亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rfc3029.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                           C. AdamsRequest for Comments: 3029                          Entrust TechnologiesCategory: Experimental                                      P. Sylvester                                     EdelWeb SA - Groupe ON-X Consulting                                                            M. Zolotarev                                      Baltimore Technologies Pty Limited                                                           R. Zuccherato                                                    Entrust Technologies                                                           February 2001                Internet X.509 Public Key Infrastructure           Data Validation and Certification Server ProtocolsStatus of this Memo   This memo defines an Experimental Protocol for the Internet   community.  It does not specify an Internet standard of any kind.   Discussion and suggestions for improvement are requested.   Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2001).  All Rights Reserved.Abstract   This document describes a general Data Validation and Certification   Server (DVCS) and the protocols to be used when communicating with   it.  The Data Validation and Certification Server is a Trusted Third   Party (TTP) that can be used as one component in building reliable   non-repudiation services.   Useful Data Validation and Certification Server responsibilities in a   PKI are to assert the validity of signed documents, public key   certificates, and the possession or existence of data.   Assertions created by this protocol are called Data Validation   Certificates (DVC).   We give examples of how to use the Data Validation and Certification   Server to extend the lifetime of a signature beyond key expiry or   revocation and to query the Data Validation and Certification Server   regarding the status of a public key certificate.  The document   includes a complete example of a time stamping transaction.Adams, et al.                 Experimental                      [Page 1]RFC 3029                     DVCS Protocols                February 2001Table of Contents   1. Introduction .................................................  2   2. Services provided by DVCS ....................................  4    2.1 Certification of Possession of Data ........................  4    2.2 Certification of Claim of Possession of Data ...............  4    2.3 Validation of Digitally Signed Documents ...................  4    2.4 Validation of Public Key Certificates ......................  5   3. Data Certification Server Usage and Scenarii .................  5   4. Functional Requirements for DVCS .............................  7   5. Data Certification Server Transactions .......................  7   6. Identification of the DVCS ...................................  8   7. Common Data Types ............................................  9    7.1 Version ....................................................  9    7.2 DigestInfo ................................................. 10    7.3. Time Values ............................................... 10    7.4. PKIStatusInfo ............................................. 11    7.5. TargetEtcChain ............................................ 11    7.6. DVCSRequestInformation .................................... 12    7.7. GeneralName and GeneralNames .............................. 13   8. Data Validation and Certification Requests ................... 13   9. DVCS Responses ............................................... 17    9.1. Data Validation Certificate ............................... 18    9.2. DVCS Error Notification ................................... 21   10. Transports .................................................. 22    10.1 DVCS Protocol via HTTP or HTTPS ........................... 22    10.2 DVCS Protocol Using Email ................................. 22   11. Security Considerations ..................................... 23   12. Patent Information .......................................... 23   13. References .................................................. 25   14. Authors' Addresses .......................................... 26   APPENDIX A - PKCS #9 Attribute .................................. 