WO2019047927A1 - 数字证书管理方法及设备 - Google Patents

数字证书管理方法及设备 Download PDF

Info

Publication number
WO2019047927A1
WO2019047927A1 PCT/CN2018/104647 CN2018104647W WO2019047927A1 WO 2019047927 A1 WO2019047927 A1 WO 2019047927A1 CN 2018104647 W CN2018104647 W CN 2018104647W WO 2019047927 A1 WO2019047927 A1 WO 2019047927A1
Authority
WO
WIPO (PCT)
Prior art keywords
digital certificate
certificate management
verification
request message
response message
Prior art date
Application number
PCT/CN2018/104647
Other languages
English (en)
French (fr)
Inventor
王月辉
张变玲
铁满霞
赖晓龙
李琴
童伟刚
张国强
杜志强
颜湘
Original Assignee
西安西电捷通无线网络通信股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 西安西电捷通无线网络通信股份有限公司 filed Critical 西安西电捷通无线网络通信股份有限公司
Priority to KR1020207009708A priority Critical patent/KR102325725B1/ko
Priority to JP2020513694A priority patent/JP7292263B2/ja
Priority to US16/645,149 priority patent/US11323433B2/en
Priority to EP18853006.7A priority patent/EP3681101B1/en
Publication of WO2019047927A1 publication Critical patent/WO2019047927A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Definitions

