[go: up one dir, main page]

CN113347148A - Electronic authentication method and system - Google Patents

Electronic authentication method and system Download PDF

Info

Publication number
CN113347148A
CN113347148A CN202110426704.5A CN202110426704A CN113347148A CN 113347148 A CN113347148 A CN 113347148A CN 202110426704 A CN202110426704 A CN 202110426704A CN 113347148 A CN113347148 A CN 113347148A
Authority
CN
China
Prior art keywords
electronic authentication
server
authentication server
gateway
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110426704.5A
Other languages
Chinese (zh)
Inventor
刘金华
张庆勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Infosec Technologies Co Ltd
Original Assignee
Beijing Infosec Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Infosec Technologies Co Ltd filed Critical Beijing Infosec Technologies Co Ltd
Priority to CN202110426704.5A priority Critical patent/CN113347148A/en
Publication of CN113347148A publication Critical patent/CN113347148A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The utility model discloses an electronic authentication method and a system, wherein, the electronic authentication method comprises that a digital certificate registration center server obtains an operation request and sends the operation request to an electronic authentication gateway; when the first electronic authentication server is normal, the electronic authentication gateway sends an operation request to the first electronic authentication server, the first electronic authentication server responds to the operation request, acquires a key pair protected by a user signature public key from the key management server, and sends the key pair to the electronic authentication gateway, and the electronic authentication gateway sends the key pair to the digital certificate registration center server; when the first electronic authentication server fails, the electronic authentication gateway sends the operation request to a second electronic authentication server, the second electronic authentication server responds to the operation request, a key pair protected by a user signature public key is obtained from the key management server, the key pair is sent to the electronic authentication gateway, and the electronic authentication gateway sends the key pair to the digital certificate registration center server.

