasi-digital certificate subsystem integrity detection module” in the “mobile phone quasi-digital certificate subsystem” according to the agreement; and starts to execute the “mobile phone standard”
  • the digital certificate subsystem integrity detection module The digital certificate subsystem integrity detection module”; the “mobile phone quasi-digital certificate subsystem integrity detection module” detects the operation of the program and data in the memory of the mobile digital quasi-digital certificate subsystem; the “mobile phone quasi-digital certificate subsystem is complete”
  • the information detection data obtained by the detection module "detecting the program and data of the quasi-digital certificate subsystem of the mobile phone” is processed and outputted by the module;
  • the "authentication system of the mobile phone quasi-digital certificate subsystem” receives the information obtained by the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” output and reports the integrity check operation of the mobile phone quasi-digital certificate subsystem. "Data”; and based on “the information data” and “known judgment criteria", the "integrity of the mobile phone quasi-digital certificate subsystem” is determined.
  • the authentication system for the mobile phone quasi-digital certificate subsystem according to the above 1, further characterized in that it comprises "the integrity verification module of the mobile phone quasi-digital certificate subsystem and the digital signature of the authenticator".
  • the above “authenticator” may be “mobile digital certificate subsystem management platform”, and may be “third party certification institution” or “other certification authority or authentication system”.
  • the “authentication system of the mobile phone quasi-digital certificate subsystem” sends the “digital signature of the mobile phone quasi-digital certificate subsystem integrity detection module and its authenticator” to the “mobile phone quasi-digital certificate subsystem”;
  • the "mobile phone quasi-digital certificate subsystem integrity authentication module” performs a detection operation on the program and data of the mobile phone quasi-digital certificate subsystem in the mobile phone quasi-digital certificate subsystem memory;
  • the "mobile phone quasi-digital certificate subsystem integrity detecting module” performs the detecting operation of the "program and data of the quasi-digital certificate subsystem of the mobile phone", and the information data that needs to be output is processed and output by the module;
  • the “authentication system of the mobile phone quasi-digital certificate subsystem” receives the “mobile phone quasi-digital certificate”
  • the subsystem integrity detection module outputs the "information data obtained by the mobile phone quasi-digital certificate subsystem integrity detecting operation”; and based on the "information data” and the "known judgment standard", The integrity of the digital certificate subsystem is determined.
  • the authentication system for the mobile phone quasi-digital certificate subsystem characterized in that it comprises "the integrity check module of the mobile phone quasi-digital certificate subsystem and its authentication data".
  • the "authentication data of the mobile phone quasi-digital certificate subsystem integrity detecting module” is a symmetric key pre-agreed by the “authenticator” with the mobile phone quasi-digital certificate subsystem, and the "mobile phone quasi-digital certificate subsystem” Encrypted data for the Hash summary of the Integrity Authentication Module.
  • the pre-agreed symmetric key may be “a static symmetric key pre-agreed by the authenticator and the mobile phone quasi-digital certificate subsystem”; or may be “dynamic order between the authenticator and the mobile phone quasi-digital certificate subsystem” Dynamic symmetric key generated by the card”;
  • authentication may be “a mobile phone quasi-digital certificate subsystem management platform”, and may be a “third-party certification institution” or “other certification authority or authentication system”.
  • the "authentication system of the mobile phone quasi-digital certificate subsystem” sends the "mobile phone quasi-digital certificate subsystem integrity detection module and its authentication data” to the "mobile phone quasi-digital certificate subsystem”;
  • the “mobile phone quasi-digital certificate subsystem” applying "symmetric key agreed with the authenticator”, decrypting the above-mentioned authentication data, and verifying the above-mentioned authentication data; if the verification is passed, then the "mobile phone standard”
  • the “digital certificate subsystem” downloads and establishes the “mobile phone quasi-digital certificate subsystem integrity detection module”; and starts to execute the “mobile phone quasi-digital certificate subsystem integrity detection module”; the “mobile phone quasi-digital certificate subsystem integrity authentication”
  • the module “detects the program and data of the mobile phone quasi-digital certificate subsystem in the memory of the mobile digital certificate subsystem; the “mobile phone quasi-digital certificate subsystem integrity detection module” pairs "the mobile phone quasi-digital certificate subsystem
  • the program data and the data that are required to be outputted by the detection operation are processed and outputted by the module;
  • the "authentication system of the mobile phone quasi-digital certificate subsystem” receives the information obtained by the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” output and reports the integrity check operation of the mobile phone quasi-digital certificate subsystem. "Data”; and based on “the information data” and “known judgment criteria", the "integrity of the mobile phone quasi-digital certificate subsystem” is determined.
  • the "authentication system for the mobile phone quasi-digital certificate subsystem" as described in one of the above 1, 2, and 3 is characterized in that it performs integrity authentication on the "mobile phone quasi-digital certificate subsystem", and further includes the following steps. Step:
  • the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” reads the private private key data specific to the "Mobile Digital Certificate Subsystem” according to the known storage address; and uses the private key pair data A. Encryption to obtain ciphertext B;
  • the "authentication system of the mobile phone quasi-digital certificate subsystem" as described in one of the above 1, 2, 3, 4, and 5 is characterized in that it performs integrity authentication on the "mobile phone quasi-digital certificate subsystem”. It also includes the following steps:
  • the authentication system for the mobile phone quasi-digital certificate subsystem of one of the above 1, 2, 3, 4, 5, 6, and 7 is further characterized by: "the integrity check module of the mobile phone quasi-digital certificate subsystem ", also includes the function of "starting to generate an asymmetric key pair of the mobile phone quasi-digital certificate subsystem”; in the "mobile phone quasi-digital certificate subsystem integrity detection module” to "the mobile phone quasi-digital certificate subsystem” After performing the integrity check operation, the module continues to execute the function of "generating the asymmetric key pair of the mobile phone quasi-digital certificate subsystem”; and generates “an asymmetric key pair of the mobile phone quasi-digital certificate subsystem” And outputting "the newly generated public key of the asymmetric key pair of the mobile phone quasi-digital certificate subsystem” for making "the digital certificate of the mobile phone quasi-digital certificate subsystem user".
  • the "authentication system of the mobile phone quasi-digital certificate subsystem" of the present invention is added.
  • the integrity authentication of the "mobile phone quasi-digital certificate subsystem” is first performed by using the "authentication system of the mobile phone quasi-digital certificate subsystem" of the present invention.
  • the CA refuses to register in the "mobile digital quasi-digital certificate subsystem” to establish "based on the mobile phone quasi-digital User Certificate for the Certificate Subsystem.
  • the CA certificate is issued "based on the mobile phone quasi-digital certificate subsystem" User digital certificate.
  • the mobile phone quasi-digital certificate subsystem management platform provided by the present invention is a computer system for managing “digital certificate application in the mobile phone quasi-digital certificate subsystem”.
  • the utility model is characterized in that it comprises a "digital certificate establishment management module" for managing "generating an asymmetric key pair (private key and public key) in the mobile phone quasi-digital certificate subsystem”. It is characterized by the following steps:
  • the mobile phone quasi-digital certificate subsystem management platform uses the “key agreed by the mobile phone quasi-digital certificate subsystem management platform and the mobile phone quasi-digital certificate subsystem” to generate “in the mobile phone quasi-digital certificate subsystem”.
  • the request of the asymmetric key pair is authenticated to obtain its authentication data;
  • the above “authentication data” is a “key of the mobile digital certificate subsystem management platform” that is “pre-agreed with the mobile phone quasi-digital certificate subsystem”, and “generates an asymmetric key pair in the mobile phone quasi-digital certificate subsystem”.
  • the Hash summary of the request is encrypted to get the ciphertext.
  • the “key of the mobile digital certificate subsystem management platform and the pre-agreed key of the mobile phone quasi-digital certificate subsystem” may be: “the private key of the asymmetric key of the mobile phone digital certificate subsystem management platform” agreed by the two parties; Yes: the static symmetric key agreed by both parties; it can also be the dynamic symmetric key generated by the dynamic token between the two parties.
  • the mobile phone quasi-digital certificate subsystem management platform will “generate the request for asymmetric key pair in the mobile phone quasi-digital certificate subsystem” and the “authentication data of the mobile quasi-digital certificate subsystem management platform together” Output, used to initiate the generation of asymmetric key pairs (private and public keys) in the "Mobile Digital Certificate Subsystem”.
  • the mobile phone quasi-digital certificate subsystem management platform according to the above 1, characterized in that it comprises a "digital certificate establishment management module” and a "public key of each CA digital certificate” for managing authentication "to be
  • the digital certificate issued by each CA is downloaded and downloaded in the mobile digital certificate subsystem. Its features include the following steps:
  • the mobile phone quasi-digital certificate subsystem management platform receives the “digital certificate to be downloaded and downloaded in the mobile phone quasi-digital certificate subsystem”;
  • the mobile phone quasi-digital certificate subsystem management platform applies the “public key of the CA that issued the digital certificate in the mobile digital certificate subsystem management platform”, decrypts the CA signature of the digital certificate, and verifies the CA signature. ;
  • the “Mobile Digital Certificate Subsystem Management Platform” encrypts the “Hash Summary of the Digital Certificate” with the “key agreed upon with the mobile digital certificate subsystem”. Obtaining "authentication data of the digital certificate”; then, the “mobile phone quasi-digital certificate subsystem management platform” outputs "the digital certificate and the authentication data” for establishing the number in the "mobile phone quasi-digital certificate subsystem” Application of the certificate.
  • the “key of the mobile digital certificate subsystem management platform and the pre-agreed key of the mobile phone quasi-digital certificate subsystem” may be: “the private key of the asymmetric key of the mobile phone digital certificate subsystem management platform” agreed by the two parties; Yes: the static symmetric key agreed by both parties; it can also be the dynamic symmetric key generated by the dynamic token between the two parties.
  • the mobile phone quasi-digital certificate subsystem provided by the invention is originally designed for the application requirements of the mobile phone digital certificate, so it is called "mobile phone quasi-digital certificate subsystem"; but it is actually a general quasi-digital certificate subsystem; It can be used independently as a product application, or integrated into various computer systems such as mobile phone systems, computer systems, and large server systems.
  • the host system of the mobile phone quasi-digital certificate subsystem of the present invention is a computer system that can communicate with the "mobile phone quasi-digital certificate subsystem" or communicate with the Internet.
  • mobile phone systems for example: mobile phone systems, computer systems, server systems, etc.
  • the mobile phone quasi-digital certificate subsystem of the invention communicates with the Internet through its host system.
  • the present invention provides a "method of integrating a digital certificate subsystem in a mobile phone and establishing a digital certificate application". Under the general idea of the present invention, there are many different solutions. To fully describe the various aspects of the present general inventive concept, various aspects of the present invention are described below in a hierarchical modular structure.
  • the "mobile phone quasi-digital certificate subsystem” of the present invention is a commercial password product with the function of the existing digital certificate subsystem and certified by the third party in the country. It is only integrated in the mobile phone sales, the security of its circulation is uncontrollable, so it needs to be re-certified when registering the application.
  • the "authentication system of the mobile phone quasi-digital certificate subsystem of the present invention” is added.
  • the “authentication system of the mobile phone quasi-digital certificate subsystem” is a commercial third-party certified enterprise that is matched with the "mobile phone quasi-digital certificate subsystem” and is dedicated to the authentication of the integrity of the "mobile phone quasi-digital certificate subsystem”. Password product.
  • the CA refuses to register to establish a user digital certificate in the "Mobile Digital Certificate Subsystem".
  • the CA certificate issues a user digital certificate based on the mobile phone quasi-digital certificate subsystem.
  • the “mobile phone quasi-digital certificate subsystem management platform of the present invention” may be a “CA authentication management system” or a “non-CA authentication system independent management platform”.
  • the mobile phone quasi-digital certificate subsystem provided by the invention and the authentication system and the method thereof solve the problems existing in the existing digital certificate technology, so that the digital certificate subsystem can be integrated into the mobile phone and widely used at low cost; and each CA can be The digital certificate subsystem is compatible and integrated into the mobile phone system.
  • FIG. 1 is a schematic diagram of a conventional digital certificate subsystem (FIG. 1A) and its CA digital certificate authentication system (FIG. 1B).
  • FIG. 2 is a schematic diagram of a mobile phone quasi-digital certificate subsystem and its authentication system (FIG. 2A) and its CA digital certificate authentication system (FIG. 2B) according to Embodiment 1 of the present invention. .
  • 3 is a schematic diagram of a mobile phone quasi-digital certificate subsystem and its registration authentication system and its management platform according to Embodiment 2 of the present invention.
  • 3A is a schematic diagram of a mobile phone quasi-digital certificate subsystem and its authentication system;
  • FIG. 3B is a schematic diagram of a CA digital certificate authentication system;
  • FIG. 3C is a mobile phone quasi-digital certificate subsystem management flat A schematic diagram of the "Online Management of Digital Certificate Application in the Mobile Digital Certificate Subsystem".
  • the mobile phone quasi-digital certificate subsystem, system and method thereof according to Embodiment 1 of the present invention are improved and innovated on the basis of the existing digital certificate technology, and are used for realizing "integrating a digital certificate subsystem in a mobile phone and establishing a user digital certificate” .
  • FIG. 1A a schematic diagram of a conventional digital certificate subsystem
  • Fig. 1B a CA digital certificate authentication system
  • Embodiment 1 of the present invention includes: a mobile phone quasi-digital certificate subsystem (Mss), a mobile phone quasi-digital certificate subsystem authentication system (MssT), and a CA digital certificate authentication system.
  • Mss mobile phone quasi-digital certificate subsystem
  • MssT mobile phone quasi-digital certificate subsystem authentication system
  • CA digital certificate authentication system CA digital certificate authentication system
  • the "mobile phone quasi-digital certificate subsystem" of the first embodiment of the present invention is a computer subsystem having the function of the existing digital certificate subsystem and conforming to the national commercial password product standard.
  • the "Mobile Phone Digital Certificate Subsystem” of Embodiment 1 of the present invention has no “private and exclusive private key data" before CA registration authentication.
  • the unique ID identification data of the mobile phone quasi-digital certificate subsystem That is: dedicated non-proprietary data. Among them, the unique ID identification data of the mobile phone quasi-digital certificate subsystem is backed up and stored in the “database of the mobile phone quasi-digital certificate subsystem management platform” for management.
  • the "mobile phone quasi-digital certificate subsystem" of the first embodiment of the present invention mainly adds the "registered authentication management module” and the "public key of the digital certificate of the national third-party certification institution” on the basis of the existing digital certificate subsystem.
  • the third party-certified authentication system from the mobile phone quasi-digital certificate subsystem, the integrity check module of the mobile phone quasi-digital certificate subsystem";
  • the 'Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module' performs an integrity check operation on the program and data in the memory of the mobile phone quasi-digital certificate subsystem.
  • the levy includes the following steps:
  • the "mobile phone quasi-digital certificate subsystem” receives the "digital signature of the integrity verification module of the mobile phone quasi-digital certificate subsystem and its 'third-party certification authority" and its commands;
  • the “Registration and Authentication Management Module” of the “Mobile Digital Certificate Subsystem” shall be used to decrypt the “public key of the third-party certification authority digital certificate in the mobile phone quasi-digital certificate subsystem” according to the agreement. Signature” and verify “the above digital signature”;
  • the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” continues to execute the “function block for generating the asymmetric key pair of the mobile phone quasi-digital certificate subsystem”; generating “the mobile phone quasi-digital certificate” The system's asymmetric key pair (private key and public key)";
  • the “authentication system of the mobile phone quasi-digital certificate subsystem” of the first embodiment of the present invention is compatible with the “mobile phone quasi-digital certificate subsystem” and is dedicated to verifying the integrity of the "mobile phone quasi-digital certificate subsystem” and conforms to the commercial password.
  • Product standard digital certificate subsystem it has "own device digital certificate And private key”; and also includes the public key of the CA authentication system for its PKI-based secure communication with the CA.
  • the “authentication system of the mobile phone quasi-digital certificate subsystem” of the first embodiment of the present invention is characterized in that it includes "the integrity verification module of the mobile phone quasi-digital certificate subsystem and the digital signature of its 'third party certification authority'". It is also characterized in that: the "integrity detection module of the mobile phone quasi-digital certificate subsystem” includes the function of "starting to generate an asymmetric key pair of the mobile phone quasi-digital certificate subsystem"; After the certificate subsystem integrity detection module performs an integrity check operation on the mobile phone quasi-digital certificate subsystem, the module continues to execute the function of "generating an asymmetric key pair of the mobile phone quasi-digital certificate subsystem". And generating "the asymmetric key pair of the mobile phone quasi-digital certificate subsystem”; and outputting "the newly generated public key of the asymmetric key pair of the mobile phone quasi-digital certificate subsystem” for making Digital certificate subsystem user's digital certificate.”
