nO GQ )> H -...
Transcript of nO GQ )> H -...
VG!
L $8 W vx &0; gkOb |! 59 dLvG :VGgW;! VB O] $8& P8JC@.
JG(1999b 10y)
L %: IBM SecureWay Trust Authority,ANW% 5648-D09, v| 3 1.: 1! {kGg, DSG! /0w mCOb |nv p
g DS 1.: W v$ v|! {kKOY.
© Copyright International Business Machines Corporation 1999b. All rights reserved.
qw
&1e Trust Authority $8 . . . . . . 1
&2e 3d . . . . . . . . . . . . . 3
&3e f} . . . . . . . . . . . . . 5
RA %:)> W<: Xq . . . . . . . . 5
jslz 0:- . . . . . . . . . . 5
RA %:)> 3! . . . . . . . . . 6
nO % dLv! W<: . . . . . . . 6
jslz Nu d; . . . . . . . . . 7
nO sB !K . . . . . . . . . . 9
GQ .8 . . . . . . . . . . . . 10
RA %:)> W<: . . . . . . . . . 10
68 [w . . . . . . . . . . . . . 12
68 &b . . . . . . . . . . . . 12
8y _N d; Kv . . . . . . . . 13
8bGB Nu Kv . . . . . . . . 13
^B!- /% 1C . . . . . . . . 13
Kv Q5 3$ . . . . . . . . . . 14
dLvg 9Ze v 3$ . . . . . . . 14
AN<: _ Gei .8 . . . . . . . 15
az [w . . . . . . . . . . . . . 15
68 az 8b . . . . . . . . . . 15
9v dLv!- az 8b . . . . . . 16
WqG <NgW %C . . . . . . . . 16
Wq S: 8b . . . . . . . . . . 17
6! w:d. 8b. . . . . . . . . 18
G # L? . . . . . . . . . . . 18
% - )b 6$ . . . . . . . . . 19
% `G - bX $D . . . . . . . . 19
%!- 9Ze 1C . . . . . . . . 20
6! v` . . . . . . . . . . . . . 20
9v 9Ze! kQ 6! . . . . . . . 20
30 9Ze! kQ 6! . . . . . . . 21
S: * /f . . . . . . . . . . . 22
/? b# /f . . . . . . . . . . 22
d; ANDO v$ . . . . . . . . 23
V. _! . . . . . . . . . . . . 23
d; BN . . . . . . . . . . . . 23
8y sBN d; /v . . . . . . . 24
d; E} . . . . . . . . . . . . 24
;E !I: /f . . . . . . . . . 24
Nu 8y . . . . . . . . . . . . 25
Nu kR . . . . . . . . . . . . 25
CRL!- Nu &E . . . . . . . . 26
5^N! kQ GQ !K . . . . . . . 26
RA %:)> >a . . . . . . . . . . 27
&4e $8 . . . . . . . . . . . . 29
nO . . . . . . . . . . . . . . 29
g|nO . . . . . . . . . . . . 29
% jslz vx . . . . . . . . . 30
nO . . . . . . . . . . . . . . 31
qnO: $% . . . . . . . . . . 31
nO GQ . . . . . . . . . . . . 31
nO %LM#L: . . . . . . . . . 31
nO 5^N . . . . . . . . . . . 32
nO 9Ze . . . . . . . . . . . 33
9Ze S: . . . . . . . . . . . 33
Nu . . . . . . . . . . . . . . 33
Nu b| . . . . . . . . . . . . 33
Nu kR qO . . . . . . . . . . 34
p:d. . . . . . . . . . . . . 34
8P L' . . . . . . . . . . . . 34
Nu . . . . . . . . . . . . . . 34
jslz Nu . . . . . . . . . . 35
CA Nu . . . . . . . . . . . . 35
-v GB e! Nu . . . . . . . . 36
© Copyright IBM Corp. 1999b iii
Nu .e . . . . . . . . . . . . 36
Nu sLA gL, . . . . . . . . 36
;E !I: . . . . . . . . . . . 36
|. . . . . . . . . . . . . . . 37
W<: &n . . . . . . . . . . . 37
Nu W GQN) . . . . . . . . . 38
?C |. . . . . . . . . . . . . 38
RA %:)> vx -m4 . . . . . . 38
d; ANDO . . . . . . . . . . 38
&5e |6gW . . . . . . . . . . . 41
68 G . . . . . . . . . . . . . 41
68 Je . . . . . . . . . . . . 41
g| $GH 68 . . . . . . . . . 44
Kv Q5 IG . . . . . . . . . . 45
dLvg 9Ze v IG . . . . . . . 45
az G . . . . . . . . . . . . . 45
|. 6! . . . . . . . . . . . . 46
Nu kR g/ . . . . . . . . . . 47
<NgW G . . . . . . . . . . . . 48
6! w:d. L%. . . . . . . . . 49
d; W NuG S: . . . . . . . . 49
Nu .e . . . . . . . . . . . . 51
&xH Nu /| . . . . . . . . . 51
<NgW Wl . . . . . . . . . . 53
nO d;G sB . . . . . . . . . 53
G 5r; . . . . . . . . . . . . . 54
Internet Explorerk JVM . . . . . . . 55
6l:G 08e k< . . . . . . . . . 56
VGgW . . . . . . . . . . . . . 59
s% W -q: s% . . . . . . . . . 61
|C $8 . . . . . . . . . . . . . 65
kn} . . . . . . . . . . . . . . 67
vN . . . . . . . . . . . . . . 83
iv Trust Authority: RA %:)> H;-
&1e Trust Authority $8
IBM®
SecureWay®
Trust AuthorityB gkZ& NuOm EZ VB kE; 8
eOb 'Q v\L wTGn VB @kANW%; &xUOY.
v 6wG nO W Nu $%! {s pvP Nu; _`, x% W |.R v V5
O UOY.
v PKIX(X.509 v| 3k xk 0 ON86) W CDSA(xk %LM 8H F0X
3) O#- %X; vxT8Na -q: &xZ #G s#nk:; ckUOY.
v pvP -m W 8H ANd]; kX .#hGG pg ggZ& NuOb '
Q v\; &xUOY.
v jslz W ,sLp. b] nO bI: VkG /?:; &xUOY.
v O#-H kE W nO $8G 8H ze5*; kX bP:; 8eUOY.
Trust Authority C:[: IBM AIX/6000®
W Microsoft Windows NT-v C
'{!- G`R v V@OY. Y=: L C:[G Vd bITOY.
v EZ VB CA(Nu b|)B pvP NuG |< sLA gL,; |.UOY.
Nu-G Nu .G:; 8uOb 'X CAB _`OB Nu- ""! kX p
vP -m; v`UOY. NuL u Ls /?Ov JYB gG; 8uOb '
X CRL(Nu kR qO)! -mOb5 UOY. -m 0& 8Y .GOT 8#
Ob 'X IBM SecureWay 4758 PCIO#- ZAN<- nG O#- Oe
~n& gkR v V@OY.
v RA(nO GQ)B gkZ nO hDG |. 8:)& 3.UOY. RAB gk
ZG qnO: 0?; vxOB Nu8L _`Gm W/Q NuL c!H gk
Z!T8 _`I v V5O UOY. |. 8:)B Z?-H AN<:* gwG
Gg a$; kX 3.I v V@OY.
v % b] nO NMdL:B jslz, -v W b8 q{(9: VPN(!s3Nk
W.v)) e!, :6. +e, 8H |Z lm); 'Q Nu 9f; kLOT X
]OY.
© Copyright IBM Corp. 1999b 1
v Windows @kANW%N Trust Authority ,sLp.& gkOi V> gk
Z! % jslz& gkOv Jm5 Nu; 9fOm |.R v V@OY.
v % b]G |. NMdL:N RA %:)>: xN nO cgZ! nO d;;
BNOE* ENOm NuL _`H D! Nu; |.R v VT UOY.
v (g -jC:[: " (g 9ZeG ^Cv Nu Ze (MAC)& hjUOY.
(g %LM! (g %LM#L:! bOH LD /fGE* h&GB fl!B
MAC& kX 'T; (vR v V@OY.
v $% "C.B @kANW% 3_Z! nO AN<:& gkZ $GR v V5
O UOY.
v O#- #x; 'Q kU vx. kE; NuOb 'X, Vd Trust Authority
8:dRB bOC }:H 3Nk 0N -mGn V@OY. 0 W MAC nG
8H @j'.B KeyStoresB 8# 5*!- O#-Gm zeKOY.
v IBM SecureWayp:d.! kQ kU vx. p:d.B /? Nu W kR
H Nu! kQ $8& LDAP Xv |D8N zeUOY.
v IBM WebSphere™
Application ServerW IBM HTTP Server! kQ kU
vx. % -vB RA -vM T2 [kO) ^Cv& O#-Om d;; Nu
Og G5H vEZ!T Nu; |[UOY.
v vs; kX W bIL TuH IBM DB2®
Universal Database! kQ kU
vx
2 Trust Authority: RA %:)> H;-
&2e 3d
6wL Trust Authority! GX 8#GB 8H @kANW%; .m V8i {}
Q Z] um-& .m VB gkZ8 Xg @kANW%! W<:R v V@O
Y. pvP Nu nG Z] um-& xOB gw: {}Q $8& &xT8Na
Z] um-& d;R v V@OY. nO d;G %LMB d;; BNOE* E
}Ob 'Q Gga$G bXL KOY. nO d;L BNGi Trust Authority
RA(nO GQ)B d;; 3.Om Trust Authority CA(Nu b|)B Nu& _
`UOY. nO d; W NuG 9ZeB O#-H nO %LM#L:! sVUO
Y.
nO d;; r!Om L 9Zei; |.OB ML |. 8:)TOY. ''N 6
w: Trust Authority! L 8:)G ON& Z?-O5O 8:Og ANW%: L
nO %LM& r!UOY. Y% '!B gkZM 0: RA |.Z! pg G\;
UOY.
Trust Authority RA %:)>(nO GQ %:)>): nO d;; 3.Om W a
zN }:GB 9Ze& |.Ob 'Q GUI(W!H gkZ NMdL:)TOY. RA
%:)>: RA |.ZN- Y=G 8:)& vxUOY.
v d;; BNOE* E}Ob 'X, 8y _N nO d;G r!
v /$ /|G Nu GB /$ gkZ! SOB NuG 9Ze& KvOb 'Q
68 Xq
v 9ZeG <NgW Kd
v NuG /? b# 3$
v Nu GB nO d;G sB& /fOb 'Q 6! v`
v 6! xN; 3mOB 9Ze 7!
RA %:)>: O>G 8H VC4TOY. LM; gkOAi /$ 8:)& v
`Ob 'Q GQ; .m Vn_ Og {}Q pvP Nu; &bO) Nu; ^
F_ UOY.
© Copyright IBM Corp. 1999b 3
&3e f}
L }G V&B RA |.ZN- v`X_ OB Y=G 8:)! kQ v'; &
xUOY.
v jslz Xq W RA %:)> 3!
v RA |.Z! Gb 'Q jslz Nu W GQ .8
v d; W Nu [w; 'Q nO %LM#L: 68
RA %:)> W<: Xq
L }!-B RA %:)>; gkOb |! OaX_ R g| 8:)! kX 3
mUOY.
v RA %:)>; G`Ob 'Q % jslz 3$
v RA %:)> 3!
v JdQ Nu; 9fOb 'X Trust Authority nO % dLv! W<:
v CA Nu .8 D % jslz! kQ jslz Nu .8
v RA |.ZN- [wOb 'Q GQN) .8
jslz 0:-
RA %:)>; 'Q % jslz& 0:-OAi Y= [w; v`OJC@.
1. Y=G vxGB % jslz _ O*& Microsoft Windows 95, 98GB NT
C'{! 3!OJC@.
v Netscape NavigatorGB Communicator,1.: 4.51 Ls
v Microsoft Internet Explorer,1.: 4.01(-q: Q 1 wT) Ls
Internet ExplorerG fl, Java !s bh(JVM) 1.: 5.00, te 3167
LsG v|; .m Vn_ UOY. 55 dLvG :Internet Explorerk JVM;
!-B G` _N JVMG 1.:& G0OB f} W JdQ fl Xg 1
.:& wW9LeOB f}! kX 3mUOY.
© Copyright IBM Corp. 1999b 5
V: NetscapeGB Microsoft! &xOB xD v|G &0; 3!X_ UO
Y. Y% GEw<! &xOB v|: /w 5n L\G pnN VC4;
G`R ' $8& CY#T %COv JB fl! V@OY.
2. % jslz& /fOJC@.
v NetscapeG fl, 1#gW ^:& -n Java& 0:-OJC@.
v Internet ExplorerG fl, Options ^:& -n Java& 0:-OJC@.
V: RA %:)> VC4 d8gW! kQ VE $8B ReadmeDO!- p&g
v TvR v V@OY. ReadmeDO; 8OAi IBM SecureWay Trust
Authority % gL.G Library dLv! W<:OJC@.
http://www.ibm.com/software/security/trust/library
RA %:)> 3!
RA %:)>; 3!Ob 'Q 3$ ANW%! W<:OB f}! kX-B gk
ZG 6w!- KA Y MTOY.