  • the present invention relates to the field of network security technologies, and in particular, to a digital certificate management method and device.
  • Digital certificates are a way to verify the identity of a network communication entity, and digital certificate technology can be used for data encryption, identity verification, and the like.
  • the digital certificate is generally issued by the digital certificate issuing device to the digital certificate application device and can be used to identify the identity of the digital certificate application device.
  • the digital certificate requesting device can transmit a message to the digital certificate issuing device via the wireless local area network to notify the digital certificate generating method supported thereby, so that the digital certificate issuing device generates a new digital certificate.
  • messages transmitted between the digital certificate requesting device and the digital certificate issuing device are transmitted in plain text, and only the integrity check of the message is performed to determine that the message has not been tampered with.
  • This method can only guarantee the integrity of the data, and can not effectively protect the authenticity and confidentiality of the data.
  • this method has a defect of low security.
  • the invention provides a digital certificate management method and device, which can establish a secure channel for data transmission between a digital certificate application device and a digital certificate issuing device, and encrypt and transmit the messages transmitted by the two, thereby effectively improving the digital certificate management. safety.
  • the present invention provides a digital certificate management method, including: a digital certificate application device uses a obtained authorization code to negotiate with a digital certificate issuing device to establish a secure data channel, and generate a security key; wherein the security key is at least Included as a data communication key; the digital certificate application device transmits a digital certificate management request message to the digital certificate issuing device by using the secure data channel, the digital certificate management request message is encrypted by the data communication key; digital certificate is issued The device receives the digital certificate management request message, and sends a digital certificate management verification request message to the digital certificate application device by using the secure data channel, where the digital certificate management verification request message is encrypted by the data communication key; The certificate application device receives the digital certificate management verification request message, and sends a digital certificate management verification response message to the digital certificate issuing device by using the secure data channel, where the digital certificate management verification response message is encrypted by the data communication key Processing The certificate issuing device receives the digital certificate management verification response message, and sends a digital certificate management response message to the digital certificate application
  • the present invention provides a digital certificate application device, including: a secure data channel establishing unit, configured to establish a secure data channel by using a obtained authorization code and negotiate with a digital certificate issuing device to generate a security key;
  • the security key includes a data communication key, and a sending unit is configured to send, by using the secure data channel, a digital certificate management request message to the digital certificate issuing device, where the digital certificate management request message is encrypted by the data communication key And transmitting, by using the secure data channel, the digital certificate management verification response message to the digital certificate issuing device, where the digital certificate management verification response message is encrypted by the data communication key;
  • the secure data channel sends the digital certificate management confirmation message to the digital certificate issuing device, the digital certificate management confirmation message is encrypted by the data communication key; and an encryption unit is configured to utilize the data communication key pair
  • the certificate management request message is encrypted; and is also used to utilize the The data communication key performs encryption processing on the digital certificate management verification response message; and is further configured to perform encryption processing on the digital certificate management confirmation message by using
  • the present invention provides an apparatus for digital certificate application, comprising a memory, and one or more programs, wherein one or more programs are stored in the memory and configured to be processed by one or more And executing, by the one or more programs, an instruction for: establishing, by using the obtained authorization code, a secure data channel, and generating a security key, in cooperation with the digital certificate issuing device; wherein the security key includes at least data a communication key; generating a digital certificate management request message; encrypting the digital certificate management request message by using the data communication key; and transmitting a digital certificate management request message to the digital certificate issuing device by using the secure data channel,
  • the digital certificate management request message is encrypted by the data communication key; and the digital certificate management verification request message sent by the digital certificate issuing device is received by using the secure data channel, where the digital certificate management verification request message is Data communication key encryption Processing the digital certificate management verification request message, and generating a digital certificate management verification response message; encrypting the digital certificate management verification response message by using the data communication key; using
  • the present invention provides a digital certificate issuing device, where the device includes: a secure data channel establishing unit, configured to establish a secure data channel by using an authorization code and a digital certificate applying device to generate a security key;
  • the security key includes at least a data communication key, and the receiving unit is configured to receive a digital certificate management request message sent by the digital certificate application device by using the secure data channel, where the digital certificate management request message is encrypted by the data communication Key encryption processing; further configured to receive a digital certificate management verification response message sent by the digital certificate application device by using the secure data channel, where the digital certificate management response message is encrypted by the data communication key;
  • the digital certificate application device uses the digital certificate management confirmation message sent by the secure data channel, the digital certificate management confirmation message is encrypted by the data communication key, and the processing unit is configured to process the received digital certificate.
  • the message is further configured to process the received digital certificate management verification response message, and generate a digital certificate management response message; further configured to process the received digital certificate management confirmation message; and an encryption unit configured to utilize the data
  • the communication key performs encryption processing on the digital certificate management verification request message; and is further configured to perform encryption processing on the digital certificate management response message by using the data communication key; and a sending unit, configured to use the secure data channel to
  • the digital certificate application device sends the digital certificate management verification request message, and the digital certificate management verification request message is encrypted by the data communication key; and is further configured to apply to the digital certificate by using the secure data channel And transmitting the digital certificate management response message, where the digital certificate management response message is encrypted by the data communication key.
  • the present invention provides an apparatus for digital certificate issuance, comprising a memory, and one or more programs, wherein one or more programs are stored in a memory and configured to be processed by one or more Executing, by the one or more programs, an instruction for: establishing, by using an authorization code, a secure data channel by using a digital certificate requesting device to generate a security key; wherein the security key includes a data communication key
  • the digital certificate application device can use the obtained authorization code to negotiate with the digital certificate issuing device to establish a secure data channel, generate a security key, and between the digital certificate application device and the digital certificate issuing device.
  • the generated data communication key is used to encrypt and process the message, which effectively improves the security of data transmission, and can be applied to automatic application, query, update, revoke and revocation of digital certificates in many different types of scenarios. List get, etc.
  • the digital certificate issuing device uses the verification to which the public and private keys belong, and checks whether the digital certificate application device has a "private key corresponding to its public key", thereby being able to detect whether the public and private keys of the digital certificate application device are replaced, whether it is an error or the like.
  • the digital certificate issuing device can only interact with the digital certificate application device with the correct public and private key to avoid the leakage of the digital certificate application device privacy data, and further ensure the security of the digital certificate management process.
  • FIG. 1 is a schematic application scenario of an embodiment of the present invention
  • FIG. 2 is a flowchart of a digital certificate management method according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of a digital certificate management method according to another embodiment of the present invention.
  • FIG. 4 is a flowchart of a digital certificate management method according to another embodiment of the present invention.
  • FIG. 5 is a schematic diagram of negotiation and establishment of a secure data channel according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of message contents in a method for automatically applying, querying, updating, and issuing digital certificates according to an embodiment of the present invention
  • FIG. 7 is a block diagram of a digital certificate requesting device according to an exemplary embodiment
  • FIG. 8 is a block diagram of an apparatus for digital certificate application, according to another exemplary embodiment.
  • FIG. 9 is a block diagram of a digital certificate issuing device, according to an exemplary embodiment.
  • FIG. 10 is a block diagram of an apparatus for digital certificate issuance, according to another exemplary embodiment.
  • the embodiment of the invention provides a digital certificate management method and device, which can establish a secure channel for data transmission between the digital certificate application device and the digital certificate issuing device, and encrypt and transmit the messages transmitted by the two, thereby effectively improving the digital certificate. Management security.
  • FIG. 1 is an exemplary application scenario of an embodiment of the present invention.
  • the method and device provided by the embodiments of the present invention may be applied to the scenario shown in FIG. 1 , where the digital certificate requesting device and the digital certificate issuing device may be connected through a network, and the connection may be any form of wired and/or wireless. Connection (eg WLAN, LAN, cellular, coaxial cable, etc.).
  • the digital certificate application device includes, but is not limited to, an existing, developing, or future developed smartphone, a non-smart phone, a tablet, a laptop personal computer, a desktop personal computer, a small computer. , medium-sized computers, large computers, etc.
  • the digital certificate application device can apply for downloading, updating a certificate, etc.
  • a digital certificate issuing device for example, a certificate authority CA server
  • a digital certificate issuing device for example, a certificate authority CA server
  • the embodiments of the present invention can be applied to many industries such as wireless operation networks, aviation, transportation, electric power, broadcasting, finance, medical, education, industry and commerce.
  • industries such as wireless operation networks, aviation, transportation, electric power, broadcasting, finance, medical, education, industry and commerce.
  • embodiments of the present invention are not limited in this respect. Rather, embodiments of the invention may be applied to any scenario that is applicable.
  • a digital certificate management method shown in an exemplary embodiment of the present invention will be described below with reference to FIGS. 2 to 6.
  • FIG. 2 is a flowchart of a digital certificate management method according to an embodiment of the present invention. As shown in FIG. 2, it may include:
  • the digital certificate application device establishes a secure data channel by using the obtained authorization code to negotiate with the digital certificate issuing device to generate a security key, where the security key includes a data communication key.
  • the digital certificate applicant may request an authorization code for downloading the digital certificate from the digital certificate issuer.
  • the digital certificate applicant may be, for example, a digital certificate application device, and the digital certificate issuer may be, for example, a digital certificate issuance device.
  • the present invention does not limit the specific authorization code request mode.
  • a digital certificate applicant may request an authorization code from a digital certificate issuer by means of a text message, a mail, a dedicated request, or the like.
  • the digital certificate issuer can send the authorization code to the digital certificate applicant in a certain way.
  • a digital certificate issuer can send an authorization code to a digital certificate applicant by means of a text message, an email, a dedicated message, or the like.
  • the authorization code is generated by the digital certificate issuer itself, may be generated in real time when the digital certificate applicant requests the authorization code, or may be generated in advance, and may be in the form of letters and/or numbers and/or symbols. The combination of the other has a certain length requirement, and the authorization code also has a certain period of use. When the usage period is exceeded, the authorization code will be invalid.
  • the authorization code assigned by the digital certificate issuer to different digital certificate applicants is different during use.
  • the digital certificate application device may negotiate with the digital certificate issuing device to establish a secure data channel by using the obtained authorization code, where the secure data channel is used for secure data transmission.
  • the digital certificate requesting device may generate a security key using an authorization code, which may include one or more keys, the one or more keys including a data communication key.
  • the security key may also include a data session key.
  • the data communication key is used to encrypt a message transmitted by the digital certificate application device and the digital certificate issuing device in a secure data channel.
  • a security key is generated on both the digital certificate application device side and the digital certificate issuing device side to facilitate encryption and decryption of messages.
  • the data session key can be used to encrypt certificate request data or certificate response data.
  • the certificate request data is specifically data carried by the digital certificate management request message.
  • the certificate response data is specifically data carried by the digital certificate management response message.
  • the digital certificate application device sends a digital certificate management request message to the digital certificate issuing device by using the secure data channel, where the digital certificate management request message is encrypted by the data communication key.
  • the digital certificate management request message is subjected to encryption processing.
  • the data communication key generated in S201 is used for encryption processing, thereby effectively improving the security of message transmission.
  • the data included in the digital certificate management request message may be processed once by encryption or may be processed by secondary encryption.
  • the digital certificate management request message may be encrypted by the data communication key when transmitted in the secure data channel before being sent to the digital certificate issuing device.
  • the digital certificate management request message has been encrypted by using a set of keys in the security key, such as a data session key, to encrypt the certificate request data carried in the digital certificate management request message.
  • the second encryption process is performed when the data channel is transmitted.
  • the digital certificate requesting device and the digital certificate issuing device may pre-agreed the number of encryptions, the encryption algorithm, and the type of key used for encryption (ie, the data communication key and the data session key).
  • the digital certificate issuing device receives the digital certificate management request message, and sends a digital certificate management response message to the digital certificate applying device by using the secure data channel, where the digital certificate management response message is encrypted by the data communication key.
  • the digital certificate issuing device first decrypts the digital certificate management request message by using the generated security key, and processes the data according to the data carried by the digital certificate management request message. Generating a digital certificate management response message and transmitting a digital certificate management response message to the digital certificate requesting device.
  • the digital certificate management response message is subjected to encryption processing.
  • the data communication key generated in S201 is used for encryption processing, thereby effectively improving the security of message transmission.
  • the digital certificate management response message may also be processed once by encryption or by secondary encryption.
  • the digital certificate management request message in S202 is used before the transmission, the data contained in the digital certificate management request message has been encrypted by using a set of keys in the security key, such as a data session key, in the security data.
  • the second encryption process is performed by the data communication key when the channel is transmitted.
  • the digital certificate management response message may also perform encryption processing twice by using the data session key and the data communication key respectively.
  • the digital certificate requesting device and the digital certificate issuing device may pre-agreed the number of encryptions, the encryption algorithm, and the type of key used for encryption (ie, the data communication key and the data session key).
  • the digital certificate application device receives the digital certificate management response message, and sends a digital certificate management confirmation message to the digital certificate issuing device by using the secure data channel, where the digital certificate management confirmation message is encrypted by the data communication key. deal with.
  • the digital certificate management response message is encrypted by the data communication key.
  • the digital certificate application device processes the digital certificate management response message, obtains a processing result, and generates a digital certificate management confirmation message.
  • the present invention does not limit the message and the interaction mode used by the digital certificate application device and the digital certificate issuance device, as long as the above information interaction can be realized, and the automatic application, query, update, and issuance of the digital certificate are all in accordance with the present invention. protected range.
  • the digital certificate management request message may include digital certificate request information, digital certificate acquisition information, digital certificate revocation information, digital certificate revocation list information, and the like.
  • the digital certificate management response message includes digital certificate response information.
  • the digital certificate application device decrypts and verifies the digital certificate management response message, obtains the message content, determines the used digital certificate according to the requirement, and performs processing such as installation and update of the digital certificate.
  • the digital certificate management request message carries certificate request data
  • the digital certificate management response message carries certificate response data. According to whether the certificate request data and/or the certificate response data are encrypted, the following implementation manners may be included:
  • the certificate request data and the certificate response data are plaintext, and the digital certificate management request message and the digital certificate management response message are encrypted by the data communication key of the secure channel to complete one encryption.
  • the digital certificate management request message is encrypted by the data communication key, and the digital certificate management request message is encrypted by a data communication key of the secure data channel; the digital certificate management response message is processed by The data communication key encryption process includes: the digital certificate management response message being encrypted by a data communication key of the secure data channel.
  • the certificate request data is subjected to the first encryption process using the data session key, and the certificate response data is not encrypted and is in plaintext.
  • the digital certificate management request message is encrypted a second time using the data communication key, and the digital certificate management response message is encrypted once using the data communication key.
  • the digital certificate management request message is encrypted by the data communication key, and the digital certificate management request message is sent before the digital certificate management request message is encrypted by the data communication key of the secure data channel.
  • the carried certificate request data is encrypted by the data session key.
  • the digital certificate management response message is encrypted by the data communication key, and the digital certificate management response message is encrypted by the data communication key of the secure data channel.
  • the certificate request data is subjected to the first encryption process using the data session key
  • the certificate response data is also subjected to the first layer encryption process using the data session key.
  • the certificate response data and the session key used by the certificate request data and the encryption method correspond to each other.
  • the digital certificate management request message and the digital certificate management response message are respectively encrypted for a second time using the data communication key.
  • the digital certificate management request message is encrypted by the data communication key, and the digital certificate management request message is sent before the digital certificate management request message is encrypted by the data communication key of the secure data channel.
  • the carried certificate request data is encrypted by the data session key;
  • the digital certificate management response message is encrypted by the data communication key, and the digital certificate management response message is sent before the digital certificate management response message is encrypted by the data communication key of the secure data channel.
  • the carried certificate response data is encrypted by the data session key.
  • the digital certificate management confirmation message is encrypted.
  • the data communication key generated in S201 is used for encryption processing, thereby effectively improving the security of message transmission.
  • the digital certificate issuing device receives and processes the digital certificate management confirmation message.
  • the digital certificate application device may use the obtained authorization code to negotiate with the digital certificate issuing device to establish a secure data channel, generate a security key, and interact with the digital certificate requesting device and the digital certificate issuing device message.
  • the generated security key is used to encrypt and process the message, which effectively improves the security of data transmission, and can be applied to automatic application, query, update, revocation and revocation of digital certificates in a plurality of different types of scenarios.
  • the message in the process of interacting with the digital certificate application device and the digital certificate issuance device, if the message is not received within a certain period of time after the message is sent, it needs to be retransmitted.
  • the digital certificate issuing device needs to determine whether the public or private key is the digital certificate requesting device.
  • a digital certificate management verification request message and a digital certificate management verification response message are required between the digital certificate issuing device and the digital certificate applying device.
  • the digital certificate issuing device receives the digital certificate management request message, and sends a digital certificate management verification request message to the digital certificate application device by using the secure data channel, where the digital certificate management verification request message is encrypted by the data communication. Key encryption processing.
  • the digital certificate issuing device after receiving the digital certificate management request message, the digital certificate issuing device first decrypts the digital certificate management request message by using the data communication key, and according to the digital certificate management request message The carried data is processed and then a digital certificate management verification request message is generated.
  • the digital certificate management verification request message includes certificate verification request information, and the certificate verification request information includes a comparison value and a verification value ciphertext.
  • the digital certificate application device receives the digital certificate management verification request message, and sends a digital certificate management verification response message to the digital certificate issuing device by using the secure data channel, where the digital certificate management verification response message is sent by the data communication. Key encryption processing.
  • the digital certificate management verification request message is encrypted by the data communication key.
  • the digital certificate issuing device receives the digital certificate management verification response message, and sends a digital certificate management response message to the digital certificate requesting device by using the secure data channel, where the digital certificate management response message passes the data communication key. Encryption processing.
  • the digital certificate issuing device in step S303 Generate a digital certificate management verification request message, including:
  • the digital certificate issuing device generates a verification value, and the verification value is generated by the public key encryption process of the digital certificate application device to generate the verification value ciphertext, and the verification value is calculated to generate the comparison value, and the verification value is used.
  • the verification value ciphertext and the comparison value generate the digital certificate management verification request message.
  • Step S304 specifically includes:
  • the digital certificate application device After receiving the digital certificate management verification request message, the digital certificate application device first decrypts the digital certificate management verification request message by using the data communication key, and obtains the verification value ciphertext and And comparing, by using the private key of the digital certificate application device, the verification value ciphertext to obtain the verification value, and calculating the verification value to generate a new comparison value, and determining the calculated generated Whether the new comparison value is consistent with the received comparison value, and if it is determined that the digital certificate application device can verify that the public private key belongs, the digital certificate management verification response message is generated and used by using the verification value.
  • the data channel transmits the digital certificate management verification response message to the digital certificate issuing device.
  • Step S305 is specifically:
  • the digital certificate issuing device After receiving the digital certificate management verification response message, the digital certificate issuing device first decrypts the digital certificate management verification response message by using the data communication key, and obtains the verification value, and compares the Whether the verification value is consistent with the verification value generated by the digital certificate issuing device before the digital certificate management verification request message is sent. If the verification is consistent, the digital certificate issuing device may determine that the public and private key belongs to the digital certificate application device. And generating the digital certificate management response message and transmitting the digital certificate management response message to the digital certificate requesting device through a secure data channel.
  • the digital certificate management digital certificate carried by the digital certificate management request message is used for a key exchange function (ie, a public-private key definition key exchange conversion), at this time, the number in step S303
  • the certificate issuing device generates a digital certificate management verification request message, which specifically includes:
  • the digital certificate issuing device generates a shared key after being exchanged with the digital certificate requesting device.
  • the digital certificate issuing device generates a verification value, and the verification value is generated by the shared key encryption process. Verifying the value ciphertext, the verification value is calculated to generate the comparison value, and the digital certificate management verification request message is generated by using the verification value ciphertext and the comparison value.
  • the manner in which the digital certificate requesting device and the digital certificate issuing device perform key exchange is not limited, and the public and private keys of the digital certificate applying device participate in the key exchange.
  • Step S304 is specifically:
  • the digital certificate application device After receiving the digital certificate management verification request message, the digital certificate application device first decrypts the digital certificate management verification request message by using the data communication key, and obtains the verification value ciphertext and And the comparison value, the digital certificate application device and the digital certificate issuing device exchange a key to generate a shared key, and use the shared key to decrypt the verification value ciphertext to obtain the verification value, The verification value is calculated to generate a new comparison value, and it is determined whether the new comparison value is consistent with the received comparison value. If it is consistent, it can be determined that the digital certificate application device can verify that the public private key belongs, and then the verification value is generated. The digital certificate management verification response message and transmitting the digital certificate management verification response message to the digital certificate issuing device.
  • Step S305 is specifically:
  • the digital certificate issuing device After receiving the digital certificate management verification response message, the digital certificate issuing device first decrypts the digital certificate management verification response message by using the data communication key, and obtains the verification value, and compares the Whether the verification value is consistent with the verification value generated by the digital certificate issuing device before the digital certificate management verification request message is sent. If the verification is consistent, the digital certificate issuing device may determine that the public and private key belongs to the digital certificate application device. And generating the digital certificate management response message and transmitting the digital certificate management response message to the digital certificate requesting device.
  • S301 to S302 are executed with reference to S201 to S202, and S306 to S307 are executed with reference to S204 to S205, and details are not described herein again.
  • the verification value may be a random number or other value, and the calculation manner of the verification value to calculate the comparison value is not limited, and may be a hash calculation or a cyclic redundancy check (CRC).
  • CRC cyclic redundancy check
  • FIG. 4 is a flowchart of a digital certificate management method according to another embodiment of the present invention. As shown in FIG. 4, the following steps may be included:
  • the digital certificate application device obtains an authorization code.
  • the digital certificate application device requests an authorization code for downloading the digital certificate from the digital certificate issuing device, and acquires an authorization code sent by the digital certificate issuing device.
  • the digital certificate application device uses the obtained authorization code to negotiate with the digital certificate issuing device to establish a secure data channel, and generate a security key.
  • a secure data channel can be established between the digital certificate application device and the digital certificate issuing device.
  • the digital certificate requesting device uses the authorization code to generate a security key for secure data channel data transmission.
  • the present invention does not limit the manner in which the secure channel is established, as long as the shared security key for data transmission can be generated using the authorization code.
  • the secure data channel can be established as follows:
  • the digital certificate application device and the digital certificate issuing device perform secure data channel negotiation.
  • S402B The digital certificate application device and the digital certificate issuing device use the authorization code and the random number and identity information obtained during the negotiation process to generate a security key of the secure channel.
  • the security key may include a data communication key, and may further include a data session key.
  • the data communication key is used by the data certificate application device and the digital certificate issuing device to encrypt and transmit the message when the secure data channel interacts with the message.
  • the data session key is used to encrypt the certificate request data and/or the certificate response data carried by the message before transmitting the message.
  • S402C The digital certificate application device and the digital certificate issuing device verify the secure channel confirmation message by using an integrity check code.
  • the digital certificate requesting device and the digital certificate issuing device perform the secure data channel negotiation, where the digital certificate applying device sends the first random number, the first identity information, and the digital certificate issuing device to the digital certificate issuing device.
  • the first random number is randomly generated by the digital certificate application device, and the first identity information may be an identifier of the digital certificate application device, such as an IP address, a MAC address, an email address, a full domain name string, or International Mobile Subscriber Identity (IMSI), etc.
  • IMSI International Mobile Subscriber Identity
  • the second random number is randomly generated by the digital certificate issuing device, and the second identity information may specifically be an identifier of the digital certificate issuing device, such as an IP address, a MAC address, an email address, a full domain name string, or an international mobile User Identification Number (IMSI), etc.
  • the process of the interaction between the digital certificate application device and the digital certificate issuance device may be initiated by the digital certificate application device or may be initiated by the digital certificate issuance device.
  • the present invention does not limit the specific interaction mode.
  • the digital certificate requesting device and the digital certificate issuing device use the authorization code and the random number and the identity information obtained during the negotiation process to generate a security key of the secure channel, including: the digital certificate requesting device and the digital certificate issuance
  • the device generates a security key by using an authorization code, the first random number, the first identity information, the second random number, and the second identity information.
  • the security key may include one or more sets of keys.
  • the security key may include a data communication key for data transmission, may also include an integrity check key for integrity verification, and may also include a data session for encrypting certificate request data and/or certificate response data. Key.
  • the security key further includes an integrity check key
  • the digital certificate requesting device and the digital certificate issuing device perform key confirmation of the secure channel by using an integrity check code, including: the digital certificate
  • the application device and the digital certificate issuing device generate an integrity check code by using the random number, the integrity check key, and verify the secure channel acknowledgement message by using the integrity check code.
  • the digital certificate application device sends the digital certificate management request message to the digital certificate issuing device by using the secure data channel.
  • the digital certificate application device sends a certificate management request message to the digital certificate issuing device after the security data channel is kept secret. If the digital certificate application device does not have a digital certificate issued by the digital certificate issuing device, the certificate management request message carries the certificate information that needs to be included in the applied new digital certificate. If the digital certificate application device already contains the digital certificate issued by the digital certificate issuing device, the digital certificate management request message sent by the digital certificate application device carries the information of the existing digital certificate, and is used for the digital certificate issuing device to perform the certificate query and Update.
  • the digital certificate management request message may include digital certificate application information, digital certificate acquisition information, digital certificate revocation information, digital certificate revocation list information, and the like.
  • the digital certificate application information, the digital certificate acquisition information, the digital certificate revocation information or the digital certificate revocation list information may be adopted but not limited to the form shown in Table 1.
  • the information type value of the digital certificate management request message is 2
  • the information is specifically a certificate application information, and is used to apply for a new digital certificate.
  • the information type value of the digital certificate management request message is 4
  • the information is specifically the certificate obtaining information, which is used to query or update the existing digital certificate.
  • the information type value of the digital certificate management request message is 5
  • the information is specifically certificate revocation information, and is used to revoke the existing digital certificate.
  • the information type value of the digital certificate management request message is 6
  • the information is specifically certificate revocation list information, and is used to request a certificate revocation list.
  • the field format of the certificate application information may be, but not limited to, the form shown in Table 2.
  • the field format of the certificate obtaining information may be, but not limited to, the form shown in Table 3.
  • the field format of the certificate revocation information may be, but not limited to, the form shown in Table 4.
  • the field format of the certificate revocation list information may be, but not limited to, the form shown in Table 5.
