CN107819584A - Digital certificate acquisition methods and device - Google Patents
Digital certificate acquisition methods and device Download PDFInfo
- Publication number
- CN107819584A CN107819584A CN201710941212.3A CN201710941212A CN107819584A CN 107819584 A CN107819584 A CN 107819584A CN 201710941212 A CN201710941212 A CN 201710941212A CN 107819584 A CN107819584 A CN 107819584A
- Authority
- CN
- China
- Prior art keywords
- digital certificate
- service end
- trusted
- request
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application provides a kind of digital certificate acquisition methods and device, applied to client, including:Digital certificate is sent to service end and obtains request, so that the service end returns to the digital certificate for obtaining successful information and the service end to the client when the uniform resource position mark URL that the digital certificate is obtained in request is identical with default request URL;When receiving the acquisition successful information that the service end returns, detect whether the digital certificate that the service end returns is trusted digital certificate;If the digital certificate is not trusted digital certificate, the digital certificate is arranged to trusted digital certificate, and access request is sent to the service end, to obtain business datum.Cost can be reduced to a great extent in technical scheme.
Description
Technical field
The application is related to communication technical field, more particularly to a kind of digital certificate acquisition methods and device.
Background technology
Apple companies carry to strengthen the Network Communicate Security of App in iOS system (Application, application program)
ATS (App Transport Security, application transport safety) function is gone out, suitable for iOS App and App
Extension.After ATS functions are enabled, client can be forced to pass through HTTPS (Hyper Text Transfer
Protocol over Secure Socket Layer, the HTTP based on SSL) with service end it
Between carry out network service.
The digital certificate of ATS functional requirement service ends must be by CA trusty (Certificate Authority, card
Book issuing organization) issue, CA trusty can be the trusted that the CA that root certificate is installed by operating system or user are set
CA.In correlation technique, the digital certificate of service end needs to buy to CA trusty, and is also needed after digital certificate is bought
Its validity of periodic maintenance is wanted, therefore cost is higher.
The content of the invention
In view of this, the application provides a kind of digital certificate acquisition methods and device, with solve in correlation technique cost compared with
The problem of high.
Specifically, the application is achieved by the following technical solution:
In a first aspect, the application provides a kind of digital certificate acquisition methods, methods described is applied to client, including:
Digital certificate is sent to service end and obtains request, so that the service end is in the digital certificate obtains request
When uniform resource position mark URL is identical with default request URL, is returned to the client and obtain successful information and the service
The digital certificate at end;
When receiving the acquisition successful information that the service end returns, detecting the digital certificate that the service end returns is
No is trusted digital certificate;
If the digital certificate is not trusted digital certificate, the digital certificate is arranged to trusted numeral card
Book, and access request is sent to the service end, to obtain business datum.
Second aspect, the application provide a kind of digital certificate acquisition methods, and methods described is applied to service end, including:
When the digital certificate for receiving client transmission obtains request, detect the digital certificate and obtain in request
Whether URL is identical with default request URL;
If the URL that the digital certificate is obtained in request is identical with the request URL, returns and obtain to the client
The digital certificate of successful information and the service end is taken, so that the client is receiving the acquisition successful information, and is examined
When to measure the digital certificate be not trusted digital certificate, the digital certificate is arranged to trusted digital certificate, and to
The service end sends access request, to obtain business datum.
The third aspect, the application provide a kind of digital certificate acquisition device, and described device is applied to client, including:
First transmitting element, request is obtained for sending digital certificate to service end, so that the service end is in the number
When uniform resource position mark URL in the request of word certificate acquisition is identical with default request URL, returns and obtain to the client
The digital certificate of successful information and the service end;
Detection unit, for when receiving the acquisition successful information that the service end returns, detecting the service end and returning
Whether the digital certificate returned is trusted digital certificate;
Setting unit, for when the digital certificate is not trusted digital certificate, the digital certificate to be arranged to
Trusted digital certificate, and access request is sent to the service end, to obtain business datum.
Fourth aspect, the application provide a kind of digital certificate acquisition device, and described device is applied to service end, including:
Detection unit, when being asked for being obtained in the digital certificate for receiving client transmission, detect the digital certificate
Whether the URL and default request URL in acquisition request are identical;
Returning unit, for obtained in the digital certificate URL in request it is identical with the request URL when, to described
Client returns to the digital certificate for obtaining successful information and the service end so that the client receive it is described obtain into
Work(information, and when to detect the digital certificate be not trusted digital certificate, the digital certificate is arranged to trusted number
Word certificate, and access request is sent to the service end, to obtain business datum.
