亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3029.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   - The 'DVCSCertInfo.serialNumber' field contains a unique identifier     of the request.   - The field 'responseTime' indicates a time value associated with the     response.  The value MAY be a locally generated one, or a signed     TimeStampToken (TST) or DVC obtained from an external service.     Before using a value obtained from an external service, the DVCS     must validate it according the rules of the external service.   - The field 'DVCSCertInfo.dvStatus' reflects a collective result of     the validation.     If the field is missing, it is an equivalent of the SUCCESS     status.     For a vkpc, if the status field is present and set to SUCCESS, it     indicates that all certificates were successfully validated.  If it     is present and set to FAILED, it indicates that all or some of the     certificates failed validation, and the specific status of the     'certs' should be investigated, at least one of the elements of the     'certs' TargetEtcChain structures MUST have a failure status.     If the field 'dvStatus' does not indicate success ('granted' or     'granted with mods') the element 'failInfo' MAY indicate the reason     for the failure.  Note that the field 'certs' MAY contain     additional information about verification failures.     A failure of the verification of one of the signatures does not     necessarily result in failing to validate a signed document.  For     example, as long as a sufficient number of signature was     successfully verified, a DVC with status 'grantedWithMods' may be     produced.  A DVC with status 'granted' MUST only be produced if all     signatures verified successfully.Adams, et al.                 Experimental                     [Page 19]RFC 3029                     DVCS Protocols                February 2001     The field MUST be present, and the status must be set to WAITING,     if no final response can be immediately available.  It is assumed     that the DVCS provides an additional final status some time later.     The details of the necessary procedures are part of the DVCS     policy.     In case of failure, the requester can further investigate the cause     of the failure, by looking into the TargetEtcChain fields.     'CertEtctoken.pkistatus' fields will indicate which item(s) has     failed or succeeded the validation and for what reason.   - The 'DVCSCertInfo.policy' field indicates the policy under which     the DVCS operates.   - If present, 'DVCSCertInfo.reqSignature' MUST be the same value as     the signerInfos field of the corresponding request.  It is a policy     decision whether to include this field.   - The 'DVCSCertInfo.certs' field contains the results of the     verifications made by the DVCS.  For the cpkc service, each element     contains a copy of a corresponding field of the request with the     selected subset in the targetAndChain subfield and the results of     the verifications, and additional certificates or certificate     references, e.g., from certification authorities or as described in     appendix C.3.  For a vsd service, each element contains the result     of the validation of one signature of the signed document to be     validated.     In case of a global status of WAITING, the DVCS MAY choose to     return an individual status of waiting in some of the 'certs'     field, or not to return such a TargetEtcChain at all.     The 'acceptablePolicySet' sequence indicates the policies and     mappings that were processed during X.509 public key certificate     path validation.  