Disclosure of Invention
The specification provides an electronic signature authentication certificate identification with an explicit identification, a verification method, a device and electronic equipment, wherein key information is carried by a self-contained field in an extension item of the explicit identification, so that a verification party can finish legal compliance judgment only by analyzing the certificate, the risk that an external file is inaccessible is avoided, and meanwhile, a service application system is facilitated to quickly identify the type of the electronic signature authentication certificate and verify legal effectiveness compliance of the certificate.
The specification provides a method for identifying an electronic signature authentication certificate with an explicit identifier, which comprises the following steps:
The registration mechanism acquires an electronic signature authentication certificate request sent by an applicant party;
the registration authority determines the type of the electronic signature authentication certificate based on the electronic signature authentication certificate request and authenticates the identity of the applicant;
When the identity authentication of the applicant is normal, the certificate authority embeds an explicit identification extension in the electronic signature authentication certificate based on the type of the electronic signature authentication certificate;
And the certificate authority carries out digital signature on the electronic signature authentication certificate containing the explicit identification extension to obtain the electronic signature authentication certificate with the explicit identification.
Optionally, the explicit identifier extension includes an electronic signature certificate statement, an electronic authentication service license number, an identity authentication field, and a cryptographic component identifier;
The electronic signature authentication certificate declaration includes a certificate type and a legal effectiveness compliance declaration;
the electronic authentication service license number includes a license number of the certificate authority;
the identity authentication field comprises an identity authentication result of the registration mechanism on the applicant;
The cryptographic component identification includes a commercial cryptographic product authentication certificate number used to generate the certificate signature.
Optionally, before the registration mechanism obtains the electronic signature authentication certificate request sent by the applicant, the method includes:
the certificate issuing organization formulates an electronic signature authentication certificate strategy and business rules, and issues a certificate configuration rule template to the registration organization.
The specification provides a method for verifying an electronic signature authentication certificate with an explicit identifier, which comprises the following steps:
Acquiring an electronic signature authentication certificate with an explicit identifier;
performing explicit identification extension verification on the electronic signature authentication certificate with the explicit identification, and outputting a legal compliance verification result;
when the legal compliance verification result is compliance, carrying out electronic signature validity verification on the electronic signature authentication certificate with the explicit mark, and outputting a validity verification result;
and when the validity verification result is in accordance, the verification of the electronic signature authentication certificate with the explicit identifier is completed.
Optionally, before the step of obtaining the electronic signature authentication certificate with the explicit identifier, the method includes:
The relying party formulates an explicit identification extension checking strategy of the electronic signature certificate based on the application scene and configures the checking strategy and the associated data set thereof to a verification system.
Optionally, the verifying the explicit identifier extension item of the electronic signature authentication certificate with the explicit identifier includes:
Analyzing the certificate declaration field of the electronic signature authentication, and extracting certificate type and legal effectiveness compliance declaration;
verifying the electronic authentication service license number, verifying the qualification of the issuing institution through an industrial and informatization department license database configured in a local storage;
Verifying an identity authentication field to confirm that the identity authentication result of the applicant is normal;
The verification password component identification field matches the commercial password product authentication certificate number configured in the local storage with the national password management agency record information configured in the local storage.
The present specification provides an electronic signature authentication certificate identification device with an explicit identification, comprising:
the first acquisition module is used for acquiring an electronic signature authentication certificate request sent by an applicant party by a registration mechanism;
The authentication module is used for determining the type of the electronic signature authentication certificate based on the electronic signature authentication certificate request by the registration authority and authenticating the identity of the applicant;
the embedding module is used for embedding an explicit identification extension item in the electronic signature authentication certificate based on the type of the electronic signature authentication certificate by the certificate authority when the identity authentication of the applicant is normal;
and the signature module is used for digitally signing the electronic signature authentication certificate containing the explicit identifier extension by the certificate issuing mechanism to obtain the electronic signature authentication certificate with the explicit identifier.
Optionally, the explicit identifier extension includes an electronic signature certificate statement, an electronic authentication service license number, an identity authentication field, and a cryptographic component identifier;
The electronic signature authentication certificate declaration includes a certificate type and a legal effectiveness compliance declaration;
the electronic authentication service license number includes a license number of the certificate authority;
the identity authentication field comprises an identity authentication result of the registration mechanism on the applicant;
The cryptographic component identification includes a commercial cryptographic product authentication certificate number used to generate the certificate signature.