  • the present invention does not limit the certificate request data carried in the certificate application information.
  • the certificate request data carried by the digital certificate management request message includes certificate request information, a signature algorithm identifier, and a signature value.
  • the certificate request information may include: a version, a holder name, a holder public key information, and an extension. These information elements are concise and can meet the basic requirements for issuing certificates.
  • the signature value is a value obtained by using the signature algorithm to identify the corresponding signature algorithm and using the private key to calculate the certificate request information after the digital certificate application device locally generates the public-private key pair.
  • the digital certificate issuing device verifies the signature according to the holder public key information in the certificate request information, and then determines whether the public private key belongs to the digital certificate application device.
  • the signature algorithm identifier and signature value can be used to verify whether the public or private key belongs to the entity.
  • the certificate request information in the certificate request data may further include more complete information: a serial number, an issuer name, and an expiration date.
  • This information can extend the certificate issuance function, such as the specific information that the digital certificate applicant requires to limit the certificate.
  • the certificate request data may be subjected to an encryption process.
  • the certificate request data is a digital certificate requesting device, after the secure data channel is established, using the generated data session key to the certificate request information and the signature algorithm. The identification and the data obtained after the signature value is encrypted.
  • the certificate request data should further include an encryption algorithm identifier, and accordingly, the certificate
  • the request data specifically includes an encryption algorithm identifier, and the encryption algorithm is used to identify a corresponding encryption algorithm, and the data obtained by encrypting the certificate request information, the signature algorithm identifier, and the signature value by using the data session key .
  • the certificate request data structure elements are more complete and more versatile, and the certificate request data is kept secret while verifying the entity to which the public and private keys belong.
  • the use of such a certificate request data structure can achieve two times of confidential protection of the certificate request data, thereby further improving the security of data transmission.
  • the digital certificate application device receives the digital certificate verification request message sent by the digital certificate issuing device by using the secure data channel.
  • the digital certificate management verification request message is encrypted by the data communication key.
  • the digital certificate issuing device if the digital certificate issuing device needs to determine whether the public or private key belongs to the digital certificate application device, the digital certificate issuing device sends the digital certificate management verification request message to the digital certificate applying device after the security data channel is kept secret.
  • the digital certificate management verification request message carries certificate verification request information, and is used to verify that the public and private keys of the digital certificate application device belong.
  • the digital certificate management verification request message may take the form shown in Table 6, but is not limited thereto.
  • the field format of the certificate verification request information may be, but not limited to, the form shown in Table 7.
  • the certificate verification request information carried by the digital certificate management verification request message further includes an algorithm identifier, a temporary public key, and the like.
  • the digital certificate issuing device determines whether the public-private key belongs to the verification according to the purpose of the digital certificate.
  • the digital certificate issuing device performs verification of the public-private key. Specifically, the digital certificate issuing device generates a verification value, and calculates the verification value to generate a comparison value.
  • the verification value is encrypted using a different key depending on the purpose of the certificate. If the certificate is used for encryption, the digital certificate is used to apply for the device's public key to encrypt the verification value to generate a verification value ciphertext; if the certificate is used for key exchange, the digital certificate issuance device and the digital certificate application device perform key exchange. A shared key that uses this shared key to encrypt the authentication value to generate a verification value ciphertext.
  • the digital certificate issuing device carries the comparison value and the verification value ciphertext in a digital certificate management verification request message.
  • the digital certificate application device sends a digital certificate management verification response message to the digital certificate issuing device, where the digital certificate management verification response message is encrypted by the data communication key.
  • the digital certificate application device processes the received digital certificate management verification request message and generates a post digital certificate management verification response message.
  • the digital certificate requesting device when the digital certificate management request message carries a data certificate to manage the digital certificate for use in an encryption function (ie, a private key definition decryption transformation), the digital certificate requesting device receives the After the digital certificate management verification request message, the digital certificate management verification request message is decrypted by using the data communication key to obtain the verification value ciphertext and the comparison value, and the digital certificate application device is used.
  • the private key decrypts the verification value ciphertext to obtain a verification value, and calculates the verification value to generate a new comparison value, and determines whether the new comparison value generated by the calculation is consistent with the received comparison value. If it is consistent, it may be determined that the digital certificate requesting device is capable of verifying that the public and private keys belong, and the digital certificate management verification response message is generated using the verification value.
  • the digital certificate application device when the digital certificate management digital message carried by the digital certificate management request message is used for a key exchange function (ie, a public-private key definition key exchange conversion), the digital certificate application device is After receiving the digital certificate management verification request message, first performing decryption processing on the digital certificate management verification request message by using the data communication key to obtain the verification value ciphertext and the comparison value, the digital certificate After the application device exchanges the key certificate with the digital certificate issuing device, a shared key is generated, and the verification value is decrypted by using the shared key to obtain the verification value, and the verification value is calculated to generate a new one.
  • the comparison value is used to determine whether the new comparison value is consistent with the received comparison value. If it is consistent, it may be determined that the digital certificate application device can verify that the public private key belongs, and the digital certificate management verification response message is generated by using the verification value.
  • the digital certificate application device sends a certificate management verification response message to the digital certificate issuing device after the security data channel is kept secret.
  • the digital certificate management verification response message includes certificate verification response information.
  • the digital certificate management verification response message may take the form shown in Table 8, but is not limited thereto.
  • the field format of the certificate verification response information may be, but not limited to, the form shown in Table 9.
  • the digital certificate application device receives the digital certificate management response message sent by the digital certificate issuing device by using the secure data channel.
  • the digital certificate management response message is encrypted by the data communication key.
  • the digital certificate application device determines the digital certificate to be used according to the requirements.
  • the digital certificate issuing device sends a certificate management response message to the digital certificate application device after being secured by the secure data channel.
  • the digital certificate management response message includes a new digital certificate generated by the digital certificate issuing device according to the certificate request data included in the digital certificate requesting information.
  • the digital certificate management response message carries the queried or updated digital certificate.
  • the digital certificate issuing device judges the processing according to the information type in the digital certificate management request message. If the digital certificate application information is received, and the certificate information to be protected is determined to exist, a new digital certificate is issued according to the certificate request data; if the existing digital certificate information included in the certificate obtaining information exists, the query is based on the issuing device name and the serial number. Some digital certificates; if the certificate revocation information contains the issuing device name and serial number, the existing digital certificate is revoked according to the issuing device name and serial number; if the certificate revocation list exists, the certificate revocation list is queried according to the issuing device name. .
  • the digital certificate issuing device carries the above certificate in the digital certificate management response message.
  • the digital certificate management response message may take the form shown in Table 10, but is not limited thereto.
  • the format of the certificate response information may be, but is not limited to, the form shown in Table 11.
  • the certificate generation type can be as shown in Table 12, and the certificate types corresponding to different certificate owners are listed.
  • Type value meaning 1 Client certificate 2 AS certificate 3 CA certificate 4 Certificate revocation list
  • the AS certificate is an authentication server certificate
  • the CA certificate is an authorization center certificate
  • the digital certificate management response message is encrypted.
  • the generated data communication key is used for encryption processing, thereby improving the security of message transmission.
  • the digital certificate management response message may be processed once by encryption or may be processed by secondary encryption.
  • the digital certificate management request message is encrypted before using the set of keys in the security key, such as the data session key
  • the certificate request data contained in the digital certificate management request message is encrypted, in the security data.
  • the second encryption process is performed by the data communication key when the channel is transmitted.
  • the digital certificate management response message may also perform a second encryption process on the included certificate response data by using the data session key and the data communication key.
  • the certificate response data should further include an encryption algorithm identifier, and correspondingly, the certificate response data specifically includes an encryption algorithm identifier. And using the encryption algorithm to identify a corresponding encryption algorithm, and using the data session key to encrypt the certificate response data.
  • the digital certificate application device sends a digital certificate management confirmation message to the digital certificate issuing device by using the secure data channel, where the digital certificate management confirmation message is encrypted by the data communication key.
  • a secure and reliable data transmission channel is established through the foregoing S401, S402 messages, and the three messages of S403, S406, and S407 are used to realize automatic application, query, and update of the digital certificate, and the S404 and S405 are adopted.
  • the interaction between the digital certificate verification request message and the digital certificate management verification response message implements verification of the entity public private key, making digital certificate management more efficient, secure, and reliable.
  • FIG. 6 it is a schematic diagram of message content in the automatic application, query, update and issuance method of the digital certificate.
  • the digital certificate management request message may specifically include digital certificate application information, digital certificate acquisition information, digital certificate revocation information, and digital certificate revocation list information.
  • the digital certificate management response message may include digital certificate response information and the like.
  • the digital certificate management confirmation message can be used to disconnect the digital certificate requesting device and the digital certificate issuing device.
  • the digital certificate management verification request message may include digital certificate verification request information and the like.
  • the digital certificate management verification response message may include digital certificate verification response information and the like.
  • the digital certificate management method provided by the present invention is described above from the digital certificate application device side. It will be understood by those skilled in the art that the method provided by the present invention can also be applied to the digital certificate issuing device side, and the processing therein can be performed corresponding to the examples shown in FIGS. 2 to 6. For example, the method may be further applied to: the digital certificate issuing device uses the authorization code to establish a secure data channel with the digital certificate application device to generate a security key, where the security key includes the data communication key.
  • the digital certificate issuing device negotiates with the digital certificate requesting device to establish a secure data channel by using the authorization code
  • the generating the security key includes: the digital certificate issuing device and the digital certificate applying device perform a secure data channel negotiation; The digital certificate issuing device and the digital certificate applying device use authorization code and the random number and the identity information obtained in the negotiation process to generate a security key of the secure channel; the digital certificate issuing device and the digital certificate applying device pass the integrity check code pair A secure channel confirmation message is verified.
  • the digital certificate issuing device performs secure data channel negotiation with the digital certificate requesting device, where the digital certificate issuing device sends the second random number, the second identity information, and the receiving device to the digital certificate applying device.
  • the first random number and the first identity information sent by the digital certificate application device are secure data channel negotiation with the digital certificate requesting device, where the digital certificate issuing device sends the second random number, the second identity information, and the receiving device to the digital certificate applying device. The first random number and the first identity information sent by the digital certificate application device.
  • the digital certificate issuing device and the digital certificate requesting device use the authorization code and the random number and the identity information obtained during the negotiation process to generate a security key of the secure channel, including: the digital certificate issuing device utilizes an authorization code, The first random number, the first identity information, the second random number, and the second identity information generate a security key.
  • FIG. 7 is a schematic diagram of a digital certificate application device according to an embodiment of the present invention.
  • a digital certificate application device 700 includes:
  • the secure data channel establishing unit 701 is configured to establish a secure data channel by using the obtained authorization code to negotiate with the digital certificate issuing device to generate a security key, where the security key includes a data communication key.
  • the sending unit 702 is configured to send, by using the secure data channel, a digital certificate management request message to the digital certificate issuing device, where the digital certificate management request message is encrypted by the data communication key; and is further used to utilize the security Transmitting, by the data channel, the digital certificate management verification response message to the digital certificate issuing device, the digital certificate management verification response message is encrypted by the data communication key; and is further configured to use the secure data channel to the digital
  • the certificate issuing device transmits the digital certificate management confirmation message, and the digital certificate management confirmation message is encrypted by the data communication key.
  • the encryption unit 703 is configured to perform encryption processing on the certificate management request message by using the data communication key, and is further configured to perform encryption processing on the digital certificate management verification response message by using the data communication key;
  • the digital certificate management confirmation message is encrypted using the data communication key.
  • the receiving unit 704 is configured to receive, by using the secure data channel, a digital certificate management verification request message sent by the digital certificate issuing device, where the digital certificate management verification request message is encrypted by the data communication key;
  • the secure data channel receives a digital certificate management response message sent by the digital certificate issuing device, and the digital certificate management response message is encrypted by the data communication key.
  • the processing unit 705 is configured to process the received digital certificate management verification request message and generate a digital certificate management verification response message, and is further configured to process the received digital certificate management response message and generate a digital certificate management confirmation message.
  • the encryption unit 703 is specifically configured to perform encryption processing on the digital certificate management verification response message by using a data communication key of the secure data channel.
  • the digital certificate management verification request message received by the receiving unit 704 includes certificate verification request information, where the certificate verification request information includes a comparison value and a verification value ciphertext.
  • the processing unit 705 when the data certificate management digital certificate carried by the digital certificate management request message is used for the encryption function, the processing unit 705 is specifically configured to:
  • the digital certificate management verification request message After receiving the digital certificate management verification request message, first performing decryption processing on the digital certificate management verification request message by using the data communication key, obtaining the verification value ciphertext and the comparison value, using the Decrypting the verification value ciphertext by the private key of the digital certificate application device to obtain a verification value, calculating the verification value to generate a new comparison value, and determining to calculate the generated new comparison value and the received Whether the comparison values are consistent. If they are consistent, it may be determined that the digital certificate application device is capable of verifying that the public and private keys belong, and the digital certificate management verification response message is generated by using the verification value;
  • the digital certificate management verification response message includes certificate verification response information.
  • the processing unit 705 when the data request management digital certificate carried by the certificate management request message is used for the key exchange function, the processing unit 705 is specifically configured to:
  • the certificate application device After receiving the digital certificate management verification request message, first performing decryption processing on the digital certificate management verification request message by using the data communication key to obtain the verification value ciphertext and the comparison value, the number After the certificate application device exchanges the key with the digital certificate issuing device, a shared key is generated, and the verification value is decrypted by using the shared key to obtain the verification value, and the verification value is calculated to generate a new value. a comparison value, determining whether the new comparison value is consistent with the received comparison value, and if it is consistent, determining that the digital certificate application device is capable of verifying that the public private key belongs, generating the digital certificate management verification response message by using the verification value .
  • the certificate request data carried by the digital certificate management request message sent by the sending unit 702 includes certificate request information, a signature algorithm identifier, and a signature value, where the certificate request information includes a version, a holder name, and The holder public key information and extension, the encryption unit 703 is specifically configured to: encrypt the digital certificate management request message by using a data communication key of the secure data channel.
  • the encryption unit 703 is further configured to: when the security key further includes a data session key, encrypt the digital certificate management request message through the data communication key of the secure data channel. Previously, the certificate request data carried by the digital certificate management request message is encrypted by using the data session key.
  • the certificate request information further includes a serial number, an issuer name, and an expiration date.
  • the certificate request data sent by the sending unit 702 further includes an encryption algorithm identifier, specifically including an encryption algorithm identifier, and using the encryption algorithm. Identifying the corresponding encryption algorithm, and the data obtained by encrypting the certificate request information, the signature algorithm identifier, and the signature value by using the data session key; correspondingly, the encryption unit 703 is further configured to: And using the encryption algorithm to identify a corresponding encryption algorithm, and using the data session key to perform encryption processing on the certificate request information, the signature algorithm identifier, and the signature value.
  • the sending unit 702 includes: a first sending unit, configured to send, by using the secure data channel, digital certificate request information to the digital certificate issuing device for applying for a new digital certificate, the digital certificate application The information includes a certificate generation manner and certificate request data; and/or a second sending unit, configured to send, by using the secure data channel, digital certificate acquisition information to the digital certificate issuing device for querying or updating an existing digital certificate.
  • the digital certificate obtaining information includes an issuing device name and a serial number field; and/or a third sending unit configured to send the digital certificate revocation information to the digital certificate issuing device by using the secure data channel for applying for revoking an existing number a certificate, the digital certificate revocation information includes an issue device name, a serial number, and a revocation cause field; and/or a fourth sending unit, configured to send the digital certificate revocation list information to the digital certificate issuing device by using the secure data channel For requesting a digital certificate revocation list, the digital certificate revocation list Information including the issuance of the Device Name field.
  • the secure data channel establishing unit 701 includes: a negotiating unit configured to perform secure data channel negotiation with the digital certificate issuing device; a key generating unit configured to use the authorization code and the negotiation process with the digital certificate issuing device The random number obtained by the medium and the identity information generate a security key of the secure channel; the key confirmation unit is configured to verify the secure channel confirmation message with the digital certificate issuing device by using the integrity check code.
  • the negotiating unit is specifically configured to: send a first random number, first identity information, and receive a second random number and a second identity information sent by the digital certificate issuing device to the digital certificate issuing device.
  • the key generation unit is specifically configured to: the digital certificate application device and the digital certificate issuing device use an authorization code, the first random number, the first identity information, the second random number, and the first The second identity information generates a security key.
  • the security key generated by the key generation unit further includes an integrity check key, where the key confirmation unit is specifically configured to: use the random number by the digital certificate application device and the digital certificate issuing device
  • the integrity check key generates an integrity check code, and the secure channel acknowledgement message is verified by using the integrity check code.
  • each unit or module of the device of the present invention can be implemented by referring to the methods shown in FIG. 2 to FIG. 6 , and details are not described herein.
  • the digital certificate management device may be a stand-alone device, may be integrated with the digital certificate issuing device, or exist as a part of the digital certificate issuing device, and is not limited herein.
  • FIG. 8 a block diagram of an apparatus for digital certificate application according to another embodiment of the present invention is shown. Including: at least one processor 801 (eg, a CPU), a memory 802, and at least one communication bus 803 for enabling connection communication between these devices.
  • the processor 801 is configured to execute executable modules, such as computer programs, stored in the memory 802.
  • the memory 802 may include a high speed random access memory (RAM), and may also include a non-volatile memory such as at least one disk memory.
  • One or more programs are stored in the memory and configured to execute, by the one or more processors 801, instructions included in the one or more programs to: negotiate with the digital certificate issuing device using the obtained authorization code Establishing a secure data channel, generating a security key; wherein the security key includes at least a data communication key; generating a digital certificate management request message; and encrypting the digital certificate management request message by using the data communication key; Transmitting, by the secure data channel, a digital certificate management request message to the digital certificate issuing device, the digital certificate management request message being encrypted by the data communication key; receiving the digital certificate issuing device by using the secure data channel Transmitting a digital certificate management verification request message, the digital certificate management verification request message is encrypted by the data communication key; processing the digital certificate management verification request message, and generating a digital certificate management verification response message; using the data Communication key pair
  • the digital certificate management verification response message is encrypted; the digital certificate management verification response message is sent to the digital certificate issuing device by using the secure data channel, and the digital certificate management verification response message is encrypted
  • the processor 801 is specifically configured to execute the one or more programs including instructions for: transmitting, by using the secure data channel, digital certificate request information to the digital certificate issuing device for application A new digital certificate, the digital certificate application information including a certificate generation method and certificate request data.
  • the processor 801 is specifically configured to execute the one or more programs including instructions for: transmitting, by using the secure data channel, digital certificate acquisition information to the digital certificate issuing device for querying Or updating an existing digital certificate, the digital certificate obtaining information including an issuing device name and a serial number field.
  • the processor 801 is specifically configured to execute the one or more programs including instructions for transmitting digital certificate revocation information to the digital certificate issuing device for requesting by using the secure data channel.
  • the existing digital certificate is revoked, and the digital certificate revocation information includes an issue device name, a serial number, and a revocation cause field.
  • the processor 801 is specifically configured to execute the one or more programs including instructions for: transmitting, by using the secure data channel, digital certificate revocation list information to the digital certificate issuing device for A digital certificate revocation list is requested, the digital certificate revocation list information including an issue device name field.
  • the processor 801 is specifically configured to execute the one or more programs including instructions for: performing secure data channel negotiation with a digital certificate issuing device; using an authorization code with a digital certificate issuing device and negotiating The random number and identity information obtained in the process generate a security key of the secure channel; and the digital certificate issuing device verifies the secure channel confirmation message by using the integrity check code.
  • the processor 801 is specifically configured to execute the one or more programs including instructions for: transmitting a first random number, first identity information to a digital certificate issuing device, and receiving the a second random number sent by the digital certificate issuing device, second identity information; and a digital certificate issuing device utilizing an authorization code, the first random number, the first identity information, the second random number, and the second The identity information generates a security key.
  • the processor 801 is specifically configured to execute the one or more programs including instructions for: generating a integrity check with the digital certificate issuing device using the random number, the integrity check key The code verification uses the integrity check code to verify the secure channel acknowledgement message.
  • FIG. 9 is a schematic diagram of a digital certificate issuing device according to an embodiment of the present invention.
  • a digital certificate issuing device 900 includes:
  • the secure data channel establishing unit 901 is configured to establish a secure data channel by using an authorization code to negotiate with the digital certificate applying device to generate a security key, where the security key includes a data communication key.
  • the receiving unit 902 is configured to receive a digital certificate management request message sent by the digital certificate requesting device by using the secure data channel, where the digital certificate management request message is encrypted by the data communication key, and is further configured to receive the
  • the digital certificate application device uses the digital certificate management verification response message sent by the secure data channel, the digital certificate management verification response message is encrypted by the data communication key; and is further configured to receive the digital certificate application device by using the A digital certificate management confirmation message sent by the secure data channel, the digital certificate management confirmation message being encrypted by the data communication key.
  • the processing unit 903 is configured to process the received digital certificate management request message, and generate a digital certificate management verification request message.
  • the method is further configured to process the received digital certificate management verification response message, and generate a digital certificate management response message. Also used to process the received digital certificate management confirmation message.
  • the encryption unit 904 is configured to perform encryption processing on the digital certificate management verification request message by using the data communication key, and is further configured to perform encryption processing on the digital certificate management response message by using the data communication key; 905.
  • the digital certificate management verification request message is sent to the digital certificate requesting device by using the secure data channel, where the digital certificate management verification request message is encrypted by the data communication key;
  • the secure data channel sends the digital certificate management response message to the digital certificate requesting device, and the digital certificate management response message is encrypted by the data communication key.
  • the digital certificate management response message sent by the sending unit 905 carries certificate response data;
  • the encryption unit 904 is specifically configured to: use the data communication key of the secure data channel to pair the digital certificate The management response message is subjected to an encryption process; wherein the certificate request data carried by the digital certificate management request message received by the receiving unit 902 includes certificate request information, a signature algorithm identifier, and a signature value, where the certificate request information includes a version and a hold Name, holder public key information and extension.
  • the encryption unit 904 is further configured to: when the security key further includes a data session key, encrypt the digital certificate management response message through a data communication key of the secure data channel
  • the certificate response data carried in the digital certificate management response message is encrypted by the data session key.
  • the certificate request information further includes a serial number, an issuer name, and an expiration date.
  • the certificate response data sent by the sending unit 905 further includes an encryption algorithm identifier, specifically including an encryption algorithm identifier, and a utilization
  • the encryption algorithm identifies the corresponding encryption algorithm, and the data obtained by encrypting the certificate response data by using the data session key; correspondingly, the encryption unit 904 is further configured to: use the encryption algorithm to identify the corresponding And an encryption algorithm that performs encryption processing on the certificate response data by using the data session key.
  • the secure data channel establishing unit 901 includes: a negotiating unit, configured to perform secure data channel negotiation with the digital certificate requesting device; and a key generating unit, configured to use the authorization code and the negotiation process with the digital certificate requesting device.
  • the obtained random number and the identity information generate a security key of the secure channel;
  • the key confirmation unit is configured to verify the secure channel confirmation message with the digital certificate requesting device by using the integrity check code.
  • the negotiating unit is specifically configured to: send the second random number, the second identity information to the digital certificate requesting device, and receive the first random number and the first identity information sent by the digital certificate applying device.
  • the key generating unit is configured to: generate a security key by using an authorization code, the first random number, the first identity information, the second random number, and the second identity information.
  • the security key generated by the key generation unit further includes an integrity check key, where the key confirmation unit is specifically configured to: utilize a random number with the digital certificate application device, and the integrity check The verification key generates an integrity check code, and the security channel confirmation message is verified by using the integrity check code.
  • FIG. 10 it is a block diagram of an apparatus for digital certificate issuance according to another embodiment of the present invention.
  • the method includes: at least one processor 1001 (eg, a CPU), a memory 1002, and at least one communication bus 1003 for implementing connection communication between the devices.
  • the processor 1001 is configured to execute an executable module, such as a computer program, stored in the memory 1002.
  • the memory 1002 may include a high speed random access memory (RAM), and may also include a non-volatile memory such as at least one disk memory.
  • One or more programs are stored in the memory and configured to execute, by the one or more processors 1001, instructions included in the one or more programs for performing the following operations: establishing an agreement with the digital certificate requesting device using the authorization code to establish security a data channel, the security key is generated; wherein the security key includes a data communication key; and the digital certificate management request message sent by the digital certificate application device is received by using the secure data channel, where the digital certificate management request message is The data communication key encryption process; processing the digital certificate management request message, and generating a digital certificate management verification request message; encrypting the digital certificate management verification request message by using the data communication key; And transmitting, by the secure data channel, the digital certificate management verification request message to the digital certificate requesting device, where the digital certificate management verification request message is encrypted by the data communication key; and receiving the digital certificate application by using the secure data channel Digital certificate sent by the device a book management verification response message, the digital certificate management verification response message being encrypted by the data communication key; processing the digital certificate management verification response message, and generating a digital certificate management response
  • the processor 1001 is specifically configured to execute the one or more programs including instructions for: performing secure data channel negotiation with a digital certificate requesting device; using a digital certificate requesting device with an authorization code and negotiating The random number obtained by the process and the identity information generate a security key of the secure channel; and the digital certificate requesting device verifies the secure channel confirmation message by using the integrity check code.
  • the processor 1001 is specifically configured to execute the one or more programs including instructions for: transmitting a second random number, second identity information to the digital certificate requesting device, and receiving the The first random number and the first identity information sent by the digital certificate application device.
  • the processor 1001 is specifically configured to execute the one or more programs including instructions for: using an authorization code, the first random number, the first identity information, the first The second random number and the second identity information generate a security key.
  • the invention may be described in the general context of computer-executable instructions executed by a computer, such as a program module.
  • program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types.
  • the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are connected through a communication network.
  • program modules can be located in both local and remote computer storage media including storage devices.
  • the various embodiments in the specification are described in a progressive manner, and the same or similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments.
  • the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment.
  • the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment.

