CN107819584A - Digital certificate acquisition methods and device - Google Patents

Digital certificate acquisition methods and device Download PDF

Info

Publication number
CN107819584A
CN107819584A CN201710941212.3A CN201710941212A CN107819584A CN 107819584 A CN107819584 A CN 107819584A CN 201710941212 A CN201710941212 A CN 201710941212A CN 107819584 A CN107819584 A CN 107819584A
Authority
CN
China
Prior art keywords
digital certificate
service end
trusted
request
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710941212.3A
Other languages
Chinese (zh)
Inventor
李绍辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN201710941212.3A priority Critical patent/CN107819584A/en
Publication of CN107819584A publication Critical patent/CN107819584A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a kind of digital certificate acquisition methods and device, applied to client, including:Digital certificate is sent to service end and obtains request, so that the service end returns to the digital certificate for obtaining successful information and the service end to the client when the uniform resource position mark URL that the digital certificate is obtained in request is identical with default request URL;When receiving the acquisition successful information that the service end returns, detect whether the digital certificate that the service end returns is trusted digital certificate;If the digital certificate is not trusted digital certificate, the digital certificate is arranged to trusted digital certificate, and access request is sent to the service end, to obtain business datum.Cost can be reduced to a great extent in technical scheme.

Description

Digital certificate acquisition methods and device
Technical field
The application is related to communication technical field, more particularly to a kind of digital certificate acquisition methods and device.
Background technology
Apple companies carry to strengthen the Network Communicate Security of App in iOS system (Application, application program) ATS (App Transport Security, application transport safety) function is gone out, suitable for iOS App and App Extension.After ATS functions are enabled, client can be forced to pass through HTTPS (Hyper Text Transfer Protocol over Secure Socket Layer, the HTTP based on SSL) with service end it Between carry out network service.
The digital certificate of ATS functional requirement service ends must be by CA trusty (Certificate Authority, card Book issuing organization) issue, CA trusty can be the trusted that the CA that root certificate is installed by operating system or user are set CA.In correlation technique, the digital certificate of service end needs to buy to CA trusty, and is also needed after digital certificate is bought Its validity of periodic maintenance is wanted, therefore cost is higher.
The content of the invention
In view of this, the application provides a kind of digital certificate acquisition methods and device, with solve in correlation technique cost compared with The problem of high.
Specifically, the application is achieved by the following technical solution:
In a first aspect, the application provides a kind of digital certificate acquisition methods, methods described is applied to client, including:
Digital certificate is sent to service end and obtains request, so that the service end is in the digital certificate obtains request When uniform resource position mark URL is identical with default request URL, is returned to the client and obtain successful information and the service The digital certificate at end;
When receiving the acquisition successful information that the service end returns, detecting the digital certificate that the service end returns is No is trusted digital certificate;
If the digital certificate is not trusted digital certificate, the digital certificate is arranged to trusted numeral card Book, and access request is sent to the service end, to obtain business datum.
Second aspect, the application provide a kind of digital certificate acquisition methods, and methods described is applied to service end, including:
When the digital certificate for receiving client transmission obtains request, detect the digital certificate and obtain in request Whether URL is identical with default request URL;
If the URL that the digital certificate is obtained in request is identical with the request URL, returns and obtain to the client The digital certificate of successful information and the service end is taken, so that the client is receiving the acquisition successful information, and is examined When to measure the digital certificate be not trusted digital certificate, the digital certificate is arranged to trusted digital certificate, and to The service end sends access request, to obtain business datum.
The third aspect, the application provide a kind of digital certificate acquisition device, and described device is applied to client, including:
First transmitting element, request is obtained for sending digital certificate to service end, so that the service end is in the number When uniform resource position mark URL in the request of word certificate acquisition is identical with default request URL, returns and obtain to the client The digital certificate of successful information and the service end;
Detection unit, for when receiving the acquisition successful information that the service end returns, detecting the service end and returning Whether the digital certificate returned is trusted digital certificate;
Setting unit, for when the digital certificate is not trusted digital certificate, the digital certificate to be arranged to Trusted digital certificate, and access request is sent to the service end, to obtain business datum.
Fourth aspect, the application provide a kind of digital certificate acquisition device, and described device is applied to service end, including:
Detection unit, when being asked for being obtained in the digital certificate for receiving client transmission, detect the digital certificate Whether the URL and default request URL in acquisition request are identical;
Returning unit, for obtained in the digital certificate URL in request it is identical with the request URL when, to described Client returns to the digital certificate for obtaining successful information and the service end so that the client receive it is described obtain into Work(information, and when to detect the digital certificate be not trusted digital certificate, the digital certificate is arranged to trusted number Word certificate, and access request is sent to the service end, to obtain business datum.
