亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3039.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                       S. SantessonRequest for Comments: 3039                                      AddTrustCategory: Standards Track                                        W. Polk                                                                    NIST                                                               P. Barzin                                                                  SECUDE                                                              M. Nystrom                                                            RSA Security                                                            January 2001                Internet X.509 Public Key Infrastructure                     Qualified Certificates ProfileStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2001).  All Rights Reserved.Abstract   This document forms a certificate profile for Qualified Certificates,   based on RFC 2459, for use in the Internet.  The term Qualified   Certificate is used to describe a certificate with a certain   qualified status within applicable governing law.  Further, Qualified   Certificates are issued exclusively to physical persons.   The goal of this document is to define a general syntax independent   of local legal requirements.  The profile is however designed to   allow further profiling in order to meet specific local needs.   It is important to note that the profile does not define any legal   requirements for Qualified Certificates.   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in RFC 2119.Santesson, et al.           Standards Track                     [Page 1]RFC 3039             Qualified Certificates Profile         January 2001Table of Contents   1  Introduction ................................................    2   2  Requirements and Assumptions ................................    3   2.1  Properties ................................................    4   2.2  Statement of Purpose ......................................    5   2.3  Policy Issues .............................................    5   2.4  Uniqueness of names .......................................    5   3  Certificate and Certificate Extensions Profile ..............    6   3.1  Basic Certificate Fields ..................................    6   3.1.1  Issuer ..................................................    6   3.1.2  Subject .................................................    6   3.2  Certificate Extensions ....................................    9   3.2.1  Subject Directory Attributes ............................    9   3.2.2  Certificate Policies ....................................   10   3.2.3  Key Usage ...............................................   10   3.2.4  Biometric Information ...................................   11   3.2.5  Qualified Certificate Statements ........................   12   4  Security Considerations .....................................   14   5  References ..................................................   15   6  Intellectual Property Rights ................................   16   A  ASN.1 definitions ...........................................   17   A.1  1988 ASN.1 Module .........................................   17   A.2  1993 ASN.1 Module .........................................   19   B  A Note on Attributes ........................................   24   C.  Example Certificate ........................................   24   C.1  ASN.1 Structure ...........................................   25   C.1.1 Extensions ...............................................   25   C.1.2 The certificate ..........................................   27   C.2  ASN.1 Dump ................................................   29   C.3  DER-encoding ..............................................   32   C.4  CA's public key ...........................................   33   Authors' Addresses .............................................   34   Full Copyright Statement .......................................   