Abstract

本发明提供一种数字证书管理方法及设备,所述方法包括:数字证书申请设备与数字证书颁发设备协商建立安全数据通道;数字证书申请设备向数字证书颁发设备发送数字证书管理请求消息;数字证书颁发设备接收数字证书管理请求消息,向数字证书申请设备发送数字证书管理验证请求消息;数字证书申请设备接收数字证书管理验证请求消息,向数字证书颁发设备发送数字证书管理验证响应消息;数字证书颁发设备接收数字证书管理验证响应消息,向数字证书申请设备发送数字证书管理响应消息;数字证书申请设备接收数字证书管理响应消息,向数字证书颁发设备发送数字证书管理确认消息。本发明可以有效提高数字证书管理的安全性。

Description

数字证书管理方法及设备
本申请要求在2017年9月7日提交中国专利局、申请号为201710802333.X、发明名称为“数字证书管理方法及设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及网络安全技术领域,具体涉及一种数字证书管理方法及设备。
背景技术
随着网络安全技术的发展,如何确保网络信息传输的保密性、完整性成为一个重要的研究课题。数字证书是一种验证网络通信实体身份的方式,可以利用数字证书技术进行数据加密、身份验证等。数字证书一般是由数字证书颁发设备向数字证书申请设备签发的,可以用于识别数字证书申请设备的身份。
现有技术中,存在一种数字证书自动申请的方法,应用于无线局域网内数字证书的申请、更新和颁发。在这种方法中,数字证书申请设备可以通过无线局域网向数字证书颁发设备发送消息,通知其支持的数字证书产生方法,以便数字证书颁发设备生成新的数字证书。在这种方法中,数字证书申请设备和数字证书颁发设备之间传输的消息均是明文传输的,二者仅进行消息的完整性校验,以确定消息未被篡改。这种方式仅能保证数据的完整性,对数据的真实性、保密性无法进行有效的保护。特别地,当数字证书申请设备和数字证书颁发设备若通过其他网络形式交互数据时,由于消息是明文传输的,这种方式存在安全性不高的缺陷。
发明内容
本发明提供了一种数字证书管理方法及设备,可以在数字证书申请设备和数字证书颁发设备间建立数据传输的安全通道,并对二者传输的消息进行加密传输,有效提高了数字证书管理的安全性。
为此,本发明提供如下技术方案:
第一方面,本发明提供了一种数字证书管理方法,包括:数字证书申请设备利用获取的授权码与数字证书颁发设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥至少包括数据通信密钥;数字证书申请设备利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;数字证书颁发设备接收所述数字证书管理请求消息,利用所述安全数据通道向所述数字证书申请设备发送数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;数字证书申请设备接收所述数字证书管理验证请求消息,利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;数字证书颁发设备接收所述数字证书管理验证响应消息,利用所述安全数据通道向所述数字证书申请设备发送数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理;数字证书申请设备接收所述数字证书管理响应消息,利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理;数字证书颁发设备接收并处理所述数字证书管理确认消息。
第二方面,本发明提供了一种数字证书申请设备,包括:安全数据通道建立单元,用于利用获取的授权码与数字证书颁发设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥包括数据通信密钥;发送单元,用于利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;还用于利用所述安全数据通道向所述数字证书颁发设备发送所述数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;还用于利用所述安全数据通道向所述数字证书颁发设备发送所述数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理;加密单元,用于利用所述数据通信密钥对所述证书管理请求消息进行加密处理;还用于利用所述数据通信密钥对所述数字证书管理验证响应消息进行加密处理;还用于利用所述数据通信密钥对所述数字证书管理确认消息进行加密处理;接收单元,用于利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;还用于利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理;处理单元,用于处理接收到的所述数字证书管理验证请求消息并生成数字证书管理验证响应消息;还用于处理接收到的所述数字证书管理响应消息并生成数字证书管理确认消息。
第三方面,本发明提供了一种用于数字证书申请的设备,包括有存储器,以及一个或者一个以上的程序,其中一个或者一个以上程序存储于存储器中,且经配置由一个或者一个以上处理器执行所述一个 或者一个以上程序包含的用于进行以下操作的指令:利用获取的授权码与数字证书颁发设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥至少包括数据通信密钥;生成数字证书管理请求消息;利用所述数据通信密钥对所述数字证书管理请求消息进行加密处理;利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;处理所述数字证书管理验证请求消息,并生成数字证书管理验证响应消息;利用所述数据通信密钥对所述数字证书管理验证响应消息进行加密处理;利用所述安全数据通道向所述数字证书颁发设备发送所述数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理;处理所述数字证书管理响应消息,并生成数字证书管理确认消息;利用所述数据通信密钥对所述数字证书管理确认消息进行加密处理;利用所述安全数据通道向所述数字证书颁发设备发送所述数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理。
第四方面,本发明提供了一种数字证书颁发设备,所述设备包括:安全数据通道建立单元,用于利用授权码与数字证书申请设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥至少包括数据通信密钥;接收单元,用于接收所述数字证书申请设备利用所述安全数据通道发送的数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;还用于接收所述数字证书申请设备利用所述安全数据通道发送的数字证书管理验证响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理;还用于接收所述数字证书申请设备利用所述安全数据通道发送的数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理;处理单元,用于处理接收到的所述数字证书管理请求消息,并生成数字证书管理验证请求消息;还用于处理接收到的所述数字证书管理验证响应消息,并生成数字证书管理响应消息;还用于处理接收到的所述数字证书管理确认消息;加密单元,用于利用所述数据通信密钥对所述数字证书管理验证请求消息进行加密处理;还用于利用所述数据通信密钥对所述数字证书管理响应消息进行加密处理;发送单元,用于利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;还用于利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理。
第五方面,本发明提供了一种用于数字证书颁发的设备,包括有存储器,以及一个或者一个以上的程序,其中一个或者一个以上程序存储于存储器中,且经配置由一个或者一个以上处理器执行所述一个或者一个以上程序包含的用于进行以下操作的指令:利用授权码与数字证书申请设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥包括数据通信密钥;利用所述安全数据通道接收所述数字证书申请设备发送的数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;处理所述数字证书管理请求消息,并生成数字证书管理验证请求消息;利用所述数据通信密钥对所述数字证书管理验证请求消息进行加密处理;利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;利用所述安全数据通道接收所述数字证书申请设备发送的数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;处理所述数字证书管理验证响应消息,并生成数字证书管理响应消息;利用所述数据通信密钥对所述数字证书管理响应消息进行加密处理;利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理;利用所述安全数据通道接收所述数字证书申请设备发送的数字证书管理确认消息,并处理所述数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理。
本发明提供的数字证书管理方法及设备中,数字证书申请设备可以利用获取的授权码与数字证书颁发设备协商建立安全数据通道,生成安全密钥并在数字证书申请设备和数字证书颁发设备之间的消息交互过程中,利用生成的数据通信密钥对消息加密处理,有效提高了数据传输的安全性,并可以适用于多种不同类型场景下的数字证书自动申请、查询、更新、吊销和撤销列表获取等。同时,数字证书颁发设备利用公私钥所属的验证,检查数字证书申请设备是否拥有“与其公钥相对应的私钥”,从而能够检测出数字证书申请设备的公私钥是否被替换,是否错误等。数字证书颁发设备只能和拥有正确公私钥的数字证书申请设备交互消息,避免数字证书申请设备隐私数据的泄露,进一步保证数字证书管理过程的安全。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明中所记载的一些实施例,对 于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例可以应用的一个示意性应用场景;
图2为本发明一实施例提供的数字证书管理方法流程图;
图3为本发明另一实施例提供的数字证书管理方法流程图;
图4为本发明另一实施例提供的数字证书管理方法流程图;
图5为本发明实施例提供的安全数据通道协商和建立示意图;
图6为本发明一实施例提供的数字证书自动申请、查询、更新和颁发方法中的消息内容示意图;
图7是根据一示例性实施例示出的一种数字证书申请设备的框图;
图8是根据另一示例性实施例示出的一种用于数字证书申请的设备的框图;
图9是根据一示例性实施例示出的一种数字证书颁发设备的框图;
图10是根据另一示例性实施例示出的一种用于数字证书颁发的设备的框图。
具体实施方式
本发明实施例提供了一种数字证书管理方法及设备,可以在数字证书申请设备和数字证书颁发设备间建立数据传输的安全通道,并对二者传输的消息进行加密传输,有效提高了数字证书管理的安全性。
为了使本技术领域的人员更好地理解本发明中的技术方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本发明保护的范围。
参见图1,为本发明实施例的示例性应用场景。本发明实施例提供的方法和设备可以应用于如图1所示的场景,其中,数字证书申请设备和数字证书颁发设备可以通过网络实现连接,所述连接可以是任何形式的有线和/或无线连接(例如,WLAN、LAN、蜂窝、同轴电缆等)。以图1为例说明,数字证书申请设备包括但不限于:现有的、正在研发的或将来研发的智能手机、非智能手机、平板电脑、膝上型个人计算机、桌面型个人计算机、小型计算机、中型计算机、大型计算机等。数字证书申请设备可以通过各自适用的网络形式向数字证书颁发设备(例如授证中心CA服务器)申请下载、更新证书等。需要说明的是,本发明实施例可以应用到无线运营网络、航空、交通、电力、广电、金融、医疗、教育、工商等诸多行业。当然,上述应用场景仅是为了便于理解本发明而示出,本发明的实施方式在此方面不受任何限制。相反,本发明的实施方式可以应用于适用的任何场景。
下面将结合附图2至附图6对本发明示例性实施例示出的数字证书管理方法进行介绍。
参见图2,为本发明一实施例提供的数字证书管理方法流程图。如图2所示,可以包括:
S201,数字证书申请设备利用获取的授权码与数字证书颁发设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥包括数据通信密钥。
具体实现时,数字证书申请者可以向数字证书颁发者请求用于下载数字证书的授权码。数字证书申请者例如可以是数字证书申请设备,数字证书颁发者例如可以是数字证书颁发设备。本发明对具体的授权码请求方式不进行限定。例如,数字证书申请者可以通过短信、邮件、专用请求等方式向数字证书颁发者请求授权码。数字证书颁发者可以通过一定的方式将授权码发送给数字证书申请者。例如,数字证书颁发者可以通过短信、邮件、专用消息等方式向数字证书申请者发送授权码。一般地,授权码是数字证书颁发者自己生成的,可以是在数字证书申请者请求授权码时实时生成,也可以是预先生成待使用的,形式上可以是字母和/或数字和/或符号等的组合,具有一定的长度要求,授权码也具有一定的使用期限,超过使用期限,授权码则会失效。在使用过程中,数字证书颁发者分配给不同数字证书申请者的授权码是不同的。
具体实现时,数字证书申请设备可以利用获取的授权码与数字证书颁发设备协商建立安全数据通道,所述安全数据通道用于进行安全数据传输。在建立安全数据通道过程中,数字证书申请设备可以利用授权码生成安全密钥,所述安全密钥可以包括一个或多个密钥,所述一个或多个密钥包括数据通信密钥。所述安全密钥还可以包括数据会话密钥。所述数据通信密钥用于加密所述数字证书申请设备与所述数字证书颁发设备在安全数据通道中传输的消息。需要说明的是,在数字证书申请设备侧和数字证书颁发设备侧均会生成安全密钥,便于消息的加密与解密处理。所述数据会话密钥可以用于加密证书请求数据或证书响应数据。所述证书请求数据具体为数字证书管理请求消息携带的数据。所述证书响应数据具体为数字证书管理响应消息携带的数据。
S202,数字证书申请设备利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理。
在本发明中,数字证书管理请求消息经过加密处理。具体地,是使用S201中生成的数据通信密钥 进行加密处理的,由此有效提高了消息传输的安全性。需要说明的是,所述数字证书管理请求消息中包含的数据可以经一次加密处理,也可以经二次加密处理。例如,所述数字证书管理请求消息可以在安全数据通道传输时,利用所述数据通信密钥进行加密后才发送给数字证书颁发设备。又举例说明,所述数字证书管理请求消息在传输前,已经利用安全密钥中的一组密钥例如数据会话密钥对数字证书管理请求消息中携带的证书请求数据进行过加密处理,在安全数据通道传输时则进行了第二次加密处理。出于安全性的考虑,两次加密处理使用的安全密钥(即数据通信密钥和数据会话密钥)是不同的。数字证书请求设备与数字证书颁发设备可以预先约定加密次数、加密算法以及加密所使用的密钥种类(即数据通信密钥和数据会话密钥)。
S203,数字证书颁发设备接收所述数字证书管理请求消息,利用所述安全数据通道向数字证书申请设备发送数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理。
具体地,数字证书颁发设备在接收到所述数字证书管理请求消息后,首先利用生成的安全密钥对所述数字证书管理请求消息进行解密处理,并根据数字证书管理请求消息携带的数据进行处理,生成数字证书管理响应消息并向数字证书申请设备发送数字证书管理响应消息。
相应地,在本发明中,数字证书管理响应消息经过加密处理。具体地,是使用S201中生成的数据通信密钥进行加密处理的,由此有效提高了消息传输的安全性。需要说明的是,所述数字证书管理响应消息同样可以经一次加密处理,也可以经二次加密处理。例如,若S202中所述数字证书管理请求消息在传输前,已经利用安全密钥中的一组密钥例如数据会话密钥对数字证书管理请求消息中包含的数据进行过加密处理,在安全数据通道传输时又利用数据通信密钥进行了第二次加密处理。相应地,所述数字证书管理响应消息也可以利用所述数据会话密钥和所述数据通信密钥分别进行两次加密处理。数字证书请求设备与数字证书颁发设备可以预先约定加密次数、加密算法以及加密所使用的密钥种类(即数据通信密钥和数据会话密钥)。
S204,数字证书申请设备接收所述数字证书管理响应消息,利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理。
其中,所述数字证书管理响应消息是经所述数据通信密钥加密处理后的。
具体地,数字证书申请设备对所述数字证书管理响应消息进行处理,获取处理结果,并生成数字证书管理确认消息。
具体实现时,本发明对数字证书申请设备和数字证书颁发设备交互采用的消息及交互方式不作限定,只要能够实现上述信息交互实现数字证书的自动申请、查询、更新和颁发,均属于本发明的保护范围。在一些实施方式中,所述数字证书管理请求消息可以包括数字证书申请信息、数字证书获取信息、数字证书吊销信息、数字证书撤销列表信息等类型。所述数字证书管理响应消息包括数字证书响应信息。
具体实现时,数字证书申请设备对数字证书管理响应消息进行解密处理以及校验处理,获取消息内容,并根据需求确定使用的数字证书,进行数字证书的安装、更新等处理。
可以理解的是,在本发明具体实现时,数字证书管理请求消息携带有证书请求数据,所述数字证书管理响应消息携带有证书响应数据。根据是否对证书请求数据和/或证书响应数据进行加密处理,可以包括以下几种实现方式:
(1)证书请求数据和证书响应数据都是明文,数字证书管理请求消息和数字证书管理响应消息经安全通道的数据通信密钥加密,完成一次加密。
这时,所述数字证书管理请求消息经所述数据通信密钥加密处理包括:所述数字证书管理请求消息经所述安全数据通道的数据通信密钥加密处理;所述数字证书管理响应消息经所述数据通信密钥加密处理包括:所述数字证书管理响应消息经所述安全数据通道的数据通信密钥加密处理。
(2)当所述安全密钥还包括数据会话密钥时,证书请求数据使用数据会话密钥进行第一次加密处理,证书响应数据不加密,为明文。数字证书管理请求消息使用数据通信密钥进行第二次加密,数字证书管理响应消息使用数据通信密钥进行一次加密。
这时,所述数字证书管理请求消息经所述数据通信密钥加密处理包括:所述数字证书管理请求消息经所述安全数据通道的数据通信密钥加密处理之前,所述数字证书管理请求消息携带的证书请求数据经所述数据会话密钥加密处理。
这时,所述数字证书管理响应消息经所述数据通信密钥加密处理包括:所述数字证书管理响应消息经所述安全数据通道的数据通信密钥加密处理。
(3)当所述安全密钥还包括数据会话密钥时,证书请求数据使用数据会话密钥进行第一次加密处理,证书响应数据也使用数据会话密钥进行第一层加密处理。其中,证书响应数据和证书请求数据使用的会话密钥以及加密方式是对应的。数字证书管理请求消息和数字证书管理响应消息再分别使用数据通信密钥进行第二次加密。
这时,所述数字证书管理请求消息经所述数据通信密钥加密处理包括:所述数字证书管理请求消息经所述安全数据通道的数据通信密钥加密处理之前,所述数字证书管理请求消息携带的证书请求数据经所述数据会话密钥加密处理;
这时,所述数字证书管理响应消息经所述数据通信密钥加密处理包括:所述数字证书管理响应消息经所述安全数据通道的数据通信密钥加密处理之前,所述数字证书管理响应消息携带的证书响应数据经所述数据会话密钥加密处理。
具体实现时,数字证书管理确认消息经过加密处理。具体地,是使用S201中生成的数据通信密钥进行加密处理的,由此有效提高了消息传输的安全性。
S205,数字证书颁发设备接收并处理所述数字证书管理确认消息。
在本发明这一实施例中,数字证书申请设备可以利用获取的授权码与数字证书颁发设备协商建立安全数据通道,生成安全密钥,并在数字证书申请设备和数字证书颁发设备消息交互过程中,利用生成的安全密钥对消息加密处理,有效提高了数据传输的安全性,并可以适用于多种不同类型场景下的数字证书自动申请、查询、更新、吊销和撤销等。
