Since the beginning of the new century, all manufacturing enterprises have been seeking ways to transform and upgrade the systems to maintain their competitive advantages. In the process of transformation and upgrading, service innovation has become more vital. In the service innovation mode, customers and suppliers are mainly involved in the manufacture of products. In the process of communication, these suppliers and customers need to rely on public key infrastructure (PKI) for data encryption and identity authentication operations, thereby achieving reliable information exchange and identity authentication in an untrusted environment. Therefore, ensuring the security of network communication for various types of users is crucial. The purpose of this paper is to solve the problem that results when a tampered certificate is difficult to trace due to the single point of failure and vulnerability of the current settlement and authentication system. In this scenario, the user's identity information is leaked in the certificate application. Resolving this problem is necessary to ensure the security of the information network.