CN101616002B - User identity authentication method and device thereof - Google Patents

User identity authentication method and device thereof Download PDF

Info

Publication number
CN101616002B
CN101616002B CN2008101252396A CN200810125239A CN101616002B CN 101616002 B CN101616002 B CN 101616002B CN 2008101252396 A CN2008101252396 A CN 2008101252396A CN 200810125239 A CN200810125239 A CN 200810125239A CN 101616002 B CN101616002 B CN 101616002B
Authority
CN
China
Prior art keywords
pki
public key
virtual
storehouse
key information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2008101252396A
Other languages
Chinese (zh)
Other versions
CN101616002A (en
Inventor
岑文初
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN2008101252396A priority Critical patent/CN101616002B/en
Publication of CN101616002A publication Critical patent/CN101616002A/en
Priority to HK10105484.0A priority patent/HK1138955A1/en
Application granted granted Critical
Publication of CN101616002B publication Critical patent/CN101616002B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a user identity authentication method and a device thereof. The user identity authentication method comprises the following steps: receiving a user identity authentication request and searching whether a virtual public key library for storing user public key information in a memory has a public key that corresponds to a user or not; if the public key exists, using the searched public key to authenticate the user identity; if the public key does not exist, using a public key source for storing the user public key information to update the virtual public key library and searching whether the updated virtual public key library has a corresponding public key or not; if the public key exists, using the searched public key to carry out the authentication; and if the public key does not exist, returning to a result of authentication failure. The user identity authentication method can instantaneously update the virtual public key library stored in the memory when a public key of a fiduciary user can not be searched in the process of using the public key to authenticate the fiduciary user; and in addition, the invention is simple and convenient for being realized.