在本发明中,数字证书申请设备和数字证书颁发设备交互消息的过程中,若发送消息后,在一定时间内未收到回应消息,需重传。
在另一实施例中,当数字证书申请设备发送的数字证书管理请求消息中携带的数字证书的用途是加密或密钥交换时,数字证书颁发设备需要判断公私钥是否为所述数字证书申请设备所属,数字证书颁发设备和数字证书申请设备之间需要交互数字证书管理验证请求消息和数字证书管理验证响应消息。具体地,参见图3,为本发明这一实施例提供的数字证书管理方法流程图。在这一实施例中,如图3所示,在S302之后,所述方法还可以包括:
S303,数字证书颁发设备接收所述数字证书管理请求消息,利用所述安全数据通道向所述数字证书申请设备发送数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理。
具体地,所述数字证书颁发设备在接收到所述数字证书管理请求消息后,首先利用所述数据通信密钥对所述数字证书管理请求消息进行解密处理,并根据所述数字证书管理请求消息携带的数据进行处理,然后生成数字证书管理验证请求消息。
所述数字证书管理验证请求消息包括证书验证请求信息,所述证书验证请求信息包括对比值和验证值密文。
S304,数字证书申请设备接收所述数字证书管理验证请求消息,利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理。
其中,所述数字证书管理验证请求消息是经所述数据通信密钥加密处理后的。
S305,数字证书颁发设备接收所述数字证书管理验证响应消息,利用所述安全数据通道向所述数字证书申请设备发送数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理。
在一些实施方式中,当所述数字证书管理请求消息携带的数据请求管理的数字证书的用途是用于加密功能时(即私钥定义解密变换)时,此时,步骤S303中数字证书颁发设备生成数字证书管理验证请求消息,具体包括:
S3031,所述数字证书颁发设备产生一个验证值,所述验证值经过所述数字证书申请设备的公钥加密处理生成所述验证值密文,所述验证值经过计算生成所述对比值,使用所述验证值密文和所述对比值生成所述数字证书管理验证请求消息。
步骤S304具体包括:
S3041,所述数字证书申请设备在接收到所述数字证书管理验证请求消息后,首先利用所述数据通信密钥对所述数字证书管理验证请求消息进行解密处理,获得所述验证值密文和所述对比值,使用所述数字证书申请设备的私钥对所述验证值密文进行解密处理得到所述验证值,对所述验证值进行计算生成新的对比值,判断计算生成的所述新的对比值与接收到的所述对比值是否一致,如果一致,可以确定所述数字证书申请设备能够验证公私钥所属,则使用所述验证值生成所述数字证书管理验证响应消息并通过安全数据通道向所述数字证书颁发设备发送所述数字证书管理验证响应消息。
步骤S305具体为:
S3051,所述数字证书颁发设备在接收到所述数字证书管理验证响应消息后,首先利用所述数据通信密钥对所述数字证书管理验证响应消息进行解密处理,获得所述验证值,比较所述验证值与所述数字证书颁发设备在发送所述数字证书管理验证请求消息前产生的验证值是否一致,如果一致,所述数字证书颁发设备可以确定公私钥是所述数字证书申请设备所属,则生成所述数字证书管理响应消息并通过安 全数据通道向所述数字证书申请设备发送所述数字证书管理响应消息。
在一些实施方式中,当所述数字证书管理请求消息携带的数据请求管理的数字证书的用途是用于密钥交换功能(即公私钥定义密钥交换变换)时,此时,步骤S303中数字证书颁发设备生成数字证书管理验证请求消息,具体包括:
S3032,所述数字证书颁发设备与所述数字证书申请设备密钥交换后生成共享密钥,所述数字证书颁发设备产生一个验证值,所述验证值经过所述共享密钥加密处理生成所述验证值密文,所述验证值经过计算生成所述对比值,使用所述验证值密文和所述对比值生成所述数字证书管理验证请求消息。
需要说明的是,在这一实施方式中,对数字证书申请设备与数字证书颁发设备进行密钥交换的方式不做限定,数字证书申请设备的公私钥均参与密钥交换。
步骤S304具体为:
S3042,所述数字证书申请设备在接收到所述数字证书管理验证请求消息后,首先利用所述数据通信密钥对所述数字证书管理验证请求消息进行解密处理,获得所述验证值密文和所述对比值,所述数字证书申请设备与所述数字证书颁发设备密钥交换后生成共享密钥,使用所述共享密钥对所述验证值密文进行解密处理得到所述验证值,对所述验证值进行计算生成新的对比值,判断所述新的对比值与接收到的对比值是否一致,如果一致,可以确定数字证书申请设备能够验证公私钥所属,则使用所述验证值生成所述数字证书管理验证响应消息并向所述数字证书颁发设备发送所述数字证书管理验证响应消息。
步骤S305具体为:
S3052,所述数字证书颁发设备在接收到所述数字证书管理验证响应消息后,首先利用所述数据通信密钥对所述数字证书管理验证响应消息进行解密处理,获得所述验证值,比较所述验证值与所述数字证书颁发设备在发送所述数字证书管理验证请求消息前产生的验证值是否一致,如果一致,所述数字证书颁发设备可以判断公私钥是所述数字证书申请设备所属,则生成所述数字证书管理响应消息并向所述数字证书申请设备发送所述数字证书管理响应消息。
在这一实施例中,S301~S302参照S201~S202执行,S306~S307参照S204~S205执行,此处不再赘述。
在这一实施例中,验证值可以是随机数或其他数值,验证值经过计算生成对比值的计算方式不做限定,可以是杂凑计算或循环冗余校验(CRC)等。
为了便于本领域技术人员更清楚地理解本发明在具体场景下的实施方式,下面以一个具体示例对本发明实施方式进行介绍。需要说明的是,该具体示例仅为使得本领域技术人员更清楚地了解本发明,但本发明的实施方式不限于该具体示例。
参见图4,为本发明另一实施例提供的数字证书管理方法流程图。如图4所示,可以包括如下步骤:
S401,数字证书申请设备获取授权码。
具体实现时,数字证书申请设备向数字证书颁发设备请求用于下载数字证书的授权码,并获取所述数字证书颁发设备发送的授权码。
S402,数字证书申请设备利用获取的授权码与数字证书颁发设备协商建立安全数据通道,生成安全密钥。
具体实现时,为保证数字证书颁发过程中信息传输的安全,在数字证书申请设备和数字证书颁发设备之间可以协商建立一个安全数据通道。数字证书申请设备使用授权码生成用于安全数据通道数据传输的安全密钥。
本发明对安全通道的建立方式不进行限制,只要能够利用授权码生成用于数据传输的共享安全密钥即可。具体实现时,可以采用如下方式建立安全数据通道:
S402A,数字证书申请设备与数字证书颁发设备进行安全数据通道协商。
S402B,数字证书申请设备与数字证书颁发设备使用授权码以及协商过程中获得的随机数、身份信息生成安全通道的安全密钥。
其中,所述安全密钥可以包括数据通信密钥,还可以包括数据会话密钥。所述数据通信密钥用于所述数据证书申请设备和数字证书颁发设备在安全数据通道交互消息时对消息进行加密传输。所述数据会话密钥用于在传输消息前对消息携带的证书请求数据和/或证书响应数据进行加密。
S402C,数字证书申请设备与数字证书颁发设备通过完整性校验码对安全通道确认消息进行验证。
具体实现可以参照图4所示的安全数据通道协商和建立示意图。具体地,所述数字证书申请设备与数字证书颁发设备进行安全数据通道协商包括:数字证书申请设备向数字证书颁发设备发送第一随机数、第一身份信息,以及,接收所述数字证书颁发设备发送的第二随机数、第二身份信息。其中,所述第一随机数为数字证书申请设备随机生成的,所述第一身份信息具体可以为数字证书申请设备的身份标识,例如IP地址、MAC地址、电子邮件地址、全域名字符串或者国际移动用户识别码(IMSI)等。所述第 二随机数为数字证书颁发设备随机生成的,所述第二身份信息具体可以为数字证书颁发设备的身份标识,例如IP地址、MAC地址、电子邮件地址、全域名字符串或者国际移动用户识别码(IMSI)等。数字证书申请设备与数字证书颁发设备交互随机数、身份信息的过程可以是数字证书申请设备先发起的,也可以是数字证书颁发设备先发起的,本发明对具体的交互方式不进行限定。
在一些实施方式中,所述数字证书申请设备与数字证书颁发设备使用授权码以及协商过程中获得的随机数、身份信息生成安全通道的安全密钥包括:所述数字证书申请设备与数字证书颁发设备利用授权码、所述第一随机数、所述第一身份信息、所述第二随机数以及所述第二身份信息生成安全密钥。需要说明的是,在数字证书申请设备和数字证书颁发设备侧生成的安全密钥是相同的。所述安全密钥可以包括一组或者多组密钥。例如安全密钥可以包括用于数据传输的数据通信密钥,还可以包括进行完整性校验的完整性校验密钥,还可以包括用于加密证书请求数据和/或证书响应数据的数据会话密钥。
在一些实施方式中,所述安全密钥还包括完整性校验密钥,所述数字证书申请设备与数字证书颁发设备通过完整性校验码进行安全通道的密钥确认包括:所述数字证书申请设备与数字证书颁发设备利用随机数、所述完整性校验密钥生成完整性校验码,利用所述完整性校验码对安全通道确认消息进行验证。
S403,数字证书申请设备利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理请求消息。
具体实现时,数字证书申请设备通过安全数据通道保密后向数字证书颁发设备发送证书管理请求消息。如果数字证书申请设备没有数字证书颁发设备所颁发的数字证书,则证书管理请求消息中携带需要在申请的新数字证书中包含的证书信息。如果数字证书申请设备已含有数字证书颁发设备所颁发的数字证书,则数字证书申请设备发送的数字证书管理请求消息中携带已有的数字证书的信息,用于数字证书颁发设备进行证书的查询和更新。
在一些实施方式中,所述数字证书管理请求消息可以包括数字证书申请信息、数字证书获取信息、数字证书吊销信息、数字证书撤销列表信息等。具体实现时,数字证书申请信息、数字证书获取信息、数字证书吊销信息或者数字证书撤销列表信息可以采用但不限于表1所示形式。
表1 数字证书管理请求消息里的信息类型
Figure PCTCN2018104647-appb-000001
举例说明,数字证书管理请求消息的信息类型值为2时,所述信息具体为证书申请信息,用于申请新数字证书。数字证书管理请求消息的信息类型值为4时,所述信息具体为证书获取信息,用于查询或者更新已有数字证书。数字证书管理请求消息的信息类型值为5时,所述信息具体为证书吊销信息,用于吊销已有数字证书。数字证书管理请求消息的信息类型值为6时,所述信息具体为证书撤销列表信息,用于请求证书撤销列表。
具体实现时,证书申请信息的字段格式可以采用但不限于表2所示形式。
表2 证书申请信息
证书生成方式 证书请求数据
具体实现时,证书获取信息的字段格式可以采用但不限于表3所示形式。
表3 证书获取信息
颁发设备名称 序列号
具体实现时,证书吊销信息的字段格式可以采用但不限于表4所示形式。
表4 证书吊销信息
颁发设备名称 序列号 吊销原因
具体实现时,证书撤销列表信息的字段格式可以采用但不限于表5所示形式。
表5 证书撤销列表信息
颁发设备名称
本发明对在证书申请信息里携带的证书请求数据不作限定。
在一些实施方式中,所述数字证书管理请求消息携带的证书请求数据包括证书请求信息、签名算法标识以及签名值。
其中,证书请求信息可以包括:版本、持有者名称、持有者公钥信息和扩展。这些信息要素简练,可以满足颁发证书的基本要求。签名值是数字证书申请设备本地生成公私钥对后,利用签名算法标识对 应的签名算法,使用私钥对所述证书请求信息进行计算后得到的值。数字证书颁发设备根据证书请求信息里的持有者公钥信息对签名进行校验后来判断公私钥是否是数字证书申请设备所属。通过签名算法标识和签名值可以验证公私钥是否归该实体所属。
在另一些实施方式中,所述证书请求数据中的所述证书请求信息还可以包括更加完整的信息:序列号、颁发者名称和有效期。这些信息可以扩充证书颁发功能,如数字证书申请者要求限制证书的一些特定信息等。在这种情况下,所述证书请求数据可以进行加密处理,具体的,所述证书请求数据为数字证书申请设备在安全数据通道建立后,使用产生的数据会话密钥对证书请求信息、签名算法标识以及签名值加密处理后得到的数据。更进一步地,在上述实施方式的基础上,若数字证书申请设备和/或数字证书颁发设备支持两种以上的加密算法,所述证书请求数据还应包括加密算法标识,相应地,所述证书请求数据具体包括加密算法标识,以及利用所述加密算法标识对应的加密算法、利用所述数据会话密钥对所述证书请求信息、所述签名算法标识和所述签名值加密处理后得到的数据。这种证书请求数据结构要素更完善,用途更广,在验证公私钥所属实体的同时,对证书请求数据进行了保密保护。同时,在有安全数据通道的情况下采用这种证书请求数据结构能够实现对证书请求数据进行两次保密保护,进一步提升数据传输的安全性。
S404,数字证书申请设备利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书验证请求消息。
其中,所述数字证书管理验证请求消息是经所述数据通信密钥加密处理后的。
具体实现时,如果数字证书颁发设备需要判断公私钥是否是数字证书申请设备所属,数字证书颁发设备通过安全数据通道保密后向数字证书申请设备发送数字证书管理验证请求消息。所述数字证书管理验证请求消息中携带证书验证请求信息,用于验证数字证书申请设备的公私钥所属。数字证书管理验证请求消息可以采用但不限于表6所示形式。
表6 数字证书管理验证请求消息里的信息类型
Figure PCTCN2018104647-appb-000002
证书验证请求信息的字段格式可以采用但不限于表7所示形式。
表7 证书验证请求信息
对比值 验证值密文
在一些实施方式中,所述数字证书管理验证请求消息携带的证书验证请求信息还包括算法标识、临时公钥等。
具体实现时,数字证书颁发设备根据数字证书的用途来判断是否需要进行公私钥所属验证,当数字证书的用途是加密或密钥交换时,数字证书颁发设备进行公私钥所属验证。具体地,数字证书颁发设备产生一个验证值,对验证值进行计算生成对比值。根据证书用途的不同使用不同的密钥对验证值进行加密。如果证书用于加密,则使用数字证书申请设备的公钥对验证值进行加密生成验证值密文;如果证书用于密钥交换,则数字证书颁发设备和数字证书申请设备进行密钥交换后产生一个共享密钥,使用此共享密钥对验证值进行加密生成验证值密文。数字证书颁发设备将所述对比值和所述验证值密文携带在数字证书管理验证请求消息里。
S405,数字证书申请设备向所述数字证书颁发设备发送数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理。
具体实现时,所述数字证书申请设备处理接收到的所述数字证书管理验证请求消息并生成后数字证书管理验证响应消息。
在一些实施方式中,当所述数字证书管理请求消息携带的数据请求管理的数字证书的用途是用于加密功能(即私钥定义解密变换)时,所述数字证书申请设备在接收到所述数字证书管理验证请求消息后,首先利用所述数据通信密钥对所述数字证书管理验证请求消息进行解密处理,获得所述验证值密文和所述对比值,使用所述数字证书申请设备的私钥对所述验证值密文进行解密处理得到验证值,对所述验证值进行计算生成新的对比值,判断计算生成的所述新的对比值与接收到的所述对比值是否一致,如果一致,可以确定数字证书申请设备能够验证公私钥所属,则使用所述验证值生成所述数字证书管理验证响应消息。
在一些实施方式中,当所述数字证书管理请求消息携带的数据请求管理的数字证书的用途是用于密钥交换功能(即公私钥定义密钥交换变换)时,所述数字证书申请设备在接收到所述数字证书管理验证请求消息后,首先利用所述数据通信密钥对所述数字证书管理验证请求消息进行解密处理,获得所述验 证值密文和所述对比值,所述数字证书申请设备与所述数字证书颁发设备密钥交换后生成共享密钥,使用所述共享密钥对所述验证值密文进行解密处理得到所述验证值,对所述验证值进行计算生成新的对比值,判断所述新的对比值与接收到的对比值是否一致,如果一致,可以确定数字证书申请设备能够验证公私钥所属,则使用所述验证值生成所述数字证书管理验证响应消息。
具体实现时,数字证书申请设备通过安全数据通道保密后向数字证书颁发设备发送证书管理验证响应消息。数字证书管理验证响应消息包括证书验证响应信息。数字证书管理验证响应消息可以采用但不限于表8所示形式。
表8 数字证书管理验证响应消息里的信息类型
Figure PCTCN2018104647-appb-000003
证书验证响应信息的字段格式可以采用但不限于表9所示形式。
表9 证书验证响应信息
验证值
S406,数字证书申请设备利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书管理响应消息。
其中,所述数字证书管理响应消息是经所述数据通信密钥加密处理后的。
进一步地,数字证书申请设备根据需求确定使用的数字证书。
具体实现时,数字证书颁发设备通过安全数据通道保密后向数字证书申请设备发送证书管理响应消息。数字证书颁发设备确定数字证书申请设备需申请新数字证书时,数字证书管理响应消息包含数字证书颁发设备根据数字证书申请信息包含的证书请求数据产生的新数字证书。数字证书颁发设备确定数字证书申请设备需查询或更新已有的数字证书时,数字证书管理响应消息携带查询的或者更新的数字证书。
具体实现时,数字证书颁发设备根据数字证书管理请求消息里的信息类型判断处理。若接收到数字证书申请信息,判断申请保护的证书信息存在,则根据证书请求数据颁发新的数字证书;如果证书获取信息包含的已有数字证书信息存在,则根据颁发设备名称和序列号查询已有的数字证书;如果证书吊销信息包含的颁发设备名称和序列号存在,则根据颁发设备名称和序列号查询吊销已有的数字证书;如果证书撤销列表存在,则根据颁发设备名称查询证书撤销列表。数字证书颁发设备将上述证书携带在数字证书管理响应消息里。数字证书管理响应消息可以采用但不限于表10所示形式。
表10 数字证书管理响应消息里的信息类型
消息 类型值 含义(信息类型)
数字证书管理响应消息 3 证书响应
证书响应信息格式可以采用但不限于表11所示形式。
表11 证书响应信息格式
证书生成类型 证书响应数据
其中证书生成类型可以如表12所示,列举了不同的证书所有者对应的证书类型。
表12 证书类型
类型值 含义
1 客户端证书
2 AS证书
3 CA证书
4 证书撤销列表
其中,AS证书为认证服务器证书,CA证书为授权中心证书。
具体实现时,数字证书管理响应消息经过加密处理。具体地,在有安全通道的情况下,使用产生的数据通信密钥进行加密处理,由此提高了消息传输的安全性。需要说明的是,所述数字证书管理响应消息可以经一次加密处理,也可以经二次加密处理。例如,若所述数字证书管理请求消息在传输前,已经利用安全密钥中的一组密钥例如数据会话密钥对数字证书管理请求消息中包含的证书请求数据进行过加密处理,在安全数据通道传输时又利用数据通信密钥进行了第二次加密处理。相应地,所述数字证书管理响应消息也可以利用所述数据会话密钥和所述数据通信密钥对所包含的证书响应数据分别进行第二次加密处理。更进一步地,若数字证书申请设备和/或数字证书颁发设备支持两种以上的加密算法,所述证书响应数据还应包括加密算法标识,相应地,所述证书响应数据具体包括加密算法标识,以及利用所述加密算法标识对应的加密算法、利用所述数据会话密钥对所述证书响应数据加密处理后得到的数据。
S407,数字证书申请设备利用所述安全数据通道向数字证书颁发设备发送数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理。
在本发明实施例中,通过上述S401、S402消息建立了安全可靠的数据传输通道,通过上述S403、S406、S407三个消息进行交互实现数字证书的自动申请、查询和更新,通过S404、S405中数字证书验证请求消息和数字证书管理验证响应消息之间的交互实现了实体公私钥所属的验证,使得数字证书管理更为有效、安全、可靠。如图6所示,为数字证书自动申请、查询、更新和颁发方法中的消息内容示意图。如图6所示,数字证书管理请求消息具体可以是包括数字证书申请信息、数字证书获取信息、数字证书吊销信息以及数字证书撤销列表信息等。所述数字证书管理响应消息可以包括数字证书响应信息等。数字证书管理确认消息可以用于解除数字证书申请设备和数字证书颁发设备之间的连接。数字证书管理验证请求消息可以包括数字证书验证请求信息等。数字证书管理验证响应消息可以包括数字证书验证响应信息等。