Description

Electronic authentication method and system
Technical Field
The present disclosure relates to the field of electronic authentication technologies, and in particular, to an electronic authentication method and system.
Background
In a Public Key Infrastructure (PKI) system, a Certificate Authority (CA) is an Authority that issues digital certificates. Is an authority responsible for issuing and managing digital certificates, and serves as a trusted third party in e-commerce transactions, and bears the responsibility for verifying the validity of public keys in a public key system.
In the prior art, PKI systematic faults occur frequently, so that services cannot be performed, and economic loss and cost increase are caused.
Disclosure of Invention
An object of the embodiments of the present disclosure is to provide an electronic authentication method and system, so as to at least solve the problem of frequent failures in the existing PKI system.
The technical scheme of the disclosure is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided an electronic authentication method, which is applied to a public key infrastructure system, where the public key infrastructure system includes a digital certificate registry server, an electronic authentication gateway, heterogeneous electronic authentication servers, and a key management server, which are sequentially arranged, where the heterogeneous electronic authentication servers include a first electronic authentication server and a second electronic authentication server that are arranged in parallel, and the electronic authentication method includes:
the digital certificate registration center server acquires an operation request and sends the operation request to the electronic authentication gateway;
when the first electronic authentication server is normal, the electronic authentication gateway sends an operation request to the first electronic authentication server, the first electronic authentication server responds to the operation request, acquires a key pair protected by a user signature public key from the key management server, and sends the key pair to the electronic authentication gateway, and the electronic authentication gateway sends the key pair to the digital certificate registration center server;
when the first electronic authentication server fails, the electronic authentication gateway sends the operation request to a second electronic authentication server, the second electronic authentication server responds to the operation request, a key pair protected by a user signature public key is obtained from the key management server, the key pair is sent to the electronic authentication gateway, and the electronic authentication gateway sends the key pair to the digital certificate registration center server.
Further, the method further comprises:
and when the first electronic authentication server is recovered to be normal in fault, the electronic authentication gateway reissues the operation request to the first electronic authentication server.
Further, when the first electronic authentication server is normal, the method further comprises:
the second electronic authentication server registers the information of the encrypted certificate and disconnects the connection with the key management server.
Further, the operation request is: one or more combinations of issuing a certificate request, updating a certificate request, revoking/freezing/unfreezing a certificate request, recovering an encrypted certificate request, and querying a certificate request.
Further, the method further comprises:
and the electronic authentication gateway records the complete interaction data.
According to a second aspect of embodiments of the present disclosure, there is provided an electronic authentication system including: the system comprises a digital certificate registration center server, an electronic authentication gateway, a heterogeneous electronic authentication server and a key management server which are arranged in a long connection mode;
the heterogeneous electronic authentication server comprises a first electronic authentication server and a second electronic authentication server which are arranged in parallel.
Further, the first electronic authentication server and the second electronic authentication server are configured identically;
the key management server is used for processing the encrypted certificate sent by the first electronic authentication server and/or the second electronic authentication server.
Further, the electronic authentication gateways are multiple;
a plurality of electronic authentication gateways and a digital certificate registration center server adopt an HA deployment mode;
the electronic authentication system further includes: a switch;
the switch is arranged between the electronic authentication gateway and the digital certificate registration center server.
Further, the switch is used for carrying out load balancing on the plurality of electronic authentication gateways and carrying out data synchronization on the plurality of electronic authentication gateways.
Furthermore, the electronic authentication gateway is provided with a database, and the database is used for recording complete interaction data.
The technical scheme provided by the embodiment of the disclosure at least brings the following beneficial effects:
the method of the embodiment of the present disclosure obtains an operation request through a digital certificate registry server, and sends the operation request to an electronic authentication gateway; when the first electronic authentication server is normal, the electronic authentication gateway sends an operation request to the first electronic authentication server, the first electronic authentication server responds to the operation request, acquires a key pair protected by a user signature public key from the key management server, and sends the key pair to the electronic authentication gateway, and the electronic authentication gateway sends the key pair to the digital certificate registration center server; when the first electronic authentication server fails, the electronic authentication gateway sends the operation request to a second electronic authentication server, the second electronic authentication server responds to the operation request, a key pair protected by a user signature public key is obtained from the key management server, the key pair is sent to the electronic authentication gateway, and the electronic authentication gateway sends the key pair to the digital certificate registration center server. The method prevents the problem that the service cannot be carried out due to the fact that the whole system fails caused by the fact that the electronic authentication server fails by utilizing a seamless switching mode of the first electronic authentication server and the second electronic authentication server, reduces the large pressure on the database under the high concurrency condition, and ensures that the overall performance is influenced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure and are not to be construed as limiting the disclosure.
Fig. 1 is a schematic flow chart of an electronic authentication method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of an electronic authentication system according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a first electronic authentication server according to an embodiment of the present invention in a normal state;
fig. 4 is a schematic flow chart of a first electronic authentication server according to an embodiment of the present invention in a failure state;