Description

A kind of user ID authentication method and device
Technical field
The present invention relates to information security field, relate in particular to a kind of user ID authentication method and device.
Background technology
Web service (Web Service) is extensively applied in the various internet, applications as the current mode of loose coupling information interaction the most widely; Because interactive information is directly exposed to and has a lot of potential safety hazards on the Internet; Therefore digital certificate is widely used; Digital certificate is a kind of authoritative electronic document, a series of data of tag communications each side identity information.It provide a kind of on Internet the mode of identity verification.
Digital certificate can be divided into two types at present, and one type is certificate granting center (Certificate Authority, CA) digital certificate of the digital certificate of authentication and non-ca authentication.The former is that the latter obtains later through the ca authentication signature, because the cost of ca authentication is higher, what at present most common developer used is the digital certificate of non-ca authentication; In the digital certificate use of non-ca authentication; As shown in Figure 1, if the both sides of information interaction (A and B) need to use signature authentication, so just must import to the PKI in the other side's digital certificate in the home server stored certificate storehouse in advance; With evidence as the verification identity; Both sides are when carrying out information interaction, and A uses the private key of oneself that the information that sends to B is carried out digital signature, and B uses the PKI of the A in the local certificate repository to decipher after receiving this information.
In the use of the digital certificate of above-mentioned non-ca authentication; If a certain number formulary word certificate update of information interaction or establishment again; So just must from the other side's digital certificate, PKI be derived again, import in the home server stored certificate storehouse through artificial mode again, and because digital certificate and certificate repository all are static files; PKI after the renewal must be restarted server after importing certificate repository, and new PKI can come into force.
Moreover; Carry out under the situation of information interaction with a plurality of users at the same time; If (constantly increase or reduce) appears changing in trusted parties user; So just need constantly in local certificate repository, to import new PKI or delete existing PKI, in the certificate repository file, increase or the deletion PKI, also must restart server and just can come into force.
Upgrade than the problem that bothers, can not upgrade in time and update efficiency is low based on PKI in the certificate repository of above-mentioned prior art existence; The trusted parties user is carried out in the process of authentication using public-key; Occur probably because the PKI in the certificate repository file fails to upgrade in time; Cause validated user not reduced the runnability and the efficient of Web Service authentication system through the situation of authentication.
Summary of the invention
The invention provides a kind of user ID authentication method and device; PKI upgrades than the problem that bothers, can not upgrade in time and update efficiency is low in the certificate repository that exists in the prior art in order to solve, and the problem of the Web Service authentication system runnability that is caused thus reduction.
A kind of user ID authentication method provided by the invention comprises:
Receive the subscriber authentication request, in internal memory, search the PKI that whether has this user corresponding in the virtual PKI storehouse of storage client public key information;
If have, use the PKI that finds to carry out subscriber authentication;
If do not have, upgrade said virtual PKI storehouse with the PKI source of storage client public key information; And search whether there is corresponding PKI in the virtual PKI storehouse after renewal; If exist, use the PKI that finds to carry out authentication; If do not exist, return the result of authentication failure.
A kind of subscriber authentication device provided by the invention comprises:
Virtual PKI storehouse is used in internal memory storage client public key information;
The request receiving element is used to receive the subscriber authentication request;
The first public key lookup unit is used for searching the PKI that whether has this user corresponding in the said virtual PKI storehouse that stores client public key information according to said subscriber authentication request; If have, the PKI that finds is sent to identity authenticating unit; If do not have, notify the first virtual PKI storehouse updating block;
The said first virtual PKI storehouse updating block is used for the notice according to the said first public key lookup unit, uses the PKI source of storage client public key information to upgrade said virtual PKI storehouse;
The second public key lookup unit is used for after the said first virtual PKI storehouse updating block upgrades virtual PKI storehouse, searching the PKI that whether has the user corresponding; If have, the PKI that finds is sent to identity authenticating unit; If do not have, return the result of authentication failure;
Said identity authenticating unit, the PKI that is used to use the said first public key lookup unit or the second public key lookup unit to find carries out subscriber authentication.
Beneficial effect of the present invention is following:
The method of authentication provided by the invention and device through receiving the subscriber authentication request, are searched the PKI that whether has this user corresponding in the virtual PKI storehouse of storage client public key information in internal memory; If have, use the PKI that finds to carry out subscriber authentication; If do not have, upgrade said virtual PKI storehouse with the PKI source of storage client public key information; Search in the virtual PKI storehouse after renewal and whether have corresponding PKI; If have, use the PKI that finds to carry out authentication; If do not have, return the result of authentication failure.User ID authentication method provided by the present invention and device; The trusted parties user is carried out in the authentication process itself using public-key; When searching less than this trusted parties client public key, can realize the virtual PKI storehouse that is stored in the internal memory is immediately upgraded, realize simple and convenient.So just avoided in the prior art, because PKI upgrades than trouble in the certificate repository, the untimely validated user that causes can not be through the problem of authentication.