以上从数字证书申请设备侧对本发明提供的数字证书管理方法进行了介绍。本领域技术人员可以理解的是,本发明提供的方法还可以应用于数字证书颁发设备侧,其中的处理可以与图2至图6所示的示例对应进行。举例说明,上述方法应用于证书颁发设备侧还可以包括:数字证书颁发设备利用授权码与数字证书申请设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥包括数据通信密钥;利用所述安全数据通道接收所述数字证书申请设备发送的数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;处理所述数字证书管理请求消息,并生成数字证书管理验证请求消息;利用所述数据通信密钥对所述数字证书管理验证请求消息进行加密处理;利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;利用所述安全数据通道接收所述数字证书申请设备发送的数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;处理所述数字证书管理验证响应消息,并生成数字证书管理响应消息;利用所述数据通信密钥对所述数字证书管理响应消息进行加密处理;利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理;利用所述安全数据通道接收所述数字证书申请设备发送的数字证书管理确认消息,并处理所述数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理。
在一些实施方式中,所述数字证书颁发设备利用授权码与数字证书申请设备协商建立安全数据通道,生成安全密钥包括:所述数字证书颁发设备与数字证书申请设备进行安全数据通道协商;所述数字证书颁发设备与数字证书申请设备使用授权码以及协商过程中获得的随机数、身份信息生成安全通道的安全密钥;所述数字证书颁发设备与数字证书申请设备通过完整性校验码对安全通道确认消息进行验证。
在一些实施方式中,所述数字证书颁发设备与数字证书申请设备进行安全数据通道协商包括:所述数字证书颁发设备向数字证书申请设备发送第二随机数、第二身份信息,以及,接收所述数字证书申请设备发送的第一随机数、第一身份信息。
在一些实施方式中,所述数字证书颁发设备与数字证书申请设备使用授权码以及协商过程中获得的随机数、身份信息生成安全通道的安全密钥包括:所述数字证书颁发设备利用授权码、所述第一随机数、所述第一身份信息、所述第二随机数以及所述第二身份信息生成安全密钥。
具体的实现可以参照图2至图6所述方法而实现。
参见图7,为本发明一实施例提供的数字证书申请设备示意图。
一种数字证书申请设备700,包括:
安全数据通道建立单元701,用于利用获取的授权码与数字证书颁发设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥包括数据通信密钥。
发送单元702,用于利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;还用于利用所述安全数据通道向所述数字证书颁发设备发送所述数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;还用于利用所述安全数据通道向所述数字证书颁发设备发送所述数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理。
加密单元703,用于利用所述数据通信密钥对所述证书管理请求消息进行加密处理;还用于利用所述数据通信密钥对所述数字证书管理验证响应消息进行加密处理;还用于利用所述数据通信密钥对所述数字证书管理确认消息进行加密处理。
接收单元704,用于利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;还用于利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信 密钥加密处理。
处理单元705,用于处理接收到的所述数字证书管理验证请求消息并生成数字证书管理验证响应消息;还用于处理接收到的所述数字证书管理响应消息并生成数字证书管理确认消息。
在一些实施方式中,所述加密单元703具体用于:利用所述安全数据通道的数据通信密钥对所述数字证书管理验证响应消息进行加密处理。
在一些实施方式中,所述接收单元704接收到的所述数字证书管理验证请求消息包括证书验证请求信息,所述证书验证请求信息包括对比值和验证值密文。
在一些实施方式中,当所述数字证书管理请求消息携带的数据请求管理的数字证书的用途是用于加密功能时,所述处理单元705具体用于:
在接收到所述数字证书管理验证请求消息后,首先利用所述数据通信密钥对所述数字证书管理验证请求消息进行解密处理,获得所述验证值密文和所述对比值,使用所述数字证书申请设备的私钥对所述验证值密文进行解密处理得到验证值,对所述验证值进行计算生成新的对比值,判断计算生成的所述新的对比值与接收到的所述对比值是否一致,如果一致,可以确定数字证书申请设备能够验证公私钥所属,则使用所述验证值生成所述数字证书管理验证响应消息;
所述数字证书管理验证响应消息包括证书验证响应信息。
在一些实施方式中,当所述证书管理请求消息携带的数据请求管理的数字证书的用途是用于密钥交换功能时,所述处理单元705具体用于:
在接收到所述数字证书管理验证请求消息后,首先利用所述数据通信密钥对所述数字证书管理验证请求消息进行解密处理,获得所述验证值密文和所述对比值,所述数字证书申请设备与所述数字证书颁发设备密钥交换后生成共享密钥,使用所述共享密钥对所述验证值密文进行解密处理得到所述验证值,对所述验证值进行计算生成新的对比值,判断所述新的对比值与接收到的对比值是否一致,如果一致,可以确定数字证书申请设备能够验证公私钥所属,则使用所述验证值生成所述数字证书管理验证响应消息。
在一些实施方式中,所述发送单元702发送的所述数字证书管理请求消息携带的证书请求数据包括证书请求信息、签名算法标识以及签名值,所述证书请求信息包括版本、持有者名称、持有者公钥信息和扩展,所述加密单元703具体用于:利用所述安全数据通道的数据通信密钥对所述数字证书管理请求消息经加密处理。
在一些实施方式中,所述加密单元703还用于:当所述安全密钥还包括数据会话密钥时,在所述数字证书管理请求消息经所述安全数据通道的数据通信密钥加密处理之前,利用所述数据会话密钥对所述数字证书管理请求消息携带的证书请求数据进行加密处理。
其中,所述证书请求信息还包括序列号、颁发者名称和有效期。
进一步的,当所述数字证书申请设备支持两种以上的加密算法时,所述发送单元702发送的所述证书请求数据还进一步包括加密算法标识,具体包括加密算法标识,以及利用所述加密算法标识对应的加密算法、利用所述数据会话密钥对所述证书请求信息、所述签名算法标识和所述签名值加密处理后得到的数据;相应的,所述加密单元703还具体用于:利用所述加密算法标识对应的加密算法、利用所述数据会话密钥对所述证书请求信息、所述签名算法标识以及所述签名值进行加密处理。
在一些实施方式中,所述发送单元702包括:第一发送单元,用于利用所述安全数据通道向所述数字证书颁发设备发送数字证书申请信息用于申请新数字证书,所述数字证书申请信息包括证书生成方式以及证书请求数据;和/或,第二发送单元,用于利用所述安全数据通道向所述数字证书颁发设备发送数字证书获取信息用于查询或更新已有数字证书,所述数字证书获取信息包括颁发设备名称和序列号字段;和/或,第三发送单元,用于利用所述安全数据通道向所述数字证书颁发设备发送数字证书吊销信息用于申请吊销已有数字证书,所述数字证书吊销信息包括颁发设备名称、序列号和吊销原因字段;和/或,第四发送单元,用于利用所述安全数据通道向所述数字证书颁发设备发送数字证书撤销列表信息用于请求数字证书撤销列表,所述数字证书撤销列表信息包括颁发设备名称字段。
在一些实施方式中,所述安全数据通道建立单元701包括:协商单元,用于与数字证书颁发设备进行安全数据通道协商;密钥生成单元,用于与数字证书颁发设备使用授权码以及协商过程中获得的随机数、身份信息生成安全通道的安全密钥;密钥确认单元,用于与数字证书颁发设备通过完整性校验码对安全通道确认消息进行验证。
在一些实施方式中,所述协商单元具体用于:向数字证书颁发设备发送第一随机数、第一身份信息,以及,接收所述数字证书颁发设备发送的第二随机数、第二身份信息;所述密钥生成单元具体用于:所述数字证书申请设备与数字证书颁发设备利用授权码、所述第一随机数、所述第一身份信息、所述第二随机数以及所述第二身份信息生成安全密钥。
在一些实施方式中,所述密钥生成单元生成的安全密钥还包括完整性校验密钥,所述密钥确认单元具体用于:所述数字证书申请设备与数字证书颁发设备利用随机数、所述完整性校验密钥生成完整性校验码,利用所述完整性校验码对安全通道确认消息进行验证。
其中,本发明设备各单元或模块的设置可以参照图2至图6所示的方法而实现,在此不赘述。需要说明的是,数字证书管理设备可以是独立的设备,也可以与数字证书颁发设备集成在一起,或者作为数字证书颁发设备的一部分而存在,在此不进行限定。
参见图8,是本发明另一实施例提供的用于数字证书申请的设备的框图。包括:至少一个处理器801(例如CPU),存储器802和至少一个通信总线803,用于实现这些设备之间的连接通信。处理器801用于执行存储器802中存储的可执行模块,例如计算机程序。存储器802可能包含高速随机存取存储器(RAM:Random Access Memory),也可能还包括非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。一个或者一个以上程序存储于存储器中,且经配置由一个或者一个以上处理器801执行所述一个或者一个以上程序包含的用于进行以下操作的指令:利用获取的授权码与数字证书颁发设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥至少包括数据通信密钥;生成数字证书管理请求消息;利用所述数据通信密钥对所述数字证书管理请求消息进行加密处理;利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;处理所述数字证书管理验证请求消息,并生成数字证书管理验证响应消息;利用所述数据通信密钥对所述数字证书管理验证响应消息进行加密处理;利用所述安全数据通道向所述数字证书颁发设备发送所述数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理;处理所述数字证书管理响应消息,并生成数字证书管理确认消息;利用所述数据通信密钥对所述数字证书管理确认消息进行加密处理;利用所述安全数据通道向所述数字证书颁发设备发送所述数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理。
在一些实施方式中,处理器801具体用于执行所述一个或者一个以上程序包含用于进行以下操作的指令:利用所述安全数据通道向所述数字证书颁发设备发送数字证书申请信息用于申请新数字证书,所述数字证书申请信息包括证书生成方式以及证书请求数据。
在一些实施方式中,处理器801具体用于执行所述一个或者一个以上程序包含用于进行以下操作的指令:利用所述安全数据通道向所述数字证书颁发设备发送数字证书获取信息用于查询或更新已有数字证书,所述数字证书获取信息包括颁发设备名称和序列号字段。
在一些实施方式中,处理器801具体用于执行所述一个或者一个以上程序包含用于进行以下操作的指令:利用所述安全数据通道向所述数字证书颁发设备发送数字证书吊销信息用于申请吊销已有数字证书,所述数字证书吊销信息包括颁发设备名称、序列号和吊销原因字段。
在一些实施方式中,处理器801具体用于执行所述一个或者一个以上程序包含用于进行以下操作的指令:利用所述安全数据通道向所述数字证书颁发设备发送数字证书撤销列表信息用于请求数字证书撤销列表,所述数字证书撤销列表信息包括颁发设备名称字段。
在一些实施方式中,处理器801具体用于执行所述一个或者一个以上程序包含用于进行以下操作的指令:与数字证书颁发设备进行安全数据通道协商;与数字证书颁发设备使用授权码以及协商过程中获得的随机数、身份信息生成安全通道的安全密钥;与数字证书颁发设备通过完整性校验码对安全通道确认消息进行验证。
在一些实施方式中,处理器801具体用于执行所述一个或者一个以上程序包含用于进行以下操作的指令:向数字证书颁发设备发送第一随机数、第一身份信息,以及,接收所述数字证书颁发设备发送的第二随机数、第二身份信息;与数字证书颁发设备利用授权码、所述第一随机数、所述第一身份信息、所述第二随机数以及所述第二身份信息生成安全密钥。
在一些实施方式中,处理器801具体用于执行所述一个或者一个以上程序包含用于进行以下操作的指令:与数字证书颁发设备利用随机数、所述完整性校验密钥生成完整性校验码,利用所述完整性校验码对安全通道确认消息进行验证。
参见图9,为本发明一实施例提供的数字证书颁发设备示意图。
一种数字证书颁发设备900,包括:
安全数据通道建立单元901,用于利用授权码与数字证书申请设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥包括数据通信密钥。
接收单元902,用于接收所述数字证书申请设备利用所述安全数据通道发送的数字证书管理请求消 息,所述数字证书管理请求消息经所述数据通信密钥加密处理;还用于接收所述数字证书申请设备利用所述安全数据通道发送的数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;还用于接收所述数字证书申请设备利用所述安全数据通道发送的数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理。
处理单元903,用于处理接收到的所述数字证书管理请求消息,并生成数字证书管理验证请求消息;还用于处理接收到的所述数字证书管理验证响应消息,并生成数字证书管理响应消息;还用于处理接收到的所述数字证书管理确认消息。
加密单元904,用于利用所述数据通信密钥对所述数字证书管理验证请求消息进行加密处理;还用于利用所述数据通信密钥对所述数字证书管理响应消息进行加密处理;发送单元905,用于利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;还用于利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理。
在一些实施方式中,所述发送单元905发送的所述数字证书管理响应消息携带证书响应数据;所述加密单元904具体用于:利用所述安全数据通道的数据通信密钥对所述数字证书管理响应消息进行加密处理;其中,所述接收单元902接收的所述数字证书管理请求消息携带的证书请求数据包括证书请求信息、签名算法标识以及签名值,所述证书请求信息包括版本、持有者名称、持有者公钥信息和扩展。
在一些实施方式中,所述加密单元904还用于:当所述安全密钥还包括数据会话密钥时,在所述数字证书管理响应消息经所述安全数据通道的数据通信密钥加密处理之前,利用所述数据会话密钥对所述数字证书管理响应消息携带的证书响应数据进行加密处理;其中,所述证书请求信息还包括序列号、颁发者名称和有效期。
在一些实施方式中,当所述数字证书颁发设备支持两种以上的加密算法时,所述发送单元905发送的所述证书响应数据还进一步包括加密算法标识,具体包括加密算法标识,以及利用所述加密算法标识对应的加密算法、利用所述数据会话密钥对所述证书响应数据加密处理后得到的数据;相应的,所述加密单元904还具体用于:利用所述加密算法标识对应的加密算法、利用所述数据会话密钥对所述证书响应数据进行加密处理。
在一些实施方式中,所述安全数据通道建立单元901包括:协商单元,用于与数字证书申请设备进行安全数据通道协商;密钥生成单元,用于与数字证书申请设备使用授权码以及协商过程中获得的随机数、身份信息生成安全通道的安全密钥;密钥确认单元,用于与数字证书申请设备通过完整性校验码对安全通道确认消息进行验证。
在一些实施方式中,所述协商单元具体用于:向数字证书申请设备发送第二随机数、第二身份信息,以及,接收所述数字证书申请设备发送的第一随机数、第一身份信息;所述密钥生成单元具体用于:利用授权码、所述第一随机数、所述第一身份信息、所述第二随机数以及所述第二身份信息生成安全密钥。
在一些实施方式中,所述密钥生成单元生成的安全密钥还包括完整性校验密钥,所述密钥确认单元具体用于:与数字证书申请设备利用随机数、所述完整性校验密钥生成完整性校验码,利用所述完整性校验码对安全通道确认消息进行验证。
参见图10,是本发明另一实施例提供的用于数字证书颁发的设备的框图。包括:至少一个处理器1001(例如CPU),存储器1002和至少一个通信总线1003,用于实现这些设备之间的连接通信。处理器1001用于执行存储器1002中存储的可执行模块,例如计算机程序。存储器1002可能包含高速随机存取存储器(RAM:Random Access Memory),也可能还包括非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。一个或者一个以上程序存储于存储器中,且经配置由一个或者一个以上处理器1001执行所述一个或者一个以上程序包含的用于进行以下操作的指令:利用授权码与数字证书申请设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥包括数据通信密钥;利用所述安全数据通道接收所述数字证书申请设备发送的数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;处理所述数字证书管理请求消息,并生成数字证书管理验证请求消息;利用所述数据通信密钥对所述数字证书管理验证请求消息进行加密处理;利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;利用所述安全数据通道接收所述数字证书申请设备发送的数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;处理所述数字证书管理验证响应消息,并生成数字证书管理响应消息;利用所述数据通信密钥对所述数字证书管理响应消息进行加密处理;利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理;利用所述安全数据通道接收所述数字证书申请设备发送的数字证书管理确认消息,并处理所述数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理。
在一些实施方式中,处理器1001具体用于执行所述一个或者一个以上程序包含用于进行以下操作的指令:与数字证书申请设备进行安全数据通道协商;与数字证书申请设备使用授权码以及协商过程中获得的随机数、身份信息生成安全通道的安全密钥;与数字证书申请设备通过完整性校验码对安全通道确认消息进行验证。
在一些实施方式中,处理器1001具体用于执行所述一个或者一个以上程序包含用于进行以下操作的指令:向数字证书申请设备发送第二随机数、第二身份信息,以及,接收所述数字证书申请设备发送的第一随机数、第一身份信息。
在一些实施方式中,处理器1001具体用于执行所述一个或者一个以上程序包含用于进行以下操作的指令:利用授权码、所述第一随机数、所述第一身份信息、所述第二随机数以及所述第二身份信息生成安全密钥。
本领域技术人员可以明了,前述方法及设备是对应的关系。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本发明旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。
以上所述仅为本发明的较佳实施例,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。本发明可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本发明,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于设备实施例而言,由于其基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。以上所描述的设备实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。以上所述仅是本发明的具体实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。