fig. 5 is a schematic flowchart of the synchronous operation information of the electronic authentication gateway according to an embodiment of the present invention;
fig. 6 is a schematic flow chart of load balancing performed by the switch according to the embodiment of the present invention;
fig. 7 is a schematic flow chart of a switch performing data synchronization according to an embodiment of the present invention;
Detailed Description
In order to make the technical solutions of the present disclosure better understood by those of ordinary skill in the art, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein are capable of operation in sequences other than those illustrated or otherwise described herein. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The inventor finds that the failure of the PKI system frequently causes the failure of the business, and often results in the failure of the certificate issuing organization, and when the certificate issuing organization fails, the failure of the whole system is often caused, so that the business cannot be performed, and economic loss and cost increase are caused. Based on this finding, the present disclosure provides an electronic authentication method and an electronic authentication system to solve the above-described problems.
As shown in fig. 1, in a first aspect of the embodiments of the present disclosure, there is provided an electronic authentication method, which is applied to a public key infrastructure system, where the public key infrastructure system includes a digital certificate registry server, an electronic authentication gateway, heterogeneous electronic authentication servers, and a key management server, which are sequentially arranged, where the heterogeneous electronic authentication servers include a first electronic authentication server and a second electronic authentication server that are arranged in parallel, and the electronic authentication method includes:
step 100: the digital certificate registration center server acquires an operation request and sends the operation request to the electronic authentication gateway;
step 210: when the first electronic authentication server is normal, the electronic authentication gateway sends an operation request to the first electronic authentication server, the first electronic authentication server responds to the operation request, acquires a key pair protected by a user signature public key from the key management server, and sends the key pair to the electronic authentication gateway, and the electronic authentication gateway sends the key pair to the digital certificate registration center server;
step 220: when the first electronic authentication server fails, the electronic authentication gateway sends the operation request to a second electronic authentication server, the second electronic authentication server responds to the operation request, a key pair protected by a user signature public key is obtained from the key management server, the key pair is sent to the electronic authentication gateway, and the electronic authentication gateway sends the key pair to the digital certificate registration center server.
According to the embodiment method, the problem that the service cannot be performed due to the fact that the whole system fault is caused by the fact that the CA fault occurs is solved through the seamless switching mode of the first electronic authentication server and the second electronic authentication server, and therefore the problem that the database is subjected to large pressure under the high concurrency condition is reduced, and the influence on the overall performance is guaranteed.
In some optional embodiments of the disclosure, the method further comprises:
step 211: and when the first electronic authentication server is recovered to be normal in fault, the electronic authentication gateway reissues the operation request to the first electronic authentication server. Since the second electronic authentication server has already processed the operation requests during the error period of the first electronic authentication server, after the first electronic authentication server recovers, the electronic authentication gateway only sends the operation requests and the processing data at this stage to the first electronic authentication server, so that the data consistency of the first electronic authentication server and the second electronic authentication server is ensured.
In some optional embodiments of the disclosure, when the first electronic authentication server is normal, the method further comprises:
step 230: the second electronic authentication server registers the information of the encrypted certificate and disconnects the connection with the key management server.
In some optional embodiments of the disclosure, the operation request is: one or more combinations of issuing a certificate request, updating a certificate request, revoking/freezing/unfreezing a certificate request, recovering an encrypted certificate request, and querying a certificate request.
It should be noted that the type of the operation request is not limited to the above example, and may also include other types of requests, and the addition setting is performed according to the requirement, which is not described herein again.
Issuing a certificate request
(1) Description and priority: signing and issuing certificate
(2) Input/response sequence
Inputting: certificate signing and issuing request sent by digital certificate registration center server
And (3) normal response: PKIMessage
Abnormal response: PKIMessage for error
(3) Functional requirements are as follows: and processing a certificate issuing request sent by the digital certificate registration center server.
2. Updating certificates
(1) Description and priority: renewal certificate (renewal signature certificate and encryption certificate at the same time)
(2) Input/response sequence
Inputting: certificate update request sent by digital certificate registry server
And (3) normal response: PKIMessage
Abnormal response: PKIMessage for error
(3) Functional requirements are as follows: and processing the certificate updating request sent by the digital certificate registration center server.
3. Revoking/freezing/unfreezing certificates
(1) Description and priority: revoking/freezing/unfreezing certificates
(2) Input/response sequence
Inputting: the revocation/freezing/unfreezing certificate request sent by the digital certificate registry server responds normally: PKIMessage
Abnormal response: PKIMessage for error
(3) Functional requirements are as follows: a revoke/freeze/unfreeze certificate request sent by a digital certificate registry server is processed.
4. Recovering encrypted certificates
After the user certificate equipment is lost and damaged, the original encrypted certificate still needs to be available.
(1) Description and priority: recovering encrypted certificates
(2) Input/response sequence
Inputting: request for recovering encrypted certificate sent by digital certificate registration center server
And (3) normal response: PKIMessage
Abnormal response: PKIMessage for error
(3) Functional requirements are as follows: and processing the encrypted certificate recovery request sent by the digital certificate registry server.
5. Inquiry certificate
(1) Description and priority: certificate query
(2) Input/response sequence
Inputting: OCSPRequest
And (3) normal response: OCSPResponse
Abnormal response: OCSPRESPONSe FOR ERROR
(3) Functional requirements are as follows: inquiring the certificate information of the request and returning a response.