  • the "authentication system for mobile phone quasi-digital certificate subsystem” sends "the digital signature of the integrity verification module of the mobile phone quasi-digital certificate subsystem and its 'third-party certification body” and its commands to the "detected" The mobile phone quasi-digital certificate subsystem" for integrity testing;
  • the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” continues to execute the function of "generating the asymmetric key pair of the mobile phone quasi-digital certificate subsystem”; and generates "the mobile phone quasi-digital certificate”
  • the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” outputs the above "Hash Digest Value H3 and the newly generated public key of the asymmetric key pair of the mobile phone quasi-digital certificate subsystem and its ID” Feedback to the “authentication system of the mobile phone quasi-digital certificate subsystem”;
  • the "authentication system for the mobile phone quasi-digital certificate subsystem” compares the above “Hash digest value H3" with "the Hash digest value H2 as the criterion";
  • the Hash digest value H2 is “the original universal data and the dedicated non-proprietary data of the detected mobile phone quasi-digital certificate subsystem”, and performs a hash operation to obtain a Hash digest value, which is “the detected mobile phone quasi-digital certificate sub- The basis for the integrity determination of the system's general data and dedicated non-proprietary data.
  • the “authentication system of the mobile phone quasi-digital certificate subsystem” in the first embodiment of the present invention is characterized in that: when performing the integrity detection and authentication on the "mobile phone quasi-digital certificate subsystem", the mobile phone quasi-digital certificate subsystem is first acquired. Unique ID data"; and then based on the “mobile phone quasi-digital certificate subsystem unique ID data", to the "original database of the existing mobile phone quasi-digital certificate subsystem” to retrieve and obtain "special non-proprietary data of the mobile phone quasi-digital certificate subsystem".
  • the "authentication system of the mobile phone quasi-digital certificate subsystem" of the first embodiment of the present invention is further characterized in that it includes a standard Hash summary of the "general data of the known storage address" of the "software system of the mobile phone quasi-digital certificate subsystem".
  • the value (abbreviated as: H1).
  • Mobile phone quasi-digital certificate subsystem integrity detection module of the mobile phone quasi-digital certificate subsystem authentication system of the first embodiment of the present invention runs in the mobile phone quasi-digital certificate subsystem, and the "mobile phone quasi-digital certificate subsystem”
  • the 'generic data of the known storage address and the dedicated non-proprietary data'" are hashed to obtain a hash summary value (abbreviated as: H3).
  • Hash digest value H2 Comparing the above Hash digest value H2 and the Hash digest value H3, if they are consistent, it is determined that "the general data of the known storage address and the dedicated non-proprietary data" of the detected mobile phone quasi-digital certificate subsystem are complete; Inconsistent, it is not complete.
  • the CA digital certificate authentication system of the first embodiment of the present invention mainly adds the "authentication system of the mobile phone quasi-digital certificate subsystem of the present invention” based on the "existing digital certificate authentication system”.
  • the integrity authentication of the "mobile phone quasi-digital certificate subsystem” must first be authenticated by the "authentication system of the mobile phone quasi-digital certificate subsystem” of the present invention.
  • the CA certificate is issued "based on the mobile phone quasi-digital certificate subsystem User digital certificate.
  • Embodiment 2 of the present invention provides a mobile phone quasi-digital certificate subsystem and a registration authentication system and a management platform thereof, which are used to implement “integrating a digital certificate subsystem in a mobile phone and establishing a user digital certificate, and at the same time being compatible with the numbers issued by each CA. Application of the certificate".
  • Embodiment 2 of the present invention includes: a mobile phone quasi-digital certificate subsystem (Mss), a mobile phone quasi-digital certificate subsystem authentication system (MssT), a mobile phone quasi-digital certificate subsystem management platform (MssM), and a CA. Digital certificate authentication system. The following are explained separately:
  • the “mobile phone quasi-digital certificate subsystem” of the second embodiment of the present invention is a computer subsystem having the function of an existing digital certificate subsystem in accordance with the national commercial cipher product standard.
  • the utility model is characterized in that it comprises a "registered authentication management module” and a "public key of a digital certificate of a national third-party certification authority", and is characterized in that it comprises a "trusted digital certificate establishment management module” and a "mobile phone number”
  • the public key of the certificate subsystem management platform; "It is also characterized in that it is pre-generated and stored in the manufacturing stage with the "mobile phone quasi-digital certificate subsystem” corresponding to the 'mobile phone quasi-digital certificate subsystem management platform' An asymmetric key pair", and uploading and storing its public key and its unique ID data of the "mobile phone quasi-digital certificate subsystem” in the database of the "mobile phone quasi-digital certificate subsystem management platform". Management of the mobile phone quasi-digital certificate subsystem.
  • the “mobile phone quasi-digital certificate subsystem” of the second embodiment of the present invention has "known binary data of known storage addresses" in the memory, and can be divided into three categories, 1) "each mobile phone quasi-digital certificate subsystem” is the same The data part, namely: general data. 2) The unique ID identification data of each mobile phone quasi-digital certificate subsystem and the public key of the asymmetric key pair. Namely: dedicated non-proprietary data. 3) "Each mobile phone digital certificate The private key of the pre-generated stored asymmetric key pair of the book subsystem. That is: private proprietary data.
  • the "mobile phone quasi-digital certificate subsystem" of the second embodiment of the present invention, the "registered authentication management module” and the “public key of the digital certificate of the national third-party certification authority” are used to manage "downloading in the quasi-digital certificate subsystem” Establishing an integrity verification module of the mobile phone quasi-digital certificate subsystem from the authentication system of the mobile phone quasi-digital certificate subsystem; and initiating execution of the "mobile phone quasi-digital certificate subsystem integrity detection module" to "the mobile phone quasi-digital
  • the program and data in the certificate subsystem memory are used for integrity detection operations.
  • the "mobile phone quasi-digital certificate subsystem” receives the "ciphertext B and ciphertext C" and commands; and according to the agreement, first decrypts "the private key of the pre-generated stored mobile phone quasi-digital certificate subsystem" "Cipheral C”, get “symmetric key A”; then use "symmetric key A” to decrypt "ciphertext B”, get "integrity detection module of mobile phone quasi-digital certificate subsystem and its 'third-party certification body' digital signature";
  • the "registered authentication management module” downloads and establishes the "mobile phone quasi-digital certificate subsystem integrity authentication module" in the "mobile phone quasi-digital certificate subsystem”;
  • the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” continues to execute the function of "generating the asymmetric key pair of the mobile phone quasi-digital certificate subsystem”; and generates "the mobile phone quasi-digital certificate”
  • the “mobile phone quasi-digital certificate subsystem” of the second embodiment of the present invention, the “trusted digital certificate establishment management module” and the “public key of the mobile phone quasi-digital certificate subsystem management platform” are used to manage the "mobile phone quasi-digital certificate”
  • An asymmetric key pair private key and public key is generated in the system.
  • the mobile phone quasi-digital certificate subsystem receives the request of “generating an asymmetric key pair in the mobile phone quasi-digital certificate subsystem” and its digital signature;
  • the "trusted digital certificate establishment management module” starts the “asymmetric key generation process” to generate an asymmetric key pair (private key and public) of the "mobile phone quasi-digital certificate subsystem” key).
  • the “mobile phone quasi-digital certificate subsystem” of the second embodiment of the present invention, the “trusted digital certificate establishment management module” and the “public key of the mobile phone quasi-digital certificate subsystem management platform” are also used to manage "the number in the quasi-mobile phone” Download the trusted digital certificate in the certificate subsystem.
  • the “trusted digital certificate” refers to “a digital certificate established in the quasi-digital certificate subsystem of the mobile phone and required to have a private key signature authentication of the mobile phone quasi-digital certificate subsystem management platform”.
  • the “trusted digital certificate” may be “a digital certificate of a mobile phone quasi-digital certificate subsystem user” or a “commercial digital certificate downloaded and downloaded in the mobile phone quasi-digital certificate subsystem”.
  • the "mobile phone quasi-digital certificate subsystem” receives the "download request for establishing a digital certificate, and its digital certificate and its digital signature";
  • the "trusted digital certificate establishment management module” downloads and establishes the digital certificate in the "mobile phone quasi-digital certificate subsystem".
  • the “authentication system of the mobile phone quasi-digital certificate subsystem” of the second embodiment of the present invention is compatible with the "mobile phone quasi-digital certificate subsystem” and is dedicated to the authentication of the integrity of the "mobile phone quasi-digital certificate subsystem”.
  • the product standard digital certificate subsystem it has "own device digital certificate and private key”; and also includes the public key of the CA authentication system for its PKI-based secure communication with the CA.
  • the “authentication system of the mobile phone quasi-digital certificate subsystem” of the second embodiment of the present invention is characterized in that it includes the “integrity detection module of the mobile phone quasi-digital certificate subsystem and its 'third-party certification institution' Digital signature". It is also characterized in that: “the integrity check module of the mobile phone quasi-digital certificate subsystem” includes the function of "starting to generate an asymmetric key pair of the mobile phone quasi-digital certificate subsystem"; After the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” performs an integrity check operation on the "mobile phone quasi-digital certificate subsystem", the module continues to execute the “generate” asymmetric key pair of the mobile phone quasi-digital certificate subsystem.
  • the function' and generate "the asymmetric key pair of the mobile phone quasi-digital certificate subsystem”; and output the "newly generated public key of the asymmetric key pair of the mobile phone quasi-digital certificate subsystem” for production
  • the digital certificate of the subscriber of the mobile digital certificate subsystem is also characterized in that: “the integrity check module of the mobile phone quasi-digital certificate subsystem” includes a “characteristic symmetric key” for detecting and outputting the same.
  • the information data is encrypted.
  • the "authentication system for the mobile phone quasi-digital certificate subsystem” uses its “randomly generated symmetric key A” to "the integrity check module of the mobile phone quasi-digital certificate subsystem and its 'third-party certification body'
  • the authentication digital signature is encrypted to obtain the ciphertext B; and the "pre-generated public key of the detected mobile phone quasi-digital certificate subsystem” obtained by the encryption is used to encrypt the "randomly generated symmetric key A" to obtain the ciphertext.
  • C the "ciphertext B and ciphertext C" and the command", together with the "detected mobile phone quasi-digital certificate subsystem", for integrity testing;
  • the "mobile phone quasi-digital certificate subsystem” receives the "ciphertext B and ciphertext C" and commands; and according to the agreement, first decrypts the "secret” with the "pre-generated private key of the mobile phone quasi-digital certificate subsystem” Text C", get “symmetric key A”; then use "symmetric key A” to decrypt "ciphertext B”, get "the integrity of the mobile phone quasi-digital certificate subsystem and its 'third-party certification body' number signature";
  • the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” continues to execute the function of "generating the asymmetric key pair of the mobile phone quasi-digital certificate subsystem”; and generates "the mobile phone quasi-digital certificate”
  • the "Mobile Phone Quasi-Digital Certificate Subsystem Integrity Detection Module” uses the above-mentioned “Hash Digest Value H3 and the newly generated public key of the asymmetric key pair of the mobile phone quasi-digital certificate subsystem and its ID” “The characteristic symmetric key of the mobile phone quasi-digital certificate subsystem integrity detection module” is encrypted and fed back to the “authentication system of the mobile phone quasi-digital certificate subsystem”;
  • the "authentication system of the mobile phone quasi-digital certificate subsystem” uses the "feature symmetric key in the mobile phone quasi-digital certificate subsystem integrity detection module” to decrypt and receive the above-mentioned "Hash digest value H3 and the newly generated one.”
  • the "authentication system of the mobile phone quasi-digital certificate subsystem” compares the above “Hash digest value H3" with "the Hash digest value H2 as a criterion";
  • the Hash digest value H2 is “the original general data and the dedicated non-proprietary data of the detected mobile phone quasi-digital certificate subsystem”, and performs a hash operation to obtain a Hash digest value, which is The basis for the integrity determination of "general data and dedicated non-proprietary data of the mobile digital quasi-digital certificate subsystem of the detected mobile phone”.
  • the “authentication system of the mobile phone quasi-digital certificate subsystem” of the second embodiment of the present invention is characterized in that: when performing the integrity detection and authentication on the "mobile phone quasi-digital certificate subsystem", the mobile phone quasi-digital certificate subsystem is first acquired.
  • the unique ID ; and then according to the "unique ID of the mobile phone quasi-digital certificate subsystem", to the "original database of the existing mobile phone quasi-digital certificate subsystem" to retrieve and obtain "the mobile phone quasi-digital certificate subsystem dedicated Non-proprietary data (including: "public key corresponding to the private key of the mobile phone quasi-digital certificate subsystem”", where "the public key of the mobile phone quasi-digital certificate subsystem” is used to verify "the detected mobile phone quasi-digital certificate” The private key of the system.”
  • the "authentication system of the mobile phone quasi-digital certificate subsystem" of the second embodiment of the present invention is further characterized in that it includes a standard Hash summary of the "general data of the known storage address" of the "software system of the mobile phone quasi-digital certificate subsystem".
  • the value (abbreviated as: H1).
  • the "authentication system of the mobile phone quasi-digital certificate subsystem” performs the integrity check and authentication on the "mobile phone quasi-digital certificate subsystem"
  • the standard Hash digest value H1 and "obtained above”
  • the detected non-proprietary data of the mobile phone quasi-digital certificate subsystem is to be re- A hash operation is performed to obtain a Hash digest value (abbreviated as: H2) as "the integrity determination criterion of the 'generic data of the known storage address and the dedicated non-proprietary data' of the detected mobile phone quasi-digital certificate subsystem".
  • Mobile phone quasi-digital certificate subsystem integrity detection module of the mobile phone quasi-digital certificate subsystem authentication system of the embodiment of the present invention runs in the mobile phone quasi-digital certificate subsystem, and the "mobile phone quasi-digital certificate subsystem"
  • the general data of the storage address and the dedicated non-proprietary data '' are hashed to obtain a hash summary value (abbreviated as: H3).
  • Hash digest value H2 Comparing the above Hash digest value H2 and the Hash digest value H3, if they are consistent, it is determined that "the general data of the known storage address and the dedicated non-proprietary data" of the detected mobile phone quasi-digital certificate subsystem are complete; Inconsistent, it is not complete.
  • the CA digital certificate authentication system of the first embodiment of the present invention mainly adds the "authentication system of the mobile phone quasi-digital certificate subsystem of the present invention” based on the "existing digital certificate authentication system”.
  • the integrity authentication of the "mobile phone quasi-digital certificate subsystem” must first be authenticated by the "authentication system of the mobile phone quasi-digital certificate subsystem” of the present invention.
  • the CA certificate is issued "based on the mobile phone quasi-digital certificate subsystem User digital certificate.
  • MssM mobile phone quasi-digital certificate subsystem management platform
  • the management platform of the mobile phone quasi-digital certificate subsystem of Embodiment 2 of the present invention is a computer system for managing "digital certificate application in the mobile phone quasi-digital certificate subsystem".
  • the utility model is characterized in that it comprises a "digital certificate establishment management module" for managing "generating an asymmetric key pair (private key and public key) in the mobile phone quasi-digital certificate subsystem". It is characterized by the following steps:
  • the mobile phone quasi-digital certificate subsystem management platform uses the private key of the “mobile phone quasi-digital certificate subsystem management platform” to perform the “request to generate an asymmetric key pair in the mobile phone quasi-digital certificate subsystem”.
  • Certification signature ;
  • the mobile phone quasi-digital certificate subsystem management platform will “generate the request for asymmetric key pair in the mobile phone quasi-digital certificate subsystem” and the digital signature of the mobile phone quasi-digital certificate subsystem management platform. Output to the mobile phone quasi-digital certificate subsystem for initiating the generation of asymmetric key pairs (private and public keys) in the "Mobile Digital Certificate Subsystem".
  • the mobile phone quasi-digital certificate subsystem management platform receives the “digital certificate to be downloaded and downloaded in the mobile phone quasi-digital certificate subsystem”;
  • the mobile phone quasi-digital certificate subsystem management platform applies the “public key of the CA that issued the digital certificate in the mobile digital certificate subsystem management platform”, decrypts the CA signature of the digital certificate, and verifies the CA signature. ;
  • the "mobile phone quasi-digital certificate subsystem” is integrated into the mobile phone, which can realize “integrating the digital certificate subsystem in the mobile phone, establishing a user digital certificate, and being compatible with each CA at the same time.
  • the goal of issuing a digital certificate application has achieved beneficial results.