Analyze above-mentioned technical proposal understand, client after self-built digital certificate is arranged into trusted digital certificate, It can be based on carrying out data transmission between the trusted digital certificate and service end, to realize customer service.Using such side Formula, for supporting the service end of ATS functions, its digital certificate need not buy simultaneously periodic maintenance to CA trusty again, and Cost can largely be reduced by the use of self-built digital certificate as its digital certificate.
Brief description of the drawings
Fig. 1 is a kind of flow chart of digital certificate acquisition methods shown in the exemplary embodiment of the application one;
Fig. 2 is the flow chart of another digital certificate acquisition methods shown in the exemplary embodiment of the application one;
Fig. 3 is a kind of hardware configuration of digital certificate acquisition device place equipment shown in the exemplary embodiment of the application one Figure;
Fig. 4 is the hardware knot of another digital certificate acquisition device place equipment shown in the exemplary embodiment of the application one Composition;
Fig. 5 is a kind of block diagram of digital certificate acquisition device shown in the exemplary embodiment of the application one;
Fig. 6 is the block diagram of another digital certificate acquisition device shown in the exemplary embodiment of the application one.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the application.
It is only merely for the purpose of description specific embodiment in term used in this application, and is not intended to be limiting the application. " one kind " of singulative used in the application and appended claims, " described " and "the" are also intended to including majority Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and wrapped Containing the associated list items purpose of one or more, any or all may be combined.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, do not departing from In the case of the application scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining ".
In correlation technique, because the digital certificate of ATS functional requirement service ends must be issued by CA trusty, therefore it is right For the service end of ATS functions is supported, its digital certificate needs to buy to CA trusty, and after digital certificate is bought Periodic maintenance its validity is also required to, cost is higher.On the other hand, when buying digital certificate to CA trusty, trusted CA need to audit service end, it is also desirable to expend certain time.
The application provides a kind of digital certificate acquisition methods and device, to solve the above mentioned problem in correlation technique.It please join Fig. 1 is examined, is a kind of flow chart of digital certificate acquisition methods shown in the exemplary embodiment of the application one.This method can be applied In client, comprise the following steps:
Step 101:Digital certificate is sent to service end and obtains request, so that the service end obtains in the digital certificate When uniform resource position mark URL in request is identical with default request URL, to the client return obtain successful information and The digital certificate of the service end.
Step 102:When receiving the acquisition successful information that the service end returns, the number that the service end returns is detected Whether word certificate is trusted digital certificate.
Step 103:If the digital certificate is not trusted digital certificate, the digital certificate is arranged to credible Appoint digital certificate, and access request is sent to the service end, to obtain business datum.
In the present embodiment, user can pre-set request URL (Uniform Resource in service end Locator, URL), the request URL can be used to the digital certificate of acquisition request service end.In another example In son, request URL can also be by determination of being held consultation between service end and client.
Subsequently, after user opens client by terminal device, if it is determined that client is needed between service end Network service is carried out based on ATS functions, then client can call underlying security interface first, based on the request URL to service End sends digital certificate and obtains request, to obtain the digital certificate of service end, during for carrying out data transmission between service end Authentication.Wherein, underlying security interface is unrelated with ATS functions, i.e., client is calling underlying security interface to send numeral Certificate acquisition need not meet the requirement of ATS functions when asking.
Service end is after the digital certificate for receiving client transmission obtains request, if detecting that the digital certificate obtains URL in request is identical with above-mentioned request URL, then illustrates that client needs to obtain the digital certificate of this service end, therefore service End can return to its digital certificate client, and returned to client and obtain successful information.
Client is when receiving the acquisition successful information of service end return, you can determines that this client successfully obtains clothes The digital certificate at business end, so as to further call underlying security interface, the digital certificate returned to service end is examined Survey, to detect whether the digital certificate is trusted digital certificate.
It should be noted that in the present embodiment, it is that the numeral issued by CA trusty is demonstrate,proved that trusted digital certificate, which is, Book, and for digital certificate voluntarily being configured by user, meeting ATS functional requirements (being referred to as self-built digital certificate) etc., Because the CA of this kind of digital certificate is not CA trusty, but voluntarily configured by user, therefore this kind of digital certificate is not Trusted digital certificate.