Optionally, before the first obtaining module, the method includes:
the certificate issuing organization formulates an electronic signature authentication certificate strategy and business rules, and issues a certificate configuration rule template to the registration organization.
The specification provides an electronic signature authentication certificate verification device with an explicit identifier, which comprises:
The second acquisition module is used for acquiring the electronic signature authentication certificate with the explicit identifier;
the first verification module is used for verifying the explicit identification extension item of the electronic signature authentication certificate with the explicit identification and outputting a legal compliance verification result;
The second verification module is used for carrying out electronic signature validity verification on the electronic signature authentication certificate with the explicit mark when the legal compliance verification result is the compliance, and outputting a validity verification result;
And the verification completion module is used for completing the verification of the electronic signature authentication certificate with the explicit identifier when the validity verification result is in accordance.
Optionally, before the second obtaining module, the method includes:
The relying party formulates an explicit identification extension checking strategy of the electronic signature certificate based on the application scene and configures the checking strategy and the associated data set thereof to a verification system.
Optionally, the first verification module includes:
Analyzing the certificate declaration field of the electronic signature authentication, and extracting certificate type and legal effectiveness compliance declaration;
verifying the electronic authentication service license number, verifying the qualification of the issuing institution through an industrial and informatization department license database configured in a local storage;
Checking an identity authentication field to confirm that the identity authentication result of the applicant is normal;
The verification password component identification field matches the commercial password product authentication certificate number configured in the local storage with the national password management agency record information configured in the local storage.
The specification also provides an electronic device, wherein the electronic device includes:
And a memory storing computer executable instructions that, when executed, cause the processor to perform any of the methods described above.
The present specification also provides a computer readable storage medium storing one or more programs which when executed by a processor implement any of the methods described above.
In the invention, key information is carried by the self-contained field in the explicit identifier extension item, so that a verification party can finish legal compliance judgment only by analyzing the certificate, and the risk that an external file is inaccessible is avoided. Meanwhile, the service application system is helped to quickly identify the type of the electronic signature authentication certificate and verify the legal effectiveness compliance of the certificate. The certificate declaration field in the extension directly identifies the certificate type and legal compliance, and solves the problem that the traditional certificate strategy lacks intuitiveness. The relying party can directly read the field values to judge legal effectiveness without manually reading the obscured policy document. And the verification system verifies the four fields of the extension item based on a pre-configured checking strategy, and outputs a machine-readable legal compliance conclusion. The flow replaces manual intervention, and timely response of legal effectiveness judgment is achieved.
Detailed Description
The following description is presented to enable one of ordinary skill in the art to make and use the invention. The preferred embodiments in the following description are by way of example only and other obvious variations will occur to those skilled in the art. The basic principles of the invention defined in the following description may be applied to other embodiments, variations, modifications, equivalents, and other technical solutions without departing from the spirit and scope of the invention.
Exemplary embodiments of the present invention are described more fully below in connection with fig. 1-6. However, the exemplary embodiments can be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art. The same reference numerals in the drawings denote the same or similar elements, components or portions, and thus a repetitive description thereof will be omitted.
The features, structures, characteristics or other details described in a particular embodiment do not exclude that may be combined in one or more other embodiments in a suitable manner, without departing from the technical idea of the invention.
In the description of specific embodiments, features, structures, characteristics, or other details described in the present invention are provided to enable one skilled in the art to fully understand the embodiments. It is not excluded that one skilled in the art may practice the present invention without one or more of the specific features, structures, characteristics, or other details.
The flow diagrams depicted in the figures are exemplary only, and do not necessarily include all of the elements and operations/steps, nor must they be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
The block diagrams depicted in the figures are merely functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The term "and/or" and/or "includes all combinations of any one or more of the associated listed items.
Fig. 1 is a schematic diagram of a method for identifying an electronic signature authentication certificate with an explicit identifier according to an embodiment of the present disclosure, where the method may include:
optionally, before S110, the method includes:
the certificate issuing organization formulates an electronic signature authentication certificate strategy and business rules, and issues a certificate configuration rule template to the registration organization.
In particular embodiments of the present description, a Certificate Authority (CA) first formulates an electronic signature certification certificate policy and business rules, including legal effectiveness compliance criteria, certificate type definitions, and cryptographic algorithm specifications. The CA system then translates the rules into machine-executable code modules via a policy structured compilation engine and dynamically generates certificate configuration rule templates.
