亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3039.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                       S. SantessonRequest for Comments: 3039                                      AddTrustCategory: Standards Track                                        W. Polk                                                                    NIST                                                               P. Barzin                                                                  SECUDE                                                              M. Nystrom                                                            RSA Security                                                            January 2001                Internet X.509 Public Key Infrastructure                     Qualified Certificates ProfileStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2001).  All Rights Reserved.Abstract   This document forms a certificate profile for Qualified Certificates,   based on RFC 2459, for use in the Internet.  The term Qualified   Certificate is used to describe a certificate with a certain   qualified status within applicable governing law.  Further, Qualified   Certificates are issued exclusively to physical persons.   The goal of this document is to define a general syntax independent   of local legal requirements.  The profile is however designed to   allow further profiling in order to meet specific local needs.   It is important to note that the profile does not define any legal   requirements for Qualified Certificates.   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in RFC 2119.Santesson, et al.           Standards Track                     [Page 1]RFC 3039             Qualified Certificates Profile         January 2001Table of Contents   1  Introduction ................................................    2   2  Requirements and Assumptions ................................    3   2.1  Properties ................................................    4   2.2  Statement of Purpose ......................................    5   2.3  Policy Issues .............................................    5   2.4  Uniqueness of names .......................................    5   3  Certificate and Certificate Extensions Profile ..............    6   3.1  Basic Certificate Fields ..................................    6   3.1.1  Issuer ..................................................    6   3.1.2  Subject .................................................    6   3.2  Certificate Extensions ....................................    9   3.2.1  Subject Directory Attributes ............................    9   3.2.2  Certificate Policies ....................................   10   3.2.3  Key Usage ...............................................   10   3.2.4  Biometric Information ...................................   11   3.2.5  Qualified Certificate Statements ........................   12   4  Security Considerations .....................................   14   5  References ..................................................   15   6  Intellectual Property Rights ................................   16   A  ASN.1 definitions ...........................................   17   A.1  1988 ASN.1 Module .........................................   17   A.2  1993 ASN.1 Module .........................................   19   B  A Note on Attributes ........................................   24   C.  Example Certificate ........................................   24   C.1  ASN.1 Structure ...........................................   25   C.1.1 Extensions ...............................................   25   C.1.2 The certificate ..........................................   27   C.2  ASN.1 Dump ................................................   29   C.3  DER-encoding ..............................................   32   C.4  CA's public key ...........................................   33   Authors' Addresses .............................................   34   Full Copyright Statement .......................................   