Telecommunications Science ›› 2020, Vol. 36 ›› Issue (11): 98-103.doi: 10.11959/j.issn.1000-0801.2020292

• Topic:Information Security • Previous Articles     Next Articles

Application of public key infrastructure in telecom operators

Congli WANG1,2,Jinhua WANG1,2,Weijia XUE1,2   

  1. 1 Research Institute of China Telecom Co.,Ltd.,Shanghai 201315,China
    2 Mobile Internet System and Application Security National Engineering Laboratory,Shanghai 201315,China
  • Revised:2020-11-13 Online:2020-11-20 Published:2020-12-09

Abstract:

With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be strengthened.A scheme of constructing unified telecom public key infrastructure with strict hierarchical structure was proposed,that is,establishing a national telecom root CA as a trust anchor,and each major telecom operator becomes an independent sub-ca,forming a certificate trust chain of “national telecom root CA- telecom operator sub-ca” and providing PKI security services.This scheme can not only realize the mutual recognition between telecom operators,but also help unify the telecom public key infrastructure to become a globally trusted electronic authentication service provider,so as to have more influence and say in the formulation of international certification standards.

Key words: public key infrastructure, digital certificate, telecom operator, connectivity

CLC Number: 

No Suggested Reading articles found!