1. Xg C:[ |.ZNNM gkZG nO 5^N! kQ URL; .8OJC@.
2. 6w8NNM TvQ 3! vCgW! {#JC@.
3. 3! AN<: _ ARA.! %CGi nO 5^N! kQ URL; &xOJ
C@.
3!! OaGi IBM SecureWay Trust Authority RA%:)>: ANW% F
!G C[ ^:! *83OY.
V: Trust Authority! kQ VE $8B ReadmeDO!- p&gv TvR v
V@OY. ReadmeDO; 8OAi IBM SecureWay Trust Authority% g
L.G Library dLv! W<:OJC@.
http://www.ibm.com/software/security/trust/library
nO % dLv! W<:
nO; 'X % dLv! W<:OAi Y= [w; v`OJC@.
6 Trust Authority: RA %:)> H;-
1. nO % dLv! W<:Ob 'X Xg 6wG URL; TvOJC@. URL
: Y= |D; .T KOY.
http://MyWebServer/MyDomain/index.jsp
)b!- MyWebServerB Trust Authority nO GQL 3!Gn VB -v
G #:. L'TOY. MyDomain: Xg Trust Authority C:[! VB n
O 5^NG 8: L'TOY.
2. RA %:)>; 'X 0:-Q jslz& )JC@.
3. Y= URL; TBOJC@.
v NetscapeG fl, '!! VB X:. sZ! URL; TBOJC@.
v Internet ExplorerG fl, VR! VB X:. sZ! URL; TBOJC
@.
4. Enter 0& )#JC@.
Trust Authority nO % dLv! %CKOY. b; 3!G fl L dLvG
L': Z] um- >MTOY.
5. 3=8N Trust Authority nO -q:& gkOB fl!B -vG CA Nu
3!& )#JC@.
L Nu: jslz! nO -q:MG kE; NuR v VT UOY. Y=!
L -q:& gkR 'B L \h& }+X5 KOY.
jslz Nu d;
L }!-B RA %:)>; G`R v V5O Ob 'X Trust Authority nO
dLv& gkO) jslz Nu; d;OB f}! kX 3mUOY.
V: RA |.ZN- -v* e!& nOOE* GB ):!& g|nOX_ R f
l5 V; v V@OY. W/Q 8:)! |CH 5r;; 8Ai Trust
Authority gkZ H;-& |mOJC@.
gkZG 6w! B5O nO @kANW%; gkZ $GQ f}L +yLD! {
s /?Q Nu; rb 'Q }w! ^sz v V@OY. F!!-B b;{N \
h! kX 3+{8N 3mOm V@OY. gkZG gL.! {UQ }w! kX
-B Xg C:[ |.Z!T .GOJC@.
&3e f} 7
jslz Nu; 9fOAi Y= [w; v`OJC@.
1. jslz& kX nO % dLv! W<:OJC@.
2. nO /|!- qO; -m jslz Nu; 1COJC@.
3. 6!!- nO; 1COJC@.
4. .N; )#JC@.
gkZ! d;Q nO gDL %CKOY.
5. % dLvG vCgW! {s Je TB; OaOJC@. Je!B Y= N 3
G =GL V@OY.
v gkZ |C $8& TBOb 'Q X:. sZ! wTH nO $8 =G
v gkZ! xOB Nu |C $8& TBOb 'Q X:. sZ! wTH N
u d; $8 =G. =GG 1C Je! *; TBOv JB fl, Trust
AuthorityB gkZ! d;OB NuG /|z ,|H b;*; {kUOY.
Y= Je! /w VGOJC@.
Nu /|
gkZ! RA %:)>! W<:Ob 'X &CX_ OB(6wG d8
kN) jslz NuG >y& 1COJC@. Nu /|! kX-B 5
1 dLvG :&xH Nu /|;!- 3mUOY.
jslz! kQ CA Nu 3!
Nu /|! #/GB Xg CA Nu; -/ Nu; .8OJC@. L
\_& )#i CA NuL oC YnNeKOY.
L Nu: gkZ! RA %:)>; gkR ' nO @kANW%z
G kE; jslz! NuR v VT UOY. n !v L/N gkZ
! LL ?OQ CA Nu; .m VB fl!B G Y% NuL Jd
x@OY.
|Z lm VR
|Z lm kv& 1COAi gkZG |Z lm VR& &xX_ U
OY.
|Z lm kv
d; az! kQ |Z lm; ^8Ai L Wq; 1COJC@.
8 Trust Authority: RA %:)> H;-
5| @d
gkZ! &xOB 5| @dG kR.Z |B& _ boOJC@. _
D nO d;G sB& !KOb 'X-B L& Km Vn_ UOY.
5^N L'
gkZ! |.R nO 5^NG L'; &xOJC@.
Je! |Q Z<Q ;kL u JdQ fl!B Trust Authority gkZ H;
-G |6gW }; |mOJC@.
6. nO d; &b; )#JC@.
Trust Authority! nO gD; vEQ D Xg $8G /?:; KuUOY.
v gD! @y! VB fl!B gkZ!T @y& KA ]OY. gD; /f
Om nO d; YC &b; )#JC@.
v gD! @y! xB fl!B Y% % dLv! gkZG d; ID& %C
UOY.
7. d; ID& _ boX NJC@. L ID! *_! gkZ& D0O) \8Na
gkZB d;G sB& !KOm Xq! I ' Nu; vER v VT KO
Y. % dLv! 3mH kN Y= _ O*& v`OJC@.
v L -i8N 1T 9FM Nu; !KR v V5O % dLv! O6)&
OJC@.
v 9FC ' &xR v V5O d; ID& bOOJC@.
v d; ID! |Z lm8N 5xOb& bY.JC@.
nO sB !K
nO d;G sB& !KOAi nOOB ?H gkZ! %%G& _x % dLv
N 9F!E* Y= \h& v`OJC@.
1. nO % dLv! W<:OJC@.
2. nO /|!- gkZ! d;Q nOG /|; 1COJC@.
3. 6!!- sB !K; 1COJC@.
4. .N; )#JC@.
&3e f} 9
gkZG d;! kQ $8& .8Ob |! gkZG Ex; NuX_ OB
JeiL -i! %CKOY.
5. Je! $8& &xOJC@.
v d; ID!-, nO gD; &bQ D! %CGzx d; ID& TBOJC
@.
v 5| @d!-, nO gD! &x_x Mz ?OQ 5| @d; TBOJC
@.
6. nO sB !K; )#JC@.
^Cv! d;G vg sB& *8@OY.
v gkZG d;L Fw 8y _N fl!B *_! YC 9FM !KR v
V@OY.
v gkZG jslz NuL _`H fl, nO sB !K; )#i NuL Y
nNeKOY.
7. xOB fl % dLvG vCgW! {s Nu; 8JC@.
GQ .8
RA %:)>! kQ GQ; N)^b 'X C:[ |.Z!T d;Ob |!, Y
= 8:)& OaOJC@.
v jslz Nu; d;Q Y= |.R nO 5^N; v$OJC@.
v jslz Nu W WM #/GB CA Nu; gk _N % jslzN YnN
eOJC@.
RA %:)> W<:
RA %:)>; C[OAm R '6Y, Uz Y=; v`X_ UOY.
1. RA |.Z NuL Netscapejslz! VB fl, G` _N pg Netscape
<G; ]8JC@.
2. Windows [w %CY!- C[ → ANW% → IBM SecureWay Trust
Authority → RA %:)>; 1COJC@.
10 Trust Authority: RA %:)> H;-
RA %:)>G URL; d;Oi gk _N % jslzM -v! 8H(,s
Lp. Nu) <G; C[OB M! ?GUOY. -v! Xg URLG ;k;
G91 v V8Ai, W |! gkZ! /?Q RA |.ZN- Nu; ^F_
UOY. jslz! gkZ!T Nu; &CO5O ARA.R MTOY. AR
A.B gkOB jslz! {s Y(OY.
3. RA |.Z!T Nu; &COJC@.
V: Internet Explorer& gkOB fl!B jslz <G 5_! gkZ! -
v! &CQ V> Nu; jslz! Z?8N &bUOY. L fl BN
; d8OB ARA.B %CGv J@OY. L NuL FQ Y% Nu;
&bOAi jslz& >aQ D YC C[X_ UOY.
% jslz! RA %:)> VC4; YnNeO) Jb-UOY.
v VC4; YnNeOB ?H jslz -iG F!J!- n 3G ^Cv&
< v5 V@OY. 9& ii, jslz! Java& Jb-Om VYB M;
K.B ^Cv& < v5 V@OY.
v Jb- _!B AN<:! OaGbnv s6* 2RBv& *8;B x`
| 7k! %CKOY. Jb- _! @y! _}Oi x`| 7k! X_m
O]{N fm ^Cv! *83OY.
Jb-! OaGi RA %:)>; < v V@OY. L& gk Xq! H MTO
Y. gkZG Nuz ,|H nO 5^N! kQ nO d;z NuG |.& C[
R v V@OY.
V: Netscape!- RA %:)>! W<:OB fl, RA %:)>!- 0?Ov
J: $ O$ C#L fzOi NetscapeB gkZG Nu; YC d8UOY.
L _!{N 8H: gkZ! RA %:)>; L3 >aOb |! d^Q k
+N Z.& 0_ OB fl! gkZG 6w; 8#UOY.
&3e f} 11
68 [w
68 G; 1CO) 68& XqOJC@. 68B El s<OT R v5 V8g
xk{N /:; !vB 9Ze Wl; KvR v5 V@OY. GQ KvR 9Z
e v& &QO) KvR v V8g 9Ze& < ' dLv! %CI 9ZeG v
& v$R v5 V@OY.
68 &b
68 G!- [wOAB nO d; W Nu 9Ze& KvOb 'Q 68& Xq
OJC@. 68B d; GB NuG vg sB& bX8N R v5 Vm W ;E
W 8b /:; bX8N R v5 V@OY. L N !vG |V ;!- gk !I
Q Y% Je& gkT8Na 68& 8Y <POT R v5 V@OY.
1. GG Je& gkO) 68& XqOJC@. gk !IQ Jei; xOB v
8- aUO) 68& <POT R v V@OY. 41 dLvG :68 Je;B
Je! kX 3mUOY.
v Je 'N ?-& L?Oi GG F!J! Xg Je! kQ 5r;L %C
KOY.
v gkZ! w" *; v$Ov Jm5 68& G`R v V@OY. L8T O
i Y% /:zB s| xL 8y _N pg d;G 9Ze& KvOT K
OY.
2. xOB fl KvR 9Ze v! kQ Q5& /fOJC@.
3. xOB fl, az G!- az& < ' dLv! %CR 9Ze v& /fO
JC@.
4. 68 Xq! OaGz8i 68 &b; )#JC@.
68 az& bY.B ?H x`| 7k! 68 AN<:G x`|; %CU
OY. 68 az! XqGi az GL Z?8N %CKOY.
5. az G!- [wOAB 9Ze& #8JC@.
|C V&
12 Trust Authority: RA %:)> H;-
:8y _N d; Kv;
:8bGB Nu Kv;
44 dLvG :g| $GH 68;
8y _N d; Kv
68 G!- Y= _ O*& v`OJC@.
v n2 *5 v$Ov J: sBN 68& G`OJC@. L8T Oi 8y _ s
B& v$OB Mz 0@OY.
v xOB fl, 68 /|G 1CgW; /fOv J: sB!-, KvR 9Ze
! kQ _! /:; v$OJC@. 9& in, gkZ! 8y _N Y% d;
; 3.Ob |! ):!G nO d;; 3.O5O |.Z! d8QYm !$
X >CY. L fl!B gkZG 68! Xg N0G L'; v$R v V@
OY.
8bGB Nu Kv
68 G!- /$ b# ;! 8b! 9$Gn V8g ;E !IQ NuG 9Ze
& KvOb 'Q 68& XqOJC@.
1. 68 /|!-, ;E !I: W 8b0; 1COJC@.
2. ;E !I:!- qO; -m ;E !I; )#JC@.
3. /$ b# ?H 8b! I NuG 9Ze8; KvOb 'X 68& <POT
OJC@. 8b OZ |'!- Y= [w; v`OJC@.
v C[!- !e L% 8b OZ& TBOE* 1COJC@.
v >a!- !e J: 8b OZ& TBOE* 1COJC@.
|C V&
22 dLvG :/? b# /f;
^B!- /% 1C
/% Je! /%& TBOB kE ^B!- /%& 1COAi Y= [w; v`
OJC@.
&3e f} 13
1. JeG X:. sZ 7! VB [: ^B FL\; )#JC@.
^BL -.i- Xg Je! vg yL* y_ OZ! %CKOY.
2. Y% ,5& 1COAi ^B!- ,5& )#JC@. W/i gkZ! ,5&
1CR v VB qOL %CKOY.
3. y; 1COAi vg yG L' 7! VB -l% _ O*& )#JC@. ^
J -l%& )#i L| yL %CGm @%J -l%& )#i LD yL %
CKOY.
4. /%& 1COAi xOB ^G /%& )#JC@.
^BL ]wm Xg Je!B 1CH /%! %CKOY.
Kv Q5 3$
68 G!- KvGB 9Ze v& &QR v V8g, v$Q v8Y u 9: 9
Ze! vg 68M O!OB fl!5 &QgWL {kKOY. gkZ! 3$O
B &Q: vg Xq _N 68!8 {kKOY.