Analyze above-mentioned technical proposal understand, client after self-built digital certificate is arranged into trusted digital certificate,
It can be based on carrying out data transmission between the trusted digital certificate and service end, to realize customer service.Using such side
Formula, for supporting the service end of ATS functions, its digital certificate need not buy simultaneously periodic maintenance to CA trusty again, and
Cost can largely be reduced by the use of self-built digital certificate as its digital certificate.
Brief description of the drawings
Fig. 1 is a kind of flow chart of digital certificate acquisition methods shown in the exemplary embodiment of the application one;
Fig. 2 is the flow chart of another digital certificate acquisition methods shown in the exemplary embodiment of the application one;
Fig. 3 is a kind of hardware configuration of digital certificate acquisition device place equipment shown in the exemplary embodiment of the application one
Figure;
Fig. 4 is the hardware knot of another digital certificate acquisition device place equipment shown in the exemplary embodiment of the application one
Composition;
Fig. 5 is a kind of block diagram of digital certificate acquisition device shown in the exemplary embodiment of the application one;
Fig. 6 is the block diagram of another digital certificate acquisition device shown in the exemplary embodiment of the application one.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the application.
It is only merely for the purpose of description specific embodiment in term used in this application, and is not intended to be limiting the application.
" one kind " of singulative used in the application and appended claims, " described " and "the" are also intended to including majority
Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and wrapped
Containing the associated list items purpose of one or more, any or all may be combined.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application
A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, do not departing from
In the case of the application scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as
One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determining ".
In correlation technique, because the digital certificate of ATS functional requirement service ends must be issued by CA trusty, therefore it is right
For the service end of ATS functions is supported, its digital certificate needs to buy to CA trusty, and after digital certificate is bought
Periodic maintenance its validity is also required to, cost is higher.On the other hand, when buying digital certificate to CA trusty, trusted
CA need to audit service end, it is also desirable to expend certain time.
The application provides a kind of digital certificate acquisition methods and device, to solve the above mentioned problem in correlation technique.It please join
Fig. 1 is examined, is a kind of flow chart of digital certificate acquisition methods shown in the exemplary embodiment of the application one.This method can be applied
In client, comprise the following steps:
Step 101:Digital certificate is sent to service end and obtains request, so that the service end obtains in the digital certificate
When uniform resource position mark URL in request is identical with default request URL, to the client return obtain successful information and
The digital certificate of the service end.
Step 102:When receiving the acquisition successful information that the service end returns, the number that the service end returns is detected
Whether word certificate is trusted digital certificate.
Step 103:If the digital certificate is not trusted digital certificate, the digital certificate is arranged to credible
Appoint digital certificate, and access request is sent to the service end, to obtain business datum.
In the present embodiment, user can pre-set request URL (Uniform Resource in service end
Locator, URL), the request URL can be used to the digital certificate of acquisition request service end.In another example
In son, request URL can also be by determination of being held consultation between service end and client.
Subsequently, after user opens client by terminal device, if it is determined that client is needed between service end
Network service is carried out based on ATS functions, then client can call underlying security interface first, based on the request URL to service
End sends digital certificate and obtains request, to obtain the digital certificate of service end, during for carrying out data transmission between service end
Authentication.Wherein, underlying security interface is unrelated with ATS functions, i.e., client is calling underlying security interface to send numeral
Certificate acquisition need not meet the requirement of ATS functions when asking.
Service end is after the digital certificate for receiving client transmission obtains request, if detecting that the digital certificate obtains
URL in request is identical with above-mentioned request URL, then illustrates that client needs to obtain the digital certificate of this service end, therefore service
End can return to its digital certificate client, and returned to client and obtain successful information.
Client is when receiving the acquisition successful information of service end return, you can determines that this client successfully obtains clothes
The digital certificate at business end, so as to further call underlying security interface, the digital certificate returned to service end is examined
Survey, to detect whether the digital certificate is trusted digital certificate.