Description of drawings
Fig. 1 is digital certificate use sketch map in the background technology of the present invention;
The auth method sketch map that Fig. 2 provides for the embodiment of the invention;
Fig. 3 A is that process flow diagram is set up in the virtual PKI storehouse that the embodiment of the invention provides;
Fig. 3 B is that the mode of the use software module that provides of the embodiment of the invention is created the flow chart in virtual PKI storehouse;
The user ID authentication method flow chart that Fig. 4 provides for the embodiment of the invention;
The subscriber authentication device internal structure sketch map that Fig. 5 provides for the embodiment of the invention.
Embodiment
Below in conjunction with accompanying drawing, a kind of user ID authentication method of the present invention and device are carried out detailed explanation with specific embodiment.
For the convenience of explaining; The embodiment of the invention describes with the instance among Fig. 2; In Fig. 2, the digital signature that the user A in the Web Service authentication system uses the public key information of the user B that stores in its virtual PKI storehouse that trusted parties user B is sent is carried out authentication (certainly, in Web Service authentication system; The trusted parties user of user A can also have one or more except user B, for example can also comprise user C, user D or the like).The virtual PKI storehouse of user A generates through the public key information in the PKI source is loaded in the internal memory, and concrete visioning procedure is following:
Shown in Fig. 3 A, the constructive process in the virtual PKI storehouse that the embodiment of the invention provides comprises the steps:
Step 301, the PKI that receives is stored in the PKI source.
When at first connecting between each trusted parties user and the user A, all can the PKI of oneself be sent to user A, user A automatically is stored to the PKI that receives in the PKI source.
Different with prior art; Public key information in the PKI source adopts the mode of separating with digital certificate to store; Can there be various ways in the PKI source; Include but not limited to database, file or the like, because the public key information storage form in the PKI source no longer is the static file form, but the form of the non-static files such as for example database that adopt; Public key information in the form of this non-static file can be easily, immediately make amendment, increase or delete, and is different fully with the update mode of static files such as existing digital certificate or certificate repository.The PKI source can be stored in this locality of user A, also can be stored on the network side third-party server of user A trust, and the present invention does not do any qualification to concrete memory location, PKI source.
For example when a certain trusted parties user's PKI took place to upgrade, this trusted parties user can send to user A with upgrading back PKI derivation, after user A receives the PKI after this user upgrades, uses this PKI to upgrade public key information corresponding in the PKI source.
For example when increasing new trusted parties user, user A can be added into the new trusted parties client public key that receives in the PKI source again; Perhaps
When the trusted parties user reduces, the public key information deletion that user A can be directly corresponding with this trusted parties user in the PKI source.
Step 302, from the PKI source that stores client public key information, obtain public key information, generate virtual PKI storehouse to internal memory.
The Axis2 framework that the embodiment of the invention is increased income at Java (functions such as the issue of the mutual each side of Axis2 framework support Web Service message, parsing; For the image statement; Below be called Web Service and resolve release module) the basis on the realization function of its existing public key acquisition module is expanded, realized the constructive process in virtual PKI storehouse with the mode of software module.But the embodiment of the invention does not limit which kind of Software tool of concrete employing do not develop, the embodiment of the invention is merely a kind of preferable embodiment.Certainly, the mode that mode can also adopt software and hardware to combine is created in virtual PKI storehouse, and the embodiment of the invention is not done any qualification to this.
The idiographic flow of creating virtual PKI storehouse in this step 302 comprises shown in Fig. 3 B:
Step 3021, initialization Web Service resolve release module, and Web Service resolves release module and calls the public key acquisition module.
When Web Service application start, initialization Web Service resolves release module;
Existing Web Service parsing release module provides and has been applied to the mutual used public key acquisition module of each side's identity verification in the Web Service authentication system; The embodiment of the invention is a cutting point with this module; Realization to this module is expanded, make that the public key acquisition module is called after, the realization of public key acquisition module is except carrying out existing logic; For example be written into public affairs in user A self digital certificate, private key to information etc., also need carry out following step 3022.
Step 3022, public key acquisition module creation public key management module.