Abstract

一种手机准数字证书子系统及其系统及其方法,包括:手机准数字证书子系统、手机准数字证书子系统的认证系统、手机准数字证书子系统的管理平台及CA数字证书认证系统。用于实现"在手机中集成数字证书子系统、并建立用户数字证书、并同时兼容各CA签发的数字证书应用"。

Description

一种手机准数字证书子系统及其系统及其方法 技术领域
本发明涉及数字证书应用技术领域,更具体地,涉及手机准数字证书子系统及其系统及其方法。
背景技术
在互联通讯时代,数字证书及其数字证书子系统(如USB Key数字证书)被广泛应用。同时,移动通讯技术、智能手机技术也蓬勃发展,基于智能手机的数字证书应用潜力巨大。
但分析现有数字证书技术,其数字证书子系统却不适合集成于手机中低成本广泛应用。分析其原因,主要如下:
1、现有数字证书子系统(如USB Key数字证书子系统),都是由签发数字证书的CA及其应用系统特别专管专控的商用密码产品。从流程上看,其产品设计、生产、测试、销售及使用等各环节,都有严格的安全认证规范;并且都必须通过CA和国家第三方认证机构的安全认证。
在整个流程中,其中最关键环节就是CA在注册建立基于数字证书子系统的用户数字证书时,该CA必须确定“该数字证书子系统是通过CA和国家第三方认证机构安全认证的商用密码产品”。因现有数字证书子系统,都是由签发数字证书的CA及其应用系统特别专管专控的商用密码产品,所以,CA在注册建立基于该数字证书子系统的用户数字证书时,该CA无需再认证该数字证书子系统。
但当“数字证书子系统”要集成于手机中、并随手机广泛销售时,则该数字证书子系统的安全认证需求及安全认证流程就发生重要变化。
首先,该数字证书子系统集成于手机中广泛销售时,其销售流通各环节的安全认证,CA和国家第三方认证机构难以掌控。这样,按现有数字证书技术规范的要求,CA就不能在该数字证书子系统中注册建立用户数字证书。除非有新的技术方案,可证明可保证“CA在该数字证书子系统中注册建立用户数字证书时,该数字证书子系统是符合现有数字证书技术的各种规范的”。
其次,当该数字证书子系统集成于手机中广泛销售、并由用户购买时,用 户一般不会马上向CA申请“在该数字证书子系统中注册建立用户数字证书”。用户可能在购买后、在需要时,才去向CA申请“在该手机数字证书子系统中注册建立用户数字证书”,即“当该数字证书子系统集成于手机时,一般是用户先购买该手机,而后再在其需要的时间、持该手机向CA申请“在该数字证书子系统中注册建立用户数字证书”。其与现有技术的流程完全不一样。这样,按现有数字证书技术规范的要求,CA就不能在该数字证书子系统中注册建立用户数字证书。除非有新的技术方案,可证明可保证“CA在该数字证书子系统中注册建立用户数字证书时,该数字证书子系统是符合现有数字证书技术的各种规范的”。
2、现有数字证书子系统(如USB Key数字证书子系统),都是由签发数字证书的CA及其应用系统特别专管专控的商用密码产品,各家CA的数字证书子系统,独立发展,互不兼容。按现有技术,现有各CA的数字证书子系统,难兼容集成于手机系统中。
3、“基于现有数字证书子系统的用户数字证书”重复浪费成本高。
现有数字证书技术(如USB Key数字证书),各CA独立发展、互不兼容,使各CA签发的USB Key用户数字证书只能用于指定的服务商,不能通用。例如:许多用户就同时拥有招行、工行、建行等不同银行的USB Key数字证书,不仅重复浪费成本高,而且管理麻烦。实际上,通过技术改进,“用户只需一个USB Key数字证书子系统”即可兼容各CA签发的数字证书。
基于上面的问题及需求,本发明提供一种手机准数字证书子系统及其认证系统及其方法,可解决上面现有技术的问题,使数字证书子系统与手机系统融合集成,并可使各CA的数字证书子系统,兼容集成于手机系统中。
本发明是在现有技术基础上,对现有技术的改进创新。下面再介绍下现有技术的相关内容:
1、Hash算法及Hash摘要
1)Hash,一般翻译为“散列”,也可直接音译为“哈希”。本文直接使用其英文。
2)Hash算法,是将任意长度的二进制值映射为较短的固定长度的二进制值的算法。
3)Hash摘要,用Hash算法将任意长度的二进制值映射为较短的固定长度的二进制值。这个小的二进制值称为Hash摘要或Hash值。其是一段数据唯一且极其紧凑的数值表示形式。要找到Hash摘要为同一个值的两个不同的输入,在计算上基本是不可能的,所以,数据的Hash摘要可以检验数据的完整性。
2、对称加密算法及其对称密钥
对称加密算法,是指加密密钥和解密密钥相同或可相互推算出来的加密算法。对称加密算法使用的密钥,称为对称密钥。
对称加密算法的加密密钥能够从解密密钥中推算出来,同时解密密钥也可以从加密密钥中推算出来。在大多数的对称算法中,加密密钥和解密密钥是相同的。
3、非对称加密算法及其非对称密钥对
非对称加密算法,是指加密密钥和解密密钥不相同的加密算法。
非对称加密算法使用的这两个密钥,是公开密钥(public key,简称公钥)和私有密钥(private key,简称私钥),它们是一对,但彼此在计算上基本不可能相互推算出来,称为非对称密钥对。
如果用公钥和该算法对数据进行加密,只有用对应的私钥和该算法才能解密;如果用私钥和该算法对数据进行加密,那么只有用对应的公钥和该算法才能解密。
4、数字证书
数字证书是一个经证书授权中心数字签名的包含公开密钥以及公开密钥拥有者信息的文件。
5、数字签名及其验证方法
1)数字签名
发送者先将报文按约定的HASH算法计算得到一个报文摘要(又称: HASH摘要);再将该报文摘要用发送者的私有密钥和非对称加密算法加密,得到的密文,就叫“该发送者对该报文的数字签名”。数字签名需与原报文绑定使用,一起发送给接收者。
2)数字签名的验证方法
接收方收到数字签名和原报文后,用同样的HASH算法对原报文计算出报文摘要,简记为A;然后用“发送者的数字证书中的公开密钥”和“相同的非对称加密算法”,对数字签名进行解密得到的原报文摘要,简记为B”。比较报文摘要A和报文摘要B;若二者相等,则数字签名验证成功,说明报文及数字签名来自“数字证书中公开密钥的拥有者”,也就是发送者。
6、现有USB Key数字证书子系统及其USB Key数字证书
1)现有USB Key数字证书子系统,是包括有独立的处理器、存储器及软件系统、及加密解密模块、及密钥生成模块的计算机子系统;其硬件主要是采用经国家第三方认证机构认证的SOC安全芯片。
2)现有USB Key数字证书子系统,都是由签发数字证书的CA及其应用系统特别专管专控的商用密码产品。其在注册建立用户数字证书时无需再进行认证。
3)USB Key数字证书,是CA签发的基于USB Key数字证书子系统的用户数字证书。其用户私钥唯一存储并应用于USB Key数字证书子系统中,不可导出,因此十分安全。其已在银行等领域广泛成熟地应用。
7、现有其它数字证书子系统,还包括:SIM卡数字证书子系统、SD卡数字证书子系统、及基于ARM TrustZone技术的数字证书子系统。
下面是本文中使用的术语、缩略语及定义:
Figure PCTCN2016079508-appb-000001
Figure PCTCN2016079508-appb-000002
Figure PCTCN2016079508-appb-000003
发明内容
本发明的目的在于提供一种手机准数字证书子系统及其系统及其方法,解决现有数字证书技术中存在的上述问题,使数字证书子系统可集成于手机中低成本广泛应用;并同时兼容“各CA签发的数字证书的应用”;并更可靠更安全。
本发明的总体构思,主要是:
1、设计“手机准数字证书子系统”,使其可集成于手机中广泛销售应用。其中,该“手机准数字证书子系统”,是符合国家商用密码产品标准的、具有现有数字证书子系统功能的计算机子系统。其在现有数字证书子系统的基础上,主要新增“注册认证管理模块”,以解决该“手机准数字证书子系统”在销售流通环节安全不可控,在其注册应用时需要重新认证的问题。
2、同时,配套设计“手机准数字证书子系统的认证系统”,用于在“手机准数字证书子系统”注册应用时,对其进行完整性认证;使“手机准数字证书子系统”可升级为“正式的数字证书子系统”。
3、同时,改进现有CA的数字证书认证系统及方法,使CA可认证签发“基于手机准数字证书子系统”的用户数字证书。即:在现有数字证书认证系统中,增加本发明的“手机准数字证书子系统的认证系统”,在用户申请注册“基于手机准数字证书子系统”的用户数字证书时,用本发明的“手机准数字证书子系统的认证系统”先对该“手机准数字证书子系统”进行完整性认证;在其完整性认证通过,使“手机准数字证书子系统”升级为“正式的数字证书子系统”后,再注册建立“基于手机准数字证书子系统”的用户数字证书。
4、设计“手机准数字证书子系统的管理平台”,用于管理“在手机准数字证书子系统中的数字证书应用”。
下面对本发明总体构思中的主要部分,分别说明。
一、手机准数字证书子系统
本发明提供的手机准数字证书子系统,在本发明的总体构思下,可有多种 不同的方案。为完整描述在本发明总体构思下的各种不同的方案,下面按层次化模块化结构,描述本发明的手机准数字证书子系统的各种不同方案。
1、本发明提供的一种手机准数字证书子系统,是具有现有数字证书子系统软硬件功能的计算机子系统,其包括有:独立的处理器、存储器及软件系统、及加密解密模块、及密钥生成模块。其特征在于:其包括有“注册认证管理模块”,用于管理“在该准数字证书子系统中下载建立‘来自手机准数字证书子系统的认证系统的、该手机准数字证书子系统的完整性检测模块’;并启动执行该‘手机准数字证书子系统完整性检测模块’对‘该手机准数字证书子系统存储器中的程序及数据’进行检测操作”。其特征包括下面步骤:
(1)该“手机准数字证书子系统”,接收到该“手机准数字证书子系统的完整性检测模块”及其命令;
(2)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性检测模块”;
(3)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,启动执行该“手机准数字证书子系统完整性检测模块”;
(4)该“手机准数字证书子系统完整性检测模块”,在手机准数字证书子系统中运行,对“该手机准数字证书子系统存储器中的程序及数据”进行检测操作;
(5)该“手机准数字证书子系统完整性检测模块”将“上面检测操作得到的需要输出的信息数据”输出上报,用于判定“该手机准数字证书子系统的完整性”。
2、如上述1所述的手机准数字证书子系统,其特征还在于:其包括有“手机准数字证书子系统认证方的公钥”和“注册认证管理模块”,用于管理“在该准数字证书子系统中下载建立‘该手机准数字证书子系统的完整性检测模块’”。 其中,“手机准数字证书子系统认证方”可以是“手机准数字证书子系统管理平台”,可以是“第三方认证机构”,也可以是“其它认证机构或认证系统”。
其特征还包括下面步骤:
(1)该“手机准数字证书子系统”,接收到“要在该手机准数字证书子系统中下载建立的‘手机准数字证书子系统完整性检测模块及其认证方的数字签名’”;
(2)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,应用在该“手机准数字证书子系统”中的“认证方的公钥”,解密“上述认证方的数字签名”,并验证该数字签名;
(3)若“数字签名”验证通过,则该“注册认证管理模块”,在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性认证模块”;
(4)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,,启动执行该“手机准数字证书子系统完整性检测模块”;
(5)该“手机准数字证书子系统完整性检测模块”,在手机准数字证书子系统中运行,对“该手机准数字证书子系统存储器中的程序及数据”进行检测操作;
(6)该“手机准数字证书子系统完整性检测模块”将“上面检测操作得到的需要输出的信息数据”输出上报,用于判定“该手机准数字证书子系统的完整性”。
3、如上述1所述的手机准数字证书子系统,其特征还在于:其包括有“手机准数字证书子系统认证方与手机准数字证书子系统预先约定的对称密钥”和其“注册认证管理模块”,用于管理“在该准数字证书子系统中下载建立‘该手 机准数字证书子系统的完整性检测模块’”,其特征还包括下面步骤:
(1)该“手机准数字证书子系统”接收到“要在该手机准数字证书子系统中下载建立的‘手机准数字证书子系统完整性检测模块及其认证数据’”;
其中,该“手机准数字证书子系统完整性检测模块的认证数据”,是“‘手机准数字证书子系统认证方’用其与该手机准数字证书子系统预先约定的对称密钥”,对该“手机准数字证书子系统完整性认证模块”的Hash摘要的加密数据。
其中,上述预先约定的对称密钥,可以是“‘手机准数字证书子系统认证方’与该手机准数字证书子系统预先约定的静态对称密钥;也可以是“‘手机准数字证书子系统认证方’与该手机准数字证书子系统之间动态令牌生成的动态对称密钥”;
其中,上述“手机准数字证书子系统认证方”可以是“手机准数字证书子系统管理平台”,可以是“第三方认证机构”,也可以是“其它认证机构或认证系统”。
(2)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,应用在该“手机准数字证书子系统”中的“与手机准数字证书子系统认证方约定的对称密钥”,解密“上述认证数据”,并验证“上述认证数据”是否为“认证方的认证数据”。其验证方法是:
1)该“注册认证管理模块”,对接收到的“上述认证数据”,应用在该“手机准数字证书子系统”中的“与认证方约定的对称密钥”,解密“上述认证数据”,得到原文Hash摘要,简记用A表示;
2)该“注册认证管理模块”,对接收到的“手机准数字证书子系统完整性检测模块”应用Hash算法进行运算,得到该“手机准数字证 书子系统完整性检测模块”的Hash摘要信息,简记用B表示;
3)比较数据A和B,若A等于B,则判定“上述认证数据”是“认证方的认证数据”,验证通过。
(3)若验证通过,判定“上述认证数据”是“认证方的认证数据”,则该“注册认证管理模块”,在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性认证模块”;
(4)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,启动执行该“手机准数字证书子系统完整性认证模块”;
(5)该“手机准数字证书子系统完整性认证模块”,在手机准数字证书子系统中运行,对“该手机准数字证书子系统存储器中的程序及数据”进行检测操作;
(6)该“手机准数字证书子系统完整性认证模块”将“上面检测操作得到的需要输出的信息数据”输出上报,用于判定“该手机准数字证书子系统的完整性”。