Specifically, the CA (CA for issuing the digital certificate) for the digital certificate that client can return to service end enters Row detection, you can the trusted CA lists locally preserved with detecting the CA of the digital certificate whether to match.If the digital certificate CA match trusted CA lists, then client can determine that the digital certificate is trusted digital certificate;If the numeral The CA of certificate mismatches trusted CA lists, then client can determine that the digital certificate is not trusted digital certificate.
Based on above-mentioned testing result, if client determines that the digital certificate that service end returns not is trusted numeral card Book, then it is self-built digital certificate to illustrate the digital certificate, and client receives the self-built digital certificate first.In such case Under, client can call underlying security interface, and the self-built digital certificate is arranged into trusted digital certificate.
Specifically, the CA of above-mentioned self-built digital certificate can be added to the trusted CA lists locally preserved by client In, the self-built digital certificate is arranged to trusted digital certificate.So, subsequent client receives the self-built numeral again During certificate, because the self-built digital certificate matches trusted CA lists, therefore client directly can demonstrate,prove the self-built numeral Book is defined as trusted digital certificate.
Client is arranged to after trusted digital certificate by above-mentioned self-built digital certificate, you can calls upper strata API (Application Programming Interface, application programming interface), based on the trusted digital certificate (i.e. The self-built digital certificate) to service end transmission access request, to obtain the business datum in service end, so that client and clothes Business can be carried out data transmission between end based on the trusted digital certificate, to realize customer service.
If client determines that the digital certificate that service end returns is trusted digital certificate, client can be adjusted directly With upper strata API, access request is sent to service end based on the trusted digital certificate, to obtain the business datum in service end, So that it can be carried out data transmission between client and service end based on the trusted digital certificate, to realize customer service.
On the other hand, service end is after the digital certificate for receiving client transmission obtains request, if detecting the number URL in the request of word certificate acquisition is different from above-mentioned request URL, then illustrates that the digital certificate that client needs obtain not is this The digital certificate of service end, therefore service end can return to client and obtain failure information.
Client is when receiving the acquisition failure information of service end return, you can interrupts the company established between service end Connect, to ensure the safety and reliability of business datum in service end.
As seen from the above-described embodiment, client is by self-built digital certificate after trusted digital certificate is arranged to, can be with Based on carrying out data transmission between the trusted digital certificate and service end, to realize customer service.Adopt in such a way, it is right For the service end of ATS functions is supported, its digital certificate need not buy simultaneously periodic maintenance to CA trusty again, and can profit By the use of self-built digital certificate as its digital certificate, largely reduce cost.On the other hand, service end can also be removed to exist Because CA needs time that it is audited and expended when buying digital certificate to CA trusty.
Fig. 2 is refer to, is the flow chart of another digital certificate acquisition methods shown in the exemplary embodiment of the application one. This method can apply to service end, comprise the following steps:
Step 201:When the digital certificate for receiving client transmission obtains request, detecting the digital certificate acquisition please Whether the URL and default request URL in asking are identical.
Step 202:If the URL that the digital certificate is obtained in request is identical with the request URL, to the client End returns to the digital certificate for obtaining successful information and the service end, so that the client is successfully believed receiving described obtain Breath, and when to detect the digital certificate be trusted digital certificate, the digital certificate is arranged to trusted numeral and demonstrate,proved Book, and access request is sent to the service end, to obtain business datum.
In the present embodiment, service end is after the digital certificate for receiving client transmission obtains request, if detected The URL that the digital certificate is obtained in request is identical with above-mentioned request URL, then illustrates that client needs to obtain the numeral of this service end Certificate, therefore service end can return to its digital certificate client, and returned to client and obtain successful information.Wherein, It can be 200OK information etc. to obtain successful information.
Client is when receiving the acquisition successful information of service end return, you can determines that this client successfully obtains clothes The digital certificate at business end, so as to further call underlying security interface, the digital certificate returned to service end is examined Survey, to detect whether the digital certificate is trusted digital certificate.
Based on above-mentioned testing result, if client determines that the digital certificate that service end returns not is trusted numeral card Book, then it is self-built digital certificate to illustrate the digital certificate, and client receives the self-built digital certificate first.In such case Under, client can call underlying security interface, and the self-built digital certificate is arranged into trusted digital certificate.Subsequently, client End can call upper strata API, and access request is sent to service end based on the trusted digital certificate (i.e. the self-built digital certificate), To obtain the business datum in service end, carried out so that the trusted digital certificate can be based between client and service end Data transfer, to realize customer service.