It should be noted that in the present embodiment, it is that the numeral issued by CA trusty is demonstrate,proved that trusted digital certificate, which is,
Book, and for digital certificate voluntarily being configured by user, meeting ATS functional requirements (being referred to as self-built digital certificate) etc.,
Because the CA of this kind of digital certificate is not CA trusty, but voluntarily configured by user, therefore this kind of digital certificate is not
Trusted digital certificate.
Specifically, the CA (CA for issuing the digital certificate) for the digital certificate that client can return to service end enters
Row detection, you can the trusted CA lists locally preserved with detecting the CA of the digital certificate whether to match.If the digital certificate
CA match trusted CA lists, then client can determine that the digital certificate is trusted digital certificate;If the numeral
The CA of certificate mismatches trusted CA lists, then client can determine that the digital certificate is not trusted digital certificate.
Based on above-mentioned testing result, if client determines that the digital certificate that service end returns not is trusted numeral card
Book, then it is self-built digital certificate to illustrate the digital certificate, and client receives the self-built digital certificate first.In such case
Under, client can call underlying security interface, and the self-built digital certificate is arranged into trusted digital certificate.
Specifically, the CA of above-mentioned self-built digital certificate can be added to the trusted CA lists locally preserved by client
In, the self-built digital certificate is arranged to trusted digital certificate.So, subsequent client receives the self-built numeral again
During certificate, because the self-built digital certificate matches trusted CA lists, therefore client directly can demonstrate,prove the self-built numeral
Book is defined as trusted digital certificate.
Client is arranged to after trusted digital certificate by above-mentioned self-built digital certificate, you can calls upper strata API
(Application Programming Interface, application programming interface), based on the trusted digital certificate (i.e.
The self-built digital certificate) to service end transmission access request, to obtain the business datum in service end, so that client and clothes
Business can be carried out data transmission between end based on the trusted digital certificate, to realize customer service.
If client determines that the digital certificate that service end returns is trusted digital certificate, client can be adjusted directly
With upper strata API, access request is sent to service end based on the trusted digital certificate, to obtain the business datum in service end,
So that it can be carried out data transmission between client and service end based on the trusted digital certificate, to realize customer service.
On the other hand, service end is after the digital certificate for receiving client transmission obtains request, if detecting the number
URL in the request of word certificate acquisition is different from above-mentioned request URL, then illustrates that the digital certificate that client needs obtain not is this
The digital certificate of service end, therefore service end can return to client and obtain failure information.
Client is when receiving the acquisition failure information of service end return, you can interrupts the company established between service end
Connect, to ensure the safety and reliability of business datum in service end.
As seen from the above-described embodiment, client is by self-built digital certificate after trusted digital certificate is arranged to, can be with
Based on carrying out data transmission between the trusted digital certificate and service end, to realize customer service.Adopt in such a way, it is right
For the service end of ATS functions is supported, its digital certificate need not buy simultaneously periodic maintenance to CA trusty again, and can profit
By the use of self-built digital certificate as its digital certificate, largely reduce cost.On the other hand, service end can also be removed to exist
Because CA needs time that it is audited and expended when buying digital certificate to CA trusty.
Fig. 2 is refer to, is the flow chart of another digital certificate acquisition methods shown in the exemplary embodiment of the application one.
This method can apply to service end, comprise the following steps:
Step 201:When the digital certificate for receiving client transmission obtains request, detecting the digital certificate acquisition please
Whether the URL and default request URL in asking are identical.
Step 202:If the URL that the digital certificate is obtained in request is identical with the request URL, to the client
End returns to the digital certificate for obtaining successful information and the service end, so that the client is successfully believed receiving described obtain
Breath, and when to detect the digital certificate be trusted digital certificate, the digital certificate is arranged to trusted numeral and demonstrate,proved
Book, and access request is sent to the service end, to obtain business datum.
In the present embodiment, service end is after the digital certificate for receiving client transmission obtains request, if detected
The URL that the digital certificate is obtained in request is identical with above-mentioned request URL, then illustrates that client needs to obtain the numeral of this service end
Certificate, therefore service end can return to its digital certificate client, and returned to client and obtain successful information.Wherein,
It can be 200OK information etc. to obtain successful information.
Client is when receiving the acquisition successful information of service end return, you can determines that this client successfully obtains clothes
The digital certificate at business end, so as to further call underlying security interface, the digital certificate returned to service end is examined
Survey, to detect whether the digital certificate is trusted digital certificate.
