亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3029.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   [RFC2119]  Bradner, S., "Key works for use in RFCs to Indicate              Requirement Levels", BCP 14, RFC 2119, March 1997.   [RFC2511]  Myers, M., Adams, C., Solo, D. and D. Kemp, "Internet              X.509 Certificate Request Message Format", RFC 2511, March              1999.   [RFC2246]  Dierks, T. and C. Allen, "The TLS Protocol, Version 1.0",              RFC 2246, January 1999.   [RFC2634]  Hoffman P., "Enhanced Security Services for S/MIME", RFC              2634, June 1999.   [RFC2560]  Myers, M., Ankney, R., Malpani, A., Galperin, S. and C.              Adams, "X.509 Internet Public Key Infrastructure Online              Certificate Status Protocol", RFC 2560, June 1999.Adams, et al.                 Experimental                     [Page 25]RFC 3029                     DVCS Protocols                February 200114.  Authors' Addresses   Carlisle Adams   Entrust Technologies   1000 Innovation Drive   Ottawa, Ontario   K2K 3E7   CANADA   EMail: cadams@entrust.com   Michael Zolotarev   Baltimore Technologies Pty Limited   5th Floor, 1 James Place   North Sydney, NSW 2060   AUSTRALIA   EMail: mzolotarev@baltimore.com   Peter Sylvester   EdelWeb SA - Groupe ON-X Consulting   15, Quai de Dion Bouton   F-92816 Puteaux Cedex   FRANCE   EMail: peter.sylvester@edelweb.fr   Robert Zuccherato   Entrust Technologies   1000 Innovation Drive   Ottawa, Ontario   K2K 3E7   CANADA   EMail: robert.zuccherato@entrust.comAdams, et al.                 Experimental                     [Page 26]RFC 3029                     DVCS Protocols                February 2001APPENDIX A - PKCS #9 Attribute   We define a PKCS #9 [PKCS9] attribute type.  The attribute type has   ASN.1 type SignedData and contains a data validation certificate.   The object identifier id-aa-dvcs-dvc identifies the data validation   certificate attribute type.   id-aa-dvcs-dvc OBJECT IDENTIFIER ::= {iso(1) member-body(2)       us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) aa(2) 29}   The attribute may be used as an authenticated or unauthenticated   attribute in CMS SignedData documents.APPENDIX B - Signed document validation.   We present some examples of a possible use of DVCS in the context of   validation of signed documents.B.1 Signed document validation   The example covers the case where a DVCS is used by a signer to   obtain a proof that a document's structure, including one or more   attached signatures, is/was correct, after the document was signed.   The DVC can be produced either by a DVCS that is trusted by the   signer, or by a DVCS that is trusted by an intended verifier of the   document.   The signer uses the obtained DVC as an evidence that its intentions   were good and it produced a signed document using the   environment(keys, algorithms, etc) that was known to be OK.   It produces a stand-alone document that can be used to extend the   life of a signature.  This example assumes that we have total trust   in the Data Validation and Certification Server.   Signature algorithms and keys have a finite lifetime.  Therefore,   signatures have a finite lifetime.  The Data Certification Server can   be used to extend the lifetime of a signature.   