PolicyMappingsSyntax is defined in [RFC2459].   - The 'extensions' field MAY be used to return additional information     to the client.  Extensions MAY be marked critical or not in order     to indicate whether the client MUST understand them.  This document     does not define extensions.Adams, et al.                 Experimental                     [Page 20]RFC 3029                     DVCS Protocols                February 20019.2. DVCS Error Notification   A DVCS Error Notification is a CMS signedData object containing a   DVCSResponse with a 'dvErrorNote' choice.   DVCSErrorNotice ::= SEQUENCE {       transactionStatus           PKIStatusInfo ,       transactionIdentifier       GeneralName OPTIONAL }   The PKIStatusInfo is defined in [RFC2511].  For the purposes of   communicating the DVCSErrorNotice, the following subset of   PKIFailureInfo values is used:   PKIFailureInfo ::= BITSTRING  {        badRequest       (2),        -- transaction not permitted or supported        badTime          (3),        -- messageTime was not sufficiently close to the system time,        -- as defined by local policy        badDataFormat    (5),        -- the data submitted has the wrong format        wrongAuthority   (6),        -- the DVCS indicated in the request is different from the        -- one creating the response token        incorrectData    (7)        --the requester's data (i.e., signature) is incorrect )   In the DVCSErrorNotice, the PKIStatus field of the PKIStatusInfo must   be set to REJECTED.   The 'statusString' field of PKIStatusInfo can be used to accommodate   extra text, such as a reason for the failure, for example "I have   gone out of service".  The DVCS initializes the   'DVCSErrorNotice.transactionIdentifier' with a copy of the   'DVCSRequest.transactionIdentifier' field of the corresponding   request.   In certain circumstances, a DVCS may not be able to produce a valid   response to a request (for example, if it is unable to compute   signatures for a period of time).  In these situations the DVCS MAY   create a response with an DVCSErrorNotice but no signature.   DVCS clients SHOULD NOT trust unsigned responses.  A DVCS client MAY   trust unsigned responses, if the communication channel provides for   server authentication (e.g., by services defined by TLS [RFC2246]).Adams, et al.                 Experimental                     [Page 21]RFC 3029                     DVCS Protocols                February 200110.  Transports   There is no mandatory transport mechanism in this document.  All   mechanisms are optional.  Two examples of transport protocols are   given which allow online exchange of request and a response, and   asynchronous communication between a client and a DVCS.   A DVCS MAY use a combination of protocols, for example in order to   return additional DVCs.10.1 DVCS Protocol via HTTP or HTTPS   This subsection specifies a means for conveying ASN.1-encoded   messages for the DVCS protocol exchanges via the HyperText Transfer   Protocol.   The DER encoded DVCS requests and responses are encapsulated using a   simple MIME object with Content-Type application/dvcs (and with the   default binary encoding).   This MIME object can be sent and received using common HTTP or HTTPS   processing engines over WWW links and provides a simple client-server   transport for DVCS messages.10.2 DVCS Protocol Using Email   This section specifies a means for conveying ASN.1-encoded messages   for the protocol exchanges described in Section 8 via Internet mail.   