27   APPENDIX B - Signed document validation ......................... 27   APPENDIX C - Verifying the Status of a Public Key Certificate ... 28   Appendix D - MIME Registration .................................. 30   Appendix E - ASN.1 Module using 1988 Syntax ..................... 31   Appendix F - Examples ........................................... 34   Appendix G - Acknowledgements ................................... 50   Full Copyright Statement ........................................ 511. Introduction   This document is the result of work that has been proposed and   discussed within the IETF PKIX working group.  The authors and some   members of the group felt that promoting the rather new concepts into   the standards process seemed premature.  The concepts presented have   been stable for some time and partially implemented.  It was agreed   that a publication as experimental RFC was an appropriate means toAdams, et al.                 Experimental                      [Page 2]RFC 3029                     DVCS Protocols                February 2001   get a stable reference document to permit other implementations to   occur.   The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT",   "RECOMMENDED", "MAY", and "OPTIONAL" in this document (in uppercase,   as shown) are to be interpreted as described in [RFC2119].   A Data Validation and Certification Server (DVCS) is a Trusted Third   Party (TTP) providing data validation services, asserting correctness   of digitally signed documents, validity of public key certificates,   and possession or existence of data.   As a result of the validation, a DVCS generates a Data Validation   Certificate (DVC).  The data validation certificate can be used for   constructing evidence of non-repudiation relating to the validity and   correctness of an entity's claim to possess data, the validity and   revocation status of an entity's public key certificate and the   validity and correctness of a digitally signed document.   Services provided by a DVCS do not replace the usage of CRLs and OCSP   for public key certificate revocation checking in large open   environments, due to concerns about the scalability of the protocol.   It should be rather used to support non-repudiation or to supplement   more traditional services concerning paperless document environments.   The presence of a data validation certificate supports   non-repudiation by providing evidence that a digitally signed   document or public key certificate was valid at the time indicated in   the DVC.   A DVC validating a public key certificate can for example be used   even after the public key certificate expires and its revocation   information is no longer or not easily available.  Determining the   validity of a DVC is assumed to be a simpler task, for example, if   the population of DVCS is significantly smaller than the population   of public key certificate owners.   An important feature of the protocol is that DVCs can be validated by   using the same protocol (not necessarily using the same service), and   the validity of a signed document, in particular a DVC, can also be   determined by means other than by verifying its signature(s), e.g.,   by comparing against an archive.   The production of a data validation certificate in response to a   signed request for validation of a signed document or public key   certificate also provides evidence that due diligence was performed   by the requester in validating a digital signature or public key   certificate.Adams, et al.                 Experimental                      [Page 3]RFC 3029                     DVCS Protocols                February 2001   This document defines the use of digital signatures to insure the   authenticity of documents and DVCs, and uses a corresponding   terminology; the use of other methods to provide evidence for   authenticity is not excluded, in particular it is possible to replace   a SignedData security envelope by another one.2. Services provided by DVCS   The current specification defines 4 types of validation and   certification services:   - Certification of Possession of Data (cpd),   - Certification of Claim of Possession of Data (ccpd),   - Validation of Digitally Signed Document (vsd), and   - Validation of Public Key Certificates (vpkc).   