About CA

xiaoxiao2021-03-06  37

:: CA Center Concept :: CA Center's core function is a digital security certificate that distributes and manages users. The CA Center is in a crucial location throughout the e-commerce environment, which is the starting point of the entire trust chain. The CA Center is the basis for e-commerce. If the CA Center is unsafe or issued, the online electronics transaction is all over. The Digital Security Certificate issued by the CA Center is a series of data of the identity information of the logo communication parties in the network communication. It provides a way to verify your identity on the Internet, which is similar to the driver's driver's license or the identity of daily life. Certificate. It is issued by an authority ----- CA organization, also known as the center of Certificate Authority, can use it to identify the identity of the other party. :: CA Working Principle :: Digital Security Certificate encrypts and decrypts with a pair of mutually matched keys. Each user can set a specific private key (private key) known to himself, use it to decrypt and sign; at the same time, set a public key (public key) and is disclosed by himself, Group users are shared, used to encrypt and verify signatures. When a confidential file is sent, the sender uses the recipient's public key to encrypt the data, and the recipient uses its own private key to decrypt, so information can be safe and unmracted. Destination. By digital means to ensure that the encryption process is an irreversible process, that is, only private keys can be decrypted. In the public key cryptographic system, one of the common use is the RSA system. Its mathematics is to decompose a large number of products into two rigs, encrypted, and decrypts two different keys. Even known clear text, ciphertext, and encryption key (public key), you want to derive the decryption key (private key), it is impossible to calculate. According to the current computer technology level, it is necessary to crack the 1024-bit RSA key currently used, and it takes a thousand years of calculation time. The public key technology solves the management problem of the key release, and the merchant can disclose its public key, but retain its private key. Shoppers can encrypt the information transmitted and securely transmitted by everyone's well-known public key, and then decrypts by merchants with their own private key. The user can also use its own private key to handle information. Since the key is only all of myself, it produces files that others unable to generate, and digital signatures are formed. With digital signatures, it is possible to confirm that the following two points: (1) Guarantee information is sent by the signature yourself, the signature cannot deny or difficult to deny; (2) After the information is issued, it has never been made without any modifications. The issued file is a real file.

:: Certificate Management :: CA CAEA also manages the certificate sent, the management function is as follows: 1 The certificate of the certificate includes a valid certificate and a certificate of revocation. When verifying the sender data, the user needs to verify the sender digital security certificate. This needs to retrieve valid certificate libraries. On the other hand, the certificate may be revoked within its validity period, so the user needs to retrieve the revoked certificate library. 2 Undo Certificate has arrived at the validity of the certificate, the user's identity change, the user's key is destroyed or is not used, and the original certificate should be revoked. 3 Backup Certificate Database 4 Effectively protect the security of the certificate and key server. :: Certificate Usage Process: Certification Center (CA) Digital Safety Certificate Using Procedure Using E-Commerce Security Architecture In order to achieve an e-commerce security of identity authentication. The security architecture of e-commerce is achieved by building a trust process of the Certification Center (CA) certificate. 1) Participants in e-commerce: the following five trading participants in e-commerce applications: buyers, service providers, suppliers, banking and certification centers (CA). 2) The transaction process mainly has the following three stages: the first phase: the registration application for the certification center (CA) certificate. The parties to the transaction acquire the respective digital security certificates through the Certification Center (CA). The second phase: The bank's payment center verifies the buyer's digital security certificate. After verification, the buyer's payment is frozen in the bank. At this point, the service providers and suppliers have also verified by each other. After verification, they can perform the transaction content for delivery. Third Phase: After the bank verifies the service provider and supplier's Digital Security certificate, the buyer is frozen in the bank to transfer to the service provider and supplier's account, and completed this electronic transaction. Since all parties involved in the transaction holds a digital security certificate issued by the Certification Center (CA), it is guaranteed that the real identity of the parties in the process of the transaction will ensure that others from fake.

转载请注明原文地址:https://www.9cbs.com/read-71751.html

New Post(0)