In some optional embodiments of the disclosure, the method further comprises: and the electronic authentication gateway records the complete interaction data. The electronic authentication gateway can provide perfect service data statistics, record complete data interaction and trace back a service operation flow according to data records.
As shown in fig. 2, in a second aspect of an embodiment of the present disclosure, there is provided an electronic authentication system including: the system comprises a digital certificate registration center server, an electronic authentication gateway, a heterogeneous electronic authentication server and a key management server which are arranged in a long connection mode;
the heterogeneous electronic authentication server comprises a first electronic authentication server and a second electronic authentication server which are arranged in parallel.
Specifically, the electronic authentication gateway includes the following functions for explanation: receiving a request of a digital certificate registration center server, storing the request of the digital certificate registration center server, forwarding the request of the digital certificate registration center server, recording the ID of a heterogeneous electronic authentication server for processing the request, recording the response of the heterogeneous electronic authentication server, storing the certificate and the certificate information, sending the response of the heterogeneous electronic authentication server to the digital certificate registration center server, and requesting the intelligent synchronous master and the second electronic authentication server. The electronic authentication gateway is deployed in a web service form. The operating system of the electronic authentication gateway supports mainstream Linux systems such as RedHat, Centos and SUSE, and supports deployment modes such as enterprise private cloud. The electronic authentication gateway supports mainstream databases such as Oracle and DB2, and supports an open source database such as maridb.
The electronic authentication gateway needs to ensure the channel safety between the digital certificate registration center server and the heterogeneous electronic authentication server, and a national secret SSL protocol is recommended. The communication message needs to adopt a uniform message protocol to increase the universality and expandability of the system to the maximum extent. In the present embodiment, the communication protocol specified in GB/T19714 is employed.
The electronic authentication gateway receives and stores an operation request from the digital certificate registration center server, and sequentially sends the operation request to the first electronic authentication server and the second electronic authentication server, the first electronic authentication server responds to the operation request, a key pair protected by a client signature public key sent by the digital certificate registration center server is obtained from the key management server, and the key pair is returned to the electronic authentication gateway. When the first electronic authentication server is normal, the second electronic authentication server registers only the information of the encrypted certificate, and does not establish connection with the key management server. In one embodiment of the invention, the information of the encrypted certificate includes information of the subject of the certificate, the issuer, the validity period, the serial number, and the like.
The following describes a flow of the first electronic authentication server in a normal state by taking an operation request as an example to apply for downloading a certificate, with reference to fig. 3.
The terminal user applies for downloading the certificate to the digital certificate registration center server, and the digital certificate registration center server further sends an operation request for applying for downloading the certificate to the electronic authentication gateway. The electronic authentication gateway sends the operation request to a first electronic authentication server, the first electronic authentication server applies for a key pair to a key management server, receives the key pair returned by the key management server and returns a double certificate to the electronic authentication gateway, and the electronic authentication gateway further sends the double certificate to a digital certificate registration center server which transmits the double certificate to a terminal user. Meanwhile, the electronic authentication gateway synchronizes the registration certificate downloading information to a second electronic authentication server for storage.
It should be noted that the processes of updating the certificate and revoking the certificate are similar to those of the certificate application, and are not described herein again.
When the first electronic authentication server fails, the electronic authentication gateway automatically switches the latest operation request to the second electronic authentication server, so that seamless conversion is realized. And the second electronic authentication server responds to the operation request, acquires a key pair protected by the client signature public key sent by the digital certificate registry server from the key management server, and returns the key pair to the electronic authentication gateway. And, when the first electronic authentication server is recovered, the electronic authentication gateway complements the operation request during the error period of the first electronic authentication server to the first electronic authentication server, as shown in fig. 4. Similarly, when the second electronic authentication server is switched from the failure state to the recovery normal state, the electronic authentication gateway supplements the operation request during the error period of the second electronic authentication server to the first electronic authentication server. Because the second electronic authentication server has already processed the operation requests during the error period of the first electronic authentication server, after the first electronic authentication server is recovered, the electronic authentication gateway only sends the operation requests and the processing data of the stage to the first electronic authentication server, so that the data consistency of the main electronic authentication server and the second electronic authentication server is ensured.
The following describes a flow in the failure state of the first electronic authentication server with reference to fig. 4 by taking an operation request as an example for applying for downloading a certificate.
As shown in fig. 4, the end user applies for downloading the certificate to the digital certificate registry server, and the digital certificate registry server further sends an operation request for applying for downloading the certificate to the electronic authentication gateway. The electronic authentication gateway sends the operation request to a second electronic authentication server, the second electronic authentication server applies for a key pair to the key management server, receives the key pair returned by the key management server and returns a double certificate to the electronic authentication gateway, and the electronic authentication gateway further sends the double certificate to a digital certificate registration center server and the double certificate is transmitted to the terminal user by the digital certificate registration center server. Meanwhile, the electronic authentication gateway synchronizes the registration certificate downloading information to a second electronic authentication server for storage. Meanwhile, the electronic authentication gateway stores the operation request during the failure of the first electronic authentication server. When the first electronic authentication server recovers, the electronic authentication gateway complements the operation request during the error of the first electronic authentication server to the first electronic authentication server, as shown in fig. 5.