A DVCS MUST support at least a subset of these services.  A DVCS may   support a restricted vsd service allowing to validate data validation   certificates.   On completion of each service, the DVCS produces a data validation   certificate - a signed document containing the validation results and   trustworthy time information.2.1 Certification of Possession of Data   The Certification of Possession of Data service provides evidence   that the requester possessed data at the time indicated and that the   actual data were presented to the Data Validation Server.2.2 Certification of Claim of Possession of Data   The Certification of Claim of Possession of Data service is similar   to the previous one, except that the requester does not present the   data itself but a message digest.2.3 Validation of Digitally Signed Documents   The Validation of Digitally Signed Document service is used when   validity of a signed document is to be asserted.   The DVCS verifies all signatures attached to the signed document   using all appropriate status information and public key certificates.   The DVCS verifies the mathematical correctness of all signatures   attached to the document and also checks whether the signing entities   can be trusted, for example by validating the full certification path   from the signing entities to a trusted point (e.g., the DVCS's CA, or   the root CA in a hierarchy).Adams, et al.                 Experimental                      [Page 4]RFC 3029                     DVCS Protocols                February 2001   The DVCS may be able to rely on relevant CRLs or may need to   supplement this with access to more current status information from   the CAs for example by accessing an OCSP service, a trusted directory   service, or other DVCS services.   The DVCS will perform verification of all signatures attached to the   signed document.  A failure of the verification of one of the   signatures does not necessarily result in the failure of the entire   validation, and vice versa, a global failure may occur if the   document has an insufficient number of signatures.2.4 Validation of Public Key Certificates   The Validation of Public Key Certificates service is used to verify   and assert the validity (according to [RFC2459]) of one or more   public key certificates at the specified time.   When verifying a public key certificate, the DVCS verifies that the   certificate included in the request is a valid certificate and   determines its revocation status at a specified time.  DVS checks the   full certification path from the certificate's issuer to a trusted   point.  Again, the DVCS MAY be able to rely on external information   (CRL, OCSP, DVCS).3. Data Certification Server Usage and Scenarii.   It is outside the scope of this document to completely describe   different operational scenarii or usages for DVCS.   See Appendix B and C for a set of some basic examples and use cases.   The Validate Signed Document service can be used to support non-   repudiation services, to allow use of the signed document beyond   public key certificate revocation or expiry, or simply to delegate   signature validation to a trusted central (company wide) service.   The Validate Public Key Certificate service can be used when timely   information regarding a certificate's revocation status is required   (e.g., high value funds transfer or the compromise of a highly   sensitive key) or when evidence supporting non-repudiation is   required.   A data validation certificate may be used to simplify the validation   of a signature beyond the expiry or subsequent revocation of the   signing certificate: a Data validation certificate used as an   authenticated attribute in a signature includes an additionalAdams, et al.                 Experimental                      [Page 5]RFC 3029                     DVCS Protocols                February 2001   assertion about the usability of a certificate that was used for   signing.  In order to validate such a signature it may be sufficient   to only validate the data validation certificate.   A DVCS may include additional key exchange certificates in a data   validation certificate to validate a key exchange certificate in   order to provide to an application a set of additional authorised   recipients for which a session key should also be encrypted.  