1. Kv Q5!- qO; -m Q5& 1COJC@. b;*: 150TOY.
L Q5B 68 azG )b! 5b; L(OY.
2. 68G *Sv NP; v$OJC@.
dLvg 9Ze v 3$
68 G!- az GG dLv! %CGB 9Ze v& &QR v V@OY. gk
Z! 3$OB &Q: vg Xq _N 68!8 {kKOY.
1. dLvg 9Ze v!- Y= _ O*& v`OJC@.
v qO; -m Q5& 1COJC@.
v %CGB b;* '! }Z& TBOJC@.
L *: 68G %C& &nUOY.
2. 68G *Sv NP; v$OJC@.
14 Trust Authority: RA %:)> H;-
AN<: _ Gei .8
SGG G!- mI \_& )#m *i PN F! J! VB sB 5*! gk
Z! d;Q AN<:G x`|L %CKOY.
az [w
az G; 1CO) 68G az& %COJC@.
L G: gkZ! KvQ 9Ze& Q Ls %CR v V@OY. dLvg 9Ze
vB 68& &b_; ' gkZ! 1CQ *! {s Y(OY.
68 az 8b
az G!- 68& G`Q D! az& < v V@OY.
68 az!- %G " `!B gkZG 68M O!OB 9Ze! wTGn V@
OY. %!B Y= -iL wTKOY.
L' d; GB Nuz ,|H L'. :, L'G |D8N %C.
d; sB
nO d;G vg sB(9: BNJ). 53 dLvG :nO d;G sB;!-
B " sB *; 3mUOY.
Oa sB
d;! kQ 3.G vg sB(9: |^J)
V> w%L.
d; GB NuG sBM ,|H /%.
vE OZ
nO d;; vEQ /%
68 az& 8Ai Y= [w; v`OJC@.
1. JdQ 9Ze& #8JC@. Y= _!- JdQ 9Ze& #B % 5rL I
SGG [w; v`R v V@OY.
v %& -iL?OE*, -G )b& 6$OE*, %G `; $DOJC@.
&3e f} 15
v dLv!- dLvN L?O) u 9: az& 8JC@.
2. [wOAB 9Ze& #; ', xOB fl Y= [w; v`R v V@OY.
v Q LsG 9Ze& 1CQ D 1CQ 9Ze& Wl8N 3.OJC@.
v \O 9Ze& 1CO) _! <NgW; 8JC@.
V: JdQ 9Ze& KvOv xQ fl!B 68 G8N 9F!- Y= [w;
v`OJC@.
v 68! CY#v J: fl, L& /fQ Y= YC G`OJC@.
v 68! CY% fl, 8Y 9: vG 9Ze& KvR v V5O Kv Q5
& 3$Om 68& YC G`OJC@.
|C V&
14 dLvG :dLvg 9Ze v 3$;
9v dLv!- az 8b
az G!-, %CGB 68 azB )/ dLv! ID V; v5 V@OY. dL
v vB 68M O!OB 9Ze v W gkZ! %C& 'X v$Q dLv )b
! {s Y(OY. sB 5*!B |< dLv vM vg 8m VB dLv! %
CKOY.
v WlG Y= dLvN L?OAi Y= dLv& )#JC@.
v WlG L| dLvN L?OAi L| dLv& )#JC@.
v n dLv Ls ZN !Ai 68 G8N 9F! 68& gG`OB ML 8Y
|& v V@OY. W/i az G: 68 azG 9x0 dLv& YC %CU
OY.
WqG <NgW %C
az G!- Y=; v`OJC@.
1. 68 az %!- gkZG 68 az! XgOB 9Ze `; 1COJC@.
2. <NgW %C& )#JC@.
<NgW GL Z?8N %CGg 1CQ 9ZeG <NgW; %CUOY.
16 Trust Authority: RA %:)> H;-
3. %CG <NgW G!- 8AB <NgWG /|; 1COJC@.
V: az G!- Xg 9Ze& 6l:N Nx )#E* 9Ze& 1CQ Y= <
NgW G; 1CO)5 9ZeG <NgW; %CR v V@OY.
|C V&
21 dLvG :30 9Ze! kQ 6!;
Wq S: 8b
az G!- Y=; v`OJC@.
1. 68 az %!- 9Ze& 1COJC@.
2. <NgW G!- <NgW %C& -/ 9Ze& 8Y s<OT %COJC@.
3. %CG <NgW G!- 8AB S:G /|; 1COJC@. 53 dLvG :<
NgW Wl;!-B S:L Wl-GB f}! kX 3mUOY. b;*: b
; S:TOY.
4. %& ll 8JC@.
%G " `: d; GB NuG S:; *-UOY. 49 dLvG :d; W N
uG S:;!-B d; S:! kX 3mUOY. %!B Y= -L wTKO
Y.
S: L'
S:G L'
S: *
S:G *. L *: d; GB NuG sLA gL, ?H /fI v
5 V@OY.
5. [w! 5rL I fl, %& -iL?OE* -G )b& 6$OE* %G `
; $DOJC@.
|C V&
22 dLvG :S: * /f;
&3e f} 17
6! w:d. 8b
az G!- Y=; v`OJC@.
1. 68 az %!- 9Ze& 1COJC@.
2. <NgW G!- <NgW %C& -/ 9Ze& 8Y s<OT %COJC@.
3. %CG <NgW G!- 6! w:d.& 1COJC@.
4. %& ll 8JC@. %!B WqG sLA gL,!- On- pg L%.G
<NgWL wTGn V@OY.
6! w:d.G " `: Xg Wq! kX kXx 6!! kX 3mUOY.
$8!B 6!! On- /%, %S ggZ W ,| V.L wTKOY. %!
B Y= -L wTGn V@OY.
/% ?OQ `! %CGB 6!G /%
V< 6!& kQ RA |.ZG 8P L' GB 6!& kQ RA ANW%
d; sB
nO d;G sB(9: BNJ). 53 dLvG :nO d;G sB;!-
B " sB *; 3mUOY.
Oa sB
d;! kQ 3. sB(9: |^J)
V. 6! C! RA |.Z! &xQ V.
5. [w! 5rL I fl, %& -iL?OE* -G )b& 6$OE* %G `
; $DOJC@.
|C V&
49 dLvG :6! w:d. L%.;
G # L?
ON fl!B O*G G!- Y% G8N Z?8N L?UOY. Y= 9& |m
OJC@.
v 68 G!- 68& G`OB fl, 68 az! RA %:)>! |^Gi az
G8N L?UOY.
18 Trust Authority: RA %:)> H;-
v 9Ze! kQ <NgW; d;Oi <NgW G8N L?UOY.
v <NgW G!- 6!& OaOi, qO GG 68 azN 9F)OY.
'M Y% fl! G gL& L?OAi %COAB G; )#b8 Oi KOY.
W8T Oi Y=; 9sR v V@OY.
v 68 az& ; D! 68 G8N 9F!B fl 68! )|w %CKOY.
v _xH Wq! kQ <NgW; d;OB fl az GG 68 azN 9F%
v V@OY. W w!- s<OT %CR Y% 9Ze& 1CR v V@OY. G
Y% 68& G`R 'nv 68 azB az G! 2F V@OY.
v az G!- Q 9Ze& 1CQ D! <NgW G8N L?R '6Y <Ng
W G! Xg 9Ze! %CKOY. az G!- 9Ze& 1COv JRE*
Q LsG 9Ze& 1COB fl L G: $8& wTOv J@OY. <Ng
W G!- 6!& &bQ D! $8! Xg G!- vv}OY.
V: <G; C[R ' RA %:)> JeB b;*8; %CUOY.
% - )b 6$
%G - )b& 6$OAi Y= [w; v`OJC@.
1. )b& 6$OAB -G fh! ?-& u8JC@.
2. 6l:& )% sB!- ?-& ^JL* @%J8N xn - Jq& /fO
JC@.
3. xOB Jq!- 6l: \_& u8JC@.
% `G - bX $D
- bX8N `; $DOAi Y= [w; v`OJC@.
v -G %&& )#JC@.
v * x-N $DOAi Q x u )#JC@.
&3e f} 19
%!- 9Ze 1C
Q LsG 9Ze& 1CR v V@OY.
v \O 9Ze& 1COAi Xg `; )#JC@.
v n 3G N"Q 9Ze& 1COAi 9 x0 9Ze& )% Y= Shift 0&
)% $N 6v7 9Ze& )#JC@.
v N"Ov J: n 3G 9Ze& 1COAi Ctrl 0& )% $N " 9Ze&
)#JC@.
v 9Ze 1C; X&OAi Xg 9Ze& YC )#JC@.
6! v`
nO d;! kQ 6!& kOE* NuG 9Ze& w%L.R v V@OY. a
z Gz <NgW G pN! 6!& 1CR v VB Je! wTGn V@OY.
gkZ! kR v VB 6!B gkZ RA |.ZN VB nO 5^N!-G G
Q! {s Y(OY.
9v 9Ze! kQ 6!
az G!- %G " `: 68 azG 9ZeTOY. %! VB Q LsG 9Z
e! kX 6!& v`R v V8g, 6!& v`Ob |! O*G 9Ze& 8Y
s<OT ll < v V@OY.
v 9v 9Ze& 8B ?H 6!& v`OAi Y= [w; v`OJC@.
1. Q LsG 9Ze& 1COJC@.
2. xOB fl, /? b# 3$!- NuL ?B; .T I /? b#; v$
OJC@.
3. xOB fl, d; ANDO 1C!- gkZ! BNOB d;! kX Y%
d; ANDO; v$OJC@. 51 dLvG :&xH Nu /|;!-B "
d; ANDOz ,|H NuG /!! kX 3mUOY.
4. 1CQ Wq! kQ 6! v`!- qO; -m 6!& 1COJC@. 9Z
e |C [w! kQ c!! gkR v VB /OQ 6!TOY.
20 Trust Authority: RA %:)> H;-
5. 6!N- kR& 1COB fl!B VR g/& 1CX_ UOY. kR 1
C g/!- qO; -m g/& 1COJC@. 47 dLvG :Nu kR g
/;!-B " g/G GL& 3mUOY.
6. xOB fl, 6!! kQ V.!- Xg 6!& 3mR V.; TBOJC
@.
7. 6! &b; -/ 1CQ 9Ze! kQ 6!& &bOJC@.
v 6! |! 9ZeG _! <NgW; 8Ai Y= [w; v`OJC@.
1. 9Ze! wTH `; 1COJC@.
2. <NgW %C \_& )#JC@.
|C V&
19 dLvG :% - )b 6$;
19 dLvG :% `G - bX $D;
30 9Ze! kQ 6!
6!& v$Ob |!, <NgW G!- %CH 9Ze! kQ Y% /f; v`
R v V@OY.
1. %C!- 8AB <NgWG /|; 1COJC@.
WqG 3. S:; %COB fl!B %G ON *; /fR v V@OY.
2. Jd! {s ON S: *; /fOJC@. 49 dLvG :d; W NuG S
:;!-B ON S:! kX 3mUOY.
3. xOB fl, /? b# 3$!- NuL ?B; .T I /? b#; v$O
JC@.
4. xOB fl, d; ANDO 1C!- gkZ! BNOB d;! kX Y% d
; ANDO; v$OJC@. 51 dLvG :&xH Nu /|;!-B " d;
ANDOz ,|H NuG /!! kX 3mUOY.
5. %CH Wq! kQ 6! v`!- qO; -m 6!& 1COJC@. 9Ze
|C [w! kQ c!! gkR v VB /OQ 6!TOY.
V: 6!! kRN fl kR! kQ g/5 1CX_ UOY. 47 dLvG :N
u kR g/;!-B /?Q g/! kX 3mUOY.
&3e f} 21
6. xOB fl, 6!! kQ V.!- Xg 6!& 3mR V.; TBOJC@.
7. 6! &b; -/ 6!& &bOJC@.
|C V&
19 dLvG :% - )b 6$;
19 dLvG :% `G - bX $D;
S: * /f
<NgW G!- nO d;; BNOE* OaH d;! kQ 6!& v`R '
ON S:G *; /fR v V@OY.
1. %C!- qnO: AN<: /v& 1COJC@.
2. w%L.OAB S:8N -iL?OJC@.
gkZ! w%L.R v VB *: u *; TBOb 'Q X:. sZ* Y
% *; 1COb 'Q qO sZ& .m V@OY. 49 dLvG :d; W N
uG S:;!-B ON S:! kX 3mUOY.
3. xOB *; TBOE* 1COJC@.
V: d; ANDOG *L gkZ! 3$Q *! l1R v5 V@OY.
/? b# /f
az GL* <NgW G!- nO d;; BNOE* OaH d;! kQ 6!&
v`R ' Nu! kQ /? b#; /fR v V@OY. /? b# 3$!- /
%G |'& v$OJC@. /%& &xOAi ^B; -/ , Y= xOB /%
& )#JC@. /%& w" TBOB fl!B ^B! gkH Mz ?OQ |D
; gkO) X:. sZ& $lJC@.
v C[ OZ!- NuL ?B; .T I /%& v$OJC@.
v >a OZ!- NuL 8b! I /%& v$OJC@.