4、如上述1、2、3之一的所述手机准数字证书子系统,其特征还在于:在其注册认证时,其“下载建立的手机准数字证书子系统完整性检测模块”中,包括有“启动生成‘手机准数字证书子系统的非对称密钥对’的功能”。在该“手机准数字证书子系统完整性检测模块”对“该手机准数字证书子系统”进行完整性检测操作后,该模块继续启动执行“生成‘该手机准数字证书子系统的非对称密钥对’的功能”,生成“该手机准数字证书子系统的非对称密钥对”;并输出“新生成的该手机准数字证书子系统的非对称密钥对的公钥”,用于制作“该手机准数字证书子系统用户的数字证书”。
5、如上述1、2、3之一所述的手机准数字证书子系统,其特征还在于: 其包括有“手机准数字证书子系统管理平台的公钥”和“可信数字证书建立管理模块”,用于管理在“手机准数字证书子系统中生成非对称密钥对(私钥和公钥)。其中“可信数字证书”是指“在该手机准数字证书子系统中建立的、且需要有‘手机准数字证书子系统管理平台的私钥签名认证’才能建立的数字证书”。
其特征是包括下面步骤:
(1)手机准数字证书子系统,接收到“在手机准数字证书子系统中生成非对称密钥对的请求”及其“手机准数字证书子系统管理平台的数字签名”;
(2)手机准数字证书子系统的“可信数字证书建立管理模块”,按协议,应用存储在该手机准数字证书子系统中的“手机准数字证书子系统管理平台的公钥”,解密“上述数字签名”;并验证“上述数字签名;
(3)若签名验证通过,则该“可信数字证书建立管理模块”启动“非对称密钥生成流程”,生成该“手机准数字证书子系统”的非对称密钥对(私钥和公钥)。
6、如上述1、2、3、4、5之一所述的手机准数字证书子系统,其特征还在于:其包括有“手机准数字证书子系统管理平台的公钥”和“可信数字证书建立管理模块”,用于管理“在该准手机数字证书子系统中建立可信数字证书”。其中“可信数字证书”是指“在该手机准数字证书子系统中建立的、且需要有‘手机准数字证书子系统管理平台的私钥签名认证’才能建立的数字证书”。“可信数字证书”可以是“手机准数字证书子系统用户的数字证书”、也可以是“在该手机准数字证书子系统中下载建立的商户数字证书”。
其特征是包括下面步骤:
(1)该“手机准数字证书子系统”接收到“下载建立数字证书的请求,及其数字证书及其数字签名”;
(2)该“手机准数字证书子系统”中的“可信数字证书建立管理模块”,按协议,应用“手机准数字证书子系统”中的“手机数字证书子系统管理平台”的公钥,解密上述数字签名;并验证上述数字签名;
(3)若签名验证通过,则该“可信数字证书建立管理模块”在该“手机准数字证书子系统”中下载建立该数字证书”。
二、手机准数字证书子系统的认证系统
本发明提供的手机准数字证书子系统的认证系统,是用于对本发明的手机准数字证书子系统进行完整性认证的计算机系统。
本发明的对“手机准数字证书子系统的完整性认证”,是指对“手机准数字证书子系统的软件系统的完整性认证”。因“手机准数字证书子系统的软件系统”实际就是“手机准数字证书子系统的存储器中已知存储地址的已知二进制数据的集合”。所以,对“手机准数字证书子系统的完整性认证”就是对“手机准数字证书子系统的存储器中已知存储地址的已知二进制数据集合的完整性认证”。
通过分析可知,同一技术方案的手机准数字证书子系统,其存储器中“已知存储地址的已知二进制数据”,可分为三类,1、“各个手机准数字证书子系统”都相同的数据部分,简称:通用数据。如:通用模块和数据。2、“各个手机准数字证书子系统”专用但不专有的数据部分,简称:专用不专有数据。如:ID数据、非对称密钥对的公钥和对称密钥。“手机准数字证书子系统管理平台”存储有该“手机准数字证书子系统的专用不专有数据”,用于管理。3、“各个手机准数字证书子系统”专用且专有的数据部分,简称:专用专有数据。如:非对称密钥对的私钥。
因此,对手机准数字证书子系统的完整性认证,就是对手机准数字证书子系统的存储器中己知存储地址的已知“通用数据、专用不专有数据和专用专有数据”的完整性认证。
如上所述的“手机准数字证书子系统的通用数据及专用不专有数据”,其完整性认证的方法,有二种。
方法1:
1)获取“要被认证的手机准数字证书子系统存储器中己知存储地址的数据,简记为A”;
2)获取“已被认证的该手机准数字证书子系统存储器中己知存储地址的已知原始数据,简记为B”;
3)比较数据A与数据B;若二者一样,则其完整性认证通过;若不一样,则其完整性认证失败。
方法2:
1)获取“要被认证的手机准数字证书子系统存储器中己知存储地址的数据”,并对该数据应用Hash算法计算其Hash摘要,简记为A”;
2)获取“已被认证的该手机准数字证书子系统存储器中己知存储地址的已知原始数据,应用同一Hash算法计算的Hash摘要,简记为B”;
3)比较Hash摘要A与Hash摘要B;若二者一样,则其完整性认证通过;若不一样,则其完整性认证失败。
如上所述的“手机准数字证书子系统的专用专有的私钥数据”,其完整性认证的方法,也有二种。
方法1:
1)在手机准数字证书子系统内,获取己知存储地址的私钥数据;
2)用该私钥对数据A加密,得密文B;
3)而后,再用已知的该私钥的公钥对该密文B解密,得到原文C;
4)比较数据C和数据A;若二者一样,则该私钥是完整的;若二者不一样,则该私钥是不完整的。
方法2:
1)用已知的该私钥的公钥对数据A加密,的密文B;
2)在手机准数字证书子系统内,获取己知存储地址的私钥数据;
3)用该私钥对密文B解密,得原文C;
4)比较数据C和数据A;若二者一样,则该私钥是完整的;若二者不一 样,则该私钥是不完整的。
本发明提供的手机准数字证书子系统的认证系统,在本发明的总体构思下,可有多种不同的方案。为完整描述在本发明总体构思下的各种不同的方案,下面按层次化模块化结构,描述本发明的手机准数字证书子系统的的注册认证系统的各种不同方案。
1、本发明提供的手机准数字证书子系统的认证系统,是用于对本发明的手机准数字证书子系统进行完整性认证的计算机系统。其特征在于:其包括有“手机准数字证书子系统的完整性检测模块”;该模块,可被发送给手机准数字证书子系统,并在该手机准数字证书子系统中下载建立;并被启动执行;该模块在手机准数字证书子系统中运行,对该手机准数字证书子系统的存储器中的该手机准数字证书子系统的程序及数据进行检测操作;“该模块对‘该手机准数字证书子系统的程序及数据进行检测操作’而得到的需要输出的信息数据”由该模块处理输出上报,用于判定“该手机准数字证书子系统”的完整性。其特征还在于包括下面步骤:
(1)该“手机准数字证书子系统的认证系统”,将“手机准数字证书子系统完整性检测模块”及其命令,发送给“手机准数字证书子系统”;
(2)该“手机准数字证书子系统”,按协议,在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性检测模块”;并启动执行该“手机准数字证书子系统完整性检测模块”;该“手机准数字证书子系统完整性检测模块”对该手机准数字证书子系统存储器中的程序及数据进行检测操作;该“手机准数字证书子系统完整性检测模块”对“该手机准数字证书子系统的程序及数据”进行检测操作而得到的需要输出的信息数据,由该模块处理输出上报;
(3)该“手机准数字证书子系统的认证系统”,接收到该“手机准数字证书子系统完整性检测模块”输出上报的“对该手机准数字证书子系统完整性检测操作获得的信息数据”;并依据“该信息数据”和“已知的判定标准”,对“该手机准数字证书子系统的完整性”进行判定。
2、如上述1所述的手机准数字证书子系统的认证系统,其特征还在于:其包括有“手机准数字证书子系统的完整性检测模块及其认证方的数字签名”。其中,上述“认证方”可以是“手机数字证书子系统管理平台”,可以是“第三方认证机构”,也可以是“其它认证机构或认证系统”。
其特征是包括下面步骤:
(1)该“手机准数字证书子系统的认证系统”,将该“手机准数字证书子系统完整性检测模块及其认证方的数字签名”,发送给该“手机准数字证书子系统”;
(2)该“手机准数字证书子系统”,并按协议,应用在该“手机准数字证书子系统”中的“认证方的公钥”,解密“上述认证方的数字签名”,并验证该数字签名;若“上述认证方的数字签名”验证通过,则在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性检测模块”;并启动执行该“手机准数字证书子系统完整性检测模块”;该“手机准数字证书子系统完整性认证模块”对该手机准数字证书子系统存储器中的该手机准数字证书子系统的程序及数据进行检测操作;该“手机准数字证书子系统完整性检测模块”对“该手机准数字证书子系统的程序及数据”进行检测操作而得到的需要输出的信息数据,由该模块处理输出上报;
(3)该“手机准数字证书子系统的认证系统”,接收到该“手机准数字证书 子系统完整性检测模块”输出上报的“对该手机准数字证书子系统完整性检测操作获得的信息数据”;并依据“该信息数据”和“已知的判定标准”,对“该手机准数字证书子系统的完整性”进行判定。
3、如上述1所述的手机准数字证书子系统的认证系统,其特征在于:其包括有“手机准数字证书子系统的完整性检测模块及其认证数据”。
其中,该“手机准数字证书子系统完整性检测模块的认证数据”,是“认证方”用其与该手机准数字证书子系统预先约定的对称密钥,对该“手机准数字证书子系统完整性认证模块”的Hash摘要的加密数据。
其中,上述预先约定的对称密钥,可以是“认证方与该手机准数字证书子系统预先约定的静态对称密钥”;也可以是“认证方与该手机准数字证书子系统之间动态令牌生成的动态对称密钥”;
其中,上述“认证方”可以是“手机准数字证书子系统管理平台”,可以是“第三方认证机构”,也可以是“其它认证机构或认证系统”。
其特征还在于:其包括下面步骤:
(1)该“手机准数字证书子系统的认证系统”,将该“手机准数字证书子系统完整性检测模块及其认证数据”,发送给该“手机准数字证书子系统”;
(2)该“手机准数字证书子系统”,应用“与认证方约定的对称密钥”,解密“上述认证数据”,并验证“上述认证数据”;若验证通过,则在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性检测模块”;并启动执行该“手机准数字证书子系统完整性检测模块”;该“手机准数字证书子系统完整性认证模块”对该手机准数字证书子系统存储器中的该手机准数字证书子系统的程序及数据进行检测操作;该“手机准数字证书子系统完整性检测模块”对“该手机准数字证书子系 统的程序及数据”进行检测操作而得到的需要输出的信息数据,由该模块处理输出上报;
(3)该“手机准数字证书子系统的认证系统”,接收到该“手机准数字证书子系统完整性检测模块”输出上报的“对该手机准数字证书子系统完整性检测操作获得的信息数据”;并依据“该信息数据”和“已知的判定标准”,对“该手机准数字证书子系统的完整性”进行判定。
4、如上述1、2、3之一所述的“手机准数字证书子系统的认证系统”,其特征还在于:其对“手机准数字证书子系统”进行完整性认证,还包括下面步骤:
(1)其“手机准数字证书子系统完整性检测模块”,在“手机准数字证书子系统”中下载建立并启动运行;
(2)其“手机准数字证书子系统完整性检测模块”,按已知的存储地址,读取“手机准数字证书子系统”的通用数据和专用不专有数据;
(3)将上述读取的“手机准数字证书子系统的通用数据和专用不专有数据”,用Hash算法进行运算,得到其Hash摘要,简记用A表示;
(4)将Hash摘要A,与“已被认证、作为判定标准的‘该手机准数字证书子系统的已知存储地址的通用数据和专用不专有数据’的Hash摘要值”进行比较;若二者一样,则判定“‘该手机准数字证书子系统完整性检测模块’读取检测的‘该手机准数字证书子系统’的通用数据和专用不专有数据”是完整的;若二者不一样,则判定“该手机准数字证书子系统”是不完整的。
5、如上述1、2、3之一所述的“手机准数字证书子系统的认证系统”,其特征还在于:其对“手机准数字证书子系统”进行完整性认证,还包括下面步 骤:
(1)其“手机准数字证书子系统完整性检测模块”,在“手机准数字证书子系统”中下载建立并启动运行;
(2)其“手机准数字证书子系统完整性检测模块”,按已知的存储地址,读取“手机准数字证书子系统”的通用数据和专用不专有数据;简记用D1表示;
(3)将上述数据D1,与“已被认证、作为判定标准的‘该手机准数字证书子系统的已知存储地址的通用数据和专用不专有数据’的原始数据”进行比较;若二者一样,则判定“‘该手机准数字证书子系统完整性检测模块’读取检测的‘该手机准数字证书子系统’的通用数据和专用不专有数据”是完整的;若二者不一样,则判定“该手机准数字证书子系统”是不完整的。
6、如上述1、2、3、4、5之一所述的“手机准数字证书子系统的认证系统”,其特征还在于:其对“手机准数字证书子系统”进行完整性认证,还包括下面步骤:
(1)其“手机准数字证书子系统完整性检测模块”,在“手机准数字证书子系统”中下载建立并启动运行;
(2)其“手机准数字证书子系统完整性检测模块”,按已知的存储地址,读取“该手机准数字证书子系统”专用专有的私钥数据;并用该私钥对数据A进行加密,得到密文B;
(3)而后,再用“已知的该私钥的公钥”对该密文B解密,得到原文C;
(4)比较数据C和数据A;若二者一样,则该私钥是完整的;若二者不一样,则该私钥是不完整的。
7、如上述1、2、3、4、5之一所述的“手机准数字证书子系统的认证系统”,其特征还在于:其对“手机准数字证书子系统”进行完整性认证,还包括下面步骤:
(1)用“已知的该手机准数字证书子系统的公钥”对数据A加密,得到密文B;
(2)“手机准数字证书子系统完整性检测模块”,在“手机准数字证书子系统”中运行,按已知的存储地址,读取“该手机准数字证书子系统”的私钥数据;并用该私钥对密文B进行加密,得到原文C;
(3)比较数据C和数据A;若二者一样,则该私钥是完整的;若二者不一样,则该私钥是不完整的。
8、如上述1、2、3、4、5、6、7之一的所述手机准数字证书子系统的认证系统,其特征还在于:其“手机准数字证书子系统的完整性检测模块”中,还包括有“启动生成‘手机准数字证书子系统的非对称密钥对’的功能”;在该“手机准数字证书子系统完整性检测模块”对“该手机准数字证书子系统”进行完整性检测操作后,该模块继续启动执行“生成‘该手机准数字证书子系统的非对称密钥对’的功能”;并生成“该手机准数字证书子系统的非对称密钥对”;并输出“新生成的该手机准数字证书子系统的非对称密钥对的公钥”,用于制作“该手机准数字证书子系统用户的数字证书”。
9、如上述1、2、3、4、5、6、7、8之一的所述手机准数字证书子系统的认证系统,其特征还在于:其同时也是独立的数字证书子系统(商用密码产品),具有“自己的设备数字证书和私钥”;其对“手机准数字证书子系统的完整性检测认证的报告”是用其私钥进行签名认证后再输出的。
三、改进现有CA的数字证书认证系统及方法
在现有数字证书认证系统中,增加本发明的“手机准数字证书子系统的认证系统”。