351  Introduction   This specification is one part of a family of standards for the X.509   Public Key Infrastructure (PKI) for the Internet.  It is based on RFC   2459, which defines underlying certificate formats and semantics   needed for a full implementation of this standard.   The standard profiles the format for a specific type of certificates   named Qualified Certificates.  The term Qualified Certificates and   the assumptions that affects the scope of this document are discussed   in Section 2.Santesson, et al.           Standards Track                     [Page 2]RFC 3039             Qualified Certificates Profile         January 2001   Section 3 defines requirements on information content in Qualified   Certificates.  This profile addresses two fields in the basic   certificate as well as five certificate extensions.  The certificate   fields are the subject and issuer fields.  The certificate extensions   are subject directory attributes, certificate policies, key usage, a   private extension for storage of biometric data and a private   extension for storage of statements related to Qualified   Certificates.  The private extensions are presented in the 1993   Abstract Syntax Notation One (ASN.1), but in conformance with RFC   2459 the 1988 ASN.1 module in Appendix A contains all normative   definitions (the 1993 module in Appendix A is informative).   In Section 4, some security considerations are discussed in order to   clarify the security context in which Qualified Certificates are   assumed to be utilized.  Section 5 contains the references.   Appendix A contains all relevant ASN.1 [X.680] structures that are   not already defined in RFC 2459.  Appendix B contains a note on   attributes.  Appendix C contains an example certificate.  Appendix D   contains authors' addresses and Appendix E contains the IETF   Copyright Statement.   It should be noted that this specification does not define the   specific semantics of Qualified Certificates, and does not define the   policies that should be used with them.  That is, this document   defines what information should go into Qualified Certificates, but   not what that information means.  A system that uses Qualified   Certificates must define its own semantics for the information in   Qualified Certificates.  It is expected that laws and corporate   policies will make these definitions.2  Requirements and Assumptions   The term "Qualified Certificate" has been used by the European   Commission to describe a certain type of certificates with specific   relevance for European legislation.  This specification is intended   to support this class of certificates, but its scope is not limited   to this application.   Within this standard the term "Qualified Certificate" is used more   generally, describing the format for a certificate whose primary   purpose is identifying a person with high level of assurance in   public non-repudiation services.  The actual mechanisms that will   decide whether a certificate should or should not be considered to be   a "Qualified Certificate" in regard to any legislation are outside   the scope of this standard.Santesson, et al.           Standards Track                     [Page 3]RFC 3039             Qualified Certificates Profile         January 2001   Harmonization in the field of Qualified Certificates is essential   within several aspects that fall outside the scope of RFC 2459.  The   most important aspects that affect the scope of this specification   are:   -  Definition of names and identity information in order to identify      the associated subject in a uniform way.   -  Definition of information which identifies the CA and the      jurisdiction under which the CA operates when issuing a particular      certificate.   -  Definition of key usage extension usage for Qualified      Certificates.   -  Definition of information structure for storage of biometric      information.   -  Definition of a standardized way to store predefined statements      with relevance for Qualified Certificates.   -  Requirements for critical extensions.2.1  Properties   A Qualified Certificate as defined in this standard is assumed to   have the following properties:   -  The certificate is issued by a CA that makes a public statement      that the certificate serves the purpose of a Qualified      Certificate, as discussed in Section 2.2   -  The certificate indicates a certificate policy consistent with      liabilities, practices and procedures undertaken by the CA, as      discussed in 2.3   -  The certificate is issued to a natural person (living human      being).   -  The certificate contains an identity based on a pseudonym or a      real name of the subject.Santesson, et al.           Standards Track                     [Page 4]RFC 3039             Qualified Certificates Profile         January 20012.2  Statement of Purpose   For a certificate to serve the purpose of being a Qualified   Certificate, this profile assumes that the CA will have to include in   the certificate information that explicitly defines this intent.   The function of this information is thus to assist any concerned   entity in evaluating the risk associated with creating or accepting   signatures that are based on a Qualified Certificate.   This profile defines two complementary ways to include this   information:   -  As information defined by a certificate policy included in the      certificate policies extension, and   -  As a statement included in the Qualified Certificates Statements      extension.2.3  Policy Issues   Certain policy aspects define the context in which this profile is to   be understood and used.  It is however outside the scope of this   profile to specify any policies or legal aspects that will govern   services that issue or utilize certificates according to this   profile.   It is however assumed that the issuing CA will undertake to follow a   publicly available certificate policy that is consistent with its   liabilities, practices and procedures.2.4  Uniqueness of names   Distinguished name is originally defined in X.501 [X.501] as a   representation of a directory name, defined as a construct that   identifies a particular object from among the set of all objects.  An   object can be assigned a distinguished name without being represented   by an entry in the Directory, but this name is then the name its   object entry could have had if it were represented in the Directory.   In the context of qualified certificates, a distinguished name   denotes a set of attribute values [X.501] which forms a name that is   unambiguous within a certain domain that forms either a real or a   virtual DIT (Directory Information Tree)[X.501].  In the case of   subject names the domain is assumed to be at least the issuing domain   of the CA.  The distinguished name MUST be unique for each subject   entity certified by the one CA as defined by the issuer name field,   during the whole life time of the CA.Santesson, et al.           Standards Track                     [Page 5]RFC 3039             Qualified Certificates Profile         January 20013  Certificate and Certificate Extensions Profile   This section defines a profile for Qualified Certificates.  The   profile is based on the Internet certificate profile RFC 2459 which   in turn is based on the X.509 version 3 format.  For full   implementation of this section implementers are REQUIRED to consult   the underlying formats and semantics defined in RFC 2459.   ASN.1 definitions relevant for this section that are not supplied by   RFC 2459 are supplied in Appendix A.3.1  Basic Certificate Fields   This specification provides additional details regarding the contents   of two fields in the basic certificate.  These fields are the issuer   and subject fields.3.1.1  Issuer   The issuer field SHALL identify the organization responsible for   issuing the certificate.  The name SHOULD be an officially registered   name of the organization.   The identity of the issuer SHALL be specified using an appropriate   subset of the following attributes:         domainComponent;         countryName;         stateOrProvinceName;         organizationName;         localityName; and         serialNumber.   