6!& &bOi gkZ! v$OB /? b#L RAN |^KOY.
V: d; ANDOG *L gkZ! 3$Q *! l1R v5 V@OY.
22 Trust Authority: RA %:)> H;-
d; ANDO v$
az GL* <NgW G!- nO d;; BNR ' Nu [:! gkR Y% d
; ANDO; v$R v V@OY.
d; ANDO 1C!- Y= _ O*& 1COJC@.
v qO!- d; ANDO; 1COJC@. qOG ANDO: gkZ! v$O5
O c!H MiTOY. 51 dLvG :&xH Nu /|;!-B " d; AND
Oz ,|H Nu! kX 3mUOY.
v vg ANDO gk; 1COJC@. LML b;*TOY. L b;*: vg A
NDOL gkZ! v$O5O c!H ML FQ fl!5 x`R v VT U
OY.
gkZ! v$OB ANDO: 6!& &bQ D! d;; 3.Om Nu; [:
Ob 'X gkKOY.
V. _!
az GL* <NgW G!- v` _N 6!& 3mOb 'Q V.; _!R v
V@OY.
1. 6! v`!- 6!& 1COJC@.
2. 6!! kQ V.!- X:. sZ! V.; TBOJC@. Vk 512 .Z&
gkR v V@OY.
3. 6! &b; -/ 9Ze& w%L.R ' V.; wTC0JC@.
6!& &bOi Xg 9Ze! gkZG V.L _!KOY.
d; BN
az GL* <NgW G _ O*!- d;; BNR v V@OY.
v az G; gkOB fl!B BNR 9Ze& Q Ls 1CR v V@OY.
v <NgW G; gkOB fl %CH d;; BNOb |! ON S:G *;
/fR v V@OY.
n@ Q J G!- Y= [w; v`OJC@.
&3e f} 23
1. 6! v`!- BN; )#JC@.
2. 6! &b; )#JC@.
8y sBN d; /v
az GL* <NgW G!- d; 8y& /vR v V@OY. az G; gkO
B fl!B 8y sB& /vR 9Ze& Q Ls 1CR v V@OY.
n@ Q J G!- Y= [w; v`OJC@.
1. 6! v`!- 8y /v& )#JC@.
2. 6! &b; )#JC@.
d; E}
az GL* <NgW G _ O*!- d;; ENR v V@OY. az G; g
kOB fl!B ENR 9Ze& Q Ls 1CRv V@OY.
n@ Q J G!- Y= [w; v`OJC@.
1. 6! v`!- E}; )#JC@.
2. 6! &b; )#JC@.
;E !I: /f
az GL* <NgW G!- NuG ;E !I:; /fR v V@OY. ;E !
IQ Nu; ;E R!N R v V8g W ]kN5 R v V@OY. az G;
gkOB fl!B Q LsG 9Ze& 1CQ Y= Xg Wl! kQ ;E !I
: sB& /fR v V@OY.
n@ Q J G!- Y= [w; v`OJC@.
1. 6! v`!- Y= _ O*& )#JC@.
v d;; ;E !I8N T
v d;; ;E m!I8N T
2. 6! &b; )#JC@.
24 Trust Authority: RA %:)> H;-
Nu 8y
az GL* <NgW G!- Nu; OC{8N 8yR v V@OY. az G;
gkOB fl!B 8yR Nu; Q Ls 1CR v V@OY.
n@ Q J G!- Y= [w; v`OJC@.
1. 6! v`!- kR& )#JC@.
2. g/!- 8y& 1COJC@.
V: CRL! vOGn VB ?H Xg NuL 8b! Gv JB Q L 6!&
_D! x9R v V@OY.
3. 6! &b; )#JC@.
L 6!& v`Oi 9Ze! kQ 3. S:L w%L.KOY. kR g/ S:
G *: 8yN 3$KOY.
|C V&
26 dLvG :CRL!- Nu &E;
Nu kR
az GL* <NgW G!- Nu; kRR v V@OY. az G; gkOB f
l!B kR! kO) Q Ls Nu 1CR v V@OY.
n@ Q J G!- Y= [w; v`OJC@.
1. 6! v`!- kR& )#JC@.
2. g/!- Xg g/& 1COJC@.
V: g/& 8yN 1COB fl!B NuL 8b! Gv JB Q _D! 6
!& x9R v V@OY.
3. 6! &b; )#JC@.
L 6!& v`Oi 9Ze! kQ 3. S:L w%L.KOY. kR g/ S:
: gkZ! v$Q *8N 3$KOY.
|C V&
&3e f} 25
25 dLvG :Nu 8y;
:CRL!- Nu &E;
CRL!- Nu &E
Y= g/ _ Q !vN CRL!- Nu; &EOAB fl! V; v V@OY.
v u Ls /?Ov J: Nu; CRL!- &EOB fl
v g/& kRN O) L|! kR_x Nu; g0:-OAB fl
V: kR b# ?H! 8b! H NuG fl!B YC 0:-R v x@OY.
az GL* <NgW GG CRL!- Nu; &ER v V@OY. az G; g
kOB fl!B CRL!- &ER Nu; Q Ls 1CR v V@OY.
n@ Q J G!- Y= [w; v`OJC@.
1. 6! v`!- kR& )#JC@.
2. g/!- CRL!- &E& 1COJC@.
3. 6! &b; )#JC@.
L 6!& v`Oi 9Ze! kQ 3. S:L w%L.KOY. kR g/ S:
G *: CRL!- &EN 3$KOY.
|C V&
25 dLvG :Nu 8y;
5^N! kQ GQ !K
az G GB <NgW G!- Y= [w; v`OJC@.
1. 6! v`; )#JC@.
2. 6! qO; 8JC@.
'G WqL NuG 9ZeM nO 5^N! kQ nO d;z |CO) gkZ!
v`R v VB [wTOY. 9Ze& < v VB GQ8 .m VB fl, qO!
%CGB /OQ *: gk !IQ 6! x=TOY.
26 Trust Authority: RA %:)> H;-
RA %:)> >a
SGG G!- RA %:)>; >aOAi Y= _ O*& v`OJC@.
v >a& )#JC@.
gkZG 6wL gkZ! kX Y% fN& 3$Ov J: Q gkZB RA
%:)>! W<:_x % dLvN 9F)OY.
v Y% jslz "; ]; 'M 6y!vN &q %CYG [: FL\ !n%
O*& -/ %:)>; ]8JC@. L8T Oi jslz! ]|OY.
&3e f} 27
&4e $8
L }G V&B RA %:)> 3$!- nO, Nu W |.! |CH 3d; $G
OE* 3mUOY.
nO
nOLu Nu; E;OB MTOY. Trust AuthorityB Q LsG nO f}; &
xOg 6wG $%! {s gk !IQ f}L ^s}OY. gkZB Y= _ Q
!v& v`R v V@OY.
v % jslz& kX Trust Authority nO gD; O:O) &bUOY. b;
Trust Authority 3!!- nO gD: Z] um- >MsB % dLv! V
@OY. gL.! {s-B L dLvG L'L Y& v5 V@OY.
v 8Y qxD{N f}8N-, g|nO; Q Y= gk _N v):WLG! 3
!H Trust Authority ,sLp. @kANW%; kX g|nO *; Trust
Authority! &xUOY.
RA(nO GQ) |.ZN- RA %:)>! W<:Ob 'X Nu; nOX_ U
OY. *_! nO % dLv& gkO) ON gkZ& g|nOR v5 V@O
Y.
nO gDG %LMB RA %:)>!- < v VB %LM#L: 9ZeN L?
UOY.
g|nO
Trust Authority& gkOi ANW% GB |.Z! ag gkZ& g|nOR
v V@OY.
Nu; 'X Y% gw; g|nOOB fl, L& 'Q C*.@B Y=z 0@
OY.
© Copyright IBM Corp. 1999b 29
v g|nOOAB 3N! kQ $8& .8X_ UOY. $8B ggZNNM r
; v5 Vm 6wG 9Ze(9: %LM#L:G $8)& gkR v5 V@OY.
v % jslz!- nO dLv! W<:UOY. /$N; g|nOOb 'Q n
O gDL V@OY.
v 3Nz Xg 3NL xOB Nu /|! kX 3mOB $8& &xO) gD
; O:UOY. W Y=!B gD; &bUOY.
v d; sB& !KUOY.
g|nO d;L BNGi gkZB .#hG ID, O#, d;; BNQ RAG
URL n; ^T KOY.
v L $8& |-, |Z lm GB Nm; kX g|nOQ 3N!T |^UOY.
1C{8N, g|nOQ 3NG mG& 'X Y% d; $8! wTGn VB g
|nO DO; &xR v V@OY. ggZB Nu; d;R Xq! I ' g
kZ! 8;B Za& gkUOY.
g|nO 8:)! |Q 5r; 8OAi Trust Authority gkZ H;-& |m
OJC@.
% jslz vx
Trust Authority!-B gkZ! Y= % jslz _ O*& kX nO gD;
O:Om &bT8Na nO d;; [:R v V@OY.
v Microsoft Internet Explorer,1.: 4.0 Ls
v Netscape NavigatorGB Communicator,v| 3.0 Ls
RA %:)>! W<:Ob 'X JdQ jslzB L jslziG 8Y VE
9'; d8UOY.
30 Trust Authority: RA %:)> H;-
nO
nOLu pvP Nu; 3N GB b8 #<<!T N)OB AN<:TOY. Trust
Authority!-B nO! U- ANW% GB RA |.Z! nO d;C T2 &
xH $8& r!UOY. W Y=!B Xg d;G BN )NM |h xL, Trust
Authority RA! nO %LM#L:! d;! kQ 9Ze& [:UOY. Nu;
N)Ob 'Q a$L ;Avi Trust Authority CA(Nu b|)! Nu; _`U
OY.
qnO: $%
ANW%: gkZG [w; RA |.ZN- _!R ' nO $8G ON! 6w
G qnO: $%; {kUOY. ANW%L r!R v VB $8 /|: gkZ
! r!OB >y8Y z 9bOg, *: $.XvB fbL V@OY(9: VR s
V bv). Trust Authority& gkOi 6wL W/Q ANW%! $% $8& &
xR v V@OY. L ANW%: Z< r!!- Xg $8& gkUOY.
nO GQ
Trust Authority!- RAB -v @kANW%TOY. RAB Y=; wTO) g
kZG nO! JdQ ON |. 8:)& cgUOY.
v gkZG Ex .N
v d;Z! d;Q S: W GQ; wTQ Nu; ^; Z]L VBv Ku
v NuG [: GB kR d;! kQ BN GB E}
v 8H @kANW%! W<:& C5OB gwL Nu ;G xk 0M ,|H 3
Nk 0& .m VBv Ku
RA %:)>; gkO) Trust Authority RAG ON 6!& C[OE* vCU
OY.
nO %LM#L:
Trust Authority nO %LM#L:B nO 9Ze& zeUOY. nO %LM#
L:B IBM DB2®
Universal DatabaseN [:H |h| %LM#L:TOY. Trust
&4e $8 31
AuthorityB 9Ze& O#-UOY. Ov8, RA %:)>; kX xN RA |.
ZB kNPG nO $8& P; v V@OY.
nO 5^N
" Trust Authority C:[: \O nO 5^N; .m V@OY. L 5^N: 6
w!- nO W Nuz ,|H qnO: $%, Nu $% W Zx; $GUOY.
Zx! W<:OAB gkZB Xg Zx! kQ 5^N! nOGn Vn_ UO
Y.
RA -v RA.~n! 3!Gn VB fl, )b!B nO @kANW%; 3$
R v VT OB A9Sv)! wTGn V@OY. L RA.~nB RA! vxO
B n2 pn* $%5 gkR v V@OY. 5^N L', pn W 3! fN! n
O @kANW%! W<:Ob 'Q URL; |:UOY.
9& in, xk % -vG L'L MyPublicWebServerLm 5^N L'L
MyDomainN fl, nO @kANW%! W<:Ob 'X-B Y= URL; gk
OT KOY.
http://MyPublicWebServer/MyDomain/
Trust Authority C:[: nO @kANW%z T2 b; Java -v dLv
(index.jsp)& wTUOY. L dLvB nO 5^N! kQ URLN %CGg, n
O -q:& &xUOY.
v e!G gkZB L % dLvN #F! Nu; d;Om ZEG jslz N
u; ;EOE* kRUOY.
v L gkZi; vxOAi Xg % dLvN L?O) RA %:)>! W<:
Ob 'Q gkZG Nu; kfX_8 UOY. W/i L Nu; gkO) Y
% gkZi; g|nOR v V@OY.
nO 5^Nz ,|H nO d;z Nu |C [w; Ob 'X RA %:)>!
W<:UOY.
32 Trust Authority: RA %:)> H;-
nO 9Ze
Nu! kQ " d;: Trust Authority RA! &bGB nO gDTOY. " n
O d;: nO %LM#L: 9ZeN zeGT KOY. L 9Ze! kQ w%
L.B d;! kQ pg 6!(d; ENnv wT)& ]5UOY. NuL [:G
B fl!B ?OQ 9Ze! Xg Nu! |CH pg L%.& ]5UOY. {
s- nO 9Ze!B d; W d;z ,|H NuG sLA gL,!- On-
pg L%.! wTKOY.