The electronic authentication gateway records the ID of the CA and CA response data that process each operation request, and stores the encryption certificate and the information of the encryption certificate, wherein the operation requests processed by the electronic authentication gateway to the first electronic authentication server and the second electronic authentication server. The electronic authentication gateway supports the continuous non-failure operation time of the system to be more than 1 ten thousand hours.
In the embodiment of the disclosure, the electronic authentication gateway is connected with the digital certificate registry server, the first electronic authentication server and the second electronic authentication server in a long connection mode, so that performance loss caused by repeated handshaking is avoided.
The database is a place where the electronic authentication gateway system is easy to fail, a high-performance database server is needed to ensure data access performance, and the database is used for connecting the pool.
In some optional embodiments of the present disclosure, the first electronic authentication server and the second electronic authentication server are configured identically; the key management server is used for processing the encrypted certificate sent by the first electronic authentication server and/or the second electronic authentication server. In this embodiment, in order to ensure that the revocation lists issued by the two CAs are the same, the same cdp calculation policy is applied to the master CA and the slave CA, which cannot be completely random. Therefore, the key management server identifies the first electronic authentication server and the second electronic authentication server as the same CA, so as to ensure that the encrypted certificates sent by the first electronic authentication server and the second electronic authentication server can be processed.
In some optional embodiments of the present disclosure, the electronic authentication gateway is plural; a plurality of electronic authentication gateways and a digital certificate registration center server adopt an HA deployment mode; the electronic authentication system further includes: a switch; the switch is arranged between the electronic authentication gateway and the digital certificate registration center server. When the performance of a single electronic authentication gateway cannot meet the service requirement, the single electronic authentication gateway can be deployed in a cluster mode. When the cluster is deployed, data needs to be synchronized among a plurality of electronic authentication gateways. The electronic authentication gateway is serially deployed in the whole system, so that performance guarantee and HA are required to be made to avoid becoming a bottleneck and a single-point hidden danger, and the robustness of the whole system is ensured.
In some optional embodiments of the present disclosure, the switch is configured to load balance the plurality of electronic authentication gateways and synchronize data of the plurality of electronic authentication gateways. Specifically, as shown in fig. 6 and 7, when two or more electronic authentication gateways are provided, the electronic authentication gateway and the digital certificate registration center server adopt an HA deployment mode, and a switch is deployed between the digital certificate registration center server and the electronic authentication gateway, so that a single point of failure is avoided, and the availability is improved. The exchanger carries out load balance on the electronic authentication gateways, and data synchronization is realized among the electronic authentication gateways.
In some optional embodiments of the present disclosure, the electronic authentication gateway is provided with a database for recording complete interaction data. In this embodiment, the electronic authentication gateway has an independent database, which avoids a large pressure on the database under a high concurrency condition, and ensures that the overall performance is affected. The electronic authentication gateway can record all business incoming and outgoing data, the occupied space can be increased quickly, and enough disk space needs to be ensured. The electronic authentication gateway has higher concurrent processing capability, and the performance depends on the sum of the connected CA processing capabilities. In the invention, in order to ensure the service requirement, the TPS supports 100 times/second. In response time, the electronic authentication gateway response time under 100VUser is not more than 200 milliseconds. And the electronic authentication gateway feeds the received CA response data back to the digital certificate registration center server. The electronic authentication gateway needs to provide perfect service data statistics, record complete data interaction, and trace back a service operation flow according to data records.
According to the method of the embodiment of the disclosure, the hot standby is realized by adding the electronic authentication gateway in front of the CA, when the first electronic authentication server is normal, the first electronic authentication server completes the operation request, when the first electronic authentication server fails, the second electronic authentication server completes the operation request, and meanwhile, the data synchronization of the first electronic authentication server and the second electronic authentication server is ensured. The electronic authentication gateway feeds back the received certificate to the digital certificate registration center server, and the digital certificate registration center server forwards the certificate to the terminal user. The mode of seamless switching between the main electronic authentication server and the second electronic authentication server is realized. And an independent database is adopted for the electronic authentication gateway, so that the problem that the database is subjected to large pressure under the high concurrency condition is avoided, and the influence on the overall performance is ensured. When the traffic is large, the invention supports the adoption of a plurality of electronic authentication gateways which are deployed in a cluster mode, realizes the cooperative work of the plurality of electronic authentication gateways through load balancing, avoids becoming a bottleneck and a single-point hidden danger, needs to make performance guarantee and HA, and ensures the robustness of the whole system.
It will be apparent to those skilled in the art that various changes and modifications can be made in the present disclosure without departing from the spirit and scope of the disclosure. Thus, if such modifications and variations of the present disclosure fall within the scope of the claims of the present disclosure and their equivalents, the present disclosure is intended to include such modifications and variations as well.