The DER encoded DVCS requests and responses are encapsulated using a   simple MIME object with Content-Type application/dvcs with an   appropriate Content-Transfer-Encoding.   This MIME object can be sent and received using MIME processing   engines and provides a simple Internet mail transport for DVCS   messages.   In order to be able to associate a possible error response with a   request, the requester SHOULD use the field 'transactionIdentifier'.   The requester SHOULD not make any assumption about the usage of   message header fields by the responding service, in particular the   usage of fields like Subject, Message-ID or References.Adams, et al.                 Experimental                     [Page 22]RFC 3029                     DVCS Protocols                February 200111.  Security Considerations   This entire chapter discusses security considerations.   When designing a data validation and certification service, the   following considerations have been identified that have an impact   upon the validity or "trust" in the data validation certificate.   It is imperative that keys used to sign DVCs are guarded with proper   security and controls in order to minimize the possibility of   compromise.  Nevertheless, in case the private key does become   compromised, an audit trail of all the DVC generated by the DVCS   SHOULD be kept as a means to help discriminate between genuine and   false DVCs.  A DVCS MAY provide for a vsd service to validate DVCs   created by this DVCS or another one solely based on the audit trail.   When confidentiality and server authentication is required, requests   and responses MAY be protected using appropriate mechanisms (e.g.,   CMS encapsulation [RFC 2630] or TLS [RFC2246]).   Server authentication is highly recommended for the vsd and cpd   service.   Client identification and authentication MAY use services defined by   TLS [RFC2246]) instead of, or in addition to, using a CMS format   providing authentication.12.  Patent Information   The following United States Patents related to data validation and   certification services, listed in chronological order, are known by   the authors to exist at this time.  This may not be an exhaustive   list.  Other patents may exist or be issued at any time.   Implementers of the DVCS protocol and applications using the protocol   SHOULD perform their own patent search and determine whether or not   any encumberences exist on their implementation.# 4,309,569     Method of Providing Digital Signatures(issued) January 5, 1982(inventor) Ralph C.  Merkle(assignee) The Board of Trustees of the Leland Stanford JuniorUniversity# 5,001,752     Public/Key Date-Time Notary Facility(issued) March 19, 1991(inventor) Addison M.  FischerAdams, et al.                 Experimental                     [Page 23]RFC 3029                     DVCS Protocols                February 2001# 5,022,080     Electronic Notary(issued) June 4, 1991(inventors) Robert T.  Durst, Kevin D.  Hunter# 5,136,643     Public/Key Date-Time Notary Facility(issued) August 4, 1992(inventor) Addison M.  Fischer(Note: This is a continuation of patent # 5,001,752.)# 5,136,646     Digital Document Time-Stamping with Catenate Certificate(issued) August 4, 1992(inventors) Stuart A.  Haber, Wakefield S.  Stornetta Jr.(assignee) Bell Communications Research, Inc.,# 5,136,647     Method for Secure Time-Stamping of Digital Documents(issued) August 4, 1992(inventors) Stuart A.  Haber, Wakefield S.  Stornetta Jr.(assignee) Bell Communications Research, Inc.,# 5,373,561     Method of Extending the Validity of a CryptographicCertificate(issued) December 13, 1994(inventors) Stuart A.  