9Ze S:
nO %LM#L:! VB 9ZeG S:: nO d;; 3mOB /vTOY. O
aH d;G fl /vB N)H Nu5 3mUOY. b8 S:: 6wL qnO:
$%; }`OB % 5r; VB 3. /vTOY. ON S:z W *: RA %:
)>; kX RA |.Z! .NR v V@OY.
Nu
NuLu #<< GB 3N; 'X pvP Nu; [:OB MTOY. Trust
AuthorityG fl Nu: nO d;; r!Om BNQ D!8 _}UOY. nO
G azN CA(Nu b|)B Nu; _`UOY. Trust AuthorityG fl _`G
B NuG /|: 6wG qnO: $%z O|:; /vUOY.
Nu b|
Trust Authority!- CAB 6wG $%! {s pvP NuG _`; cgOB
-v ANW%TOY.
Trust AuthorityB -N EZOB CAiL Nu:G uEN VfG Nu; BN
OB % ?GOB s# Nu; vxUOY. Trust AuthorityB CA h~5 vx
UOY. CAB h~!- s'! VB CA& EZOg Nu:G uEN L CAG
Nu; BNUOY.
&4e $8 33
Nu kR qO
Trust Authority RAB $b{N #]8N CRL(Nu kR qO); x%UOY.
CRL: u Ls /?Ov J: Nu; *-Q M8N-, Xg Nu; &COB R
/Z! NuGv J5O UOY.
n2 CA, RA GB @kANW%Lgv L qO! W<:O) NuG kR )N
& G0R v V@OY. LM: V> gkZ! 6wG 8H @kANW%! W<
:OAm R ' Trust Authority RA! 8H; &xOB Q !v f}TOY.
p:d.
Trust Authority! Nu; zeOb 'X gkOB p:d.B IBM SecureWay
p:d.TOY. L p:d.B 6wL /0w Trust AuthorityM T2 gkOb
'X 3$Q MO v5 V8g, GB gkZ! L|! 3!O) Y% @kANW
%z T2 gkXB p:d.O v5 V@OY.
Trust Authority! p:d.! W<:Ob 'X gkOB ANd]: LDAP(f.
p:d. W<: ANd])TOY.
8P L'
DN(8P L')Lu pvP Nu; 'Q p:d. WqG Q dRTOY. DN: p
:d.G h~ 86!- WqG '!& m/OT D0UOY.
Nu
NuLu Nu 8/ZG Ex; 8uOB CA! GX -mGB pvP Z] um
-TOY. Nu 8/ZB Y% gwz %LM& Vm ^; ' GB 8H @kAN
W%! kQ W<:& d;R ' Nu; Nu8N gkR v V@OY. Trust
Authority!-B -v, @kANW% W e!(9: A0M, :6. +e n)nv! p
N gkZ W s# #! NuOb 'Q Nu; .m Vn_ UOY.
Trust AuthorityB Y= |V!- X.509v3 Nu; vxUOY.
v jslz Nu
34 Trust Authority: RA %:)> H;-
v -v Nu
v e! Nu
v PKIX Xv @kANW%! W<:Ob 'Q Nu
v CA! kQ s# Nu
Trust AuthorityB Y= ANd]i5 vxUOY.
v SSL
v S/MIME
v IPSec
v PKIX CMP
b; Trust Authority 3!B L/Q |VM ANd]; b]8N O) YgQ N
u /|; &xUOY. {s- nOZB ZEG Jd! KBB Nu; d;R v
V@OY. 51 dLvG :&xH Nu /|;!-B Nu /|! kX 3mUOY.
jslz Nu
jslz Nu: O]{8N % jslz! O#-H DON zeOB pvP Z
] um-TOY. ON @kANW%!-B gkZ! :6. +e* Y% E<!
0& zeR v V@OY. Trust Authority C:[!-B gkZ! % jslz&
kX w" jslz Nu; d;R v V@OY. *_! JdQ fl!B nO %
dLvN 9F! Xg Nu; ;EOE* kRR v V@OY.
CA Nu
Trust Authority -v! &CR Nu; .m VB pg jslz, -v, e! G
B @kANW%: #/GB CA Nu5 .m Vn_ UOY. L Nu: Trust
Authority CA! _`Q Nu; .m VB -v!-G kE; NuOb 'X J
dUOY.
8H Trust Authority nO -q:& gkOAi gk _N jslz! Trust
Authority CA Nu; .m Vn_ UOY. 3=8N Trust Authority nO % d
Lv& f.R ' L Nu; r; v V@OY. W D!B nO -q:NNM N
u; d;R '6Y L Nuz #/GB Xg CA Nu; YnNeR v V@O
Y.
&4e $8 35
9& in 2b 8bG SSL jslz Nu; d;OB fl!B Xg Nuz #
/GB CA Nu; ^; v V@OY.
V: NetscapeG Jb 1.:B Trust Authority -v! &COB gL. Nu;
ckR v Vz@OY. L Nu: Xg -vMG -v Nu kE W ,sLp
. Nu kE pN! kX ck !I_@OY. Ov8, NetscapeG VY 1.
:B ,sLp. Nu <G! kX CA Nu; d8UOY.
-v GB e! Nu
gkZG [wG ONN fl!B -v* e!! kQ Nu; d;R v V@O
Y. % jslz& kX &xGB nO gD; gkOJC@.
Nu; d;OB -v GB e!B PKCS #10d; |D; gkO)_ UOY.
Nu .e
Nu .e: X.509v3 NuG |D!- 1C{N dRTOY. .e; kX _! J
e& Nu! kUR v V@OY. Trust AuthorityB 6wL _`OB Nu; g
kZ $GR v V5O OB Nu .e Wl; &xUOY. L _! JeB qn
O: AN<: /vsm UOY.
RA %:)>!- 9Ze& < ' 3. S:; %COT Oi L Jei; < v
V@OY. ON fl!B Je *; w%L.R v5 V@OY.
Nu sLA gL,
Nu; d;Oi Xg Z] um-G /? b# ?H vSGB sLA gL,L C
[KOY. L sLA gL,: NuL kRGE* 8b! I ' >aKOY.
NuL ;EGB fl, u 9ZeB nO %LM#L:! [:KOY.
;E !I:
NuG ;E !I:: gkZ! RA %:)>!- /fR v VB /: _ O*
TOY.
36 Trust Authority: RA %:)> H;-
v Nu; ;E !I8N Oi, Xg NuG 8/ZB 8 NuL /?Q sBN V
B ?H! u Nu; E;R v V@OY. ;E !IQ Nu; R/Oi nO
AN<: W nO [wL \x- KOY.
v Nu; ;E R!I8N Oi Xg NuG R/ZB 8b! I 'nv bYA
_ Og W D!5 )|w NuL JdQ fl!B YC nO; X_ UOY.
nO C 8/ZB 3= nOR 'M 6y!vN pg $8& &xX_ UOY.
ON gkZB Z< ;E d;; &bR v V@OY.
v ;E !IQ jslz Nu; .m VB gkZB nO % dLv!- ;E;
d;R v V@OY.
v PKIX Xv @kANW%! W<:Ob 'Q ;E !IQ Nu; .m VB g
kZB Trust Authority ,sLp. @kANW%; gkO) ;E; d;R v
V@OY.
|.
RA |.ZN- [wOAi Uz RA %:)>; gkOAB % jslz! kX
Nu; d;Om ^F_ UOY. jslz Nu; .8Q D!B RA %:)>!
W<:OAm R '6Y jslz Nu; &bX_ UOY. RA %:)>!- S
GG nO 9Ze GB d;; 8E* W! kQ 6!& v`OAi {}Q DO
GQ; .m Vn_ UOY.
L }!-B NuG gk W |.M |CH V&i; YlOY.
W<: &n
W<: &n qO(ACL): ;N Trust Authority gkZ, e!, RA.~nG N
u W GQN)& UOY. 9& in, RA %:)> vx -m4: RA |.Z!
RA %:)>! W<:R v Vb |! ACL; gkO) nO GQ |.Z& N
uOm GQ; N)UOY.
&4e $8 37
Nu W GQN)
Nu: Ex um; &xOB ]i GQN)B n2 [w; Ob 'Q GQ; &
xUOY. Trust Authority!-B V> gkZ! 8H @kANW%! W<:Ob
|! 6wL Nuz GQN) pN& d8R v V@OY. W/i Nu 8/ZB
ZEL gk _N @kANW%L H|OYB M; .ER v V@OY.
?C |.
Trust AuthorityB \O nO 5^N; &xOv8 Q LsG RA |.Z! Xg
5^N ;!- [wR v V@OY. RA %:)> -m4z RAB ):!! LL
9Ze |C [w; Om VB fl Y% ):!! 9Ze& w%L.Ov xO5
O 3hGn V@OY. Ov8, Q LsG |.Z! ?C! 0: 9Ze& < v
B V@OY.
RA %:)> vx -m4
RA %:)> vx -m4: RA |.Z!T RA %:)> -q:& &xOB Trust
Authority @kANW%TOY. -m4: RA |.Z! 68& G`R ' $8&
]/Og RA |.Z! 9Ze! kQ /f GQ; N)R ' 9Ze& w%L.
UOY.
d; ANDO
Trust AuthorityB 6wL nO W Nu; \x-Ob 'X gkR v VB d;
ANDOG b; <.& &xUOY. d; ANDO: nO d;G S:z 3.&
&nUOY. " d; ANDO!B Nu; 'Q [C..! wTGn V@OY. v
xGB Nu |V! kQ YgQ d; ANDOL V@OY.
Wq! kQ d; ANDOG L': W S: _ O*TOY. JdQ fl!B n
O d;; BNR ' Y% d; ANDO; v$R v V@OY.
O*G d; ANDO L': d; S:z T2 *-Gm Y% d; ANDO L
': b; S:z T2 *-GB M; < v5 V@OY. LM: RA |.Z GB
38 Trust Authority: RA %:)> H;-
RA AN<:! n2 !!- d; ANDO; +C_YB M; GLUOY. d;
S:G ANDO: nO d;G Y% S:z T2 m$Gz@OY. b; S:G A
NDO: vg d; ANDOTOY.
&4e $8 39
&5e |6gW
L }G V&B RA %:)>! %CGB Je 3m, /?Q Je * W S:G
GL& wTUOY. V&B RA %:)>!- Xg $8! JdOT I '!& b
X8N O) 8:Gz@OY.
68 G
68 G!- Nu GB nO d; $8& KvOB 68& XqR v V@OY.
G!B Y= bIL wTGn V@OY.
v 68 Xq& 'Q Je
v 68 G`; 'Q 68 &b \_
v 8:)! kQ 5r;
– GG F!J! VB sB 5*. L 5*: Je m/G 5r;, Trust
Authority ^Cv W AN<: _G x`| 7k& %CUOY.
– G! kQ 5r; \_
68 az! XqGi RA %:)>L Z?8N az G; %CUOY.
68 Je
68& XqR 'B JdQ 8- 9: Je& gkOJC@. ON JeG fl, g
kZ! 1CQ Y% JeM s# h8{N fl!B gkR v x@OY.
v 68 /|!- Y= _ O*& )#JC@.
– sB, L' W w%L. /%0: sB& bX8N nO d; GB NuG 9
Ze& KvOAB fl
– ;E !I: W 8b0: ;E !I:L* 8b $8! JdQ NuG 9Ze
& KvOAB fl
v 68 /|!- sB, L' W w%L. /%0; 1CQ fl, Y= Je& g
kO) Jd! {s 68& <POT R v V@OY.
© Copyright IBM Corp. 1999b 41
– sB!- qO; gkO) pg sBG Wq GB O*G /$ sB& .m
VB Wq8; KvOJC@. qO!- Y= d; sB *G O*& 1CO
JC@. b; 1C: 8y _TOY.
|< sB! |h xL pg nO d;; KvUOY.
"v uN "vH nO d;; KvUOY.
8y _
BNGE* E}Gv J: d;; KvUOY. ON 8y _N d;
: ET d;Lg gkZG a$; JdN UOY. Y% d;: g
kZ! 3.R v Vb |! `#G _! $8& bY.m VB d
;TOY. L IG: b;*TOY.
BNJ RA GB RA |.Z! BNQ d;; KvUOY. ,|H NuG s
B! Y& v5 V@OY.
E}J RA GB RA |.Z! BN; ENQ d;; KvUOY.
OaJ RA GB RA |.Z! BNOE* E}Q d;; KvUOY. L s
BN BNH d;! kX-B Xg NuL LL gkZ!T |^H
MTOY.
– Y= Je& gkO) /$ L'z ,|H d; GB NuG 9Ze8; K
vOJC@.
- :!- L'; &\Q :; TBOJC@. L'G 3= n [Z& TBO
) Xg [ZN C[OB pg :; KvR v5 V@OY. 9& in Smi
& TBOi, Smith, Smithers, SmileyW ″Smi″N C[OB b8 :!
kQ 9Ze& KvOT KOY.
- L'!- L'; TBOJC@. L'G 3= n [Z& TBO) Xg .
ZN C[OB pg L'; KvR v5 V@OY. 9& in ″Joh*″&
TBOi, Johanna, John, JohanW ″Joh″N C[OB b8 L'L wT
H 9Ze& KvOT KOY.