在用户申请注册“基于手机准数字证书子系统”的用户数字证书时,用本发明的“手机准数字证书子系统的认证系统”先对该“手机准数字证书子系统”进行完整性认证。
若该“手机准数字证书子系统”未通过“手机准数字证书子系统的认证系统”的完整性认证,则CA拒绝在该“手机准数字证书子系统”中注册建立“基于该手机准数字证书子系统”的用户数字证书。
若该“手机准数字证书子系统”通过“手机准数字证书子系统的认证系统”的完整性认证,并具备签发用户数字证书的条件,则CA认证签发“基于该手机准数字证书子系统”的用户数字证书。
四、手机准数字证书子系统的管理平台
1、本发明提供的手机准数字证书子系统管理平台,是管理“在手机准数字证书子系统中的数字证书应用”的计算机系统。其特征在于:其包括有“数字证书建立管理模块”,用于管理“在手机准数字证书子系统中生成非对称密钥对(私钥和公钥)”。其特征是包括下面步骤:
(1)手机准数字证书子系统管理平台,按协议,用“手机准数字证书子系统管理平台与手机准数字证书子系统预先约定的密钥”,对“在手机准数字证书子系统中生成非对称密钥对的请求”进行认证,得到其认证数据;
其中,上述“认证数据”是“手机数字证书子系统管理平台”用“与该手机准数字证书子系统预先约定的密钥”,对“在手机准数字证书子系统中生成非对称密钥对的请求”的Hash摘要进行加密,得到的密文。
其中,“手机数字证书子系统管理平台与该手机准数字证书子系统预先约定的密钥”,可以是:双方约定的“手机数字证书子系统管理平台的非对称密钥的私钥”;可以是:双方约定的静态对称密钥;也可以是双方之间的动态令牌生成的动态对称密钥”。
(2)手机准数字证书子系统管理平台,按协议,将“在手机准数字证书子系统中生成非对称密钥对的请求”及其“手机准数字证书子系统管理平台的认证数据,一起输出,用于在“手机准数字证书子系统中启动生成非对称密钥对(私钥和公钥)”。
2、如上述1所述的手机准数字证书子系统管理平台,其特征还在于:其包括有“数字证书建立管理模块”和“各CA数字证书的公钥”,用于管理认证“要在手机准数字证书子系统中下载建立的各CA签发的数字证书”。其特征包括下面的步骤:
(1)手机准数字证书子系统管理平台,接收到“要在手机准数字证书子系统中下载建立的数字证书”;
(2)手机准数字证书子系统管理平台,按协议,应用“手机数字证书子系统管理平台中的签发该数字证书的CA的公钥”,解密该数字证书的CA签名,并验证该CA签名;
(3)若该CA的签名验证通过,则“手机数字证书子系统管理平台”用“其与手机准数字证书子系统之间约定的密钥”对“该数字证书的Hash摘要”的进行加密,得到“该数字证书的认证数据”;而后,“手机准数字证书子系统管理平台”输出“该数字证书及该认证数据”,用于在“该手机准数字证书子系统”中建立该数字证书的应用。
其中,“手机数字证书子系统管理平台与该手机准数字证书子系统预先约定的密钥”,可以是:双方约定的“手机数字证书子系统管理平台的非对称密钥的私钥”;可以是:双方约定的静态对称密钥;也可以是双方之间的动态令牌生成的动态对称密钥”。
五、手机准数字证书子系统的主机系统
本发明提供的手机准数字证书子系统,其初始是为手机数字证书应用需求而设计的,故称为“手机准数字证书子系统”;但其实际是一个通用的准数字证书子系统;其既可独立构成产品应用,也可集成于手机系统、电脑系统、大型服务器系统等各种计算机系统中应用。
本发明的手机准数字证书子系统的主机系统,是即可与“手机准数字证书子系统”连接通信、也可与互联网连接通信的计算机系统。例如:手机系统、电脑系统、服务器系统等。
本发明的手机准数字证书子系统,通过其主机系统与互联网进行交互通信。
六、在手机中集成数字证书子系统并建立数字证书应用的方法
本发明提供的“在手机中集成数字证书子系统并建立数字证书应用的方法”,在本发明的总体构思下,可有多种不同的方案。为完整描述在本发明总体构思下的各种不同的方案,下面按层次化模块化结构,描述本发明的各种不同方案。
1、本发明的“在手机中集成数字证书子系统并建立数字证书应用的方法”,其特征包括下面步骤,
(1)将本发明的“手机准数字证书子系统”集成于手机中。其中,该“手机准数字证书子系统”是具有现有数字证书子系统功能的、经国家第三方认证的商用密码产品。其只因集成于手机中销售,其流通环节的安全不可控,所以,其在注册应用时需重新认证。
(2)在现有的CA数字证书认证系统中,增加“本发明的手机准数字证书子系统的认证系统”。其中,该“手机准数字证书子系统的认证系统”是与“手机准数字证书子系统”配套的、专用于认证该“手机准数字证书子系统”完整性的、经国家第三方认证的商用密码产品。
(3)用户持集成“手机准数字证书子系统”的手机,到CA的注册中心申请“基于该手机准数字证书子系统”的用户数字证书;
(4)CA的注册中心,用“本发明的手机准数字证书子系统的认证系统”对 该“手机准数字证书子系统”进行完整性认证;
(5)若其完整性认证不通过,则CA拒绝在该“手机准数字证书子系统”中注册建立用户数字证书。
(6)若其完整性认证通过,并且其具备签发用户数字证书的条件,则CA认证签发“基于该手机准数字证书子系统”的用户数字证书。
2、如上述1所述的“在手机中集成数字证书子系统并建立数字证书应用的方法”,其特征还在于:用“本发明的手机准数字证书子系统管理平台”,管理“在手机准数字证书子系统中下载建立各CA签发的数字证书应用”。各CA签发的数字证书,若没有“本发明的手机准数字证书子系统管理平台”的认证数据,就不能在“在手机准数字证书子系统中下载建立”。
其中,“本发明的手机准数字证书子系统管理平台”,可以是“CA认证管理系统”,也可以是“非CA认证系统的独立管理平台”。
有益效果:
本发明提供的手机准数字证书子系统及其认证系统及其方法,解决了现有数字证书技术中存在的问题,使数字证书子系统可集成于手机中低成本广泛应用;并可使各CA的数字证书子系统,兼容集成于手机系统中。
附图说明
图1是现有数字证书子系统(图1A)及其CA数字证书认证系统(图1B)的示意图。
图2是本发明实施例1的手机准数字证书子系统及其认证系统(图2A)及其CA数字证书认证系统(图2B)的示意图。。
图3是本发明实施例2的手机准数字证书子系统及其注册认证系统及其管理平台的示意图。其中,图3A是手机准数字证书子系统及其认证系统的示意图;图3B是CA数字证书认证系统的示意图;图3C是手机准数字证书子系统管理平 台“在线管理在手机准数字证书子系统的数字证书应用”的示意图。
具体实施方式
下面结合附图给出几个具体实施例,对本发明的总体构思和具体技术方案作进一步的详细描述:
实施例1:
本发明实施例1的手机准数字证书子系统及其系统及其方法,是在现有数字证书技术基础上的改进创新,用于实现“在手机中集成数字证书子系统并建立用户数字证书”。
参考附图1,是现有数字证书子系统(图1A)及“在现有数字证书子系统中注册建立用户数字证书”的CA数字证书认证系统(图1B)的示意图。
参考附图2,本发明实施例1,包括:手机准数字证书子系统(Mss)、手机准数字证书子系统的认证系统(MssT)及CA数字证书认证系统。下面分别说明:
一、手机准数字证书子系统(Mss)
本发明实施例1的“手机准数字证书子系统”,是具有现有数字证书子系统功能的、符合国家商用密码产品标准的计算机子系统。
本发明实施例1的“手机准数字证书子系统”在CA注册认证之前,无“专用专有的私钥数据”。其存储器中“已知存储地址的已知二进制数据”,只有两类,1)“各个手机准数字证书子系统”都相同的数据部分,即:通用数据。2)手机准数字证书子系统的唯一ID标识数据。即:专用不专有数据”。其中,手机准数字证书子系统的唯一ID标识数据,在生产时,被备份存储于“手机准数字证书子系统管理平台的数据库”中,用于管理。
本发明实施例1的“手机准数字证书子系统”,其在现有数字证书子系统的基础上,主要增加“注册认证管理模块”和“国家第三方认证机构的数字证书的公钥”,用于管理“在该准数字证书子系统中下载建立‘由第三方认证的、来自手机准数字证书子系统的认证系统的、该手机准数字证书子系统的完整性检测模块’;并启动执行该‘手机准数字证书子系统完整性检测模块’对‘该手机准数字证书子系统存储器中的程序及数据’进行完整性检测操作”。其特 征包括下面步骤:
(1)该“手机准数字证书子系统”,接收到“手机准数字证书子系统的完整性检测模块和其‘第三方认证机构’的数字签名”及其命令;
(2)该“手机准数字证书子系统”的“注册认证管理模块”,按协议,应用在该“手机准数字证书子系统中的第三方认证机构数字证书的公钥”,解密“上述数字签名”,并验证“上述数字签名”;
(3)若“数字签名”验证通过,则该“注册认证管理模块”,在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性认证模块”;
(4)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,,启动执行该“手机准数字证书子系统完整性检测模块”;
(5)该“手机准数字证书子系统完整性检测模块”,在手机准数字证书子系统内运行,对“手机准数字证书子系统的‘已知存储地址的通用数据和专用不专有数据’”进行Hash运算,得到Hash摘要值(简记为:H3);
(6)该“手机准数字证书子系统完整性检测模块”,继续启动执行“生成‘该手机准数字证书子系统的非对称密钥对’的功能块”;生成“该手机准数字证书子系统的非对称密钥对(私钥和公钥)”;
(7)该“手机准数字证书子系统完整性检测模块”,将上述“Hash摘要值H3”和“新生成的该手机准数字证书子系统的非对称密钥对的公钥及其ID”,输出反馈给该“手机准数字证书子系统的认证系统”。
二、手机准数字证书子系统的认证系统
本发明实施例1的“手机准数字证书子系统的认证系统”,是与“手机准数字证书子系统”配套的、专用于认证该“手机准数字证书子系统”完整性的、符合商用密码产品标准的数字证书子系统;其具有“自己的设备数字证书 和私钥”;并还包括有CA认证系统的公钥,用于其与CA进行基于PKI的安全通信。
本发明实施例1的“手机准数字证书子系统的认证系统”,其特征在于:其包括有“手机准数字证书子系统的完整性检测模块和其‘第三方认证机构’的数字签名”。其特征还在于:该“手机准数字证书子系统的完整性检测模块”中,包括有“启动生成‘手机准数字证书子系统的非对称密钥对’的功能”;在该“手机准数字证书子系统完整性检测模块”对“该手机准数字证书子系统”进行完整性检测操作后,该模块继续启动执行“生成‘该手机准数字证书子系统的非对称密钥对’的功能”;并生成“该手机准数字证书子系统的非对称密钥对”;并输出“新生成的该手机准数字证书子系统的非对称密钥对的公钥”,用于制作“该手机准数字证书子系统用户的数字证书”。
其特征还在于包括下面步骤:
(1)该“手机准数字证书子系统的认证系统”,将“手机准数字证书子系统的完整性检测模块和其‘第三方认证机构’的数字签名”及其命令,发送给“被检测的手机准数字证书子系统”,对其进行完整性检测;
(2)该“手机准数字证书子系统”,按协议,应用在该“手机准数字证书子系统”中的“第三方认证机构的公钥”,解密“上述数字签名”,并验证“上述数字签名”。若“上述数字签名”验证通过,则在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性检测模块”;并启动执行该“手机准数字证书子系统完整性检测模块”;
(3)该“手机准数字证书子系统完整性检测模块”,在手机准数字证书子系统内运行,对“手机准数字证书子系统的‘已知存储地址的通用数据和专用不专有数据’”进行Hash运算,得到Hash摘要值(简记为: H3);
(4)该“手机准数字证书子系统完整性检测模块”,继续启动执行“生成‘该手机准数字证书子系统的非对称密钥对’的功能”;并生成“该手机准数字证书子系统的非对称密钥对(私钥和公钥)”;
(5)该“手机准数字证书子系统完整性检测模块”,将上述“Hash摘要值H3和新生成的该手机准数字证书子系统的非对称密钥对的公钥及其ID”,输出反馈给该“手机准数字证书子系统的认证系统”;
(6)该“手机准数字证书子系统的认证系统”,将上述“Hash摘要值H3”,与“作为判定标准的Hash摘要值H2”,进行比较;
其中,Hash摘要值H2,是“被检测的手机准数字证书子系统的原始的通用数据和专用不专有数据”,进行Hash运算,得到Hash摘要值,是“被检测的手机准数字证书子系统的通用数据和专用不专有数据”的完整性判定的依据。
(7)若“Hash摘要值H3”与“Hash摘要值H2”一致,则判定该“被检测的手机准数字证书子系统”是完整的;
(8)该“手机准数字证书子系统的认证系统”,用其私钥,对“该手机准数字证书子系统完整性OK的检测报告和新生成的该手机准数字证书子系统的非对称密钥对的公钥及其ID”,进行数字签名;而后,再用CA的公钥加密后再输出;用于CA认证签发“基于该手机数字证书子系统”的用户数字证书。
本发明实施例1的“手机准数字证书子系统的认证系统”,其特征还在于:其对“手机准数字证书子系统”进行完整性检测认证时,先获取该“手机准数字证书子系统的唯一ID数据”;而后再依据该“手机准数字证书子系统的唯一 ID数据”,到“已存在的手机准数字证书子系统的原始数据库”中检索、获取“该手机准数字证书子系统的专用不专有数据”。
本发明实施例1的“手机准数字证书子系统的认证系统”,其特征还在于:其包括有“手机准数字证书子系统的软件系统”的“已知存储地址的通用数据的标准Hash摘要值(简记为:H1)。当“手机准数字证书子系统的认证系统”对“手机准数字证书子系统”进行完整性检测认证时,该标准Hash摘要值H1,与“上面获取的‘被检测的手机准数字证书子系统’的专用不专有数据”,要再进行Hash运算,得到Hash摘要值(简记为:H2),作为“被检测的手机准数字证书子系统的‘已知存储地址的通用数据和专用不专有数据’的完整性判定标准”。
“本发明实施例1的手机准数字证书子系统的认证系统”的“手机准数字证书子系统完整性检测模块”,在手机准数字证书子系统内运行,对“手机准数字证书子系统的‘已知存储地址的通用数据和专用不专有数据’”进行Hash运算,得到Hash摘要值(简记为:H3)。
比较上述的Hash摘要值H2和Hash摘要值H3,若一致,则判定“被检测的手机准数字证书子系统的‘已知存储地址的通用数据和专用不专有数据’”是完整的;若不一致,则不完整。
三、本发明实施例1的CA数字证书认证系统。
本发明实施例1的CA数字证书认证系统,其在“现有数字证书认证系统”的基础上,主要增加“本发明的手机准数字证书子系统的认证系统”。
在用户申请注册“基于手机准数字证书子系统”的用户数字证书时,要先用本发明的“手机准数字证书子系统的认证系统”对该“手机准数字证书子系统”进行完整性认证。