If client determines that the digital certificate that service end returns is trusted digital certificate, client can be adjusted directly With upper strata API, access request is sent to service end based on the trusted digital certificate, to obtain the business datum in service end, So that it can be carried out data transmission between client and service end based on the trusted digital certificate, to realize customer service.
On the other hand, service end is after the digital certificate for receiving client transmission obtains request, if detecting the number URL in the request of word certificate acquisition is different from above-mentioned request URL, then illustrates that the digital certificate that client needs obtain not is this The digital certificate of service end, therefore service end can return to client and obtain failure information.Wherein, obtaining failure information can be with It is 404Not Found information etc..
Client is when receiving the acquisition failure information of service end return, you can interrupts the company established between service end Connect, to ensure the safety and reliability of business datum in service end.
As seen from the above-described embodiment, client is by self-built digital certificate after trusted digital certificate is arranged to, can be with Based on carrying out data transmission between the trusted digital certificate and service end, to realize customer service.Adopt in such a way, it is right For the service end of ATS functions is supported, its digital certificate need not buy simultaneously periodic maintenance to CA trusty again, and can profit By the use of self-built digital certificate as its digital certificate, largely reduce cost.On the other hand, service end can also be removed to exist Because CA needs time that it is audited and expended when buying digital certificate to CA trusty.
Corresponding with the embodiment of aforementioned digital certificate acquisition method, present invention also provides digital certificate acquisition device Embodiment.
The embodiment of the application digital certificate acquisition device can be applied in client and service end.Device embodiment can To be realized by software, can also be realized by way of hardware or software and hardware combining.Exemplified by implemented in software, as one Device on logical meaning, it is by corresponding meter in nonvolatile memory by the processor of client where it or service end Calculation machine programmed instruction reads what operation in internal memory was formed.For hardware view, as shown in figure 3, being the application digital certificate A kind of hardware structure diagram of client where acquisition device;As shown in figure 4, serviced where the application digital certificate acquisition device A kind of hardware structure diagram at end.Except the processor shown in Fig. 3 and Fig. 4, internal memory, network interface and nonvolatile memory Outside, actual functional capability that the equipment in embodiment where device obtains generally according to the digital certificate, it is hard that other can also be included Part, this is repeated no more.
Fig. 5 is refer to, is a kind of block diagram of digital certificate acquisition device shown in the exemplary embodiment of the application one.The dress Put 500 and can apply to client shown in Fig. 3, including:
First transmitting element 501, request is obtained for sending digital certificate to service end, so that the service end is described When uniform resource position mark URL in digital certificate acquisition request is identical with default request URL, returns and obtain to the client Take the digital certificate of successful information and the service end;
Detection unit 502, for when receiving the acquisition successful information that the service end returns, detecting the service end Whether the digital certificate of return is trusted digital certificate;
Setting unit 503, for when the digital certificate is not trusted digital certificate, the digital certificate to be set For trusted digital certificate, and access request is sent to the service end, to obtain business datum.
In an optional embodiment, described device 500 can also include:
Second transmitting element 504, for when the digital certificate is trusted digital certificate, being sent to the service end Access request, to obtain business datum.
Fig. 6 is refer to, is a kind of block diagram of digital certificate acquisition device shown in the exemplary embodiment of the application one.The dress Put 600 and can apply to service end shown in Fig. 4, including:
Detection unit 601, when being asked for being obtained in the digital certificate for receiving client transmission, detect the numeral card Whether the URL and default request URL in book acquisition request are identical;
Returning unit 602, for the digital certificate obtain request in URL it is identical with the request URL when, to institute State client and return to the digital certificate for obtaining successful information and the service end, so that the client is receiving the acquisition Successful information, and when to detect the digital certificate be not trusted digital certificate, the digital certificate is arranged to trusted Digital certificate, and access request is sent to the service end, to obtain business datum.
The function of unit and the implementation process of effect specifically refer to and step are corresponded in the above method in said apparatus Implementation process, it will not be repeated here.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is real referring to method Apply the part explanation of example.Device embodiment described above is only schematical, wherein described be used as separating component The unit of explanation can be or may not be physically separate, can be as the part that unit is shown or can also It is not physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to reality Need to select some or all of module therein to realize the purpose of application scheme.Those of ordinary skill in the art are not paying In the case of going out creative work, you can to understand and implement.
The preferred embodiment of the application is the foregoing is only, not limiting the application, all essences in the application God any modification, equivalent substitution and improvements done etc., should be included within the scope of the application protection with principle.