Claims (23)

  1. 一种数字证书管理方法,其特征在于,包括:
    数字证书申请设备利用获取的授权码与数字证书颁发设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥至少包括数据通信密钥;
    数字证书申请设备利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;
    数字证书颁发设备接收所述数字证书管理请求消息,利用所述安全数据通道向所述数字证书申请设备发送数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;
    数字证书申请设备接收所述数字证书管理验证请求消息,利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;
    数字证书颁发设备接收所述数字证书管理验证响应消息,利用所述安全数据通道向所述数字证书申请设备发送数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理;
    数字证书申请设备接收所述数字证书管理响应消息,利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理;
    数字证书颁发设备接收并处理所述数字证书管理确认消息。
  2. 根据权利要求1所述的方法,其特征在于,所述数字证书管理验证请求消息经所述数据通信密钥加密处理包括:
    所述数字证书管理验证请求消息经所述安全数据通道的数据通信密钥加密处理;
    所述数字证书管理验证响应消息经所述数据通信密钥加密处理包括:
    所述数字证书管理验证响应消息经所述安全数据通道的数据通信密钥加密处理。
  3. 根据权利要求1或2中任一项所述的方法,其特征在于,所述数字证书颁发设备接收所述数字证书管理请求消息,利用所述安全数据通道向所述数字证书申请设备发送数字证书管理验证请求消息,具体包括:
    所述数字证书颁发设备在接收到所述数字证书管理请求消息后,首先利用所述数据通信密钥对所述数字证书管理请求消息进行解密处理,并根据所述数字证书管理请求消息携带的数据进行处理,然后生成数字证书管理验证请求消息;
    所述数字证书管理验证请求消息包括证书验证请求信息,所述证书验证请求信息包括对比值和验证值密文。
  4. 根据权利要求3所述的方法,其特征在于,当所述数字证书管理请求消息携带的数据请求管理的数字证书的用途是用于加密功能时,相应的,所述数字证书颁发设备生成所述数字证书管理验证请求消息,具体包括:
    所述数字证书颁发设备产生一个验证值,所述验证值经过所述数字证书申请设备的公钥加密处理生成所述验证值密文,所述验证值经过计算生成所述对比值,使用所述验证值密文和所述对比值生成所述数字证书管理验证请求消息。
  5. 根据权利要求4所述的方法,其特征在于,所述数字证书申请设备接收所述数字证书管理验证请求消息,利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理验证响应消息,具体包括:
    所述数字证书申请设备在接收到所述数字证书管理验证请求消息后,首先利用所述数据通信密钥对所述数字证书管理验证请求消息进行解密处理,获得所述验证值密文和所述对比值,使用所述数字证书申请设备的私钥对所述验证值密文进行解密处理得到所述验证值,对所述验证值进行计算生成新的对比值,判断计算生成的所述新的对比值与接收到的所述对比值是否一致,如果一致,可以确定所述数字证书申请设备能够验证公私钥所属,则使用所述验证值生成所述数字证书管理验证响应消息并通过安全数据通道向所述数字证书颁发设备发送所述数字证书管理验证响应消息。
  6. 根据权利要求5所述的方法,其特征在于,所述数字证书颁发设备接收所述数字证书管理验证响应消息,利用所述安全数据通道向所述数字证书申请设备发送数字证书管理响应消息,具体包括:
    所述数字证书颁发设备在接收到所述数字证书管理验证响应消息后,首先利用所述数据通信密钥对所述数字证书管理验证响应消息进行解密处理,获得所述验证值,比较所述验证值与所述数字证书颁发设备在发送所述数字证书管理验证请求消息前产生的验证值是否一致,如果一致,所述数字证书颁发设备可以确定公私钥是所述数字证书申请设备所属,则生成所述数字证书管理响应消息并通过安全数据通道向所述数字证书申请设备发送所述数字证书管理响应消息。
  7. 根据权利要求3所述的方法,其特征在于,当所述数字证书管理请求消息携带的数据请求管理的数字证书的用途是用于密钥交换功能时,相应的,所述数字证书颁发设备生成所述数字证书管理验证请 求消息,具体包括:
    所述数字证书颁发设备与所述数字证书申请设备密钥交换后生成共享密钥,所述数字证书颁发设备产生一个验证值,所述验证值经过所述共享密钥加密处理生成所述验证值密文,所述验证值经过计算生成所述对比值,使用所述验证值密文和所述对比值生成所述数字证书管理验证请求消息。
  8. 根据权利要求7所述的方法,其特征在于,所述数字证书申请设备接收所述数字证书管理验证请求消息,利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理验证响应消息,具体包括:
    所述数字证书申请设备在接收到所述数字证书管理验证请求消息后,首先利用所述数据通信密钥对所述数字证书管理验证请求消息进行解密处理,获得所述验证值密文和所述对比值,所述数字证书申请设备与所述数字证书颁发设备密钥交换后生成共享密钥,使用所述共享密钥对所述验证值密文进行解密处理得到所述验证值,对所述验证值进行计算生成新的对比值,判断所述新的对比值与接收到的对比值是否一致,如果一致,可以确定数字证书申请设备能够验证公私钥所属,则使用所述验证值生成所述数字证书管理验证响应消息并向所述数字证书颁发设备发送所述数字证书管理验证响应消息;
    所述数字证书管理验证响应消息包括证书验证响应信息。
  9. 根据权利要求8所述的方法,其特征在于,所述数字证书颁发设备接收所述数字证书管理验证响应消息,利用所述安全数据通道向所述数字证书申请设备发送数字证书管理响应消息,具体包括:
    所述数字证书颁发设备在接收到所述数字证书管理验证响应消息后,首先利用所述数据通信密钥对所述数字证书管理验证响应消息进行解密处理,获得所述验证值,比较所述验证值与所述数字证书颁发设备在发送所述数字证书管理验证请求消息前产生的验证值是否一致,如果一致,所述数字证书颁发设备可以判断公私钥是所述数字证书申请设备所属,则生成所述数字证书管理响应消息并向所述数字证书申请设备发送所述数字证书管理响应消息。
  10. 一种数字证书申请设备,其特征在于,所述设备包括:
    安全数据通道建立单元,用于利用获取的授权码与数字证书颁发设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥包括数据通信密钥;
    发送单元,用于利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;还用于利用所述安全数据通道向所述数字证书颁发设备发送所述数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;还用于利用所述安全数据通道向所述数字证书颁发设备发送所述数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理;
    加密单元,用于利用所述数据通信密钥对所述证书管理请求消息进行加密处理;还用于利用所述数据通信密钥对所述数字证书管理验证响应消息进行加密处理;还用于利用所述数据通信密钥对所述数字证书管理确认消息进行加密处理;
    接收单元,用于利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;还用于利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理;
    处理单元,用于处理接收到的所述数字证书管理验证请求消息并生成数字证书管理验证响应消息;还用于处理接收到的所述数字证书管理响应消息并生成数字证书管理确认消息。
  11. 根据权利要求10所述的设备,其特征在于,所述加密单元具体用于:
    利用所述安全数据通道的数据通信密钥对所述数字证书管理验证响应消息进行加密处理。
  12. 根据权利要求10或11所述的设备,其特征在于,所述接收单元接收到的所述数字证书管理验证请求消息包括证书验证请求信息,所述证书验证请求信息包括对比值和验证值密文。
  13. 根据权利要求12所述的设备,其特征在于,当所述数字证书管理请求消息携带的数据请求管理的数字证书的用途是用于加密功能时,所述处理单元具体用于:
    在接收到所述数字证书管理验证请求消息后,首先利用所述数据通信密钥对所述数字证书管理验证请求消息进行解密处理,获得所述验证值密文和所述对比值,使用所述数字证书申请设备的私钥对所述验证值密文进行解密处理得到验证值,对所述验证值进行计算生成新的对比值,判断计算生成的所述新的对比值与接收到的所述对比值是否一致,如果一致,可以确定数字证书申请设备能够验证公私钥所属,则使用所述验证值生成所述数字证书管理验证响应消息;
    所述数字证书管理验证响应消息包括证书验证响应信息。
  14. 根据权利要求12所述的设备,其特征在于,当所述证书管理请求消息携带的数据请求管理的数字证书的用途是用于密钥交换功能时,所述处理单元具体用于:
    在接收到所述数字证书管理验证请求消息后,首先利用所述数据通信密钥对所述数字证书管理验证 请求消息进行解密处理,获得所述验证值密文和所述对比值,所述数字证书申请设备与所述数字证书颁发设备密钥交换后生成共享密钥,使用所述共享密钥对所述验证值密文进行解密处理得到所述验证值,对所述验证值进行计算生成新的对比值,判断所述新的对比值与接收到的对比值是否一致,如果一致,可以确定数字证书申请设备能够验证公私钥所属,则使用所述验证值生成所述数字证书管理验证响应消息。
  15. 一种用于数字证书申请的设备,其特征在于,包括有存储器,以及一个或者一个以上的程序,其中一个或者一个以上程序存储于存储器中,且经配置由一个或者一个以上处理器执行所述一个或者一个以上程序包含的用于进行以下操作的指令:
    利用获取的授权码与数字证书颁发设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥至少包括数据通信密钥;
    生成数字证书管理请求消息;
    利用所述数据通信密钥对所述数字证书管理请求消息进行加密处理;
    利用所述安全数据通道向所述数字证书颁发设备发送数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;
    利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;
    处理所述数字证书管理验证请求消息,并生成数字证书管理验证响应消息;
    利用所述数据通信密钥对所述数字证书管理验证响应消息进行加密处理;
    利用所述安全数据通道向所述数字证书颁发设备发送所述数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;
    利用所述安全数据通道接收所述数字证书颁发设备发送的数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理;
    处理所述数字证书管理响应消息,并生成数字证书管理确认消息;
    利用所述数据通信密钥对所述数字证书管理确认消息进行加密处理;
    利用所述安全数据通道向所述数字证书颁发设备发送所述数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理。
  16. 一种数字证书颁发设备,其特征在于,所述设备包括:
    安全数据通道建立单元,用于利用授权码与数字证书申请设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥至少包括数据通信密钥;
    接收单元,用于接收所述数字证书申请设备利用所述安全数据通道发送的数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;还用于接收所述数字证书申请设备利用所述安全数据通道发送的数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;还用于接收所述数字证书申请设备利用所述安全数据通道发送的数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理;
    处理单元,用于处理接收到的所述数字证书管理请求消息,并生成数字证书管理验证请求消息;还用于处理接收到的所述数字证书管理验证响应消息,并生成数字证书管理响应消息;还用于处理接收到的所述数字证书管理确认消息;
    加密单元,用于利用所述数据通信密钥对所述数字证书管理验证请求消息进行加密处理;还用于利用所述数据通信密钥对所述数字证书管理响应消息进行加密处理;
    发送单元,用于利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;还用于利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理。
  17. 根据权利要求16所述的设备,其特征在于,所述加密单元具体用于:
    利用所述安全数据通道的数据通信密钥对所述数字证书管理验证请求消息进行加密处理。
  18. 根据权利要求16或17所述的设备,其特征在于,所述处理单元具体用于:
    在接收到所述数字证书管理请求消息后,首先利用所述数据通信密钥对所述数字证书管理请求消息进行解密处理,并根据所述数字证书管理请求消息携带的数据进行处理,然后生成数字证书管理验证请求消息;
    所述发送单元发送的的所述数字证书管理验证请求消息包括证书验证请求信息,所述证书验证请求信息包括对比值和验证值密文。
  19. 根据权利要求18所述的设备,其特征在于,当所述数字证书管理请求消息携带的数据请求管理 的数字证书的用途是用于加密功能时,所述处理单元还具体用于:
    产生一个验证值,所述验证值经过所述数字证书申请设备的公钥加密处理生成所述验证值密文,所述验证值经过计算生成所述对比值,使用所述验证值密文和所述对比值生成所述数字证书管理验证请求消息。
  20. 根据权利要求19所述的设备,其特征在于,所述处理单元还具体用于:
    在接收到所述数字证书管理验证响应消息后,首先利用所述数据通信密钥对所述数字证书管理验证响应消息进行解密处理,获得所述验证值,比较所述验证值与所述数字证书颁发设备在发送所述数字证书管理验证请求消息前产生的验证值是否一致,如果一致,所述数字证书颁发设备可以判断公私钥是数字证书申请设备所属,生成所述数字证书管理响应消息。
  21. 根据权利要求18所述的设备,其特征在于,当所述数字证书管理请求消息携带的数据请求管理的数字证书的用途是用于密钥交换功能时,所述处理单元具体用于:
    与所述数字证书申请设备密钥交换后生成共享密钥,并产生一个验证值,所述验证值经过所述共享密钥加密处理生成所述验证值密文,所述验证值经过计算生成所述对比值,使用所述验证值密文和所述对比值生成所述数字证书管理验证请求消息。
  22. 根据权利要求21所述的设备,其特征在于,所述处理单元还具体用于:
    在接收到所述数字证书管理验证响应消息后,首先利用所述数据通信密钥对所述数字证书管理验证响应消息进行解密处理,获得所述验证值,比较所述验证值与所述数字证书颁发设备在发送所述数字证书管理验证请求消息前产生的验证值是否一致,如果一致,所述数字证书颁发设备可以判断公私钥是所述数字证书申请设备所属,则生成所述数字证书管理响应消息。
  23. 一种用于数字证书颁发的设备,其特征在于,包括有存储器,以及一个或者一个以上的程序,其中一个或者一个以上程序存储于存储器中,且经配置由一个或者一个以上处理器执行所述一个或者一个以上程序包含的用于进行以下操作的指令:
    利用授权码与数字证书申请设备协商建立安全数据通道,生成安全密钥;其中,所述安全密钥包括数据通信密钥;
    利用所述安全数据通道接收所述数字证书申请设备发送的数字证书管理请求消息,所述数字证书管理请求消息经所述数据通信密钥加密处理;
    处理所述数字证书管理请求消息,并生成数字证书管理验证请求消息;
    利用所述数据通信密钥对所述数字证书管理验证请求消息进行加密处理;
    利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理验证请求消息,所述数字证书管理验证请求消息经所述数据通信密钥加密处理;
    利用所述安全数据通道接收所述数字证书申请设备发送的数字证书管理验证响应消息,所述数字证书管理验证响应消息经所述数据通信密钥加密处理;
    处理所述数字证书管理验证响应消息,并生成数字证书管理响应消息;
    利用所述数据通信密钥对所述数字证书管理响应消息进行加密处理;
    利用所述安全数据通道向所述数字证书申请设备发送所述数字证书管理响应消息,所述数字证书管理响应消息经所述数据通信密钥加密处理;
    利用所述安全数据通道接收所述数字证书申请设备发送的数字证书管理确认消息,并处理所述数字证书管理确认消息,所述数字证书管理确认消息经所述数据通信密钥加密处理。
PCT/CN2018/104647 2017-09-07 2018-09-07 数字证书管理方法及设备 WO2019047927A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
KR1020207009708A KR102325725B1 (ko) 2017-09-07 2018-09-07 디지털 인증서 관리 방법 및 장치
JP2020513694A JP7292263B2 (ja) 2017-09-07 2018-09-07 デジタル証明書を管理するための方法および装置
US16/645,149 US11323433B2 (en) 2017-09-07 2018-09-07 Digital credential management method and device
EP18853006.7A EP3681101B1 (en) 2017-09-07 2018-09-07 Digital credential management method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710802333.X 2017-09-07
CN201710802333.XA CN109474432B (zh) 2017-09-07 2017-09-07 数字证书管理方法及设备