若该“手机准数字证书子系统”未通过“手机准数字证书子系统的认证系统”的完整性认证,则CA拒绝在该“手机准数字证书子系统”中注册建立“基于该“手机准数字证书子系统”的用户数字证书。
若该“手机准数字证书子系统”通过“手机准数字证书子系统的认证系统”的完整性认证,并且其具备签发用户数字证书的条件,则CA认证签发“基于该手机准数字证书子系统”的用户数字证书。
实施例2:
本发明实施例2,提供一种手机准数字证书子系统及注册认证系统及其管理平台,用于实现“在手机中集成数字证书子系统并建立用户数字证书,并同时兼容各CA签发的数字证书的应用”。
参考附图3,本发明实施例2,包括:手机准数字证书子系统(Mss)、手机准数字证书子系统的认证系统(MssT)、手机准数字证书子系统的管理平台(MssM)及CA数字证书认证系统。下面分别说明:
一、手机准数字证书子系统(Mss)
本发明实施例2的“手机准数字证书子系统”,是符合国家商用密码产品标准的、具有现有数字证书子系统功能的计算机子系统。其特征在于:其包括有“注册认证管理模块”和“国家第三方认证机构的数字证书的公钥”,其特征还在于:其包括有“可信数字证书建立管理模块”和“手机准数字证书子系统管理平台的公钥”;“其特征还在于:其在生产制造阶段,预先生成并存储有“对应于‘手机准数字证书子系统管理平台’的‘手机准数字证书子系统’的非对称密钥对”,并将其公钥及其“手机准数字证书子系统”的唯一ID数据,也上传存储于“手机准数字证书子系统管理平台”的数据库中。用于对该“手机准数字证书子系统”的管理。
本发明实施例2的“手机准数字证书子系统”,其存储器中“已知存储地址的已知二进制数据”,可分为三类,1)“各个手机准数字证书子系统”都相同的数据部分,即:通用数据。2)“各手机准数字证书子系统”唯一的ID标识数据、非对称密钥对的公钥。即:专用不专有数据。3)“各个手机准数字证 书子系统”的预先生成存储的非对称密钥对的私钥。即:专用专有数据。
本发明实施例2的“手机准数字证书子系统”,其“注册认证管理模块”和“国家第三方认证机构的数字证书的公钥”,用于管理“在该准数字证书子系统中下载建立‘来自手机准数字证书子系统的认证系统的、该手机准数字证书子系统的完整性检测模块’;并启动执行该“手机准数字证书子系统完整性检测模块”对“该手机准数字证书子系统存储器中的程序及数据”进行完整性检测操作。其特征包括下面步骤:
(1)首先,“手机准数字证书子系统的认证系统”,用其“随机生成的对称密钥A”,对“手机准数字证书子系统的完整性检测模块和其‘第三方认证机构’的数字签名”进行加密,得到密文B;再用其获取到的“预先生成的被检测的手机准数字证书子系统的公钥”对“随机生成的对称密钥A”加密,得到密文C;而后,再将“密文B和密文C”及命令”,一起发送给“被检测的手机准数字证书子系统”,对其进行完整性检测;
(2)该“手机准数字证书子系统”,接收到“密文B和密文C”及命令;并按协议,先用“预先生成存储的手机准数字证书子系统的私钥”解密“密文C”,得到“对称密钥A”;再用“对称密钥A”解密“密文B”,得到“手机准数字证书子系统的完整性检测模块和其‘第三方认证机构’的数字签名”;
(3)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,应用在该“手机准数字证书子系统”中的“第三方认证机构数字证书的公钥”,解密“上述数字签名”,并验证“上述数字签名”;
(4)若“数字签名”验证通过,则该“注册认证管理模块”,在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性认证模块”;
(5)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,,启 动执行该“手机准数字证书子系统完整性检测模块”;
(6)该“手机准数字证书子系统完整性检测模块”,在手机准数字证书子系统内运行,对“手机准数字证书子系统的‘已知存储地址的通用数据和专用不专有数据’”进行Hash运算,得到Hash摘要值(简记为:H3);
(7)该“手机准数字证书子系统完整性检测模块”,继续启动执行“生成‘该手机准数字证书子系统的非对称密钥对’的功能”;并生成“该手机准数字证书子系统的非对称密钥对(私钥和公钥)”;
(8)该“手机准数字证书子系统完整性检测模块”,将上述“Hash摘要值H3”和“新生成的该手机准数字证书子系统的非对称密钥对的公钥及其ID”,用“‘手机准数字证书子系统完整性检测模块’自带的特征对称密钥”加密后,反馈给该“手机准数字证书子系统的认证系统”。
本发明实施例2的“手机准数字证书子系统”,其“可信数字证书建立管理模块”和“手机准数字证书子系统管理平台的公钥”,用于管理在“手机准数字证书子系统中生成非对称密钥对(私钥和公钥)。
其特征是包括下面步骤:
(1)手机准数字证书子系统,接收到“在手机准数字证书子系统中生成非对称密钥对”的请求,及其数字签名;
(2)手机准数字证书子系统的‘可信数字证书’建立管理模块”,按协议,应用存储在该手机准数字证书子系统中的“手机准数字证书子系统管理平台的公钥”,解密“上述数字签名”;并验证“上述数字签名;
(3)若签名验证通过,则该“可信数字证书建立管理模块”启动“非对称密钥生成流程”,生成该“手机准数字证书子系统”的非对称密钥对(私钥和公钥)。
本发明实施例2的“手机准数字证书子系统”,其“可信数字证书建立管理模块”和“手机准数字证书子系统管理平台的公钥”,还用于管理“在该准手机数字证书子系统中下载建立可信数字证书”。其中“可信数字证书”是指“在该手机准数字证书子系统中建立的、且需要有‘手机准数字证书子系统管理平台的私钥签名认证’才能建立的数字证书”。“可信数字证书”可以是“手机准数字证书子系统用户的数字证书”、也可以是“在该手机准数字证书子系统中下载建立的商户数字证书”。
其特征是包括下面步骤:
(1)该“手机准数字证书子系统”接收到“下载建立数字证书的请求,及其数字证书及其数字签名”;
(2)该“手机准数字证书子系统”中的“可信数字证书建立管理模块”,按协议,应用“手机准数字证书子系统”中的“手机数字证书子系统管理平台”的公钥,解密上述数字签名;并验证上述数字签名;
(3)若签名验证通过,则该“可信数字证书建立管理模块”在该“手机准数字证书子系统”中下载建立该数字证书”。
二、手机准数字证书子系统的认证系统
本发明实施例2的“手机准数字证书子系统的认证系统”,是与“手机准数字证书子系统”配套的、专用于认证该“手机准数字证书子系统”完整性的、符合商用密码产品标准的数字证书子系统;其具有“自己的设备数字证书和私钥”;并还包括有CA认证系统的公钥,用于其与CA进行基于PKI的安全通信。
本发明实施例2的“手机准数字证书子系统的认证系统”,其特征在于:其包括有“手机准数字证书子系统的完整性检测模块和其‘第三方认证机构’的 数字签名”。其特征还在于:该“手机准数字证书子系统的完整性检测模块”中,包括有“启动生成‘手机准数字证书子系统的非对称密钥对’的功能”;在该“手机准数字证书子系统完整性检测模块”对“该手机准数字证书子系统”进行完整性检测操作后,该模块继续启动执行“生成‘该手机准数字证书子系统的非对称密钥对’的功能”;并生成“该手机准数字证书子系统的非对称密钥对”;并输出“新生成的该手机准数字证书子系统的非对称密钥对的公钥”,用于制作“该手机准数字证书子系统用户的数字证书”。其特征还在于:该“手机准数字证书子系统的完整性检测模块”中,包括有“特征对称密钥”,用于对其检测输出的信息数据,进行加密。
其特征还在于包括下面步骤:
(1)该“手机准数字证书子系统的认证系统”,用其“随机生成的对称密钥A”,对“手机准数字证书子系统的完整性检测模块和其‘第三方认证机构’的认证数字签名”进行加密,得到密文B;再用其获取到的“预先生成的被检测的手机准数字证书子系统的公钥”对“随机生成的对称密钥A”加密,得到密文C;而后,再将“密文B和密文C”及命令”,一起发送给“被检测的手机准数字证书子系统”,对其进行完整性检测;
(2)该“手机准数字证书子系统”,接收到“密文B和密文C”及命令;并按协议,先用“预先生成的手机准数字证书子系统的私钥”解密“密文C”,得到“对称密钥A”;再用“对称密钥A”解密“密文B”,得到“手机准数字证书子系统的完整性检测模块和其‘第三方认证机构’的数字签名”;
(3)该“手机准数字证书子系统”,按协议,应用在该“手机准数字证书 子系统”中的“第三方认证机构的公钥”,解密“上述数字签名”,并验证“上述数字签名”。若“上述数字签名”验证通过,则在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性检测模块”;并启动执行该“手机准数字证书子系统完整性检测模块”;
(4)该“手机准数字证书子系统完整性检测模块”,在手机准数字证书子系统内运行,对“手机准数字证书子系统的‘已知存储地址的通用数据和专用不专有数据’”进行Hash运算,得到Hash摘要值(简记为:H3);
(5)该“手机准数字证书子系统完整性检测模块”,继续启动执行“生成‘该手机准数字证书子系统的非对称密钥对’的功能”;并生成“该手机准数字证书子系统的非对称密钥对(私钥和公钥)”;
(6)该“手机准数字证书子系统完整性检测模块”,将上述“Hash摘要值H3和新生成的该手机准数字证书子系统的非对称密钥对的公钥及其ID”,用“‘手机准数字证书子系统完整性检测模块’自带的特征对称密钥”加密后,反馈给该“手机准数字证书子系统的认证系统”;
(7)该“手机准数字证书子系统的认证系统”,用其“手机准数字证书子系统完整性检测模块中特征对称密钥”,解密接收到上述“Hash摘要值H3和新生成的该手机准数字证书子系统的非对称密钥对的公钥及其ID”的密文;得到其原文;
(8)该“手机准数字证书子系统的认证系统”,将上述“Hash摘要值H3”,与“作为判定标准的Hash摘要值H2”,进行比较;
其中,Hash摘要值H2,是“被检测的手机准数字证书子系统的原始的通用数据和专用不专有数据”,进行Hash运算,得到Hash摘要值,是 “被检测的手机准数字证书子系统的通用数据和专用不专有数据”的完整性判定的依据。
(9)若“Hash摘要值H3”与“Hash摘要值H2”一致,则判定该“被检测的手机准数字证书子系统”是完整的。
其中,上面步骤(2)、(3)及步骤(9)的正常结果,可证明“被检测的手机准数字证书子系统的私钥数据”是完整的。
(10)该“手机准数字证书子系统的认证系统”,用其私钥,对“该手机准数字证书子系统完整性正常的检测报告和新生成的该手机准数字证书子系统的非对称密钥对的公钥及其ID”,进行数字签名;而后,再用CA的公钥加密后再输出;用于CA认证签发“基于该手机数字证书子系统”的用户数字证书。
本发明实施例2的“手机准数字证书子系统的认证系统”,其特征还在于:其对“手机准数字证书子系统”进行完整性检测认证时,先获取该“手机准数字证书子系统的唯一ID”;而后再依据该“手机准数字证书子系统的唯一ID”,到“已存在的手机准数字证书子系统的原始数据库”中检索、获取“该手机准数字证书子系统的专用不专有数据(包括:‘手机准数字证书子系统的私钥’对应的公钥)”,其中,“手机准数字证书子系统的公钥”用于验证“被检测的手机准数字证书子系统的私钥”。
本发明实施例2的“手机准数字证书子系统的认证系统”,其特征还在于:其包括有“手机准数字证书子系统的软件系统”的“已知存储地址的通用数据的标准Hash摘要值(简记为:H1)。当“手机准数字证书子系统的认证系统”对“手机准数字证书子系统”进行完整性检测认证时,该标准Hash摘要值H1,与“上面获取的‘被检测的手机准数字证书子系统’的专用不专有数据”,要再 进行Hash运算,得到Hash摘要值(简记为:H2),作为“被检测的手机准数字证书子系统的‘已知存储地址的通用数据和专用不专有数据’的完整性判定标准”。
“本发明实施例的手机准数字证书子系统的认证系统”的“手机准数字证书子系统完整性检测模块”,在手机准数字证书子系统内运行,对“手机准数字证书子系统的‘已知存储地址的通用数据和专用不专有数据’”进行Hash运算,得到Hash摘要值(简记为:H3)。
比较上述的Hash摘要值H2和Hash摘要值H3,若一致,则判定“被检测的手机准数字证书子系统的‘已知存储地址的通用数据和专用不专有数据’”是完整的;若不一致,则不完整。
三、本发明实施例2的CA数字证书认证系统。
本发明实施例1的CA数字证书认证系统,其在“现有数字证书认证系统”的基础上,主要增加“本发明的手机准数字证书子系统的认证系统”。
在用户申请注册“基于手机准数字证书子系统”的用户数字证书时,要先用本发明的“手机准数字证书子系统的认证系统”对该“手机准数字证书子系统”进行完整性认证。
若该“手机准数字证书子系统”未通过“手机准数字证书子系统的认证系统”的完整性认证,则CA拒绝在该“手机准数字证书子系统”中注册建立“基于该“手机准数字证书子系统”的用户数字证书。
若该“手机准数字证书子系统”通过“手机准数字证书子系统的认证系统”的完整性认证,并且其具备签发用户数字证书的条件,则CA认证签发“基于该手机准数字证书子系统”的用户数字证书。
四、手机准数字证书子系统的管理平台(MssM)。
本发明实施例2的手机准数字证书子系统的管理平台,是管理“在手机准数字证书子系统中的数字证书应用”的计算机系统。
其特征在于:其包括有“数字证书建立管理模块”,用于管理“在手机准数字证书子系统中生成非对称密钥对(私钥和公钥)”。其特征是包括下面步骤:
(1)手机准数字证书子系统管理平台,按协议,用“手机准数字证书子系统管理平台”的私钥,对“在手机准数字证书子系统中生成非对称密钥对的请求”进行认证签名;
(2)手机准数字证书子系统管理平台,按协议,将“在手机准数字证书子系统中生成非对称密钥对的请求”及其“手机准数字证书子系统管理平台的数字签名,一起输出给手机准数字证书子系统,用于在“手机准数字证书子系统中启动生成非对称密钥对(私钥和公钥)”。
其特征还在于:其包括“各CA数字证书的公钥”,用于管理认证“要在手机准数字证书子系统中下载建立的各CA签发的数字证书”。其特征包括下面的步骤:
(1)手机准数字证书子系统管理平台,接收到“要在手机准数字证书子系统中下载建立的数字证书”;
(2)手机准数字证书子系统管理平台,按协议,应用“手机数字证书子系统管理平台中的签发该数字证书的CA的公钥”,解密该数字证书的CA签名,并验证该CA签名;
(3)若该CA的签名验证通过,则“手机数字证书子系统管理平台”用私钥,对“该数字证书的Hash摘要”的进行签名;而后,“手机准数字证书子系统管理平台”输出“该数字证书及该数字签名”,用于在“该手机准数字证书子系统”中建立该数字证书的应用。
综上所述,应用本发明提供的技术方案,将“手机准数字证书子系统”集成于手机中,可实现“在手机中集成数字证书子系统、并建立用户数字证书、并同时兼容各CA签发的数字证书应用”的目标,取得有益的效果。