This   can be used for example to provide central management of a company   wide recovery scheme.  Note, that the additional certificates may not   only depend on the requested certificate, but also on the requester's   identity.   The Certification of Claim of Possession of Data service is also   known as time stamping.   The Certification of Possession of Data service can be used to assert   legal deposit of documents, or to implement archival services as a   trusted third party service.   The Data Validation and Certification Server Protocols can be used in   different service contexts.  Examples include company-wide   centralised services (verification of signatures, certification of   company certificates), services to cooperate in a multi-organization   community, or general third party services for time stamping or data   archival.   An important application of DVCS is an enterprise environment where   all security decisions are based on company wide rules.  A company   wide DVCS service can be used to delegate all technical decisions   (e.g., path validation, trust configuration) to a centrally managed   service.   In all cases, the trust that PKI entities have in the Data Validation   and Certification Server is transferred to the contents of the Data   Validation Certificate  (just as trust in a CA is transferred to the   public key certificates that it issues).   A DVCS service may be combined with or use archiving and logging   systems, in order to serve as a strong building block in non-   repudiation services.  In this sense it can be regarded as an   Evidence Recording Authority [ISO-NR].Adams, et al.                 Experimental                      [Page 6]RFC 3029                     DVCS Protocols                February 2001

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品视频1区2区| 国产一区二区三区av电影| 日本福利一区二区| 亚洲免费观看在线视频| 色哟哟一区二区在线观看| 亚洲精选在线视频| 色婷婷综合五月| 午夜伊人狠狠久久| 精品国免费一区二区三区| 国产在线播放一区| 中文字幕中文字幕中文字幕亚洲无线| 日本一区二区久久| 91在线观看美女| 亚洲福利电影网| 亚洲精品一区二区三区蜜桃下载 | 欧美日韩的一区二区| 亚洲国产精品一区二区www在线| 欧美日韩国产高清一区二区| 美女视频黄免费的久久 | 成人手机电影网| 一区二区三区蜜桃| 日韩精品一区二区三区在线播放| 国产精品一区二区91| 亚洲美女一区二区三区| 欧美性大战久久久久久久蜜臀| 日韩高清在线电影| 欧美高清在线视频| 欧美精品18+| 成人毛片老司机大片| 亚洲成av人影院在线观看网| 2023国产精品| 欧美亚洲高清一区| 国产在线不卡一区| 亚洲一二三四区| 欧美激情资源网| 欧美一区二区视频在线观看2022| 久久久精品一品道一区| 在线国产亚洲欧美| 国产91精品露脸国语对白| 午夜日韩在线观看| 亚洲色图另类专区| 久久久久国产精品麻豆| 欧美色国产精品| jlzzjlzz亚洲日本少妇| 精品亚洲免费视频| 亚洲国产一二三| 一区精品在线播放| 久久精品视频在线看| 日韩一卡二卡三卡国产欧美| 色婷婷av一区二区三区大白胸 | 欧美国产精品一区二区三区| 欧美精品少妇一区二区三区| 波多野结衣亚洲| 国产一区二区三区黄视频| 亚洲国产成人porn| 亚洲欧美色图小说| 国产精品不卡在线| 国产喂奶挤奶一区二区三区| 欧美一卡二卡在线| 欧美另类高清zo欧美| 91看片淫黄大片一级在线观看| 国产精品羞羞答答xxdd| 老司机免费视频一区二区三区| 午夜成人在线视频| 亚洲一线二线三线视频| 一区二区三区四区激情| 亚洲男人的天堂一区二区 | 亚洲欧洲成人精品av97| 久久久久久久久久久电影| 欧美一级欧美一级在线播放| 欧美色综合网站| 欧洲激情一区二区| 91国模大尺度私拍在线视频| 99精品视频一区| 99精品欧美一区二区蜜桃免费| 国产**成人网毛片九色| 国产凹凸在线观看一区二区| 国产馆精品极品| 国产iv一区二区三区| 成人永久免费视频| 欧美韩国日本不卡| 国产欧美日韩另类一区| 久久蜜桃av一区二区天堂| 精品国产露脸精彩对白| 久久精品水蜜桃av综合天堂| 久久精品男人的天堂| 中文一区二区完整视频在线观看| 欧美国产精品一区| 亚洲欧美成人一区二区三区| 亚洲制服丝袜一区| 秋霞午夜av一区二区三区| 精品一区二区三区蜜桃| 粉嫩av一区二区三区| 一本到三区不卡视频| 欧美综合视频在线观看| 91精品国产高清一区二区三区 | 欧美久久久久久久久| 日韩亚洲欧美一区| 久久婷婷国产综合精品青草| 国产精品午夜久久| 亚洲精品视频免费观看| 蜜臀va亚洲va欧美va天堂| 国产一区二区三区不卡在线观看| 国产91在线|亚洲| 一本大道av伊人久久综合| 欧美疯狂性受xxxxx喷水图片| 精品国内片67194| 中文字幕在线不卡一区 | 亚洲三级久久久| 亚洲一区二区在线视频| 欧美一区二区大片| 日本一二三不卡| 午夜电影网一区| 国产69精品久久久久毛片| 91高清视频在线| 精品剧情在线观看| 亚洲人快播电影网| 另类小说色综合网站| 99精品热视频| 精品国产乱码久久久久久1区2区| 亚洲欧美另类综合偷拍| 蜜臀av性久久久久蜜臀aⅴ| www.亚洲激情.com| 日韩一级二级三级精品视频| 中文在线免费一区三区高中清不卡| 亚洲国产精品一区二区久久恐怖片 | 狠狠狠色丁香婷婷综合激情| 色婷婷综合激情| 久久亚洲精品小早川怜子| 亚洲精品一卡二卡| 国产一区二区主播在线| 欧美三级电影在线观看| 国产精品毛片a∨一区二区三区| 秋霞影院一区二区| 欧洲一区二区三区在线| 中文字幕av一区二区三区免费看| 日本sm残虐另类| 欧美影片第一页| 中文字幕一区二区三区四区 | 日本中文字幕一区| 91免费版在线| 日本一二三不卡| 精品一区二区三区不卡| 欧美日韩久久一区| 亚洲精品久久嫩草网站秘色| 国产黄色精品网站| 久久久久久毛片| 美女脱光内衣内裤视频久久影院| 亚洲桃色在线一区| 国产精品一区二区久激情瑜伽| 日韩欧美视频在线| 日本色综合中文字幕| 欧美日韩精品一区二区三区蜜桃 | 日韩精品免费专区| 欧美专区在线观看一区| 综合久久一区二区三区| 国产精品一区一区| 国产女人18毛片水真多成人如厕| 精品写真视频在线观看| 日韩精品一区二区三区中文不卡 | 欧美一二三四区在线| 日本欧美在线看| 欧美一区二区视频免费观看| 亚洲愉拍自拍另类高清精品| 在线精品亚洲一区二区不卡| 亚洲女同ⅹxx女同tv| 一本大道久久精品懂色aⅴ| 亚洲欧美日韩中文字幕一区二区三区| 99久久er热在这里只有精品15 | 天堂av在线一区| 69堂亚洲精品首页| 视频一区二区欧美| 538prom精品视频线放| 爽爽淫人综合网网站| 91精品国产91热久久久做人人| 全部av―极品视觉盛宴亚洲| 日韩成人免费看| 91精品国产综合久久小美女| 美腿丝袜在线亚洲一区| 精品久久久网站| 国产不卡视频一区二区三区| 1区2区3区国产精品| 91电影在线观看| 日产国产高清一区二区三区| 精品久久人人做人人爽| 国产成人av一区| 一区二区三区精品视频| 3751色影院一区二区三区| 精品制服美女丁香| 国产精品麻豆一区二区| 日本国产一区二区| 免费成人在线观看视频| 欧美国产一区视频在线观看| 一本大道av伊人久久综合| 日韩成人精品在线观看| 国产人成一区二区三区影院| 在线精品视频免费观看| 精品亚洲免费视频| 亚洲女与黑人做爰| 精品精品欲导航|