In order to extend the lifetime of a signature in this way, the   following technique can be used:   1) The signature needs to be certified:      The signed message is presented to the Data Validation and      Certification Server in a 'vsd' service request.Adams, et al.                 Experimental                     [Page 27]RFC 3029                     DVCS Protocols                February 2001      The DVCS verifies that the signature and certificates are valid at      that time by checking expiry dates, status information, or DVCs,      and returns a DVC.   2) The DVC SHOULD be verified.      The signature of the Data Validation and Certification Server in      data certification token SHALL be verified using the Data      Certification Server's valid verification key.   A signer's signing key (and therefore, its signature) is only valid   until some specified time T1.  The DVCS's signing key (and therefore,   its signature) is valid until some specified time T2 that is   (usually) after time T1.  Without certification, the signer's   signature would only be valid until time T1.  With certification, the   signer's signature remains valid until time T2, regardless of   subsequent revocation or expiry at time T1.   If the signature of the DVCS is valid, the trust we have in the DVCS   allows us to conclude that the original signature on the data was   valid at the time included in the DVC.   The DVCS signing key MUST be of a sufficient length to allow for a   sufficiently long lifetime.  Even if this is done, the key will have   a finite lifetime.  Since data validation certificates are just   another type of signed documents, they can be validated using   (another) DVCS.APPENDIX C - Verifying the Status of a Public Key Certificate   We now present three examples of how to produce a data validation   certificate that can be used to assert that a public key certificate   is valid, trusted, and can be used for a particular purpose.   A client wants to use a given public key certificate either to use it   to verify a signature on a document or to use it for document   encryption.   A DVCS MUST have access to current information regarding public   certificate status, it can therefore be used to verify the revocation   status of a certificate at the current time.   The following technique can be used:   A) The public key certificate needs to be validated.      The certificate is presented to the Data Certification Server      using a 'vpkc' service.Adams, et al.                 Experimental                     [Page 28]RFC 3029                     DVCS Protocols                February 2001      The Data Validation and Certification Server verifies that the      public key certificate is valid and that it hasn't been revoked      and then returns a data validation certificate.   B) The data validation certificate MUST be verified.      The signature of the Data Certification Server in the data      certification token SHALL be verified using the Data Validation      and Certification Server's valid certificate.   C) The public key certificate is used:   C.1) A clients's own public key certificate (i.e., the corresponding        private key) can be used to add a signature to a document.  The        signing certificate and the data validation certificate can be        added as signed attributes to the signature.        A data validation certificate can now be used during the        validation signatures using the key contained in the public key        certificate.  