Claims (10)

  1. A kind of 1. digital certificate acquisition methods, it is characterised in that methods described is applied to client, including:
    Digital certificate is sent to service end and obtains request, so that unification of the service end in the digital certificate obtains request When URLs URL is identical with default request URL, is returned to the client and obtain successful information and the service end Digital certificate;
    When receiving the acquisition successful information that the service end returns, detect digital certificate that the service end returns whether be Trusted digital certificate;
    If the digital certificate is not trusted digital certificate, the digital certificate is arranged to trusted digital certificate, And access request is sent to the service end, to obtain business datum.
  2. 2. according to the method for claim 1, it is characterised in that methods described also includes:
    When receiving the acquisition failure information that the service end returns, the connection established between the service end is interrupted;
    Wherein, the failure information that obtains is asked by the service end in the URL that the digital certificate is obtained in request with default Returned when seeking URL differences to the client.
  3. 3. according to the method for claim 1, it is characterised in that methods described also includes:
    If the digital certificate is trusted digital certificate, access request is sent to the service end, to obtain business number According to.
  4. 4. according to the method for claim 1, it is characterised in that whether the digital certificate that the detection service end returns For trusted digital certificate, including:
    Whether the certification authority CA for detecting the digital certificate matches trusted CA lists;
    If the CA matches the trusted CA lists, it is determined that the digital certificate is trusted digital certificate;
    If the CA mismatches the trusted CA lists, it is determined that the digital certificate is not trusted digital certificate.
  5. 5. according to the method for claim 1, it is characterised in that described that the digital certificate is arranged to trusted numeral card Book, including:
    The CA of the digital certificate is added in the trusted CA lists.
  6. A kind of 6. digital certificate acquisition methods, it is characterised in that methods described is applied to service end, including:
    When the digital certificate for receiving client transmission obtains request, detect the digital certificate obtain URL in request with Whether default request URL is identical;
    If the URL that the digital certificate is obtained in request is identical with the request URL, to the client return acquisition into The digital certificate of work(information and the service end, so that the client is receiving the acquisition successful information, and detect When the digital certificate is not trusted digital certificate, the digital certificate is arranged to trusted digital certificate, and to described Service end sends access request, to obtain business datum.
  7. 7. according to the method for claim 6, it is characterised in that methods described also includes:
    If the URL that the digital certificate is obtained in request is different from the request URL, returns to obtain to the client and lose Information is lost, so that the client interrupts the company established between the service end when receiving the acquisition failure information Connect.
  8. A kind of 8. digital certificate acquisition device, it is characterised in that described device is applied to client, including:
    First transmitting element, request is obtained for sending digital certificate to service end, so that the service end is in the numeral card When uniform resource position mark URL in book acquisition request is identical with default request URL, returns and obtained successfully to the client The digital certificate of information and the service end;
    Detection unit, for when receiving the acquisition successful information that the service end returns, detecting what the service end returned Whether digital certificate is trusted digital certificate;
    Setting unit, for when the digital certificate is not trusted digital certificate, the digital certificate to be arranged into credible Appoint digital certificate, and access request is sent to the service end, to obtain business datum.
  9. 9. device according to claim 8, it is characterised in that described device also includes:
    Second transmitting element, asked for when the digital certificate is trusted digital certificate, sending to access to the service end Ask, to obtain business datum.
  10. A kind of 10. digital certificate acquisition device, it is characterised in that described device is applied to service end, including:
    Detection unit, when being asked for being obtained in the digital certificate for receiving client transmission, detect the digital certificate and obtain Whether the URL and default request URL in request are identical;
    Returning unit, for the digital certificate obtain request in URL it is identical with the request URL when, to the client End returns to the digital certificate for obtaining successful information and the service end, so that the client is successfully believed receiving described obtain Breath, and when to detect the digital certificate be trusted digital certificate, the digital certificate is arranged to trusted numeral and demonstrate,proved Book, and access request is sent to the service end, to obtain business datum.
CN201710941212.3A 2017-10-11 2017-10-11 Digital certificate acquisition methods and device Pending CN107819584A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710941212.3A CN107819584A (en) 2017-10-11 2017-10-11 Digital certificate acquisition methods and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710941212.3A CN107819584A (en) 2017-10-11 2017-10-11 Digital certificate acquisition methods and device