Claims (10)

  1. 本发明提供的一种手机准数字证书子系统,是具有现有数字证书子系统软硬件功能的计算机子系统,其包括有:独立的处理器、存储器及软件系统、及加密解密模块、及密钥生成模块;其特征在于:其包括有“注册认证管理模块”,用于管理“在该准数字证书子系统中下载建立‘来自手机准数字证书子系统的认证系统的、该手机准数字证书子系统的完整性检测模块’;并启动执行该‘手机准数字证书子系统完整性检测模块’对‘该手机准数字证书子系统存储器中的程序及数据’进行检测操作”;其特征包括下面步骤:
    (1)该“手机准数字证书子系统”,接收到该“手机准数字证书子系统的完整性检测模块”及其命令;
    (2)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性检测模块”;
    (3)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,启动执行该“手机准数字证书子系统完整性检测模块”;
    (4)该“手机准数字证书子系统完整性检测模块”,在手机准数字证书子系统中运行,对“该手机准数字证书子系统存储器中的程序及数据”进行检测操作;
    (5)该“手机准数字证书子系统完整性检测模块”将“上面检测操作得到的需要输出的信息数据”输出上报,用于判定“该手机准数字证书子系统的完整性”。
  2. 如权利要求1所述的手机准数字证书子系统,其特征还在于:其包括有“手机准数字证书子系统认证方的公钥”和“注册认证管理模块”,用于管理“在该准数字证书子系统中下载建立‘该手机准数字证书子系统的完整性检测模块’”;其中,“手机准数字证书子系统认证方”可以是“手机准数字证书子系统管理平台”,可以是“第三方认证机构”,也可以是“其它认证机构或认证系统”; 其特征还包括下面步骤:
    (1)该“手机准数字证书子系统”,接收到“要在该手机准数字证书子系统中下载建立的‘手机准数字证书子系统完整性检测模块及其认证方的数字签名’”;
    (2)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,应用在该“手机准数字证书子系统”中的“认证方的公钥”,解密“上述认证方的数字签名”,并验证该数字签名;
    (3)若“数字签名”验证通过,则该“注册认证管理模块”,在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性认证模块”;
    (4)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,启动执行该“手机准数字证书子系统完整性检测模块”;
    (5)该“手机准数字证书子系统完整性检测模块”,在手机准数字证书子系统中运行,对“该手机准数字证书子系统存储器中的程序及数据”进行检测操作;
    (6)该“手机准数字证书子系统完整性检测模块”将“上面检测操作得到的需要输出的信息数据”输出上报,用于判定“该手机准数字证书子系统的完整性”。
  3. 如权利要求1所述的手机准数字证书子系统,其特征还在于:其包括有“手机准数字证书子系统认证方与手机准数字证书子系统预先约定的对称密钥”和其“注册认证管理模块”,用于管理“在该准数字证书子系统中下载建立‘该手机准数字证书子系统的完整性检测模块’”,其特征还包括下面步骤:
    (1)该“手机准数字证书子系统”接收到“要在该手机准数字证书子系统中 下载建立的‘手机准数字证书子系统完整性检测模块及其认证数据’”;
    其中,该“手机准数字证书子系统完整性检测模块的认证数据”,是“‘手机准数字证书子系统认证方’用其与该手机准数字证书子系统预先约定的对称密钥”,对该“手机准数字证书子系统完整性认证模块”的Hash摘要的加密数据;
    其中,上述预先约定的对称密钥,可以是“‘手机准数字证书子系统认证方’与该手机准数字证书子系统预先约定的静态对称密钥;也可以是“‘手机准数字证书子系统认证方’与该手机准数字证书子系统之间动态令牌生成的动态对称密钥”;
    其中,上述“手机准数字证书子系统认证方”可以是“手机准数字证书子系统管理平台”,可以是“第三方认证机构”,也可以是“其它认证机构或认证系统”;
    (2)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,应用在该“手机准数字证书子系统”中的“与手机准数字证书子系统认证方约定的对称密钥”,解密“上述认证数据”,并验证“上述认证数据”是否为“认证方的认证数据”。其验证方法是:
    1)该“注册认证管理模块”,对接收到的“上述认证数据”,应用在该“手机准数字证书子系统”中的“与认证方约定的对称密钥”,解密“上述认证数据”,得到原文Hash摘要,简记用A表示;
    2)该“注册认证管理模块”,对接收到的“手机准数字证书子系统完整性检测模块”应用Hash算法进行运算,得到该“手机准数字证书子系统完整性检测模块”的Hash摘要信息,简记用B表示;
    3)比较数据A和B,若A等于B,则判定“上述认证数据”是“认 证方的认证数据”,验证通过;
    (3)若验证通过,判定“上述认证数据”是“认证方的认证数据”,则该“注册认证管理模块”,在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性认证模块”;
    (4)该“手机准数字证书子系统”中的“注册认证管理模块”,按协议,启动执行该“手机准数字证书子系统完整性认证模块”;
    (5)该“手机准数字证书子系统完整性认证模块”,在手机准数字证书子系统中运行,对“该手机准数字证书子系统存储器中的程序及数据”进行检测操作;
    (6)该“手机准数字证书子系统完整性认证模块”将“上面检测操作得到的需要输出的信息数据”输出上报,用于判定“该手机准数字证书子系统的完整性”。
  4. 如权利要求1、2、3之一所述的手机准数字证书子系统,其特征还在于:其包括有“手机准数字证书子系统管理平台的公钥”和“可信数字证书建立管理模块”,用于管理在“手机准数字证书子系统中生成非对称密钥对(私钥和公钥)。其特征是包括下面步骤:
    (1)手机准数字证书子系统,接收到“在手机准数字证书子系统中生成非对称密钥对的请求”及其“手机准数字证书子系统管理平台的数字签名”;
    (2)手机准数字证书子系统的“可信数字证书建立管理模块”,按协议,应用存储在该手机准数字证书子系统中的“手机准数字证书子系统管理平台的公钥”,解密“上述数字签名”;并验证“上述数字签名;
    (3)若签名验证通过,则该“可信数字证书建立管理模块”启动“非对称密钥生成流程”,生成该“手机准数字证书子系统”的非对称密钥对(私 钥和公钥)。
  5. 如权利要求1、2、3、4之一所述的手机准数字证书子系统,其特征还在于:其包括有“手机准数字证书子系统管理平台的公钥”和“可信数字证书建立管理模块”,用于管理“在该准手机数字证书子系统中建立可信数字证书”;其中“可信数字证书”是指“在该手机准数字证书子系统中建立的、且需要有‘手机准数字证书子系统管理平台的私钥签名认证’才能建立的数字证书”;“可信数字证书”可以是“手机准数字证书子系统用户的数字证书”、也可以是“在该手机准数字证书子系统中下载建立的商户数字证书”;其特征是包括下面步骤:
    (1)该“手机准数字证书子系统”接收到“下载建立数字证书的请求,及其数字证书及其数字签名”;
    (2)该“手机准数字证书子系统”中的“可信数字证书建立管理模块”,按协议,应用“手机准数字证书子系统”中的“手机数字证书子系统管理平台”的公钥,解密上述数字签名;并验证上述数字签名;
    (3)若签名验证通过,则该“可信数字证书建立管理模块”在该“手机准数字证书子系统”中下载建立该数字证书”。
  6. 本发明提供一种手机准数字证书子系统的认证系统,是用于对本发明的手机准数字证书子系统进行完整性认证的计算机系统。其特征在于:其包括有“手机准数字证书子系统的完整性检测模块”;该模块,可被发送给手机准数字证书子系统,并在该手机准数字证书子系统中下载建立;并被启动执行;该模块在手机准数字证书子系统中运行,对该手机准数字证书子系统的存储器中的该手机准数字证书子系统的程序及数据进行检测操作;“该模块对‘该手机准数字证书子系统的程序及数据进行检测操作’而得到的需要输出的信息数据”由 该模块处理输出上报,用于判定“该手机准数字证书子系统”的完整性;其特征还在于包括下面步骤:
    (1)该“手机准数字证书子系统的认证系统”,将“手机准数字证书子系统完整性检测模块”及其命令,发送给“手机准数字证书子系统”;
    (2)该“手机准数字证书子系统”,按协议,在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性检测模块”;并启动执行该“手机准数字证书子系统完整性检测模块”;该“手机准数字证书子系统完整性检测模块”对该手机准数字证书子系统存储器中的程序及数据进行检测操作;该“手机准数字证书子系统完整性检测模块”对“该手机准数字证书子系统的程序及数据”进行检测操作而得到的需要输出的信息数据,由该模块处理输出上报;
    (3)该“手机准数字证书子系统的认证系统”,接收到该“手机准数字证书子系统完整性检测模块”输出上报的“对该手机准数字证书子系统完整性检测操作获得的信息数据”;并依据“该信息数据”和“已知的判定标准”,对“该手机准数字证书子系统的完整性”进行判定。
  7. 如权利要求6所述的手机准数字证书子系统的认证系统,其特征还在于:其包括有“手机准数字证书子系统的完整性检测模块及其认证方的数字签名”;其中,上述“认证方”可以是“手机数字证书子系统管理平台”,可以是“第三方认证机构”,也可以是“其它认证机构或认证系统”;
    其特征是包括下面步骤:
    (1)该“手机准数字证书子系统的认证系统”,将该“手机准数字证书子系统完整性检测模块及其认证方的数字签名”,发送给该“手机准数字证书子系统”;
    (2)该“手机准数字证书子系统”,并按协议,应用在该“手机准数字证书子系统”中的“认证方的公钥”,解密“上述认证方的数字签名”,并验证该数字签名;若“上述认证方的数字签名”验证通过,则在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性检测模块”;并启动执行该“手机准数字证书子系统完整性检测模块”;该“手机准数字证书子系统完整性认证模块”对该手机准数字证书子系统存储器中的该手机准数字证书子系统的程序及数据进行检测操作;该“手机准数字证书子系统完整性检测模块”对“该手机准数字证书子系统的程序及数据”进行检测操作而得到的需要输出的信息数据,由该模块处理输出上报;
    (3)该“手机准数字证书子系统的认证系统”,接收到该“手机准数字证书子系统完整性检测模块”输出上报的“对该手机准数字证书子系统完整性检测操作获得的信息数据”;并依据“该信息数据”和“已知的判定标准”,对“该手机准数字证书子系统的完整性”进行判定。
  8. 如权利要求6所述的手机准数字证书子系统的认证系统,其特征在于:其包括有“手机准数字证书子系统的完整性检测模块及其认证数据”;
    其中,该“手机准数字证书子系统完整性检测模块的认证数据”,是“认证方”用其与该手机准数字证书子系统预先约定的对称密钥,对该“手机准数字证书子系统完整性认证模块”的Hash摘要的加密数据;
    其中,上述预先约定的对称密钥,可以是“认证方与该手机准数字证书子系统预先约定的静态对称密钥”;也可以是“认证方与该手机准数字证书子系统之间动态令牌生成的动态对称密钥”;
    其中,上述“认证方”可以是“手机准数字证书子系统管理平台”,可以是 “第三方认证机构”,也可以是“其它认证机构或认证系统”;
    其特征还在于:其包括下面步骤:
    (1)该“手机准数字证书子系统的认证系统”,将该“手机准数字证书子系统完整性检测模块及其认证数据”,发送给该“手机准数字证书子系统”;
    (2)该“手机准数字证书子系统”,应用“与认证方约定的对称密钥”,解密“上述认证数据”,并验证“上述认证数据”;若验证通过,则在该“手机准数字证书子系统”中下载建立该“手机准数字证书子系统完整性检测模块”;并启动执行该“手机准数字证书子系统完整性检测模块”;该“手机准数字证书子系统完整性认证模块”对该手机准数字证书子系统存储器中的该手机准数字证书子系统的程序及数据进行检测操作;该“手机准数字证书子系统完整性检测模块”对“该手机准数字证书子系统的程序及数据”进行检测操作而得到的需要输出的信息数据,由该模块处理输出上报;
    (3)该“手机准数字证书子系统的认证系统”,接收到该“手机准数字证书子系统完整性检测模块”输出上报的“对该手机准数字证书子系统完整性检测操作获得的信息数据”;并依据“该信息数据”和“已知的判定标准”,对“该手机准数字证书子系统的完整性”进行判定。
  9. 如权利要求6、7、8之一所述的“手机准数字证书子系统的认证系统”,其特征还在于:其对“手机准数字证书子系统”进行完整性认证,还包括下面步骤:
    (1)其“手机准数字证书子系统完整性检测模块”,在“手机准数字证书子系统”中下载建立并启动运行;
    (2)其“手机准数字证书子系统完整性检测模块”,按已知的存储地址,读 取“手机准数字证书子系统”的通用数据和专用不专有数据;
    (3)其“手机准数字证书子系统完整性检测模块”,将上述读取的“手机准数字证书子系统的通用数据和专用不专有数据”,用Hash算法进行运算,得到其Hash摘要,简记用A表示;
    (4)其“手机准数字证书子系统完整性检测模块”,将Hash摘要A,输出给该“手机准数字证书子系统的认证系统”;
    (5)该“手机准数字证书子系统的认证系统”,将Hash摘要A,与“作为判定标准的‘该手机准数字证书子系统的已知存储地址的通用数据和专用不专有数据’的Hash摘要值”进行比较;若二者一样,则判定“‘该手机准数字证书子系统完整性检测模块’读取检测的‘该手机准数字证书子系统’的通用数据和专用不专有数据”是完整的;若二者不一样,则判定“该手机准数字证书子系统”是不完整的。
  10. 如权利要求6、7、8、9之一所述手机准数字证书子系统的认证系统,其特征还在于:其“手机准数字证书子系统的完整性检测模块”中,还包括有“启动生成‘手机准数字证书子系统的非对称密钥对’的功能块”;在该“手机准数字证书子系统完整性检测模块”对“该手机准数字证书子系统”进行完整性检测操作后,该模块继续启动执行“生成‘该手机准数字证书子系统的非对称密钥对’的功能”;并生成“该手机准数字证书子系统的非对称密钥对”;并输出“新生成的该手机准数字证书子系统的非对称密钥对的公钥”,用于制作“该手机准数字证书子系统用户的数字证书”;
    其特征还在于:该述手机准数字证书子系统的认证系统,同时也是独立的数字证书子系统(商用密码产品),具有“自己的设备数字证书和私钥”;其对“手机准数字证书子系统的完整性检测认证的报告”是用其私钥进行签名认证 后再输出的。
PCT/CN2016/079508 2015-04-15 2016-04-15 一种手机准数字证书子系统及其系统及其方法 WO2016165662A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510181073.X 2015-04-15
CN201510181073.XA CN106161027A (zh) 2015-04-15 2015-04-15 一种手机准数字证书子系统及其系统及其方法