351  Introduction   This specification is one part of a family of standards for the X.509   Public Key Infrastructure (PKI) for the Internet.  It is based on RFC   2459, which defines underlying certificate formats and semantics   needed for a full implementation of this standard.   The standard profiles the format for a specific type of certificates   named Qualified Certificates.  The term Qualified Certificates and   the assumptions that affects the scope of this document are discussed   in Section 2.Santesson, et al.           Standards Track                     [Page 2]RFC 3039             Qualified Certificates Profile         January 2001   Section 3 defines requirements on information content in Qualified   Certificates.  This profile addresses two fields in the basic   certificate as well as five certificate extensions.  The certificate   fields are the subject and issuer fields.  The certificate extensions   are subject directory attributes, certificate policies, key usage, a   private extension for storage of biometric data and a private   extension for storage of statements related to Qualified   Certificates.  The private extensions are presented in the 1993   Abstract Syntax Notation One (ASN.1), but in conformance with RFC   2459 the 1988 ASN.1 module in Appendix A contains all normative   definitions (the 1993 module in Appendix A is informative).   In Section 4, some security considerations are discussed in order to   clarify the security context in which Qualified Certificates are   assumed to be utilized.  Section 5 contains the references.   Appendix A contains all relevant ASN.1 [X.680] structures that are   not already defined in RFC 2459.  Appendix B contains a note on   attributes.  Appendix C contains an example certificate.  Appendix D   contains authors' addresses and Appendix E contains the IETF   Copyright Statement.   It should be noted that this specification does not define the   specific semantics of Qualified Certificates, and does not define the   policies that should be used with them.  That is, this document   defines what information should go into Qualified Certificates, but   not what that information means.  A system that uses Qualified   Certificates must define its own semantics for the information in   Qualified Certificates.  It is expected that laws and corporate   policies will make these definitions.2  Requirements and Assumptions   The term "Qualified Certificate" has been used by the European   Commission to describe a certain type of certificates with specific   relevance for European legislation.  This specification is intended   to support this class of certificates, but its scope is not limited   to this application.   Within this standard the term "Qualified Certificate" is used more   generally, describing the format for a certificate whose primary   purpose is identifying a person with high level of assurance in   public non-repudiation services.  The actual mechanisms that will   decide whether a certificate should or should not be considered to be   a "Qualified Certificate" in regard to any legislation are outside   the scope of this standard.Santesson, et al.           Standards Track                     [Page 3]RFC 3039             Qualified Certificates Profile         January 2001   Harmonization in the field of Qualified Certificates is essential   within several aspects that fall outside the scope of RFC 2459.  The   most important aspects that affect the scope of this specification   are:   -  Definition of names and identity information in order to identify      the associated subject in a uniform way.   -  Definition of information which identifies the CA and the      jurisdiction under which the CA operates when issuing a particular      certificate.   -  Definition of key usage extension usage for Qualified      Certificates.   -  Definition of information structure for storage of biometric      information.   -  Definition of a standardized way to store predefined statements      with relevance for Qualified Certificates.   -  Requirements for critical extensions.2.1  Properties   A Qualified Certificate as defined in this standard is assumed to   have the following properties:   -  The certificate is issued by a CA that makes a public statement      that the certificate serves the purpose of a Qualified      Certificate, as discussed in Section 2.2   -  The certificate indicates a certificate policy consistent with      liabilities, practices and procedures undertaken by the CA, as      discussed in 2.3   -  The certificate is issued to a natural person (living human      being).   -  The certificate contains an identity based on a pseudonym or a      real name of the subject.Santesson, et al.           Standards Track                     [Page 4]RFC 3039             Qualified Certificates Profile         January 20012.2  Statement of Purpose   For a certificate to serve the purpose of being a Qualified   Certificate, this profile assumes that the CA will have to include in   the certificate information that explicitly defines this intent.   The function of this information is thus to assist any concerned   entity in evaluating the risk associated with creating or accepting   signatures that are based on a Qualified Certificate.   This profile defines two complementary ways to include this   information:   -  As information defined by a certificate policy included in the      certificate policies extension, and   -  As a statement included in the Qualified Certificates Statements      extension.2.3  Policy Issues   Certain policy aspects define the context in which this profile is to   be understood and used.  It is however outside the scope of this   profile to specify any policies or legal aspects that will govern   services that issue or utilize certificates according to this   profile.   It is however assumed that the issuing CA will undertake to follow a   publicly available certificate policy that is consistent with its   liabilities, practices and procedures.2.4  Uniqueness of names   Distinguished name is originally defined in X.501 [X.501] as a   representation of a directory name, defined as a construct that   identifies a particular object from among the set of all objects.  An   object can be assigned a distinguished name without being represented   by an entry in the Directory, but this name is then the name its   object entry could have had if it were represented in the Directory.   In the context of qualified certificates, a distinguished name   denotes a set of attribute values [X.501] which forms a name that is   unambiguous within a certain domain that forms either a real or a   virtual DIT (Directory Information Tree)[X.501].  In the case of   subject names the domain is assumed to be at least the issuing domain   of the CA.  The distinguished name MUST be unique for each subject   entity certified by the one CA as defined by the issuer name field,   during the whole life time of the CA.Santesson, et al.           Standards Track                     [Page 5]RFC 3039             Qualified Certificates Profile         January 20013  Certificate and Certificate Extensions Profile   This section defines a profile for Qualified Certificates.  The   profile is based on the Internet certificate profile RFC 2459 which   in turn is based on the X.509 version 3 format.  For full   implementation of this section implementers are REQUIRED to consult   the underlying formats and semantics defined in RFC 2459.   ASN.1 definitions relevant for this section that are not supplied by   RFC 2459 are supplied in Appendix A.3.1  Basic Certificate Fields   This specification provides additional details regarding the contents   of two fields in the basic certificate.  These fields are the issuer   and subject fields.3.1.1  Issuer   The issuer field SHALL identify the organization responsible for   issuing the certificate.  The name SHOULD be an officially registered   name of the organization.   The identity of the issuer SHALL be specified using an appropriate   subset of the following attributes:         domainComponent;         countryName;         stateOrProvinceName;         organizationName;         localityName; and         serialNumber.   Additional attributes MAY be present but they SHOULD NOT be necessary   to identify the issuing organization.   