This service provided by the DVCS can be thought        of as a supplement to the usual method of checking revocation        status.        In other words, signature validation at a later time does not        necessarily require access to the revocation status of the        user's signing certificate, access to a DVCS service and        validation of the DVC is sufficient to verify a signature.  Note        that the DVC does not tell when the signature had been created,        it only indicates when the signing certificate was valid.   C.2) A public key certificate for key exchange can be used after        having obtained a data validation certification certificate to        encrypt data.  The DVC can be stored with the data and/or stored        by the creator of the encrypted document.        If an intended recipient of the document claims that the creator        did not use an appropriate encryption key, the DVC (obtained by        a recipient's DVCS) can be used as evidence that the recipient's        DVCS has authorized the usage of the public key.   C.3) The procedure described in the previous paragraph can be        enhanced to provide domain encryption in several ways.        Organizations require that encrypted documents need to be        recoverable.  One simple way is to always encrypt documents with        additional recipients that act as 'domain encryption centers' or        'recovery centers'.  This is not a technically difficultAdams, et al.                 Experimental                     [Page 29]RFC 3029                     DVCS Protocols                February 2001        problem, but may require complicated and difficult interactions        with the end user, in particular when the document's recipients        are in several different organizations.        One possible solution consists of adding additional certificates        to the dvc that validates the usage of a particular public key        certificate used for encryption.  In an environment of several        organizations, one of the possible procedures may be:        The client asks its local dvcs to validate the public key        certificate.  The dvcs forwards the request to a dvcs of a        remote organization.  The remotes organization's dvcs verifies        the certificate and provides a dvc assertion validating the        certificate.  It adds additional certificates usable for key        exchange to the certEtcChain structure indicating additional        required recipients.  The local dvc creates a dvc containing the        dvc of the remote dvcs.  It may add additional certificates or        references to the dvc.  The clients use all validated        certificates to be usable for key exchange to enhance its list        of recipients.        In the local dvcs may as well use local information about the        remote organization's need for additional recipients.Appendix D - MIME Registration   To: ietf-types@iana.org Subject: Registration of MIME media type   application/timestamp   MIME media type name: application   MIME subtype name: dvcs   Required parameters: None   Optional parameters: None   Encoding considerations: binary or Base64   Security considerations: Carries a request for a data validation and   certification service and the response.  A request may be   cryptographically signed.  