Publications (1)

Publication Number Publication Date
WO2019047927A1 true WO2019047927A1 (zh) 2019-03-14

Family

ID=65633517

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/104647 WO2019047927A1 (zh) 2017-09-07 2018-09-07 数字证书管理方法及设备

Country Status (6)

Country Link
US (1) US11323433B2 (zh)
EP (1) EP3681101B1 (zh)
JP (1) JP7292263B2 (zh)
KR (1) KR102325725B1 (zh)
CN (1) CN109474432B (zh)
WO (1) WO2019047927A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112738122A (zh) * 2021-01-04 2021-04-30 北京全路通信信号研究设计院集团有限公司 一种轨道交通领域复杂场景下的在线密钥管理系统及方法
US11516020B2 (en) * 2018-06-06 2022-11-29 Tencent Technology (Shenzhen) Company Limited Key management method, apparatus, and system, storage medium, and computer device

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11671264B1 (en) * 2020-09-18 2023-06-06 Amazon Technologies, Inc. Validating certificate information before signing
CN113079006B (zh) * 2021-03-29 2021-11-30 上海纬百科技有限公司 针对密钥的信息处理方法、电子设备及存储介质
CN113301523B (zh) * 2021-04-14 2022-09-16 江铃汽车股份有限公司 一种v2x车载终端数字证书的申请、更新方法及系统
CN114189337A (zh) * 2021-11-18 2022-03-15 山东云海国创云计算装备产业创新中心有限公司 一种固件烧录方法、装置、设备以及存储介质
WO2024063800A1 (en) * 2022-09-21 2024-03-28 Tbcasoft, Inc. Verification of digital credentials and digital signatures

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011120583A1 (en) * 2010-04-01 2011-10-06 Nokia Siemens Networks Oy Certificate authority
CN103186719A (zh) * 2011-12-27 2013-07-03 方正国际软件(北京)有限公司 一种面向移动终端的数字版权保护方法及系统
CN103190129A (zh) * 2009-11-25 2013-07-03 安全第一公司 对移动中数据进行保护的系统和方法
CN104579662A (zh) * 2013-10-21 2015-04-29 航天信息股份有限公司 基于wpki和时间戳的移动终端身份认证方法和系统
CN104683359A (zh) * 2015-03-27 2015-06-03 成都三零瑞通移动通信有限公司 一种安全通道建立方法及其数据保护方法和安全通道秘钥更新方法

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4130809B2 (ja) 2003-11-04 2008-08-06 エヌ・ティ・ティ・コミュニケーションズ株式会社 端末間の暗号化通信チャネルを構築する方法及びそのための装置並びにプログラム
US20020165912A1 (en) * 2001-02-25 2002-11-07 Storymail, Inc. Secure certificate and system and method for issuing and using same
JP4626033B2 (ja) * 2000-08-31 2011-02-02 ソニー株式会社 公開鍵証明書利用システム、公開鍵証明書利用方法、および情報処理装置、並びにプログラム提供媒体
US9331990B2 (en) * 2003-12-22 2016-05-03 Assa Abloy Ab Trusted and unsupervised digital certificate generation using a security token
JP2007329731A (ja) 2006-06-08 2007-12-20 Hitachi Ltd 証明書更新方法、システム及びプログラム
KR100853182B1 (ko) * 2006-09-29 2008-08-20 한국전자통신연구원 다중 도메인에서 대칭키 기반 인증 방법 및 장치
JP4938408B2 (ja) 2006-10-12 2012-05-23 Kddi株式会社 アドレス管理システム、アドレス管理方法およびプログラム
CN101828358B (zh) 2007-06-27 2012-07-04 环球标志株式会社 服务器认证书发行系统
CN101547095B (zh) * 2009-02-11 2011-05-18 广州杰赛科技股份有限公司 基于数字证书的应用服务管理系统及管理方法
US8707031B2 (en) 2009-04-07 2014-04-22 Secureauth Corporation Identity-based certificate management
US8868913B1 (en) * 2011-09-29 2014-10-21 Juniper Networks, Inc. Automatically authenticating a host key via a dynamically generated certificate using an embedded cryptographic processor
EP2634993B1 (en) * 2012-03-01 2017-01-11 Certicom Corp. Devices and methods for connecting client devices to a network
CN103856477B (zh) * 2012-12-06 2018-01-02 阿里巴巴集团控股有限公司 一种可信计算系统及相应的认证方法和设备
CN105812136A (zh) * 2014-12-30 2016-07-27 北京握奇智能科技有限公司 一种更新方法及系统、安全认证设备
US11153297B2 (en) * 2016-12-06 2021-10-19 Vmware, Inc. Systems and methods to facilitate certificate and trust management across a distributed environment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103190129A (zh) * 2009-11-25 2013-07-03 安全第一公司 对移动中数据进行保护的系统和方法
WO2011120583A1 (en) * 2010-04-01 2011-10-06 Nokia Siemens Networks Oy Certificate authority
CN103186719A (zh) * 2011-12-27 2013-07-03 方正国际软件(北京)有限公司 一种面向移动终端的数字版权保护方法及系统
CN104579662A (zh) * 2013-10-21 2015-04-29 航天信息股份有限公司 基于wpki和时间戳的移动终端身份认证方法和系统
CN104683359A (zh) * 2015-03-27 2015-06-03 成都三零瑞通移动通信有限公司 一种安全通道建立方法及其数据保护方法和安全通道秘钥更新方法

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11516020B2 (en) * 2018-06-06 2022-11-29 Tencent Technology (Shenzhen) Company Limited Key management method, apparatus, and system, storage medium, and computer device
CN112738122A (zh) * 2021-01-04 2021-04-30 北京全路通信信号研究设计院集团有限公司 一种轨道交通领域复杂场景下的在线密钥管理系统及方法
CN112738122B (zh) * 2021-01-04 2023-02-21 北京全路通信信号研究设计院集团有限公司 一种轨道交通领域复杂场景下的在线密钥管理系统及方法

Also Published As

Publication number Publication date
US11323433B2 (en) 2022-05-03
EP3681101A1 (en) 2020-07-15
JP2020533853A (ja) 2020-11-19
US20200328902A1 (en) 2020-10-15
KR102325725B1 (ko) 2021-11-11
CN109474432A (zh) 2019-03-15
CN109474432B (zh) 2021-11-02
JP7292263B2 (ja) 2023-06-16
EP3681101A4 (en) 2020-08-05
EP3681101B1 (en) 2021-03-24
KR20200044117A (ko) 2020-04-28

Similar Documents

Publication Publication Date Title
WO2018177045A1 (zh) 数字证书管理方法及设备
WO2019047927A1 (zh) 数字证书管理方法及设备
US10855668B2 (en) Wireless device authentication and service access
WO2018076365A1 (zh) 密钥协商方法及装置
US11134069B2 (en) Method for authorizing access and apparatus using the method
WO2017020452A1 (zh) 认证方法和认证系统
US20170214664A1 (en) Secure connections for low power devices
CN101296086B (zh) 接入认证的方法、系统和设备
WO2010078755A1 (zh) 电子邮件的传送方法、系统及wapi终端
JP2015500585A (ja) グループメンバーによるグループシークレットの単純化された管理
CN104486087A (zh) 一种基于远程硬件安全模块的数字签名方法
WO2014146609A1 (zh) 信息处理方法、信任服务器及云服务器
CN109995723B (zh) 一种域名解析系统dns信息交互的方法、装置及系统
WO2014194818A1 (zh) 一种用于发现设备的用户的方法和用户设备
WO2012024998A1 (zh) 一种对个人网设备进行认证的认证方法及系统
CN103856463A (zh) 基于密钥交换协议的轻量目录访问协议实现方法和装置
CN114553426B (zh) 签名验证方法、密钥管理平台、安全终端及电子设备
JP2013236185A (ja) 電子署名代行サーバ、電子署名代行システム及び電子署名代行方法
KR20110053578A (ko) 유비쿼터스 컴퓨팅 네트워크 환경에서 커뮤니티 컴퓨팅을 위한 디바이스 멤버 인증방법
Hsu et al. ECDSA Certificate Enrollment and Authentication for SCEP Protocol in Smart Grid PKI
CN114244502A (zh) 基于sm9算法的签名密钥生成方法、装置和计算机设备
CN116506184A (zh) 数据加密方法、数据验证方法及相关装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18853006

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020513694

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20207009708

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2018853006

Country of ref document: EP

Effective date: 20200407