The realization of public key acquisition module is searched public key management modules configured file according to the rule of setting under current environment; If corresponding configuration file is not found in the realization of public key acquisition module, so just be written into the module of acquiescence; If corresponding configuration file is found in the realization of public key acquisition module, be written into the specified module of this configuration file so.The module of configuration file and appointment can be created and stored by the developer as required in advance.When acquiescence or the module of appointment be that the public key acquisition module had just been accomplished the establishment to the public key management module after the realization of public key management module was written into.
Step 3023, public key management module creation PKI are written into update module.
The realization of public key management module is searched the configuration file that PKI is written into update module according to the rule of setting under current environment; If do not find corresponding configuration file, the realization of public key management module is written into the module of acquiescence so; If find corresponding configuration file, the realization of public key management module is written into the specified module of this configuration file so.When acquiescence or the module of appointment be after realization that PKI is written into update module is written into, the public key management module has just been accomplished the establishment that PKI is written into update module.
After step 3024, PKI were written into update module establishment completion, PKI was written into update module and from the PKI source, obtains PKI, creates virtual PKI storehouse.PKI is written into update module and from the PKI source, obtains PKI, and the PKI that gets access to is stored in the internal memory, forms virtual PKI storehouse.
The interface that above-mentioned public key management module, PKI are written into update module designs completion in advance; In the process that virtual PKI storehouse generates, be written into module acquiescence or appointment by the upper level module, the establishment of the module of completion next stage is (for example by public key acquisition module creation public key management module; Be written into update module by creating good public key management module creation PKI); After PKI is written into update module establishment completion, carry out and from the PKI source, obtain the operation that PKI deposits internal memory in, form virtual PKI storehouse.
In embodiments of the present invention, after completion is created in virtual PKI storehouse, can from the PKI source, obtain public key information, and use the public key information that gets access to that virtual PKI storehouse is upgraded according to the frequency period ground of setting to internal memory;
Can also carry out in the authentication process itself the user, immediately virtual PKI storehouse upgraded as required, above-mentioned dual mode guaranteed the public key information in the virtual PKI storehouse can be in time with the PKI source in public key information be consistent.So just avoided in the prior art; Updating digital certificate as the trusted parties user; When perhaps trusted parties user self increases or reduces, need static file such as artificial verification stack room to make amendment, upgrade the troublesome poeration that caused, upgrade untimely and inefficient problem.
Still with user A among Fig. 2 trusted parties user B being carried out authentication is example; After virtual PKI storehouse is set up; When receiving the subscriber authentication request, when need verify to user's digital signature, the user ID authentication method that the embodiment of the invention provided; As shown in Figure 4, may further comprise the steps:
Step 401, reception subscriber authentication request;
Step 402, in the virtual PKI storehouse of user A, search the PKI that whether has this trusted parties user B corresponding according to the digital certificate user name of carrying in this request.When finding corresponding PKI, carry out the following step 403; When not finding corresponding PKI, carry out the following step 404;
Because step 404 is an optional step, also can when not finding corresponding PKI, directly carry out the following step 405 in the embodiment of the invention.
The PKI that step 403, use find is verified the digital signature of user B, verifies whether it is legal users; And return corresponding checking result (authentication through or failure).
Step 404, judge current virtual PKI storehouse renewal frequency whether greater than preset threshold, if judged result is for being that execution in step 405 so; If judged result is that then execution in step 406.
Why step 404 is optional step, main because this step be to the safety of Web Service authentication system with the aspect of performance consideration and be provided with; Owing to need expend system resource,, the user is being carried out in the authentication process itself if it is higher that virtual PKI storehouse is set renewal frequency to the renewal process (from the PKI source, obtain PKI again and be loaded into internal memory again) in virtual PKI storehouse; It is not only unnecessary to upgrade virtual PKI storehouse too continually, in addition may be unfavorable with safety to the performance of whole Web Service authentication system operation, therefore; Can judge whether that needs immediately upgrade virtual PKI storehouse according to the size of the renewal frequency in current virtual PKI storehouse; For example can compare, if the renewal frequency in virtual PKI storehouse is higher, greater than this threshold value with a certain threshold value of setting; So just judge and do not need immediate updating; If the renewal frequency in virtual PKI storehouse is lower, smaller or equal to this threshold value, so just judgement needs immediate updating.
Step 405, use store the PKI source of trusted parties client public key information and upgrade current virtual PKI storehouse.
Step 406, directly return the result of this subscriber authentication failure.
After the renewal process of completion to the virtual PKI storehouse of user A in the step 405, also need carry out following steps:
Search the PKI that whether has user B corresponding in the virtual PKI storehouse of step 407, the user A after renewal once more, when finding corresponding PKI, turn to execution in step 403; When the public key management module does not find corresponding PKI, turn to execution in step 406.