Based on above-mentioned testing result, if client determines that the digital certificate that service end returns not is trusted numeral card
Book, then it is self-built digital certificate to illustrate the digital certificate, and client receives the self-built digital certificate first.In such case
Under, client can call underlying security interface, and the self-built digital certificate is arranged into trusted digital certificate.Subsequently, client
End can call upper strata API, and access request is sent to service end based on the trusted digital certificate (i.e. the self-built digital certificate),
To obtain the business datum in service end, carried out so that the trusted digital certificate can be based between client and service end
Data transfer, to realize customer service.
If client determines that the digital certificate that service end returns is trusted digital certificate, client can be adjusted directly
With upper strata API, access request is sent to service end based on the trusted digital certificate, to obtain the business datum in service end,
So that it can be carried out data transmission between client and service end based on the trusted digital certificate, to realize customer service.
On the other hand, service end is after the digital certificate for receiving client transmission obtains request, if detecting the number
URL in the request of word certificate acquisition is different from above-mentioned request URL, then illustrates that the digital certificate that client needs obtain not is this
The digital certificate of service end, therefore service end can return to client and obtain failure information.Wherein, obtaining failure information can be with
It is 404Not Found information etc..
Client is when receiving the acquisition failure information of service end return, you can interrupts the company established between service end
Connect, to ensure the safety and reliability of business datum in service end.
As seen from the above-described embodiment, client is by self-built digital certificate after trusted digital certificate is arranged to, can be with
Based on carrying out data transmission between the trusted digital certificate and service end, to realize customer service.Adopt in such a way, it is right
For the service end of ATS functions is supported, its digital certificate need not buy simultaneously periodic maintenance to CA trusty again, and can profit
By the use of self-built digital certificate as its digital certificate, largely reduce cost.On the other hand, service end can also be removed to exist
Because CA needs time that it is audited and expended when buying digital certificate to CA trusty.
Corresponding with the embodiment of aforementioned digital certificate acquisition method, present invention also provides digital certificate acquisition device
Embodiment.
The embodiment of the application digital certificate acquisition device can be applied in client and service end.Device embodiment can
To be realized by software, can also be realized by way of hardware or software and hardware combining.Exemplified by implemented in software, as one
Device on logical meaning, it is by corresponding meter in nonvolatile memory by the processor of client where it or service end
Calculation machine programmed instruction reads what operation in internal memory was formed.For hardware view, as shown in figure 3, being the application digital certificate
A kind of hardware structure diagram of client where acquisition device;As shown in figure 4, serviced where the application digital certificate acquisition device
A kind of hardware structure diagram at end.Except the processor shown in Fig. 3 and Fig. 4, internal memory, network interface and nonvolatile memory
Outside, actual functional capability that the equipment in embodiment where device obtains generally according to the digital certificate, it is hard that other can also be included
Part, this is repeated no more.
Fig. 5 is refer to, is a kind of block diagram of digital certificate acquisition device shown in the exemplary embodiment of the application one.The dress
Put 500 and can apply to client shown in Fig. 3, including:
First transmitting element 501, request is obtained for sending digital certificate to service end, so that the service end is described
When uniform resource position mark URL in digital certificate acquisition request is identical with default request URL, returns and obtain to the client
Take the digital certificate of successful information and the service end;
Detection unit 502, for when receiving the acquisition successful information that the service end returns, detecting the service end
Whether the digital certificate of return is trusted digital certificate;
Setting unit 503, for when the digital certificate is not trusted digital certificate, the digital certificate to be set
For trusted digital certificate, and access request is sent to the service end, to obtain business datum.
In an optional embodiment, described device 500 can also include:
Second transmitting element 504, for when the digital certificate is trusted digital certificate, being sent to the service end
Access request, to obtain business datum.
Fig. 6 is refer to, is a kind of block diagram of digital certificate acquisition device shown in the exemplary embodiment of the application one.The dress
Put 600 and can apply to service end shown in Fig. 4, including:
Detection unit 601, when being asked for being obtained in the digital certificate for receiving client transmission, detect the numeral card
Whether the URL and default request URL in book acquisition request are identical;
Returning unit 602, for the digital certificate obtain request in URL it is identical with the request URL when, to institute
State client and return to the digital certificate for obtaining successful information and the service end, so that the client is receiving the acquisition
Successful information, and when to detect the digital certificate be not trusted digital certificate, the digital certificate is arranged to trusted
Digital certificate, and access request is sent to the service end, to obtain business datum.