Publications (1)

Publication Number Publication Date
WO2016165662A1 true WO2016165662A1 (zh) 2016-10-20

Family

ID=57125701

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/079508 WO2016165662A1 (zh) 2015-04-15 2016-04-15 一种手机准数字证书子系统及其系统及其方法

Country Status (2)

Country Link
CN (1) CN106161027A (zh)
WO (1) WO2016165662A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107229874B (zh) * 2017-05-27 2020-12-15 北京世纪龙脉科技有限公司 一种实现VR-Key的方法、装置和服务器
CN108418692B (zh) * 2018-03-28 2021-05-25 湖南东方华龙信息科技有限公司 认证证书的在线写入方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050246534A1 (en) * 2004-04-30 2005-11-03 Kirkup Michael G System and method for administering digital certificate checking
CN102202307A (zh) * 2011-06-17 2011-09-28 刘明晶 基于数字证书的移动终端身份认证系统及方法
CN102547688A (zh) * 2012-02-13 2012-07-04 江苏博智软件科技有限公司 一种基于虚拟专用信道的高可信手机安全通信信道的建立方法
CN104462965A (zh) * 2014-11-14 2015-03-25 华为技术有限公司 应用程序完整性验证方法及网络设备

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777978B (zh) * 2008-11-24 2012-05-30 华为终端有限公司 一种基于无线终端的数字证书申请方法、系统及无线终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050246534A1 (en) * 2004-04-30 2005-11-03 Kirkup Michael G System and method for administering digital certificate checking
CN102202307A (zh) * 2011-06-17 2011-09-28 刘明晶 基于数字证书的移动终端身份认证系统及方法
CN102547688A (zh) * 2012-02-13 2012-07-04 江苏博智软件科技有限公司 一种基于虚拟专用信道的高可信手机安全通信信道的建立方法
CN104462965A (zh) * 2014-11-14 2015-03-25 华为技术有限公司 应用程序完整性验证方法及网络设备

Also Published As

Publication number Publication date
CN106161027A (zh) 2016-11-23

Similar Documents

Publication Publication Date Title
CN109951489B (zh) 一种数字身份认证方法、设备、装置、系统及存储介质
US20210367795A1 (en) Identity-Linked Authentication Through A User Certificate System
CN109150548B (zh) 一种数字证书签名、验签方法及系统、数字证书系统
US20190173873A1 (en) Identity verification document request handling utilizing a user certificate system and user identity document repository
US8689290B2 (en) System and method for securing a credential via user and server verification
US20100042848A1 (en) Personalized I/O Device as Trusted Data Source
WO2020062668A1 (zh) 一种身份认证方法、身份认证装置及计算机可读介质
US8433914B1 (en) Multi-channel transaction signing
US20190251561A1 (en) Verifying an association between a communication device and a user
JP2019521414A (ja) 車載端末のための決済認証方法、装置、及び、システム
TW201741922A (zh) 一種基於生物特徵的安全認證方法及裝置
JP2018532301A (ja) 本人認証方法及び装置
US8397281B2 (en) Service assisted secret provisioning
WO2021190197A1 (zh) 生物支付设备的认证方法、装置、计算机设备和存储介质
WO2016054990A1 (zh) 安全校验方法、装置、终端及服务器
US10439809B2 (en) Method and apparatus for managing application identifier
TWM595792U (zh) 跨平台授權存取資源的授權存取系統
WO2012034339A1 (zh) 一种实现网络支付的方法及移动终端
WO2016165662A1 (zh) 一种手机准数字证书子系统及其系统及其方法
CN115242471A (zh) 信息传输方法、装置、电子设备及计算机可读存储介质
TWI669672B (zh) 電子交易方法及系統
TWI772908B (zh) 以線上快速認證之硬體載具認證並簽章之系統及方法
TWI813905B (zh) 以線上快速認證之認證機制啟用數位憑證之系統及方法
KR102209531B1 (ko) 클라우드 환경에서 인증서 및 개인키의 저장 방법 및 그 인증서 및 개인키를 다운로드 하는 방법
WO2017067490A1 (zh) 一种数字证书子系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16779637

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16779637

Country of ref document: EP

Kind code of ref document: A1