S110, a registration mechanism acquires an electronic signature authentication certificate request sent by an applicant party;
S120, the registration institution determines the type of the electronic signature authentication certificate based on the electronic signature authentication certificate request and authenticates the identity of the applicant party;
s130, when the identity authentication of the applicant is normal, embedding an explicit identification extension term in the electronic signature authentication certificate based on the type of the electronic signature authentication certificate by a certificate authority;
And S140, the certificate authority digitally signs the electronic signature authentication certificate containing the explicit identification extension to obtain the electronic signature authentication certificate with the explicit identification.
Optionally, the explicit identifier extension includes an electronic signature certificate statement, an electronic authentication service license number, an identity authentication field, and a cryptographic component identifier;
The electronic signature authentication certificate declaration includes a certificate type and a legal effectiveness compliance declaration;
the electronic authentication service license number includes a license number of the certificate authority;
the identity authentication field comprises an identity authentication result of the registration mechanism on the applicant;
The cryptographic component identification includes a commercial cryptographic product authentication certificate number used to generate the certificate signature.
In the specific embodiment of the present specification, a Registration Authority (RA) receives an electronic signature authentication certificate request initiated by an applicant, determines a required certificate type (such as a personal signature, an enterprise signature, etc.) according to the request content, and performs real-name authentication on the identity of the applicant. When the identity authentication result is confirmed to be normal, a Certificate Authority (CA) embeds an explicit identification extension in the electronic signature authentication certificate according to the determined certificate type. As shown in table 1, the extension contains the following core fields:
An electronic signature authentication certificate statement, namely, clearly marking the type of the certificate and the compliance of legal effectiveness (such as 'compliance with the thirteenth item of electronic signature law');
An electronic authentication service license number, which is written in a legal license number of the CA mechanism;
an identity authentication field for recording the real name authentication state of the RA to the applicant;
the cipher component mark marks the cipher algorithm and the cipher identification number for generating the certificate signature.
And the CA mechanism carries out digital signature on the certificate containing the extension, and finally generates an electronic signature authentication certificate with an explicit identifier and distributes the electronic signature authentication certificate to the applicant.
Table 1 electronic signature authentication certificate extension content and definition
Fig. 2 is a schematic diagram of an electronic signature authentication certificate verification method with explicit identifier according to an embodiment of the present disclosure, where the method may include:
Optionally, before S210, the method includes:
The relying party formulates an explicit identification extension checking strategy of the electronic signature certificate based on the application scene and configures the checking strategy and the associated data set thereof to a verification system.
In the specific embodiments of this specification, a relying party formulates an explicit identity extension checking strategy according to legal effectiveness requirements of an application scenario. The strategy comprises the following core contents:
certificate type verification rules, namely setting a certificate type list which is allowed to be used (such as only accepting 'qualified electronic signature');
legal compliance assertion condition, the legal assertion field in the clear extension must be true;
An identity authentication threshold value, namely requiring an identity authentication field value to reach a 'real name authentication passing' level;
the password identification white list defines the acceptable commercial password product authentication certificate number range.
The policy and associated data set (e.g., the national password administration algorithm record library) are configured to a verification system to generate executable machine verification rules. And the verification system automatically loads a strategy when in operation, performs field-level verification on the certificate dominant identifier extension, and outputs a legal compliance decision instruction.
S210, acquiring an electronic signature authentication certificate with an explicit identifier;
S220, verifying the explicit identification extension item of the electronic signature authentication certificate with the explicit identification, and outputting a legal compliance verification result;
S230, when the legal compliance verification result is compliance, carrying out electronic signature validity verification on the electronic signature authentication certificate with the explicit mark, and outputting a validity verification result;
And S240, when the validity verification result is in accordance, the verification of the electronic signature authentication certificate with the explicit identifier is completed.
Optionally, the S220 includes:
Analyzing the certificate declaration field of the electronic signature authentication, and extracting certificate type and legal effectiveness compliance declaration;
verifying the electronic authentication service license number, verifying the qualification of the issuing institution through an industrial and informatization department license database configured in a local storage;
Verifying an identity authentication field to confirm that the identity authentication result of the applicant is normal;
The verification password component identification field matches the commercial password product authentication certificate number configured in the local storage with the national password management agency record information configured in the local storage.