The function of unit and the implementation process of effect specifically refer to and step are corresponded in the above method in said apparatus
Implementation process, it will not be repeated here.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is real referring to method
Apply the part explanation of example.Device embodiment described above is only schematical, wherein described be used as separating component
The unit of explanation can be or may not be physically separate, can be as the part that unit is shown or can also
It is not physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to reality
Need to select some or all of module therein to realize the purpose of application scheme.Those of ordinary skill in the art are not paying
In the case of going out creative work, you can to understand and implement.
The preferred embodiment of the application is the foregoing is only, not limiting the application, all essences in the application
God any modification, equivalent substitution and improvements done etc., should be included within the scope of the application protection with principle.
Claims (10)
- A kind of 1. digital certificate acquisition methods, it is characterised in that methods described is applied to client, including:Digital certificate is sent to service end and obtains request, so that unification of the service end in the digital certificate obtains request When URLs URL is identical with default request URL, is returned to the client and obtain successful information and the service end Digital certificate;When receiving the acquisition successful information that the service end returns, detect digital certificate that the service end returns whether be Trusted digital certificate;If the digital certificate is not trusted digital certificate, the digital certificate is arranged to trusted digital certificate, And access request is sent to the service end, to obtain business datum.
- 2. according to the method for claim 1, it is characterised in that methods described also includes:When receiving the acquisition failure information that the service end returns, the connection established between the service end is interrupted;Wherein, the failure information that obtains is asked by the service end in the URL that the digital certificate is obtained in request with default Returned when seeking URL differences to the client.
- 3. according to the method for claim 1, it is characterised in that methods described also includes:If the digital certificate is trusted digital certificate, access request is sent to the service end, to obtain business number According to.
- 4. according to the method for claim 1, it is characterised in that whether the digital certificate that the detection service end returns For trusted digital certificate, including:Whether the certification authority CA for detecting the digital certificate matches trusted CA lists;If the CA matches the trusted CA lists, it is determined that the digital certificate is trusted digital certificate;If the CA mismatches the trusted CA lists, it is determined that the digital certificate is not trusted digital certificate.
- 5. according to the method for claim 1, it is characterised in that described that the digital certificate is arranged to trusted numeral card Book, including:The CA of the digital certificate is added in the trusted CA lists.
- A kind of 6. digital certificate acquisition methods, it is characterised in that methods described is applied to service end, including:When the digital certificate for receiving client transmission obtains request, detect the digital certificate obtain URL in request with Whether default request URL is identical;If the URL that the digital certificate is obtained in request is identical with the request URL, to the client return acquisition into The digital certificate of work(information and the service end, so that the client is receiving the acquisition successful information, and detect When the digital certificate is not trusted digital certificate, the digital certificate is arranged to trusted digital certificate, and to described Service end sends access request, to obtain business datum.
- 7. according to the method for claim 6, it is characterised in that methods described also includes:If the URL that the digital certificate is obtained in request is different from the request URL, returns to obtain to the client and lose Information is lost, so that the client interrupts the company established between the service end when receiving the acquisition failure information Connect.
- A kind of 8. digital certificate acquisition device, it is characterised in that described device is applied to client, including:First transmitting element, request is obtained for sending digital certificate to service end, so that the service end is in the numeral card When uniform resource position mark URL in book acquisition request is identical with default request URL, returns and obtained successfully to the client The digital certificate of information and the service end;Detection unit, for when receiving the acquisition successful information that the service end returns, detecting what the service end returned Whether digital certificate is trusted digital certificate;Setting unit, for when the digital certificate is not trusted digital certificate, the digital certificate to be arranged into credible Appoint digital certificate, and access request is sent to the service end, to obtain business datum.
- 9. device according to claim 8, it is characterised in that described device also includes:Second transmitting element, asked for when the digital certificate is trusted digital certificate, sending to access to the service end Ask, to obtain business datum.