– V> w%L. /% |'& gkO) /$ b# ?H V>{8N w%L.
H Wq8; KvOJC@. /%G |'& v$OJC@.
- /% *!B v$H b;*L x@OY.
42 Trust Authority: RA %:)> H;-
- n@ Je!-g /%& v$Ov J8i 68G *SvM O!OB pg
9Ze& KvUOY.
/%& &xOAi ^B; -/ , Y= xOB /%& )#JC@. /%&
w" TBOB fl!B ^B! gkH Mz ?OQ |D; gkO) X:
. sZ& $lJC@.
C[ |'!- !e L% /%.
L Je& xi8N 2\ NB fl 68B >a JeG /% L|
(Xg /% wT)! w%L.H pg 9Ze& KvUOY.
>a |'!- !e VY /%.
L Je& xi8N 2\ NB fl 68B C[ JeG /% LD
(Xg /% wT)! w%L.H pg 9Ze& KvUOY.
v 68 /|!- ;E !I: W 8b0; 1CQ fl, Y= Je& gkO) J
d! {s 68& <POT R v V@OY.
– ;E !I:!- qO; gkO) NuG ;E !I )N& bX8N 68
& OJC@. qO!- Y= * _ O*& 1COJC@.
;E !I
Fw 8b! Gv J: fl Nu; ;ER v V@OY.
;E R!I
Nu; ;ER v x@OY.
– 8b /%G |'& gkO) /$ b# ?H! 8b! 9$Gn VB Wq
8 KvOJC@. /%G |'& v$OJC@.
- b;*: x@OY.
- n@ Je!-g /%& v$Ov J8i 68G *SvM O!OB pg
9Ze& KvUOY.
/%& &xOAi ^B; -/ , Y= xOB /%& )#JC@. /%&
w" TBOB fl!B ^B! gkH Mz ?OQ |D; gkO) X:
. sZ& $lJC@.
C[ !e L% 8b /%.
&5e |6gW 43
L Je& xi8N 2\ NB fl 68B >a JeG /% L|
(Xg /% wT)! 8b! GE* 8bI 9$N pg 9Ze& K
vUOY.
>a !e J: 8b /%.
L Je& xi8N 2\ NB fl 68B C[ JeG /% LD
(Xg /% wT)! 8b! GE* 8bI 9$N pg 9Ze& K
vUOY.
v Y= Je _ O* GB pN& gkO) 68G 3. W %C& &nOJC
@.
Kv Q5
68M O!OB 9Ze v! s6gv s|Ov Jm KvR 9ZeG
Vk v. Y= _ O*& 1COJC@.
– 50
– 100
– 150
– 250 (b;*)
– +&Q(O!OB pg 9Ze& KvT)
dLv )b
az GG " dLv! %CR 9Ze v. 68 az!- L dLvi
; L?X !g JdQ 9Ze& #; v V@OY. Y= _ O*& 1
COE* %CGB b;* '! }Z& w" TBOJC@.
– 10
– 15(b;*)
– 20
– 25
g| $GH 68
g| $GH /OQ 68B 8y _N pg d;; KvOB b; 68TOY.
44 Trust Authority: RA %:)> H;-
Kv Q5 IG
68 G!- Kv Q5 3$! gkR v VB IG: Y=z 0@OY.
v 50
v 100
v 150
v 250 (b;*)
v +&Q(O!OB pg 9Ze& KvT)
L IGi: az GG 68 az! %CGB 9Ze v! 5b; L(OY.
dLvg 9Ze v IG
68 GG dLvg 9Ze v!- 1CR v VB IG: Y=z 0@OY.
v 10
v 15(b;*)
v 20
v 25
v %CGB b;* '! TBOB SGG v
L IGi: az GG 68 az %C! 5b; L(OY.
az G
az G!- 68 G`G az& < v V@OY. G!B Y= bIL wTGn V
@OY.
v 68 az! wTGn VB %
– " `!B 68M O!OB WqG 9Ze! in V@OY.
– -G *! bX8N `; $DR v V@OY.
– -G )b& 6$O) W Jq& /fR v V@OY.
– %G dLv! %C -i8Y u d fl! -iL?; kX az& < v
V@OY.
– az! 9v dLv! ID VB fl Y= dLvM L| dLv& -/ d
Lv& < v V@OY.
&5e |6gW 45
V: Y= dLv* L| dLv& d;R 'B `#G v,L V; v5 V
@OY. dLvB gkZ! JdN R ' -v!- KvGGN vg d
Lv8 NCN gkR v V@OY.
v xOB fl NuG /? b#; 3$Ob 'Q Je
v d; BNC xOB fl Y% d; ANDO; v$Ob 'Q Je
v 1CQ Q LsG Wq; 3.OB % gkR v VB 6!G 1C qO. 6!
! kRN fl kR! kQ g/ 1C qO5 V@OY.
v gkZ! v`OB 6!! kX V.; 7NR v VB V. Je
v 9Ze& 8Y s<OT %COb 'Q <NgW %C \_. L \_& )#i
RA %:)>L <NgW G; %CUOY.
v gkZ! 1COB 6!& OaOb 'Q 6! &b \_
v 8:)! kQ 5r;
– GG F!J! VB sB 5*. L 5*: Je m/G 5r;, Trust
Authority ^Cv W AN<: _G x`| 7k& %CUOY.
– G! kQ 5r; \_
68 G; )#i 68 G8N 9F!- 68& <POT OE* Y% 68& X
qR v V@OY.
|. 6!
9Ze |C [w! kQ c!! gkR v VB /OQ 6!TOY. Y= _ Q
!v& < v V@OY.
BN nO d;; BNO) nOZ!T d;Q Nu; &xR v V@OY.
8y /v
a$; ,bUOY. \N R:NNM $8& TvR Jd! V; ' GB
\v 9Ze! V.; _!OAm R ' LM; gkOJC@.
E} nO d;; E}UOY.
kR NuG /?:; >aUOY.
46 Trust Authority: RA %:)> H;-
V: g/& 8yN O) Nu; kROB fl!B NuL 8b! Gv J
B Q _D! 6!& x9R v V@OY. g/& CRL!- &EN
Ob8 Oi #\w Xg Nu; YC kRR v V@OY.
d;; ;E R!I8N T
;E !IQ Nu; ;E R!I8N /fUOY.
d;; ;E !I8N T
;E R!IQ Nu; ;E !I8N /fUOY.
gk !IQ 6! x=
gkZ! nO 5^N!- 9Ze& < v VB GQ8 .m V=; *8
@OY.
Nu kR g/
Nu; kRR 'B kR g/& 1CX_8 UOY. Y=: Nu; kRR ' 1
CR v VB /?Q g/iTOY.
9ZeG <NgW; %COm 3. S:; < ' kR g/ S:!B Y= * _
O*! wTI v5 V@OY.
CA 0! UsJ
Nu b|G 0! UsGz@OY.
NuL k<J
gkZ! u Nu; .m V8GN Xg NuL JdOv J@OY.
g/ x=
gkZ! g/& &xOv Jm kR& d;_@OY.
x! k5! u Ls /?Ov J=
Nu R/Z! u Ls x!G k5& 'Q Nu; JdN Ov J@OY.
gkZ !T /f
gkZ! u Ls Nu; JdN _x !TG; .m Vv J@OY.
gkZ 0! UsJ
gkZG 3Nk 0! UsGz@OY.
&5e |6gW 47
V: Y= g/B kR 6!! v$gWL }b5O UOY.
Nu 8y
Nu; kROb8YB q0:-Ob 'Q kR 6!& /fUOY. CRL
! vOGn VB ?H 8b! Gv JB fl! QX Xg Nu; *_
! 0:-R v V@OY. F!G CRL!- &E& |mOJC@.
CRL!- &E
8y _N Nu! kQ kR 6!& /fUOY.
v NuL 8b! H fl! CRL!- Xg Nu; &EO) CRL; $
.UOY.
v NuL 8b! Gv J: fl!B YC 0:-KOY.
<NgW G
<NgW G!-B 68M O!OB 9Zei!- gkZ! 1CQ 9ZeG <N
gW; < v V@OY. G!B Y= bIL wTGn V@OY.
v 8AB <NgWG /|; 1COb 'Q qO. L qO!B WqG 6! w:
d.M Xg Wq! SOB )/ S: WlL wTKOY. 53 dLvG :<N
gW Wl;!-B L Wli! kX 3mUOY.
v gkZ! 1CQ <NgWG /|; %COB %
– S:; %COB fl " `!B S:z W *L wTKOY. nO d;;
BNR 'B ON *; w%L.R v V@OY.
– 6! w:d.& %COB fl " `: Wq! kX kXx 6!& *8@
OY.
– -G *; bX8N `; $DR v V@OY.
– -G )b& 6$O) W Jq& /fR v V@OY.
v xOB fl NuG /? b#; 3$Ob 'Q Je
v d;; BNR ' xOB fl Y% d; ANDO; v$Ob 'Q Je
v gkR v VB 6!G 1C qO. 6!! kRN fl kR! kQ g/ 1C
qO5 V@OY.
v gkZ! v`OB 6!! kX V.; 7NR v VB V. Je
48 Trust Authority: RA %:)> H;-
v -i; ;EOb 'Q <NgW -i ;E \_
v gkZ! 1COB 6!& OaOb 'Q 6! &b \_
v 8:)! kQ 5r;
– GG F!J! VB sB 5*. L 5*: Je m/G 5r;, Trust
Authority ^Cv W AN<: _G x`| 7k& %CUOY.
– G! kQ 5r; \_
68 G; )#i 68 G8N 9F!- 68& <POT OE* Y% 68& X
qR v V@OY. az G; )#i az G8N 9F!- 68 azM |CH [
w; hSR v V@OY.
6! w:d. L%.
az GG 68 az %M <NgW GG 6! w:d. %B /gQ -; .m
V@OY. d; sB -: nO d;! kQ RA 6!& 3mUOY. Oa sB
-: d;! kQ 3. sB& 3mUOY.
v az GG 68 az %B 68 azG " Wq! kQ vg sB& %CUO
Y.
v <NgW G! VB 6! w:d. %G -: %CGB WqG vg sBS8
FOs L|G " sB5 %CUOY.
d; W NuG S:
Y= S:i: d; S:8N PyKOY. ON S:G *: /fR v V@OY.
qnO: AN<: /v
nO AN<: _! 6wL &xOB *. NuG kR g/B L S:!
- gkR v V@OY.
Z] um- 8b OZ
NuG 8b 9$ /%.
Z] um- ;E !I sB
NuG ;E !I )N& *8@OY.
&5e |6gW 49
Z] um- UUID
%LM#L: 9Ze! vN; &xOb 'X }:GB Vd 0N |k m
/ D0Z.
@y Ze
_}Q @yG /|; *8;B ;N Ze. L JeM @y b3 JeB
?OQ @y! kX 3mUOY.
@y b3
RA %:)> d;; 3.OB ?H @y! _}Q Trust AuthorityG A
N<: GB b8 dR.
L' E;ZG L'. k3B E;ZG L'; *8;v8 _# L'L* _#
L' S.[Z! *! wTI v5 V@OY.
Oa sB
d;! kQ 3. sB. 6! w:d.! L sB& %CUOY. 53 dL
vG :nO d;G sB;!-B " sB *; 3mUOY.
: E;ZG :.
L| d; ID
NuL ;EH fl L|G nO d;! kX }:H ID& *8;B N
ZyH .Z-.
nO 5^N
NuG 8/Z!T H|Q Zx; &xOB nO 5^N.
d; ID
nO d;! kX }:H ID& *8;B NZyH .Z-.
d; ANDO L'
nO d;G 3.& 'Q &n. L ANDO!B Nu! kQ [C..!
wTGn V@OY. L ANDOG *: ANDOz sLR fl gkZ!
v$Q b8 gW! l1UOY. 51 dLvG :&xH Nu /|;!-B
" d; ANDOz ,|H NuG /!! kX 3mUOY.
V: 9Ze! kQ S:; < ' N 3G d; ANDOL *-GB M;
< v5 V@OY. d; S:: O*G ANDO; *-Om b; S
50 Trust Authority: RA %:)> H;-
:: Y% ANDO; *-R v V@OY. LM: RA |.Z! z
EG n2 C!! d; ANDO; +CQ {L V=; GLUOY. d
; S:G ANDO: nO d;G Y% S:z T2 m$Gz@OY.
b; S:G ANDO: vg d; ANDOTOY.
d; sB
nO d;G sB. 6! w:d.! L sB& %CUOY. 53 dLvG
:nO d;G sB;!-B " sB *; 3mUOY.
d; /v
nO AN<: _! d;Z! &xQ *.
Nu .e
.e: L'=* VG |BN Nu! _!Gg Nu! kX %CGB S:! SR
v5 V@OY. Y=G Nu .e: 8H @kANW%; gkOAB 3NG Nu
; 'X vkR v V@OY.
v b; &`
v 0 k5
v L' &`
v 3Nk 0 gk b#
v V< 3< L'
&xH Nu /|
Trust Authority C:[: vxGB Nu |V W ANd]! kQ )/ Nu /
|; &xUOY. /f gW!B Y% /? b#L wTKOY. NuG L': X
g NuG /? b#z 0G Vd k5& KAVB %Cb *R; UOY. )/ b
I! kQ 3m; 8Ai kn}; |mOJC@.
