Current location - Trademark Inquiry Complete Network - Trademark registration - How to correct the loss of patent electronic digital certificate?
How to correct the loss of patent electronic digital certificate?
Digital certificates are generally "online application for download", so that they can be used on multiple computers after backup. The application process begins with the submission of paper documents, which takes less than 1 month. The paper documents to be submitted include 1 signed registration request, 2 copies of user agreement and 1 copy of ID card, and then send them to the Patent Office.

About 20 days after the paper document is submitted, you can log in to the temporary account to view it. If it passes, it will give you an official account, go in and download the electronic certificate, and then you can operate it through the CPC platform. Personal information will not be checked for academic qualifications. As long as it is correct, there will be no artificial obstacles.

Extended data

1, secure email

Using digital certificate in e-mail can construct a secure e-mail certificate, and the main user encrypts the transmission of e-mail to protect the security of e-mail during transmission and reception. A secure e-mail certificate mainly includes the signature of the certificate holder, the e-mail address and the public key of the CA organization.

On the one hand, after the combination of digital certificate and e-mail, under the protection of secure e-mail certificate encryption and digital signature technology, e-mail can be sent and received safely, ensuring the security and integrity of e-mail. At the same time, it also ensures the authenticity of the information of the sender and receiver of the mail. On the other hand, including the public key in the secure e-mail certificate can ensure that the e-mail will not be changed, because the e-mail can only be used if the public key is known.

2, security terminal protection

With the development of computer network technology, e-commerce is developing faster and faster, and it is more and more widely used in people's life and production, and the security of user terminals and data is also paid more and more attention. In order to avoid the damage or leakage of terminal data information, digital certificate, as an encryption technology, can be used for terminal protection.

First of all, use genuine software and hardware, correctly configure the system and network and check it regularly to prevent the terminal configuration from being illegally tampered with. Secondly, by using network security technologies such as firewalls, the internal and external networks are basically isolated. At the same time, update virus database and antivirus software in time, scan terminal system viruses and security vulnerabilities in real time, and strengthen the security protection of terminal system. Once suspicious information is found, it should be monitored immediately to prevent its influence and destruction.

Finally, strengthen the control of access terminals, and strengthen the difficulty of information cracking by means of encryption and authentication. Users can set a system login mode based on digital certificate and verify the system through dynamic encryption. Unauthorized users cannot access the terminal system, and authorized users meet the access requirements, ensuring the consistency of accessing the terminal. In addition, it is necessary to separate the terminal network from the main network, so as to reduce the data crossing and merging between them, avoid the mutual influence between the terminal network and the main network, and reduce the risk.

3. code signing protection

Network information promotion is convenient and economical for many users, but it is uncertain about the security of software. For example, when users share software, there are many unsafe factors in the process of receiving and using the software. Even if the software supplier can guarantee the security of the software itself, it can't resist the adverse effects caused by the unsafe factors of pirated software and the network itself.

4. Trusted website services

With the development of computer network technology, there are more and more websites in China, including malicious websites, phishing websites and fake websites, which makes it more and more difficult for users to identify these websites. If they are not careful, they will reveal their own data and information, which will seriously affect the security of the network. When users have doubts about the website they use and are not sure whether it has been tampered with or invaded, the technology of digital certificate can be used. Through digital certificate technology, uncertain websites can be verified and checked first, which increases the probability of using secure websites and avoids the losses caused by malicious websites, phishing websites and fake websites.

5. Identity authorization management

Authorization management system is an important content of information system security, which provides users and programs with corresponding authorization services, authorized access and application methods. Digital certificates can only be applied after identity authorization management of computer networks. Therefore, it is necessary to ensure the security of identity authorization management tools. When both sides of the system reach an agreement, the work of the identity authorization system can be carried out. At the same time, the correct use of digital certificates, reasonable authorization and user authentication of the system can effectively protect the security of the identity authorization management system.

Baidu Encyclopedia-Digital Certificate