The embodiment of the invention also provides a kind of subscriber authentication device; As shown in Figure 5, specifically comprise: virtual PKI storehouse 501, request receiving element 502, the first public key lookup unit, 503, the first virtual PKI storehouse updating block 504, the second public key lookup unit 505 and identity authenticating unit 506; Wherein:
Virtual PKI storehouse 501 is used in internal memory storage client public key information;
Request receiving element 502 is used to receive the subscriber authentication request;
The first public key lookup unit 503 is used for according to the subscriber authentication request that receives, and searches in storing the virtual PKI storehouse 501 of client public key information whether corresponding PKI is arranged; If have, the PKI that finds is sent to identity authenticating unit 506; If do not have, notify the first virtual PKI storehouse updating block 504;
The first virtual PKI storehouse updating block 504 is used for the notice according to the first public key lookup unit 503, upgrades virtual PKI storehouse 501 with the PKI source of storage client public key information; And after completion is upgraded in virtual PKI storehouse 501, notify the second public key lookup unit 505;
The second public key lookup unit 505 is used for the notice according to the first virtual PKI storehouse updating block 504, searches in the virtual PKI storehouse 501 after renewal whether corresponding PKI is arranged; If have, the PKI that finds is sent to identity authenticating unit 506; If do not have, return the result of authentication failure;
Identity authenticating unit 506, the PKI that is used to use the first public key lookup unit 503 or the second public key lookup unit 505 to find carries out authentication.
The subscriber authentication device that the embodiment of the invention provided further, also comprises: judging unit 507;
The first public key lookup unit 503 when in virtual PKI storehouse 501, not finding corresponding PKI, also is used to notify judging unit 507;
Whether judging unit 507, virtual PKI storehouse self renewal frequency that is used to judge current setting be greater than preset threshold, if return the result that subscriber authentication is failed;
If not, notify the first virtual PKI storehouse updating block 504 to upgrade virtual PKI storehouse 501.
The authentication means that the embodiment of the invention provided further, also comprises: virtual PKI storehouse generation unit 508;
Virtual PKI storehouse generation unit 508 is used for obtaining public key information to internal memory through the PKI source from storage client public key information, generates virtual PKI storehouse 501.
The authentication means that the embodiment of the invention provided further, also comprises: the second virtual PKI storehouse updating block 509; Be used for obtaining public key information to internal memory from the PKI source, use the public key information that gets access to that virtual PKI storehouse 501 is upgraded according to the frequency period ground of setting.
The subscriber authentication device that the embodiment of the invention provides is a preferred implementation; In the practical implementation process; Also can directly adopt the software module used when creating virtual PKI storehouse for example public key management module and PKI be written into the partial function that update module is accomplished above-mentioned authentication means, for example adopt the public key management module can realize the function of the above-mentioned first public key lookup unit, the second public key lookup unit and identity authenticating unit; PKI is written into the function that update module is accomplished the above-mentioned first virtual PKI storehouse updating block, and the division of above-mentioned module or unit can produce concrete change and distortion because of the difference of practical implementation method, and the present invention does not do any qualification to this.
The embodiment of the invention provides a kind of method of authentication, comprising: according to the request of the authentication that receives, search in virtual PKI storehouse whether corresponding PKI is arranged; If have, use the PKI that finds to carry out authentication; If do not have, from the PKI source, obtain public key data again, upgrade virtual PKI storehouse; Search in the virtual PKI storehouse after renewal and whether have corresponding PKI; If exist, use the PKI that finds to carry out authentication; If do not exist, return the result of authentication failure.User ID authentication method provided by the present invention; The trusted parties user is carried out in the authentication process itself using public-key; When searching less than this trusted parties client public key, can realize the virtual PKI storehouse that is stored in the internal memory is immediately upgraded, realize simple and convenient.So just avoided in the prior art, because PKI upgrades than trouble in the certificate repository, the untimely validated user that causes can not be through the problem of authentication.And because so the virtual PKI library storage that the embodiment of the invention provides in use, can more conveniently be inquired about in internal memory apace.
In addition; The user ID authentication method that the embodiment of the invention provided, when in virtual PKI storehouse, not finding corresponding PKI, the size that has also increased according to virtual PKI storehouse self renewal frequency judges whether that needs immediately upgrade the step in current virtual PKI storehouse; If judged result is for being; Carry out the step of upgrading virtual PKI storehouse so, if judged result is directly returned the result of authentication failure for not; Can guarantee under prerequisite convenient to PKI, that immediately upgrade the runnability and the fail safe that improve Web Service authentication system like this.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, belong within the scope of claim of the present invention and equivalent technologies thereof if of the present invention these are revised with modification, then the present invention also is intended to comprise these changes and modification interior.