In the specific embodiment of the present specification, the verification system first acquires an electronic signature authentication certificate with an explicit identifier, and performs four-step field-level verification on the explicit identifier extension in the certificate:
Resolving certificate declaration field, extracting certificate type and legal effectiveness compliance declaration (such as "accord with thirteenth item of electronic signature law");
Verifying license numbers, namely verifying qualification legitimacy of an issuing institution through an electronic authentication service license database of an industrial and informatization part;
verifying the identity authentication field, namely confirming that the identity authentication state of the applicant party is normal (the authentication of the real name passes);
and verifying the password component identification, namely matching the commercial password product authentication certificate number with the record information of the national password management agency, and ensuring the algorithm compliance.
Outputting legal compliance verification results:
If the verification in the four steps is passed, marking the verification as 'legal compliance verification passing';
Any field verifies failure, terminates the flow and returns a specific failure cause (e.g., "password component identification not yet filed").
When the legal compliance results are passed, the system triggers electronic signature validity verification (including certificate chain verification, signature algorithm verification, etc.). Finally, only after signature validity verification is passed, judging that the verification of the electronic signature authentication certificate is completed
In the invention, key information is carried by the self-contained field in the explicit identifier extension item, so that a verification party can finish legal compliance judgment only by analyzing the certificate, and the risk that an external file is inaccessible is avoided. Meanwhile, the service application system is helped to quickly identify the type of the electronic signature authentication certificate and verify the legal effectiveness compliance of the certificate. The certificate declaration field in the extension directly identifies the certificate type and legal compliance, and solves the problem that the traditional certificate strategy lacks intuitiveness. The relying party can directly read the field values to judge legal effectiveness without manually reading the obscured policy document. And the verification system verifies the four fields of the extension item based on a pre-configured checking strategy, and outputs a machine-readable legal compliance conclusion. The flow replaces manual intervention, and second-level response of legal effectiveness judgment is realized.
Fig. 3 is a schematic diagram of an electronic signature authentication certificate identifier device with explicit identifier according to an embodiment of the present disclosure, where the device may include:
a first obtaining module 10, configured to obtain an electronic signature authentication certificate request sent by an applicant by a registration authority;
an authentication module 20, configured to determine the type of the electronic signature authentication certificate based on the electronic signature authentication certificate request by the registration authority, and authenticate the identity of the applicant;
An embedding module 30, configured to embed an explicit identifier extension in the electronic signature authentication certificate based on the electronic signature authentication certificate type by the certificate authority when the identity authentication of the applicant is normal;
and the signature module 40 is used for the certificate authority to digitally sign the electronic signature authentication certificate containing the explicit identifier extension to obtain the electronic signature authentication certificate with the explicit identifier.
Optionally, the explicit identifier extension includes an electronic signature certificate statement, an electronic authentication service license number, an identity authentication field, and a cryptographic component identifier;
The electronic signature authentication certificate declaration includes a certificate type and a legal effectiveness compliance declaration;
the electronic authentication service license number includes a license number of the certificate authority;
the identity authentication field comprises the identity authentication of the registration authority to the applicant;
The cryptographic component identification includes a commercial cryptographic product authentication certificate number used to generate the certificate signature.
Optionally, before the first obtaining module 10, the method includes:
the certificate issuing organization formulates an electronic signature authentication certificate strategy and business rules, and issues a certificate configuration rule template to the registration organization.
The functions of the apparatus according to the embodiments of the present invention have been described in the foregoing method embodiments, so that the descriptions of the embodiments are not exhaustive, and reference may be made to the related descriptions in the foregoing embodiments, which are not repeated herein.
Fig. 4 is a schematic diagram of an electronic signature authentication certificate verification device with explicit identifier according to an embodiment of the present disclosure, where the device may include:
A second obtaining module 50, configured to obtain an electronic signature authentication certificate with an explicit identifier;
a first verification module 60, configured to perform explicit identifier extension verification on the electronic signature authentication certificate with the explicit identifier, and output a legal compliance verification result;
A second verification module 70, configured to perform electronic signature validity verification on the electronic signature authentication certificate with the explicit identifier, and output a validity verification result when the legal compliance verification result is coincidence;
and the verification completion module 80 is configured to complete verification of the electronic signature authentication certificate with the explicit identifier when the validity verification result is in accordance.
Optionally, before the second obtaining module 50, the method includes:
The relying party formulates an explicit identification extension checking strategy of the electronic signature certificate based on the application scene and configures the checking strategy and the associated data set thereof to a verification system.