- A kind of 10. digital certificate acquisition device, it is characterised in that described device is applied to service end, including:Detection unit, when being asked for being obtained in the digital certificate for receiving client transmission, detect the digital certificate and obtain Whether the URL and default request URL in request are identical;Returning unit, for the digital certificate obtain request in URL it is identical with the request URL when, to the client End returns to the digital certificate for obtaining successful information and the service end, so that the client is successfully believed receiving described obtain Breath, and when to detect the digital certificate be trusted digital certificate, the digital certificate is arranged to trusted numeral and demonstrate,proved Book, and access request is sent to the service end, to obtain business datum.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710941212.3A CN107819584A (en) | 2017-10-11 | 2017-10-11 | Digital certificate acquisition methods and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710941212.3A CN107819584A (en) | 2017-10-11 | 2017-10-11 | Digital certificate acquisition methods and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107819584A true CN107819584A (en) | 2018-03-20 |
Family
ID=61608029
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710941212.3A Pending CN107819584A (en) | 2017-10-11 | 2017-10-11 | Digital certificate acquisition methods and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107819584A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020233308A1 (en) * | 2019-05-22 | 2020-11-26 | 深圳壹账通智能科技有限公司 | Self-checking method, apparatus and device based on local certificate, and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104333548A (en) * | 2014-10-27 | 2015-02-04 | 百度在线网络技术(北京)有限公司 | Method and system of accessing local services in https websites |
CN105429934A (en) * | 2014-09-19 | 2016-03-23 | 腾讯科技(深圳)有限公司 | HTTPS connection verification method and device |
CN107229877A (en) * | 2017-06-05 | 2017-10-03 | 北京凤凰理理它信息技术有限公司 | Certificate management, acquisition methods, device, computer program and electronic equipment |
-
2017
- 2017-10-11 CN CN201710941212.3A patent/CN107819584A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105429934A (en) * | 2014-09-19 | 2016-03-23 | 腾讯科技(深圳)有限公司 | HTTPS connection verification method and device |
CN104333548A (en) * | 2014-10-27 | 2015-02-04 | 百度在线网络技术(北京)有限公司 | Method and system of accessing local services in https websites |
CN107229877A (en) * | 2017-06-05 | 2017-10-03 | 北京凤凰理理它信息技术有限公司 | Certificate management, acquisition methods, device, computer program and electronic equipment |
Non-Patent Citations (2)
Title |
---|
KOBEJAYANDY: "深入浅出HTTPS基本原理", 《HTTPS://BLOG.CSDN.NET/KOBEJAYANDY/ARTICLE/DETAILS/52433660》 * |
靳海轶等: "Windows网络管理与应用实训教程", 《东软电子出版社》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020233308A1 (en) * | 2019-05-22 | 2020-11-26 | 深圳壹账通智能科技有限公司 | Self-checking method, apparatus and device based on local certificate, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107645486B (en) | login authentication method and device | |
CN104113551B (en) | A kind of platform authorization method, platform service end and applications client and system | |
CN104378342B (en) | Many accounts verification method, Apparatus and system | |
CN104169952B (en) | A kind of method of network payment, apparatus and system | |
CN104158802B (en) | A kind of platform authorization method, platform service end and applications client and system | |
CN103929402B (en) | Sensitive operation verification method, terminal unit, server and checking system | |
CN103825734B (en) | Sensitive operation verification method, terminal device, server and checking system | |
CN110287682A (en) | A kind of login method, apparatus and system | |
CN104660557B (en) | operation processing method and device | |
CN105871947B (en) | The method and device of cross-domain request data | |
CN107979525A (en) | A kind of red packet distribution method, equipment and medium | |
CN108173938A (en) | Server load shunt method and device | |
CN104468592B (en) | Login method and login system | |
CN105007280A (en) | Application sign-on method and device | |
CN107689951A (en) | Web data crawling method, device, user terminal and readable storage medium storing program for executing | |
CN104580112B (en) | A kind of service authentication method, system and server | |
CN106027574A (en) | Identity authentication method and device | |
CN110198248A (en) | The method and apparatus for detecting IP address | |
CN110084011A (en) | A kind of method and device of the verifying of user's operation | |
CN106161354A (en) | Service authentication method, device, equipment and service server | |
CN108259457A (en) | A kind of WEB authentication methods and device | |
CN103581881B (en) | Comprehensive number-obtaining device as well as system and method for obtaining cell phone number of user on network side | |
CN110519127A (en) | Detection method, device and the storage medium of network delay | |
CN106911681A (en) | Network access authentication method and device | |
CN104462934B (en) | A kind of information processing method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180320 |
|
RJ01 | Rejection of invention patent application after publication |