Claims (10)

1. a user ID authentication method is characterized in that, comprising:
Receive the subscriber authentication request, in internal memory, search the PKI that whether has this user corresponding in the virtual PKI storehouse of storage client public key information;
If have, use the PKI that finds to carry out subscriber authentication;
If do not have, upgrade said virtual PKI storehouse with the PKI source of storage client public key information, and search whether there is corresponding PKI in the virtual PKI storehouse after renewal; If exist, use the PKI that finds to carry out authentication, if do not exist, return the result of authentication failure.
2. the method for claim 1 is characterized in that, said PKI source with storage client public key information is upgraded before the said virtual PKI storehouse, also comprises:
Whether the renewal frequency of judging current said virtual PKI storehouse is greater than preset threshold, if return the result that subscriber authentication is failed; If not, upgrade said virtual PKI storehouse with the PKI source of storage client public key information.
3. the method for claim 1 is characterized in that, said virtual PKI storehouse generates to internal memory through from the PKI source of storage client public key information, obtaining public key information.
4. method as claimed in claim 3 is characterized in that, also comprises: when client public key upgrades, use public key information corresponding in the said PKI of the said client public key information updating source after upgrading;
When the user increases, the new user's who receives public key information is added in the PKI source;
When the user reduces, the corresponding public key information of trusted parties user of the said minimizing of deletion in the PKI source.
5. method as claimed in claim 4 is characterized in that, also comprises: the frequency period ground according to setting obtains public key information to internal memory from the PKI source, and uses the said public key information that gets access to that said virtual PKI storehouse is upgraded.
6. like each described method of claim 1-5, it is characterized in that said PKI source comprises: store one or more trusted parties client public key database of information or file.
7. a subscriber authentication device is characterized in that, comprising:
Virtual PKI storehouse is used in internal memory storage client public key information;
The request receiving element is used to receive the subscriber authentication request;
The first public key lookup unit is used for searching the PKI that whether has this user corresponding in the said virtual PKI storehouse that stores client public key information according to said subscriber authentication request; If have, the PKI that finds is sent to identity authenticating unit; If do not have, notify the first virtual PKI storehouse updating block;
The said first virtual PKI storehouse updating block is used for the notice according to the said first public key lookup unit, uses the PKI source of storage client public key information to upgrade said virtual PKI storehouse;
The second public key lookup unit is used for after the said first virtual PKI storehouse updating block upgrades virtual PKI storehouse, searching the PKI that whether has the user corresponding; If have, the PKI that finds is sent to identity authenticating unit; If do not have, return the result of authentication failure;
Said identity authenticating unit, the PKI that is used to use the said first public key lookup unit or the second public key lookup unit to find carries out subscriber authentication.
8. device as claimed in claim 7 is characterized in that said authentication means also comprises: judging unit;
The said first public key lookup unit when in said virtual PKI storehouse, not finding corresponding PKI, also is used to notify said judging unit;
Whether said judging unit, the renewal frequency in said virtual PKI storehouse that is used to judge current setting greater than preset threshold, if return the result of subscriber authentication failure;
If not, notify the said first virtual PKI storehouse updating block to upgrade said virtual PKI storehouse.
9. device as claimed in claim 7 is characterized in that, said authentication means also comprises: virtual PKI storehouse generation unit;
Said virtual PKI storehouse generation unit is used for obtaining public key information to internal memory through the PKI source from storage client public key information, generates virtual PKI storehouse.
10. require 9 described devices like the right spy, it is levied and is, said authentication means also comprises: the second virtual PKI storehouse updating block;
The said second virtual PKI storehouse updating block is used for obtaining public key information to internal memory according to the frequency period ground of setting from the PKI source, uses the said public key information that gets access to that said virtual PKI storehouse is upgraded.
CN2008101252396A 2008-06-23 2008-06-23 User identity authentication method and device thereof Active CN101616002B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2008101252396A CN101616002B (en) 2008-06-23 2008-06-23 User identity authentication method and device thereof
HK10105484.0A HK1138955A1 (en) 2008-06-23 2010-06-03 User identity verification method and apparatus thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101252396A CN101616002B (en) 2008-06-23 2008-06-23 User identity authentication method and device thereof