The response will be cryptographically   signed.   Interoperability considerations: None   Published specification:   RFC 3029 on Data Validation and Certification Server ProtocolsAdams, et al.                 Experimental                     [Page 30]RFC 3029                     DVCS Protocols                February 2001   Applications which use this media type: Data Validation and   Certification Servers and Clients   Additional information:     Magic number(s): None     File extension(s): .dvc     Macintosh File Type Code(s): none   Person & email address to contact for further information: Peter   Sylvester <peter.sylvester@edelweb.fr>   Intended usage: COMMON   Author/Change controller: Peter Sylvester   <peter.sylvester@edelweb.fr>Appendix E - ASN.1 Module using 1988 SyntaxPKIXDVCS {iso(1) identified-organization(3) dod(6) internet(1)   

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美高清性hdvideosex| 美女一区二区久久| 91亚洲精品一区二区乱码| 国产亚洲欧美一级| 丁香天五香天堂综合| 中文一区二区完整视频在线观看 | 亚洲人成在线观看一区二区| 91亚洲男人天堂| 亚洲国产日韩a在线播放| 欧美亚洲综合一区| 秋霞电影一区二区| 亚洲精品一区二区三区四区高清| 国产一区二区伦理片| 国产午夜精品久久久久久免费视| heyzo一本久久综合| 一区二区三区波多野结衣在线观看 | 国产精品成人一区二区艾草 | 高清在线不卡av| 亚洲人精品一区| 日韩一区二区三区视频| 国产伦精一区二区三区| 欧美韩日一区二区三区| 在线观看日韩av先锋影音电影院| 蜜桃久久av一区| 国产精品第13页| 日韩一区二区精品| 福利一区福利二区| 亚洲国产一区二区在线播放| 精品国产乱码久久久久久1区2区| 91亚洲精品一区二区乱码| 日本女优在线视频一区二区| 中文字幕在线一区二区三区| 欧美肥妇free| caoporn国产精品| 日本人妖一区二区| 国产欧美精品一区二区色综合| 欧美性做爰猛烈叫床潮| 国产一区二区三区| 亚洲自拍偷拍九九九| www亚洲一区| 欧美三级日韩在线| 国产mv日韩mv欧美| 日本美女一区二区三区视频| 18欧美乱大交hd1984| 日韩视频一区二区在线观看| 色综合天天综合色综合av| 精品一二三四区| 亚洲国产精品综合小说图片区| 国产午夜精品美女毛片视频| 91精品国产色综合久久ai换脸| 91尤物视频在线观看| 国产精品综合网| 美女在线观看视频一区二区| 亚洲一区二区三区激情| 中文字幕精品三区| 精品日韩在线一区| 欧美视频在线一区二区三区 | 国产成人在线看| 奇米色一区二区| 亚洲一区在线观看视频| 国产精品视频免费| ww亚洲ww在线观看国产| 91精品国产手机| 欧美剧情电影在线观看完整版免费励志电影| 国产成人激情av| 国产一区欧美一区| 青娱乐精品在线视频| 亚洲综合免费观看高清完整版在线| 国产精品免费丝袜| 久久蜜桃av一区精品变态类天堂 | 亚州成人在线电影| 亚洲精品成人悠悠色影视| 国产精品免费丝袜| 中文字幕乱码亚洲精品一区| 日本一区二区免费在线| 国产午夜精品在线观看| 久久久久国产一区二区三区四区| 久久亚洲精精品中文字幕早川悠里 | 欧美视频日韩视频| 91精彩视频在线| 欧美丝袜丝交足nylons| 欧美亚日韩国产aⅴ精品中极品| 欧美综合天天夜夜久久| 91精品91久久久中77777| 91成人在线精品| 欧美男人的天堂一二区| 欧美乱熟臀69xxxxxx| 欧美一区二区播放| 日韩精品一区二区三区三区免费 | 亚洲精品国产无天堂网2021 | 日韩精品免费视频人成| 天天综合色天天综合| 五月天网站亚洲| 裸体健美xxxx欧美裸体表演| 国产一区视频在线看| 成人av电影在线| 一本到一区二区三区| 欧美日韩视频专区在线播放| 欧美α欧美αv大片| 久久午夜电影网| 亚洲欧洲一区二区三区| 亚洲午夜电影网| 韩国中文字幕2020精品| 成人动漫在线一区| 欧美日韩极品在线观看一区| 久久伊人蜜桃av一区二区| 国产精品黄色在线观看| 亚洲成年人网站在线观看| 久久av资源网| 日本韩国一区二区三区视频| 日韩精品一区二区三区四区视频 | 亚洲一区二区三区小说| 天堂av在线一区| 国产真实乱对白精彩久久| 国产一区亚洲一区| 在线亚洲精品福利网址导航| 欧美电影影音先锋| 精品人在线二区三区| 国产精品区一区二区三| 丝袜美腿亚洲色图| 狠狠网亚洲精品| 91污片在线观看| 欧美人与性动xxxx| 精品成人一区二区三区| 国产亚洲va综合人人澡精品 | 一本色道综合亚洲| 欧美v日韩v国产v| 国产欧美一区二区精品忘忧草| 亚洲美女免费在线| 日韩**一区毛片| 国产91色综合久久免费分享| 91精品国产欧美日韩| 国产日韩欧美一区二区三区乱码| 亚洲精品中文在线影院| 久久电影网电视剧免费观看| 91免费国产在线| 国产日韩成人精品| 一区二区三区精品在线| 国产一区二区视频在线播放| 91成人免费网站| 久久精品一区二区三区av| 日韩av网站在线观看| 99久久免费精品| 日韩欧美国产成人一区二区| 亚洲天天做日日做天天谢日日欢| 麻豆精品久久精品色综合| 欧美三级中文字幕| 国产网红主播福利一区二区| 亚洲国产中文字幕在线视频综合| 精品亚洲成a人在线观看| 91麻豆精品视频| 中文字幕中文字幕一区| 男人的j进女人的j一区| 91片黄在线观看| 国产日韩欧美电影| 午夜精品123| 欧美日本韩国一区二区三区视频| 国产精品欧美极品| 久久国内精品自在自线400部| 欧美猛男gaygay网站| 中文字幕免费一区| 国产一区二区免费视频| 26uuu久久综合| 免播放器亚洲一区| 欧美剧在线免费观看网站| 亚洲精品老司机| 91猫先生在线| 中文字幕一区av| 国产成人精品一区二区三区四区 | 美女高潮久久久| 欧美精品在线一区二区三区| 中文字幕乱码一区二区免费| 黄色资源网久久资源365| 欧美精品久久天天躁| 亚洲丝袜另类动漫二区| 国产真实精品久久二三区| 在线播放日韩导航| 亚洲午夜久久久久久久久久久| 欧美日韩一区二区在线观看 | 91福利视频网站| 一区二区三区不卡视频 | 99久久伊人精品| 国产精品理论片在线观看| 国产精品99久久久久久宅男| 精品日产卡一卡二卡麻豆| 韩国v欧美v亚洲v日本v| 精品福利二区三区| 韩国一区二区三区| 国产视频一区不卡| 99久久亚洲一区二区三区青草 | 国产又黄又大久久| 日韩色视频在线观看| 黄页视频在线91| 亚洲国产精品v| 丁香啪啪综合成人亚洲小说| 中文字幕一区在线观看| 欧美日韩在线观看一区二区| 日韩高清在线一区| 欧美大胆人体bbbb| 麻豆国产精品777777在线|