CA s# Nu
Nu; 8/OB CA! Nu; _`Q CA! GX EZGB Nu; !z
v V5O UOY. L Nu: pvP -m W NN @b& &xUOY.
&5e |6gW 51
1b W 2b 8b %LM O#-
8/Z! %LM& O#-R v V5O UOY. L Nu: Y% q{8N
gkGv J@OY.
1b W 2b E-mail 8#
8/Z! S/MIME(Secure Multi-Purpose Internet Mail Exchange)A
Nd]; gkR v VT UOY. L ANd]: |Z lm GB b8
MIME @j'.& 8#UOY. b3G Nu, ^Cv +a:, _E NN @
b W bP:; &xUOY. V> gkZ! kQ O]{N 1CTOY.
1b W 2b 8b IPSec
NM] ANd] P68N NM] s! |[GB %LMG +a: W b
P:; 8eUOY. IPSec Nu: gkZ 8YB %LM& 'Q MLg,
>> slM! v$KOY.
1b W 2b 8b 0 O#- |k
8/Z! 0& O#-R v V5O UOY. L Nu: Y% q{8N g
kGv J@OY.
1b W 2b 8b NN @b
^CvG _E NN @b* vE NN @b& fvOb 'X ^Cv O#
- W pvP -m bI; &xUOY.
1b W 2b 8b -m |k
8/Z! DO; pvP fD8N -mR v VT UOY. L Nu: Y
% q{8N gkGv J@OY.
1b W 2b % ,sLp. Nu
% jslz! ,sLp. Nu SSL <G! |)R v VT UOY. L
Nu; kX jslz gkZB /$ 8H % gL.! W<:R v V@
OY. Nu: pvP -m, NN @b W 0 O#-& &xOg, V> g
kZ! kQ O]{N 1CTOY.
1b W 2b % -v Nu
-v! -v Nu SSL <G! |)R v VT UOY. L Nu: pvP
-m W 0 O#-& &xUOY.
52 Trust Authority: RA %:)> H;-
Y% ):!& 'X g|nOOB nOZ* gw: {UQ Nu /|; d;R v
V@OY. d; ANDO; v$R 'B Nu /|G O*! kQ [C..! w
TKOY.
V: gkZ! 8B qO: L qOz O!Ov J; v5 V@OY. 6w! {s
-B L' GB Ivn &x Wqnv /f_; v Vb '.TOY. gkZ
! 8B qO: GQ nO 5^N! kQ gkZG GQ! {s ^s}OY.
<NgW Wl
<NgW G!- %C Je& gkO) 8AB S:G Wl; 1CR v V@O
Y. RA %:)>G pg <NgW; < v VB M: FUOY. ON S:: Q
LsG Wl! *83OY. gkZ! < v VB <NgWG >yB Y=z 0@
OY.
b; S:
%LM#L: 9ZeM ;z{8N ,|H S:.
d; S:
nO d;; 3mOB S:.
3. S:
gkZG qnO: $%! {% 3.& 3mOB S:. L S:!B kR
g/ S:L wTKOY. S: *: 8yGE* GB 9xC0b 'X CRL
!- &EH Nu; D0OB %! 5r; ]OY.
6! w:d.
d; GB OaH d;! kX kXx pg 6!G %.
nO d;G sB
pg sBB 6! w:d.G L%.TOY.
d; sB!B Y=L wTKOY.
BNJ nO d;L BNGz@OY.
OaJ RA GB RA |.Z! nO d;; BNOE* E}_@OY. BNH d
;G fl!B NuL gkZ!T |^Gz@OY.
&5e |6gW 53
V: LM: nO d;! kQ V> d; sBTOY. OaH d;G Oa
sBB d;! 5b; L!B DS 6!M L%.& |6UOY. 9&
in, NuL ;EGE* kRGB fl Oa sBB Xg gW; *
8;v8 d; sBB )|w OaJTOY.
8y _
nO d;L KdGz; v Vv8 Fw BN GB EN& bY.m V@
OY.
"v nO d;L "vGz@OY.
E} nO d;L E}Gz@OY. NuL _`Gv JR@OY.
Oa sB!B Y=L wTKOY.
|^ gkZ! LkR v VB % dLvN NuL |^Gz@OY.
.$ |^
gkZ! Nu; % jslzN YnNeO4@OY.
_` nO d;L BNGm NuL _`Gz@OY.
L_` NuL Fw _`Gv JR@OY. L sBB d;! kX 6!! kX3
Bv )N& *8;v J@OY.
;EJ 9ZeM ,|H Nu! ;EGn az{8N u 9ZeM ET NuL }
:KOY.
kRJ 9ZeM ,|H NuL kRGn Z] um-! +?UOY.
G 5r;
RA %:)>: pg G! xk{N Y= 5r;; &xUOY.
sB 5*
GG F! J! VB L 5*: Y=; %CUOY.
Je m/ 5r;
6l:& Je '! u8i Xg Je! kQ 5r;L %CKO
Y.
54 Trust Authority: RA %:)> H;-
Trust Authority ^Cv
^Cv! fmNv @yNv& *8;B FL\z T2 -iL?
!IQ X:. sZ! %CKOY.
x`| 7k
gkZ! d;Q AN<:G x`|; 8) ]OY.
5r; \_
L \_& -/ gk _N G! kQ 5r;; %CR v V@OY.
V: gkZ! %COB 5r;!B nO GQ %:)> H;-! kQ q
w5 wTKOY. qw!- Xg Wq; )#i L %! in VB S
GG V&& %CR v V@OY.
|C V&
18 dLvG :G # L?;
Internet Explorer k JVM
Internet ExplorerM T2 gkOb 'Q RA %:)>; 3!Ob |! Java !
s bh(JVM)G Y= 1.:& .m Vn_ UOY.
v 1.: 5.00, te 3167 Ls
.m VB MS JVMG v|; G0OAi Y= _ O*& v`OJC@.
v Internet Explorer!- Java \V; )JC@.
v DOS mI`; -m jview& TBOJC@.
8mGB v| x#B 5.00.3167LsLn_ UOY.
gk _N JVM; wW9LeX_ OB fl!B Javak Microsoft bz % d
Lv!- JdQ 1.:& YnNeR v V@OY.
&5e |6gW 55
6l:G 08e k<
6l: xL RA %:)>; gkX_ OB fl!B Y= %& |6OJC@.
?-/J! '! 0 6[
O]
C#>a D! <G gC[ F5 0
RA %:)>; >aUOY. Ctrl-x
vg %CH G! kQ 5r;; >OY. F1 0
G H!-G [w
kNPG Je!- G 9LmN L?UOY. Ctrl-'J -l%
G Y% G 9Lm; 1COm Xg G; %
CUOY.
@%J -l%B Y= G8N L?C
5OY. ^J -l%B L| G8N
L?C5OY.
G H!- -iL?UOY. PgDn 0B F!J8N -iL?UO
Y. PgUp 0B 'J8N -i L?
UOY.
Je H!-G [w
kNPG Je!- Y= JeN L?UOY. Tab
kNPG Je!- L| JeN L?UOY. Shift-Tab
% GB X:. 5*!- Y= JeN L?U
OY.
Ctrl-Tab
% GB X:. 5*!- L| JeN L?U
OY.
Ctrl-Shift-Tab
56 Trust Authority: RA %:)> H;-
?-/J! '! 0 6[
% H!-G [w
- * bX8N `; $DUOY. Alt-n. )b!- n: %CGB -G
vNTOY. 9& in, N x0 -;
bX8N $DOAi Alt-2& )(O
Y.
- )b& 6$UOY. 6l: xLB R!IUOY.
`!- `8N L?Om `; 1CUOY. F!J -l%B Q ` F!N L?
UOY. 'J -l%B Q ` 'N L
?UOY.
`G |'& 1CUOY. Shift-'J -l%* Shift-F!J -
l%! |'!- " `; 1CUOY.
N"Ov J: `; 1CUOY. 6l: xLB R!IUOY.
` ;G ?!- ?N L?UOY. Tab 0B Q ? @%J8N L?UO
Y. Shift-Tab 0B Q ? ^J8N
L?UOY.
m} !IQ fl vg ?; m}UOY. F2 0B m}R ?; 1OY. Enter
0B /fgW; .`Om ?!- *
)OY. Esc 0B /fgW; .`O
v Jm ?!- *)OY.
qOG Wq! kQ [w
qO; 1OY. 'J -l% GB F!J -l%.
WqG qO; L?UOY. F!J -l%B F!N L?UOY.
'J -l%B 'N L?UOY.
qO!- Wq; 1COm qO; ]@OY. Enter 0
1CgW; /fOv Jm qO; ]@OY. Esc 0
>a D Y= JeN L?UOY. Tab
&5e |6gW 57
?-/J! '! 0 6[
sp@ \_ <.! kQ [w(<.B O*G JeN #VJ)
sp@ \_ gL& L?Om W _ O*&
1CUOY.
F!J -l%B F!N L?UOY.
'J -l%B 'N L?UOY.
Je& >aUOY. Tab
/% 3$
/% Je ;!- ?-& L?UOY. @%J -l%B @%J8N L?UO
Y. ^J -l%B ^J8N L?UO
Y.
/% Je!- ^B; 1OY. 'J -l% GB F!J -l%
^BG ,5& /fUOY. Ctrl-PgDn 0& )#i 1b U8N
L?UOY. Ctrl-PgUp 0& )#i
1b ZN L?UOY.
^BG y; /fUOY. PgDn 0& )#i Q ^ U8N L
?UOY. PgUp 0& )#i Q ^
ZN L?UOY.
^B!- Xg yG 3= GB ! NP8N
/fUOY.
Home 0& )#i yG 3=8N L
?UOY. End 0& )#i yG !
8N L?UOY.
^BG V& /fUOY. F!J -l%B Q V F!N L?
UOY. 'J -l%B Q V 'N L
?UOY.
^B!- /; /fUOY. @%J -l%B Og @%J8N L
?UOY. ^J -l%B Og ^J8
N L?UOY.
^B!- @C /%N L?UOY. Ctrl-Home
-6%CH /%& 1CUOY. Enter
/%& 1COv Jm ^B; ]@OY. Esc
mI \_! kQ [w
mI \_N L?UOY. Tab
mI; G`UOY. xi 0 GB Enter 0
58 Trust Authority: RA %:)> H;-
VGgW
L %G $8B L9!- &xGB &0 W -q:& 'Q MTOY. Y% *s!
-B L %! p^H &0, -q: GB bIiL &xGv J; v5 V@OY.
vg Xg v*!- gkL !IQ &0 W -q:! kQ $8B IBM 5wk%
!T .GOJC@. IBM &0, ANW% GB -q:& p^_Ym X- Xg IBM
&0, ANW% GB -q:8 gkR v VYB GLB FUOY. IBMG v{ g
jG; 'XOv JB Q bIs ?nQ Y% &0, ANW% GB -q:& kE
gkR v V@OY. W/*, IBMg L\G &0, ANW% GB -q:& gk
R ' W [?; r! W KuOB M: gkZG %STOY.
IBM: L %!- mGGB V&! kX /c& .m VE* vg bx_O v V
@OY. L %; &xOB ML /c! kQ gkG; N)OB M: FUOY. g
kG! |X-B -i; kX F! VRN .GOG v V@OY.
150-010
-o/0C 5nw8 )G5? 25-11, Qxty
Q9 FL.q.% VD8g
v{gjGN
2YL.(DBCS) $8! kQ gkG! |X-B Xg v*G IBM v{gjGN
N .GOE* -i; kX F! VRN .GOJC@.
IBM World Trade Asia Corporation Licensing
2-31 Roppongi 3-chome, Minato-ku
Tokyo 106, Japan
Y= ;k: 59 W Xg v* }T! O!Ov JB 9!!B {kGv J@O
Y. IBM: n0Q >yG mC{ GB OC{ 8u xL L %; :vskN; &
xUOY. )b!B /$ q{zG {U: GB GE !I:, q'X n! kQ O
C{ 8uL wTG* L! 9QGB M: FUOY. ON 9!!-B /$ E!
! Vn- mC{ GB OC{ 8uG wb! ckGv J; v5 V@OY. {s
- L ;kL gkZ!T {kGv J; v5 V@OY.
© Copyright IBM Corp. 1999b 59
L %!B bzsG N$.:L* bGsG @y! V; v V@OY. L %G $
8B $b{8N /fGg, /fgW: 3$G! kUKOY. IBM: g| kv x
L p&s5 L %!- 3mOB &0 W ANW%; /fOE* 31R v V@
OY.
L %!- |6Q IBM L\G % gL.B \v mG& 'X &xH MLg X
g % gL.& _5Ob 'Q ML FUOY. Xg % gL.G ZaB ; IBM
&0; 'Q ZaG ON! FOg W/Q % gL.& gkOB M: gkZ ;
NL 1CR .&TOY.
IBM: m4L &xOB $8& m4!T n0Q G+5 N)Ov Jm {}OY
m }"OB fD8N gk GB PhR v V@OY.