Claims (10)

1. An electronic authentication method is applied to a public key infrastructure system, wherein the public key infrastructure system comprises a digital certificate registry server, an electronic authentication gateway, a heterogeneous electronic authentication server and a key management server which are sequentially arranged, wherein the heterogeneous electronic authentication server comprises a first electronic authentication server and a second electronic authentication server which are arranged in parallel, and the electronic authentication method comprises the following steps:
the digital certificate registration center server acquires an operation request and sends the operation request to the electronic authentication gateway;
when the first electronic authentication server is normal, the electronic authentication gateway sends the operation request to the first electronic authentication server, the first electronic authentication server responds to the operation request, a key pair protected by a user signature public key is obtained from the key management server, the key pair is sent to the electronic authentication gateway, and the electronic authentication gateway sends the key pair to the digital certificate registration center server;
when the first electronic authentication server fails, the electronic authentication gateway sends the operation request to the second electronic authentication server, the second electronic authentication server responds to the operation request, obtains a key pair protected by a user signature public key from the key management server, and sends the key pair to the electronic authentication gateway, and the electronic authentication gateway sends the key pair to the digital certificate registration center server.
2. The method of claim 1, further comprising:
and when the first electronic authentication server is recovered to be normal in fault, the electronic authentication gateway reissues the operation request to the first electronic authentication server.
3. The method according to claim 1, wherein when the first electronic authentication server is normal, the method further comprises:
the second electronic authentication server registers information of the encrypted certificate, and disconnects the connection with the key management server.
4. The method of claim 1, wherein the operation request is: one or more combinations of issuing a certificate request, updating a certificate request, revoking/freezing/unfreezing a certificate request, recovering an encrypted certificate request, and querying a certificate request.
5. The method of claim 1, further comprising:
and the electronic authentication gateway records the complete interactive data.
6. An electronic authentication system, comprising: the system comprises a digital certificate registration center server, an electronic authentication gateway, a heterogeneous electronic authentication server and a key management server which are arranged in a long connection mode;
the heterogeneous electronic authentication server comprises a first electronic authentication server and a second electronic authentication server which are arranged in parallel.
7. The system according to claim 6, wherein the first electronic authentication server and the second electronic authentication server are configured identically;
the key management server is used for processing the encrypted certificate sent by the first electronic authentication server and/or the second electronic authentication server.
8. The system according to claim 6, wherein the electronic authentication gateway is plural;
a plurality of electronic authentication gateways and the digital certificate registration center server adopt an HA deployment mode;
the electronic authentication system further includes: a switch;
the switch is arranged between the electronic authentication gateway and the digital certificate registry server.
9. The system of claim 8, wherein the switch is configured to load balance the plurality of electronic authentication gateways and synchronize data of the plurality of electronic authentication gateways.
10. The system according to claim 6, characterized in that the electronic authentication gateway is provided with a database for recording complete interaction data.
CN202110426704.5A 2021-04-20 2021-04-20 Electronic authentication method and system Pending CN113347148A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110426704.5A CN113347148A (en) 2021-04-20 2021-04-20 Electronic authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110426704.5A CN113347148A (en) 2021-04-20 2021-04-20 Electronic authentication method and system