Optionally, the first verification module 60 includes:
Analyzing the certificate declaration field of the electronic signature authentication, and extracting certificate type and legal effectiveness compliance declaration;
verifying the electronic authentication service license number, verifying the qualification of the issuing institution through an industrial and informatization department license database configured in a local storage;
Checking an identity authentication field to confirm that the identity authentication result of the applicant is normal;
The verification password component identification field matches the commercial password product authentication certificate number configured in the local storage with the national password management agency record information configured in the local storage.
The functions of the apparatus according to the embodiments of the present invention have been described in the foregoing method embodiments, so that the descriptions of the embodiments are not exhaustive, and reference may be made to the related descriptions in the foregoing embodiments, which are not repeated herein.
Based on the same inventive concept, the embodiments of the present specification also provide an electronic device.
The following describes an embodiment of an electronic device according to the present invention, which may be regarded as a specific physical implementation of the above-described embodiment of the method and apparatus according to the present invention. The details described in the embodiments of the electronic device according to the invention should be regarded as additions to the embodiments of the method or the apparatus described above, and the details not disclosed in the embodiments of the electronic device according to the invention may be realized by referring to the embodiments of the method or the apparatus described above.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. An electronic device 300 according to this embodiment of the present invention is described below with reference to fig. 5. The electronic device 300 shown in fig. 5 is merely an example, and should not be construed as limiting the functionality and scope of use of embodiments of the present invention.
As shown in fig. 5, the electronic device 300 is embodied in the form of a general purpose computing device. The components of electronic device 300 may include, but are not limited to, at least one processing unit 310, at least one memory unit 320, a bus 330 connecting the different system components (including memory unit 320 and processing unit 310), a display unit 340, and the like.
Wherein the storage unit stores program code that is executable by the processing unit 310 such that the processing unit 310 performs the steps according to various exemplary embodiments of the invention described in the above processing method section of the present specification. For example, the processing unit 310 may perform the steps shown in fig. 1 and/or 2.
The memory unit 320 may include readable media in the form of volatile memory units, such as Random Access Memory (RAM) 3201 and/or cache memory 3202, and may further include Read Only Memory (ROM) 3203.
The storage unit 320 may also include a program/utility 3204 having a set (at least one) of program modules 3205, such program modules 3205 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 330 may be one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 300 may also communicate with one or more external devices 400 (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a viewer to interact with the electronic device 300, and/or any device (e.g., router, modem, etc.) that enables the electronic device 300 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 350. Also, electronic device 300 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 360. The network adapter 360 may communicate with other modules of the electronic device 300 via the bus 330. It should be appreciated that although not shown in FIG. 5, other hardware and/or software modules may be used in connection with electronic device 300, including, but not limited to, microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
From the above description of embodiments, those skilled in the art will readily appreciate that the exemplary embodiments described herein may be implemented in software, or may be implemented in software in combination with necessary hardware. Thus, the technical solution according to the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a computer readable storage medium (may be a CD-ROM, a usb disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, or a network device, etc.) to perform the above-mentioned method according to the present invention. The computer program, when executed by a data processing device, enables the computer readable medium to carry out the above-described method of the present invention, i.e. the method as shown in fig. 1 and/or 2.
Fig. 6 is a schematic diagram of a computer readable medium according to an embodiment of the present disclosure.
A computer program implementing the methods shown in fig. 1 and/or 2 may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of a readable storage medium include an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable storage medium may also be any readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the spectator computing device, partly on the spectator device, as a stand-alone software package, partly on the spectator computing device, partly on a remote computing device, or entirely on a remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the spectator computing device through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the internet using an internet service provider).
In summary, the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functionality of some or all of the components in accordance with embodiments of the present invention may be implemented in practice using a general purpose data processing device such as a microprocessor or Digital Signal Processor (DSP). The present invention can also be implemented as an apparatus or device program (e.g., a computer program and a computer program product) for performing a portion or all of the methods described herein. Such a program embodying the present invention may be stored on a computer readable medium, or may have the form of one or more signals. Such signals may be downloaded from an internet website, provided on a carrier signal, or provided in any other form.
The above-described specific embodiments further describe the objects, technical solutions and advantageous effects of the present invention in detail, and it should be understood that the present invention is not inherently related to any particular computer, virtual device or electronic apparatus, and various general-purpose devices may also implement the present invention. The foregoing description of the embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.