Publications (1)

Publication Number Publication Date
CN107819584A true CN107819584A (en) 2018-03-20

Family

ID=61608029

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710941212.3A Pending CN107819584A (en) 2017-10-11 2017-10-11 Digital certificate acquisition methods and device

Country Status (1)

Country Link
CN (1) CN107819584A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020233308A1 (en) * 2019-05-22 2020-11-26 深圳壹账通智能科技有限公司 Self-checking method, apparatus and device based on local certificate, and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104333548A (en) * 2014-10-27 2015-02-04 百度在线网络技术(北京)有限公司 Method and system of accessing local services in https websites
CN105429934A (en) * 2014-09-19 2016-03-23 腾讯科技(深圳)有限公司 HTTPS connection verification method and device
CN107229877A (en) * 2017-06-05 2017-10-03 北京凤凰理理它信息技术有限公司 Certificate management, acquisition methods, device, computer program and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429934A (en) * 2014-09-19 2016-03-23 腾讯科技(深圳)有限公司 HTTPS connection verification method and device
CN104333548A (en) * 2014-10-27 2015-02-04 百度在线网络技术(北京)有限公司 Method and system of accessing local services in https websites
CN107229877A (en) * 2017-06-05 2017-10-03 北京凤凰理理它信息技术有限公司 Certificate management, acquisition methods, device, computer program and electronic equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
KOBEJAYANDY: "深入浅出HTTPS基本原理", 《HTTPS://BLOG.CSDN.NET/KOBEJAYANDY/ARTICLE/DETAILS/52433660》 *
靳海轶等: "Windows网络管理与应用实训教程", 《东软电子出版社》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020233308A1 (en) * 2019-05-22 2020-11-26 深圳壹账通智能科技有限公司 Self-checking method, apparatus and device based on local certificate, and storage medium

Similar Documents

Publication Publication Date Title
CN107645486B (en) login authentication method and device
CN104113551B (en) A kind of platform authorization method, platform service end and applications client and system
CN104378342B (en) Many accounts verification method, Apparatus and system
CN104169952B (en) A kind of method of network payment, apparatus and system
CN104158802B (en) A kind of platform authorization method, platform service end and applications client and system
CN103929402B (en) Sensitive operation verification method, terminal unit, server and checking system
CN103825734B (en) Sensitive operation verification method, terminal device, server and checking system
CN110287682A (en) A kind of login method, apparatus and system
CN104660557B (en) operation processing method and device
CN105871947B (en) The method and device of cross-domain request data
CN107979525A (en) A kind of red packet distribution method, equipment and medium
CN108173938A (en) Server load shunt method and device
CN104468592B (en) Login method and login system
CN105007280A (en) Application sign-on method and device
CN107689951A (en) Web data crawling method, device, user terminal and readable storage medium storing program for executing
CN104580112B (en) A kind of service authentication method, system and server
CN106027574A (en) Identity authentication method and device
CN110198248A (en) The method and apparatus for detecting IP address
CN110084011A (en) A kind of method and device of the verifying of user's operation
CN106161354A (en) Service authentication method, device, equipment and service server
CN108259457A (en) A kind of WEB authentication methods and device
CN103581881B (en) Comprehensive number-obtaining device as well as system and method for obtaining cell phone number of user on network side
CN110519127A (en) Detection method, device and the storage medium of network delay
CN106911681A (en) Network access authentication method and device
CN104462934B (en) A kind of information processing method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180320

RJ01 Rejection of invention patent application after publication