Publications (1)

Publication Number Publication Date
CN113347148A true CN113347148A (en) 2021-09-03

Family

ID=77468206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110426704.5A Pending CN113347148A (en) 2021-04-20 2021-04-20 Electronic authentication method and system

Country Status (1)

Country Link
CN (1) CN113347148A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050055552A1 (en) * 2003-09-10 2005-03-10 Canon Kabushiki Kaisha Assurance system and assurance method
US20070079115A1 (en) * 2005-10-04 2007-04-05 Roman Kresina Secure gateway with redundent servers
US20110078304A1 (en) * 2009-09-30 2011-03-31 Ade Lee Automatic Server Administration of Serial Numbers in a Replicated Certificate Authority Topology
EP2837162A1 (en) * 2012-04-11 2015-02-18 Nokia Solutions and Networks Oy Apparatus, method, system and computer program product for server failure handling

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050055552A1 (en) * 2003-09-10 2005-03-10 Canon Kabushiki Kaisha Assurance system and assurance method
US20070079115A1 (en) * 2005-10-04 2007-04-05 Roman Kresina Secure gateway with redundent servers
US20110078304A1 (en) * 2009-09-30 2011-03-31 Ade Lee Automatic Server Administration of Serial Numbers in a Replicated Certificate Authority Topology
EP2837162A1 (en) * 2012-04-11 2015-02-18 Nokia Solutions and Networks Oy Apparatus, method, system and computer program product for server failure handling

Similar Documents

Publication Publication Date Title
CN110569309B (en) Apparatus, method, system, and medium for implementing blockchain
CN109688012B (en) Method for hot standby switching of alliance link nodes
US20180337892A1 (en) Scalable proxy clusters
CN112686668B (en) Alliance chain crossing system and method
CN112199726B (en) A blockchain-based alliance trust distributed identity authentication method and system
CN102148850B (en) Cluster system and service processing method thereof
CN100369413C (en) Proxy-response device and method for proxy-response device
US20080222296A1 (en) Distributed server architecture
CN113824563A (en) Cross-domain identity authentication method based on block chain certificate
US20130173747A1 (en) System, method and apparatus providing address invisibility to content provider/subscriber
CN111460029B (en) Data synchronization method and device
CN111314060B (en) A key updating method, device and storage medium
CN116389105B (en) Remote access management platform and management method
CN110035081A (en) A kind of publish/subscribe architectural framework based on block chain
CN110730081B (en) Block chain network-based certificate revocation method, related equipment and medium
WO2016177231A1 (en) Dual-control-based active-backup switching method and device
CN112152981A (en) A communication method, node and communication system
CN105933379A (en) Business processing method, device and system
KR101342258B1 (en) Deistributed data management system and method thereof
US9706440B2 (en) Mobile communication system, call processing node, and communication control method
CN110290163B (en) Data processing method and device
CN111193720A (en) Trust service adaptation method based on security agent
CN112202801B (en) Cloud key system
CN113347148A (en) Electronic authentication method and system
JP7480434B2 (en) Distributed management system and method for smart card management device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210903