Haber, Wakefield S.  Stornetta Jr.(assignee) Bell Communications Research, Inc.,# 5,422,95 Personal Date/Time Notary Device(issued) June 6, 1995(inventor) Addison M.  Fischer# 5,781,629     Digital Document Authentication System(issued) July 14, 1998(inventor) Stuart A. Haber, Wakefield S. Stornetta Jr.(assignee) Surety Technologies, Inc.,Adams, et al.                 Experimental                     [Page 24]RFC 3029                     DVCS Protocols                February 200113.  References   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate              Requirement Levels", BCP 14, RFC 2119, March 1997.   [RFC2510]  Adams, C. and S. Farrell, "Internet X.509 Public Key              Infrastructure, Certificate Management Protocols", RFC              2510, March 1999.   [RFC2459]  Housley, R., Ford, W., Polk, W. and D. Solo, "Internet              X.509 Public Key Infrastructure, Certificate and CRL              Profile", RFC 2459, January 1999.   [RFC2630]  Housley, R., "Cryptographic Message Syntax", RFC 2630,              June 1999.   [ISONR]    ISO/IEC 10181-5:  Security Frameworks in Open Systems.              Non-Repudiation Framework.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
蜜臂av日日欢夜夜爽一区| 亚洲素人一区二区| 欧美精品自拍偷拍动漫精品| av网站一区二区三区| 国产91精品精华液一区二区三区| 国内精品嫩模私拍在线| 国内精品国产成人| 国产成人免费av在线| 国产大陆a不卡| 成人免费看片app下载| 国产成人在线视频免费播放| 国产不卡在线视频| 99在线视频精品| 欧美午夜一区二区三区| 在线观看日韩一区| 91麻豆精品国产91久久久| 欧美一区二区日韩| 欧美精品一区二区三区四区 | 午夜精品福利久久久| 亚洲成人一区二区| 天堂成人国产精品一区| 日韩激情视频在线观看| 精品无人码麻豆乱码1区2区 | 中文字幕不卡的av| 亚洲人成影院在线观看| 亚洲电影欧美电影有声小说| 美女性感视频久久| 成人黄色电影在线 | 日本网站在线观看一区二区三区| 免费在线看成人av| 国产精品77777| 99精品久久只有精品| 欧美午夜不卡视频| 欧美电视剧免费观看| 国产精品天干天干在线综合| 亚洲激情一二三区| 日本va欧美va精品发布| 大胆欧美人体老妇| 91麻豆精品国产| 中文字幕亚洲区| 日本中文字幕一区二区视频| 国产伦精一区二区三区| 在线中文字幕一区二区| 久久综合色一综合色88| 亚洲特黄一级片| 国产原创一区二区| 欧美高清性hdvideosex| 国产精品国模大尺度视频| 天天综合日日夜夜精品| av高清不卡在线| 欧美成人在线直播| 婷婷六月综合网| 91免费看片在线观看| 久久亚洲综合色| 日本午夜精品一区二区三区电影| 成人avav影音| 久久久久国产成人精品亚洲午夜| 五月婷婷综合在线| 在线免费观看不卡av| 欧美国产日韩亚洲一区| 日韩国产在线观看| 欧美日韩一区二区三区在线| 一区精品在线播放| 国产精品1区2区3区| 日韩精品一区二区三区视频播放 | 麻豆久久久久久| 欧美午夜精品免费| 艳妇臀荡乳欲伦亚洲一区| 99视频在线精品| 国产精品灌醉下药二区| 国产成人啪午夜精品网站男同| 欧美电影免费观看高清完整版在| 日韩高清不卡一区| 5858s免费视频成人| 亚洲福利国产精品| 欧美日韩国产bt| 亚洲第一二三四区| 欧美日韩国产综合草草| 午夜电影一区二区| 日韩一区二区免费在线电影| 日韩成人精品在线| 日韩欧美国产麻豆| 国产呦萝稀缺另类资源| 久久噜噜亚洲综合| 国产91精品一区二区麻豆亚洲| 国产人成亚洲第一网站在线播放| 国产一区二区三区视频在线播放| 久久久久国产一区二区三区四区| 国产精品一区三区| 亚洲欧洲性图库| 在线免费不卡电影| 久热成人在线视频| 欧美国产日韩a欧美在线观看| 成人黄色国产精品网站大全在线免费观看| 国产精品无人区| 欧美综合色免费| 日本中文字幕不卡| 欧美国产日韩一二三区| 在线中文字幕一区二区| 日韩成人午夜精品| 久久久亚洲精品一区二区三区 | 中文字幕一区二区三区av| 96av麻豆蜜桃一区二区| 亚洲午夜一区二区三区| 欧美xxxxx牲另类人与| 成人精品国产一区二区4080| 亚洲激情综合网| 日韩一区二区三区精品视频| 成人免费视频视频| 日韩精品久久理论片| 久久九九影视网| 欧美在线视频全部完| 免费人成黄页网站在线一区二区| 久久久不卡影院| 色老头久久综合| 紧缚奴在线一区二区三区| 亚洲精选一二三| 久久丝袜美腿综合| 精品视频一区二区不卡| 成人做爰69片免费看网站| 亚洲电影在线播放| 国产精品毛片大码女人| 日韩欧美国产一区二区在线播放| 色综合天天做天天爱| 久久国产夜色精品鲁鲁99| 亚洲老妇xxxxxx| 国产欧美一区二区在线| 欧美一区二区女人| 色琪琪一区二区三区亚洲区| 免费视频一区二区| 亚洲主播在线观看| 国产精品情趣视频| 欧美mv日韩mv国产| 欧美日韩亚洲国产综合| 色综合久久综合中文综合网| 国产精品一区二区免费不卡| 日本vs亚洲vs韩国一区三区二区| 亚洲激情一二三区| 亚洲欧美综合网| 国产亚洲欧美激情| 精品日韩欧美在线| 日韩精品最新网址| 欧美成人一区二区三区片免费 | 制服丝袜一区二区三区| 色婷婷久久久久swag精品| 高清免费成人av| 国产成人亚洲精品狼色在线 | www.亚洲人| 大胆欧美人体老妇| 不卡在线观看av| 福利视频网站一区二区三区| 美女一区二区三区| 精品一区免费av| 美女www一区二区| 久久国产综合精品| 国产很黄免费观看久久| 国产成a人亚洲| 99久久国产综合色|国产精品| 成人激情免费电影网址| 9色porny自拍视频一区二区| 不卡av电影在线播放| 99re在线精品| 91电影在线观看| 在线播放亚洲一区| 精品久久99ma| 欧美国产欧美综合| 亚洲色图欧洲色图| 亚洲高清免费视频| 久久99精品久久久久久动态图| 美脚の诱脚舐め脚责91| 国内国产精品久久| av激情亚洲男人天堂| 欧美在线观看一二区| 欧美精品高清视频| 欧美精品一区二区不卡| 亚洲国产成人自拍| 亚洲精品视频免费看| 日韩av一级片| 高清国产午夜精品久久久久久| 99久久99久久免费精品蜜臀| 欧美日韩视频不卡| 精品对白一区国产伦| 成人免费一区二区三区视频| 亚洲国产中文字幕在线视频综合| 免费观看日韩电影| 97久久精品人人做人人爽| 欧美妇女性影城| 中文字幕成人网| 日韩电影免费在线| 成人黄色777网| 日韩美一区二区三区| 中文字幕一区不卡| 韩国av一区二区三区在线观看| 一本大道久久a久久精品综合| 日韩一区二区三区在线观看| 中文字幕一区二区三区四区不卡 | 亚洲成人手机在线| 国产成人精品免费视频网站| 欧美日韩极品在线观看一区| 亚洲精品v日韩精品|