Attributes present in the issuer field SHOULD be consistent with the   laws under which the issuer operates.   A relying party MAY have to consult associated certificate policies   and/or the issuer's CPS, in order to determine the semantics of name   fields and the laws under which the issuer operates.3.1.2  Subject   The subject field of a certificate compliant with this profile SHALL   contain a distinguished name of the subject (see 2.4 for definition   of distinguished name).Santesson, et al.           Standards Track                     [Page 6]RFC 3039             Qualified Certificates Profile         January 2001   The subject field SHALL contain an appropriate subset of the   following attributes:      countryName;      commonName;      surname;      givenName;      pseudonym;      serialNumber;      organizationName;      organizationalUnitName;      stateOrProvinceName      localityName and      postalAddress.   Other attributes may be present but MUST NOT be necessary to   distinguish the subject name from other subject names within the   issuer domain.   Of these attributes, the subject field SHALL include at least one of   the following:      Choice   I:  commonName      Choice  II:  givenName      Choice III:  pseudonym   The countryName attribute value specifies a general context in which   other attributes are to be understood.  The country attribute does   not necessarily indicate the subject's country of citizenship or   country of residence, nor does it have to indicate the country of   issuance.   Note: Many X.500 implementations require the presence of countryName

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩一区二区在线免费观看| 在线视频国内一区二区| 久久综合九色综合97_久久久| 免费亚洲电影在线| 欧美成人r级一区二区三区| 捆绑调教美女网站视频一区| 久久美女艺术照精彩视频福利播放| 国产一区二区美女| 国产精品热久久久久夜色精品三区 | 制服丝袜一区二区三区| 蜜臀精品久久久久久蜜臀| 337p粉嫩大胆噜噜噜噜噜91av| 国产福利一区二区三区在线视频| 国产精品久久久久一区| 91福利社在线观看| 日韩国产欧美在线播放| 欧美tickling网站挠脚心| 国产精品小仙女| 亚洲欧美一区二区三区久本道91| 欧美最猛性xxxxx直播| 日韩av中文字幕一区二区三区| 精品乱人伦小说| 成人蜜臀av电影| 亚洲电影在线免费观看| 精品国产一区二区精华 | 国产一区二区三区在线观看精品| 国产欧美日韩中文久久| 色婷婷精品久久二区二区蜜臂av | 国产真实乱偷精品视频免| 中国av一区二区三区| 日本精品视频一区二区三区| 美女一区二区在线观看| 国产精品视频麻豆| 欧美日韩国产首页| 国产精品主播直播| 亚洲精品videosex极品| 日韩欧美成人一区| 99精品国产热久久91蜜凸| 视频一区二区三区在线| 欧美国产成人精品| 欧美日韩激情在线| 国产成人福利片| 亚洲风情在线资源站| 欧美激情一区在线观看| 欧美午夜不卡在线观看免费| 久草精品在线观看| 亚洲另类色综合网站| 精品免费日韩av| 一本到一区二区三区| 精品在线亚洲视频| 一区二区三区精品在线观看| 26uuu久久天堂性欧美| 欧美亚洲综合另类| 国产成人免费av在线| 亚洲va韩国va欧美va精品| 欧美—级在线免费片| 在线不卡中文字幕| 91蜜桃在线观看| 韩国av一区二区三区在线观看| 夜夜操天天操亚洲| 日本一区二区三区高清不卡| 欧美日韩国产片| 成人av动漫在线| 日本亚洲视频在线| 亚洲伦理在线免费看| 久久综合久久99| 777久久久精品| 色综合色综合色综合| 国产剧情av麻豆香蕉精品| 日韩专区在线视频| 亚洲免费毛片网站| 久久久久一区二区三区四区| 9191国产精品| 色婷婷久久久亚洲一区二区三区| 成人在线综合网| 久久成人免费日本黄色| 五月天精品一区二区三区| 亚洲区小说区图片区qvod| 久久久久久久久久久99999| 欧美精品99久久久**| 色偷偷久久一区二区三区| 成人激情小说网站| 国产精品一区二区在线观看网站| 午夜一区二区三区在线观看| 中文字幕在线一区| 国产日韩综合av| 欧美精品一区在线观看| 欧美一级片免费看| 欧美日韩一区二区三区免费看| 91免费国产在线观看| 成人av网站在线| 国产精品一区久久久久| 黄色资源网久久资源365| 天天影视色香欲综合网老头| 亚洲自拍偷拍网站| 亚洲精品伦理在线| 国产精品入口麻豆九色| 久久综合99re88久久爱| 精品嫩草影院久久| 精品久久国产字幕高潮| 日韩一区二区在线观看视频播放 | 色综合久久六月婷婷中文字幕| 国产精品资源网| 国产一区二区中文字幕| 麻豆成人av在线| 蜜桃91丨九色丨蝌蚪91桃色| 日韩极品在线观看| 日一区二区三区| 丝袜脚交一区二区| 天天综合色天天综合| 丝袜a∨在线一区二区三区不卡| 婷婷成人激情在线网| 天天影视色香欲综合网老头| 日韩成人午夜精品| 日本在线不卡一区| 蜜臀av一区二区在线观看| 美女mm1313爽爽久久久蜜臀| 偷窥国产亚洲免费视频| 五月激情六月综合| 日韩在线a电影| 日本三级亚洲精品| 另类小说视频一区二区| 久久 天天综合| 国产一区二区在线观看免费| 国产一二三精品| 国产精品99久久久| 国产成+人+日韩+欧美+亚洲| 国产成人av一区二区三区在线| 国产精品系列在线播放| 成人黄色一级视频| 91色综合久久久久婷婷| 99精品视频免费在线观看| 一本色道亚洲精品aⅴ| 欧美性做爰猛烈叫床潮| 在线不卡a资源高清| 日韩三级在线观看| 久久亚洲欧美国产精品乐播| 亚洲国产成人午夜在线一区| 亚洲色图一区二区三区| 亚洲国产成人av网| 美女一区二区三区| 国产一区二区美女诱惑| 99久久精品国产麻豆演员表| 欧美在线观看视频在线| 日韩一区二区在线看| 久久免费视频色| 亚洲天堂成人在线观看| 亚洲一区二区三区中文字幕在线| 亚洲成人精品影院| 久久99精品国产.久久久久久| 国产一区二区伦理片| 色综合久久久久| 88在线观看91蜜桃国自产| 日韩欧美视频在线| 国产丝袜欧美中文另类| 亚洲欧美区自拍先锋| 亚洲丶国产丶欧美一区二区三区| 欧美aaa在线| 成人精品视频网站| 欧美写真视频网站| 欧美精品一区二区在线播放| 国产精品美女久久久久高潮| 亚洲精品免费看| 久久成人免费电影| 色综合中文字幕| 日韩欧美色综合| 中文字幕一区二区三区在线不卡| 亚洲电影视频在线| 国产一区二区免费视频| 欧美最猛黑人xxxxx猛交| 精品国精品国产尤物美女| 自拍偷拍国产亚洲| 麻豆精品久久久| 99久久国产综合精品麻豆| 欧美一卡二卡三卡四卡| 国产精品不卡在线| 美国毛片一区二区三区| 99久久精品国产精品久久| 日韩视频免费观看高清完整版在线观看| 国产精品理伦片| 日本不卡123| 99精品视频免费在线观看| 精品日韩欧美在线| 一区二区在线观看不卡| 国产精品一二一区| 欧美日韩精品一区二区天天拍小说 | 欧美v日韩v国产v| 亚洲人成7777| 国产精品主播直播| 337p亚洲精品色噜噜| 亚洲色图自拍偷拍美腿丝袜制服诱惑麻豆| 老司机免费视频一区二区| 色婷婷精品久久二区二区蜜臀av | 日韩网站在线看片你懂的| 中文字幕欧美一区| 精品一区二区日韩| 欧美日韩亚洲综合在线| 国产精品污www在线观看| 美腿丝袜在线亚洲一区| 91蜜桃视频在线|