Publications (2)

Publication Number Publication Date
CN101616002A CN101616002A (en) 2009-12-30
CN101616002B true CN101616002B (en) 2012-03-21

Family

ID=41495432

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101252396A Active CN101616002B (en) 2008-06-23 2008-06-23 User identity authentication method and device thereof

Country Status (2)

Country Link
CN (1) CN101616002B (en)
HK (1) HK1138955A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102026178B (en) * 2010-12-31 2013-06-12 成都三零瑞通移动通信有限公司 User identity protection method based on public-key mechanism
CN103001774B (en) * 2012-11-30 2015-06-17 飞天诚信科技股份有限公司 Method and device for managing package file
US10033720B2 (en) * 2014-05-28 2018-07-24 Futurewei Technologies, Inc. Method and system for creating a certificate to authenticate a user identity
CN111079103B (en) * 2015-09-14 2024-02-09 创新先进技术有限公司 Identity authentication method and equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159556A (en) * 2007-11-09 2008-04-09 清华大学 Group key server based key management method in sharing encryption file system
CN101188616A (en) * 2007-12-12 2008-05-28 四川长虹电器股份有限公司 Method for terminal to apply for certificate

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159556A (en) * 2007-11-09 2008-04-09 清华大学 Group key server based key management method in sharing encryption file system
CN101188616A (en) * 2007-12-12 2008-05-28 四川长虹电器股份有限公司 Method for terminal to apply for certificate

Also Published As

Publication number Publication date
HK1138955A1 (en) 2010-09-03
CN101616002A (en) 2009-12-30

Similar Documents

Publication Publication Date Title
US11088903B2 (en) Hybrid cloud network configuration management
US10148643B2 (en) Authenticating or controlling software application on end user device
US8693690B2 (en) Organizing an extensible table for storing cryptographic objects
JP4993733B2 (en) Cryptographic client device, cryptographic package distribution system, cryptographic container distribution system, and cryptographic management server device
US8745223B2 (en) System and method of distributed license management
US20190140837A1 (en) Remote Management Method, and Device
US20090320110A1 (en) Secure boot with optional components method
JP5304345B2 (en) Content processing apparatus, content processing system, and content processing program
US8341616B2 (en) Updating digitally signed active content elements without losing attributes associated with an original signing user
CN110008665B (en) Authority control method and device for blockchain
CN103595730A (en) Ciphertext cloud storage method and system
JP2015511735A (en) Software installation method, device and system
CN111918274B (en) Code number configuration and management method and device, electronic equipment and readable storage medium
CN105072608B (en) A kind of method and device of administrative authentication token
US11165774B2 (en) Delegated authentication to certificate authorities
US8646070B1 (en) Verifying authenticity in data storage management systems
CN101616002B (en) User identity authentication method and device thereof
CN112131041A (en) Method, apparatus and computer program product for managing data placement
CN109687970B (en) Mobile block chain full node and implementation method thereof
US8326933B2 (en) Appearance package management method, system and device
CN110807203B (en) Data processing method, service operation center platform, system and storage medium
CN113434824B (en) Software service authorization management method, device, equipment and storage medium
CN111737679B (en) Security authentication method and device, electronic equipment and storage medium
CN114489737A (en) Multi-firmware OTA (over the air) upgrading method and device, server and storage medium
CN111698227B (en) Information synchronization management method, device, computer system and readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1138955

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1138955

Country of ref document: HK