Additional attributes MAY be present but they SHOULD NOT be necessary   to identify the issuing organization.   Attributes present in the issuer field SHOULD be consistent with the   laws under which the issuer operates.   A relying party MAY have to consult associated certificate policies   and/or the issuer's CPS, in order to determine the semantics of name   fields and the laws under which the issuer operates.3.1.2  Subject   The subject field of a certificate compliant with this profile SHALL   contain a distinguished name of the subject (see 2.4 for definition   of distinguished name).Santesson, et al.           Standards Track                     [Page 6]RFC 3039             Qualified Certificates Profile         January 2001   The subject field SHALL contain an appropriate subset of the   following attributes:      countryName;      commonName;      surname;      givenName;      pseudonym;      serialNumber;      organizationName;      organizationalUnitName;      stateOrProvinceName      localityName and      postalAddress.   Other attributes may be present but MUST NOT be necessary to   distinguish the subject name from other subject names within the   issuer domain.   Of these attributes, the subject field SHALL include at least one of   the following:      Choice   I:  commonName      Choice  II:  givenName      Choice III:  pseudonym   The countryName attribute value specifies a general context in which   other attributes are to be understood.  The country attribute does   not necessarily indicate the subject's country of citizenship or   country of residence, nor does it have to indicate the country of   issuance.   Note: Many X.500 implementations require the presence of countryName

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久av中文字幕片| 国产成人aaa| 国产偷国产偷亚洲高清人白洁| 欧美绝品在线观看成人午夜影视 | 日韩欧美的一区| 欧美视频一二三区| 欧美日韩一区久久| 欧美视频在线不卡| 色综合天天天天做夜夜夜夜做| 亚洲天堂成人网| 欧美国产日韩精品免费观看| 久久综合视频网| 精品国产免费一区二区三区香蕉| 色综合天天综合网天天看片| 不卡av在线免费观看| 日本中文一区二区三区| 国产成a人无v码亚洲福利| 欧美喷水一区二区| 成人av网站免费| 7777精品伊人久久久大香线蕉最新版| 欧美大黄免费观看| 亚洲一区二区四区蜜桃| 亚洲欧洲另类国产综合| 久久久久青草大香线综合精品| 精品久久久久久久久久久久包黑料 | 波多野结衣亚洲| 国产精品久久午夜| 成人免费一区二区三区视频 | 国产九九视频一区二区三区| 高潮精品一区videoshd| 一本色道久久加勒比精品| 亚洲成人一区二区| 欧美成人aa大片| 中文字幕欧美一| 免费人成精品欧美精品| 色婷婷激情久久| 日韩欧美一级精品久久| 一区二区三区中文字幕| 亚洲欧美一区二区久久| 亚洲一卡二卡三卡四卡无卡久久 | 日本欧美大码aⅴ在线播放| 99久久婷婷国产综合精品电影| 国产69精品久久99不卡| 欧美绝品在线观看成人午夜影视| 亚洲精品老司机| 91在线一区二区| 久久青草国产手机看片福利盒子 | 色偷偷88欧美精品久久久| 国产午夜久久久久| 国产一区二区三区在线观看免费视频 | 精品国产露脸精彩对白| 日本va欧美va欧美va精品| 欧美色窝79yyyycom| 亚洲综合网站在线观看| 色婷婷狠狠综合| 亚洲一级二级在线| 欧美亚洲日本国产| 亚洲444eee在线观看| 欧美日韩国产三级| 日韩黄色免费电影| 日日夜夜免费精品| 欧美日韩一级视频| 日韩精品乱码av一区二区| 欧美日韩在线播| 青青草国产成人99久久| 欧美日韩国产乱码电影| 日本中文在线一区| 2023国产精品| 岛国精品在线观看| 亚洲欧美偷拍另类a∨色屁股| 91丨九色丨国产丨porny| 91一区二区在线观看| 综合久久给合久久狠狠狠97色| 成人av在线电影| 亚洲精品中文在线影院| 欧美日韩国产成人在线免费| 日本不卡1234视频| 久久网这里都是精品| www.欧美亚洲| 亚洲成人777| 精品久久久影院| av在线综合网| 日韩成人免费电影| 久久影视一区二区| 一本色道综合亚洲| 另类综合日韩欧美亚洲| 欧美国产日本视频| 欧美日韩卡一卡二| 成人一区二区三区视频| 亚洲香肠在线观看| 国产日韩欧美不卡在线| 91成人网在线| 国产精品一色哟哟哟| 一区二区不卡在线视频 午夜欧美不卡在| 777奇米四色成人影色区| 国产成人一级电影| 日一区二区三区| 亚洲视频你懂的| 久久这里只有精品首页| 在线亚洲一区二区| 国产精品 日产精品 欧美精品| 亚洲激情中文1区| 久久久久97国产精华液好用吗| 欧美性大战久久久久久久| 国产成人激情av| 青青草国产精品亚洲专区无| 日韩理论片在线| 久久精品人人做人人综合| av亚洲精华国产精华| 久久99精品久久只有精品| 亚洲国产日韩在线一区模特| 亚洲国产精品黑人久久久| 精品久久国产老人久久综合| 欧美日韩综合不卡| 91视频www| 成人网在线播放| 国产高清亚洲一区| 另类调教123区 | 欧美成人一区二区| 色婷婷av久久久久久久| www.视频一区| 成人网页在线观看| 成人手机电影网| 男女激情视频一区| 亚洲制服丝袜av| 中文字幕中文乱码欧美一区二区| 日韩免费视频一区二区| 欧洲一区二区av| 在线视频观看一区| 成人免费不卡视频| 国产美女精品在线| 国产真实乱偷精品视频免| 日韩精品国产精品| 一区二区三区欧美亚洲| 一色桃子久久精品亚洲| 国产欧美久久久精品影院| 91精品国模一区二区三区| 欧美日韩高清一区| 8x福利精品第一导航| 欧美调教femdomvk| 欧美一区二区三区视频在线| 欧美成人a视频| 日韩欧美一级二级三级| 精品久久国产字幕高潮| 久久久噜噜噜久久人人看| 国产婷婷色一区二区三区| 亚洲国产精品ⅴa在线观看| 国产精品久久久久久久蜜臀| 成人欧美一区二区三区1314| 亚洲最新视频在线观看| 五月天精品一区二区三区| 日本欧美一区二区| 激情五月激情综合网| aaa欧美日韩| 欧美日韩三级一区二区| 日韩欧美精品在线视频| 国产网站一区二区| 一区二区三区日韩精品视频| 日韩电影一二三区| 国产真实乱偷精品视频免| 激情都市一区二区| av激情综合网| 91官网在线观看| 日韩亚洲电影在线| 久久久久久免费毛片精品| 亚洲女同ⅹxx女同tv| 日韩高清在线电影| 国产69精品一区二区亚洲孕妇| 91福利在线看| 亚洲精品在线网站| 亚洲女人****多毛耸耸8| 久久精品999| 精品视频全国免费看| 久久欧美一区二区| 五月天亚洲婷婷| www.亚洲精品| 亚洲精品在线观看网站| 亚洲精品少妇30p| 国内外成人在线| 欧美日韩在线免费视频| 欧美国产97人人爽人人喊| 午夜欧美一区二区三区在线播放| 激情久久五月天| 欧美人与性动xxxx| 中文字幕在线不卡国产视频| 久久国产精品色| 欧美主播一区二区三区| 久久久一区二区| 美洲天堂一区二卡三卡四卡视频| 色香蕉成人二区免费| 久久久久99精品国产片| 免费不卡在线视频| 欧美在线一区二区| 中文一区二区在线观看| 日本va欧美va精品| 91在线视频官网| 日韩美女久久久| 成熟亚洲日本毛茸茸凸凹| 日韩一区二区免费视频| 亚洲大片精品永久免费|