(i) 6Z{8N [:H ANW%z(L ANW%; wTO)) b8 ANW% #G $
8 3/, (ii) 3/H $8G s# gk nG q{8N L ANW%! kQ $8&
xOB gkGZB F! VRN .GOCb YxOY.
150-010
-o/0C 5nw8 )G5? 25-11, Qxty
Q9 FL.q.% VD8g
RA.~n gw;N
L/Q $8B gka n; qTX- Xg b# W 6G! {s gkL !IUO
Y.
L %!- 3mOB gkG ANW%z W/Q ANW%; gkR v VB pg
gkG Zai: IBM m4 h`-, IBM 9& ANW% gkG h`- GB L
M ?nQ h`6GO!- IBM! GX &xKOY.
)b! wTH :I ZaB &nH /fO!- x$Gz@OY. W/GN b8 n
5 /f!- r: azM )T Y& v V@OY. ON x$*: 3_ \h C:
[!- r: MO v V8g, L/Q x$*L O]{8N gkR v VB C:[
!-5 0; MLsm 8eR v x@OY. S8 FOs, ON x$!B _$; k
X r: MLGN G& *z Y& v V@OY. L %G gkZB /$ /f! X
gGB Za& .NX_ UOY.
60 Trust Authority: RA %:)> H;-
IBM &0 L\G M! |Q $8B Xg &0G &6w< W b#0, W\ gk
!IQ xD R:& kX 8Q MTOY. IBM: IBM &0L FQ Mz |CH
R8gWL* :I W #/: .&! kX-B 8eOv J8g WM 0: &0:
W:.Ov JR@OY. IBM &0L FQ &0G :I! kQ .GB Xg &6
w<N OJC@.
IBMG bD fbL* G5! |Q xmB g| kv xL /fGE* 68I v
V8g LB \v q{L* q%& &COB M! v*v J@OY.
%CH pg IBM &0G !]: IBMG Ge RqZ !]LZ C<Lg g| k
v xL /fI v V@OY. E! !]: YgR v V@OY.
s% W -q: s%
Y=: L9 GB b8 9!! nOH IBMgG s%TOY.
IBM
AIX
AIX/6000
DB2
DB2 Universal Database
SecureWay
WebSphere
Trust Authority ANW%(″ANW%″)!B DB2 Universal DatabaseG ON! w
TGn V@OY. ANW% gkG; .m, ANW%L gk GB }:OB %LM
G ze W |.k8N gkOB fl!8 L 8:dRi; 3! W gkR GQ
L V@OY. 9& in, 68 GB 8m- }:; 'X Y% @kANW%G %
LM#L:N ;N ,aOB M: gkG! wTGv J@OY. ANW%L 3!H
Mz ?OQ bh!- L ANW%z T2 gkOB fl!8 L 8:dRi; 3
! W gkR GQL V@OY.
ANW%!B IBM WebSphere Application ServerW IBM HTTP Web
Server(″IBM -v″)G ON! wTGn V@OY. ANW%! kQ gkG; .
m VB fl! FOi IBM -v& 3!OE* gkR GQL x@OY. IBM -
VGgW 61
vB ANW%L 3!H Mz ?OQ bh! sVX_ Og IBM -v& ANW
%z 05N 3!OE* gkR GQ: N)Gv J@OY.
Java W pg Java b] s% W NmB L9 W b8 9!! nOH Sun
Microsystems,Inc.G s%TOY.
Microsoft, Windows, Windows NTW Windows NmB L9 W b8 9!!
nOH Microsoft CorporationG s%TOY.
UNIXB X/Open Company Limited.& kX 6!{8N gkGL N)GB L
9 W b8 9!!-G nOs%TOY.
Pentium: L9 W b8 9!! nOH Intel CorporationG s%TOY.
L ANW%!B RSA Data Security, Inc.NNM &x^: 8H R
A.~n! wTGn V@OY. Copyright © 1994 RSA Data Security, Inc. All
rights reserved.
L ANW%!B Hewlett-Packard CompanyNNM &x^: STL(%X [C..
sLj/.)L wTGn V@OY. Copyright (c) 1994.
v gkZB IBM! qk; vROv Jm L RA.~nM H;-& n2 q{8
Ng gk, 9g, v$, hw GB GER v V@OY. \, 'G z[G $8&
pg 9g;! mCX_ Og, &xOB H;-! 'G z[G $8M L c!
$8& pN mCX_ UOY. Hewlett-Packard CompanyB L RA.~nG
SG q{zG {U:; 8uOv J8g, mC{ GB OC{ 8u xL ″vs
kN″ &xUOY.
L ANW%!B Silicon Graphics Computer Systems, Inc.8NNM &x ^:
STL(%X [C.. sLj/.) RA.~n! wTGn V@OY. Copyright (c)
1996–1999.
v gkZB IBM! qk; vROv Jm L RA.~nM H;-& n2 q{8
Ng gk, 9g, v$, hw GB GER v V@OY. \, 'G z[G $8&
pg 9g;! mCX_ Og, &xOB H;-! 'G z[G $8M L c!
62 Trust Authority: RA %:)> H;-
$8& pN mCX_ UOY. Silicon GraphicsB L RA.~nG SG q{
zG {U:; 8uOv J8g, mC{ GB OC{ 8u xL ″vskN″ &
xUOY.
b8 8g, &0 W -q:m: 8g m/G s% GB -q: s%TOY.
VGgW 63
|C $8
Trust Authority &0 H;-B IBM SecureWay Trust AuthorityH;-
CD-ROM! PDF(L? !I .- |D) W HTML |D8N &xGn V@OY.
ON #`0G HTML v|: &0z T2 3!Gg gkZ NMdL:& kX W
<:R v V@OY.
#`0L &[H LD &0L /fGz; v5 V=; VvOJC@. VYG &0
$8 W gkZ! 1CQ pn W |D8N H #`0! W<:OB }! kQ Z
<Q ;k: ReadmeDO; |mOJC@. VE v|G ReadmeDO: Y= V
R! VB IBM SecureWay Trust Authority% gL.G Library dLv!- T
vR v V@OY.
http://www.ibm.com/software/security/trust/library
Trust Authority sLj/.!B Y=G H;-! wTGn V@OY.
3! W G`
L %!-B &0G 3d& &xUOY. &0 d8gW; *-Om 3! }
w& 3mOg " &0 8:dR! gk !IQ BsN 5r;! W<:
OB f}! kQ $8& &xUOY. L %: &0z T2 NbGn h
wKOY.
C:[ |. H;-
L %!B Trust Authority C:[ |.! kQ O]{N $8! wTG
n V@OY. -vG C[ W _v, O# /f, -v 8:dR |., (g
v` W %LM +a: !K G`; 'Q }w! wTGn V@OY.
8: H;-
L %!B 3$ 6}g& gkO) Trust Authority C:[; 8:OB f
}! kQ $8! wTGn V@OY. 6}g& 'Q BsN 5r;; 8
B ?H L H;-G HTML v|! W<:R v V@OY.
nO GQ %:)> H;-
L %!B RA %:)>; gkO) Nu sLA gL, |<! ID N
© Copyright IBM Corp. 1999b 65
u; |.OB f}! kQ $8! wTGn V@OY. %:)>G BsN
5r;; 8B ?H L H;-G HTML v|! W<:R v V@OY.
gkZ H;-
L %!B Nu 9f W |. f}! kQ $8! wTGn V@OY. Trust
Authority jslz nO gD; gkO) Nu; d;, ;E W kRO
b 'Q }w! &xGn V@OY. GQ PKIX Xv Nu; 'X g|n
OOB f}z Trust Authority ,sLp.& gkO) L Nu; |.O
B f}! kX-5 p^Om V@OY. ,sLp.G BsN 5r;; 8
B ?H L H;-G HTML v|! W<:R v V@OY.
Trust Authority % gL.G Library dLv!B Trust AuthorityG 3!, |.
W gk! 5rL GB b8 .-! wTGn V@OY. 9& in, nO AN<
:& gkZ $GOB f}! kQ _! v'; < v V@OY.
66 Trust Authority: RA %:)> H;-
kn}
L kn}: ;.! *@B uNn kn* #
wOv J: knM W `n& $GOm gk
Z! |I Vn R kn& $GOm V@OY.
kn W W $GB Y= Za!- _iQ MT
OY.
v IBM Dictionary of Computing, New York:
McGraw-Hill, 1994.
v American National Standard Dictionary for
Information Systems, ANSI X3.172–1990,
American National Standards Institute
(ANSI), 1990.
v The Answers to Frequently Asked
Questions, Version 3.0, California: RSA
Data Security, Inc., 1998.
!
!s 3Nk W.v)(VPN). |-1L FQ NM]; g
kO) x] ,a; 8`OB 3Nk %LM W.v). g
kZiL |- 8g! FQ NM] -q: &xZ(ISP)&
kX |g{ W.v) Zx! W<:Ob '.! 6w<
!- x] W<: qk; sg NP }`R v V@OY.
VPN: GQ %LM 3/G 8H:; bsC5OY. b8
G f-. bzG fl ^Cv ;k: O#-C3 v V
8* R: W VRB O#-C3 v x@OY. VPN b
z!-B gkZ! |< $8 P6(;k W lu); O#
-Om 86-Q MN ,a; .3R v V@OY.
(g NW. Trust Authority!- (g L%.6Y O*
?G 9Ze& zeOB %LM#L:G WLm.
(g -v. (g ,sLp.NNM (g L%.& vE
Om L& (g NW! bOOB Trust Authority -v.
(g -jC:[. Trust Authority!- 8H |C 6!
! kQ Nk; vxOB -jC:[. ]6 -q: jw
; 'Q xk 0 O# [:}!- _%Q %X <. _
X9.57 %XG GegW; XvUOY.
(g _{. m.{ fN |D8N H %LMN-, L%.
x-& ,aOB %LM. (g _{; kX .#hGL*
Xg 0?G bO; _{R v V@OY.
(g ,sLp.. Trust Authority (g -vN (g L
%.& |[OB C:[G SG ,sLp.. (g ,sL
p.B (g -vN L%.& |[Ob |! (g -vM
G ,a; 3$UOY. ,aL 3$H D ,sLp.B (
g -jC:[ ,sLp. sLj/.& gkO) L%.
& (g -v! |^UOY.
3f| %LM#L: ,a:(ODBC). -N Y% %LM
#L: C:[; W<:Ob 'Q %X.
3f| C:[ s#,a(OSI). ISO!- NuQ D;M
W.v7 %X L'.
3Nk 0. R/Z8 gkR v VB xk/3Nk 0 V
G 0. L 0& kX R/Z! 3Nk .#hG; vEO
E* pvP Nu; v`R v V@OY. 3Nk 0N -
mH %LMB Xg xk 0N8 .NL !IUOY. x
k 0M q3OJC@. GQ xk/3Nk 0 V; |mO
JC@.
TL.~L. q#/ W.v) GB @kANW%L -N
kER v V5O OB bI{ \'.
© Copyright IBM Corp. 1999b 67
f. p:d. W<: ANd](LDAP). p:d. W<
:! gkGB ANd].
xk 0. Y% gkZ! gkR v V5O X VB x
k/3Nk 0 VG 0. .#hG; 0 R/Z!T v$O
E* pvP Nu; .NR v V5O UOY. xk 0N
O#-H %LMB Xg 3Nk 0N8 X6L !IUO
Y. 3Nk 0M q3OJC@. GQ xk/3Nk 0 V;
|mOJC@.
xk 0 O# [:} %X(PKCS). YgQ D;M w<
G k%Ziz T2 RSA ,8R!- 1991b! 3_Q q
x D { N w < # % X . L % X : RSA O # - ,
Diffie-Hellman y`, O# b] O#-, .eH Nu 8
., O#- ^Cv 8., 3Nk 0 $8 8. W.m N
u 8.; 8fUOY.
v PKCS #1: RSA xk 0 O#- C:[; gkT8
Na %LM& O#-OB f}; 3mUOY. pvP
-m W pvP @u! gkOB ML W q{TOY.
v PKCS #7: O#- ^CvG O] |D; v$UOY.
v PKCS #10: Nu d;G %X 8.; v$UOY.
v PKCS #11: :6. +e nG O#- e!& 'Q b
z 63{ ANW!V NMdL:& $GUOY.
v PKCS #12B gkZG 3Nk 0, Nu, b8 qP $
8 n; zeOE* |[Ob 'Q L? !IQ |D
; v$UOY.
xk 0 ON86(PKI). xk 0 O# [:}; b]8
N OB 8H RA.~nG %X. PKIB pvP Nu, N
u b|, nO GQ, Nu |. -q: W Pj p:d.
-q: C:[TOY. LM: NM] sG .#hG! |
CH " skfG Ex W GQ; .NOB % gkKO
Y. L .#hG!B Ex .NL JdQ 6[L ,|I
v V@OY. 9& in &H- T{Z, |Z lm ^C
v [:Z GB ]6 E!& .NOB fl! V@OY.
PKIB xk O#- 0M /?Q 3NL* 6w<!- N
uOB gkZ Nu; [:O) WM 0: 3.& v`U
OY. pvP Nu, Z] um, pvP -m; .NOb '
X gkGB xk O#- 0M NuL wTH BsN p
:d.& &xUOY.
PKIB xk O#- 0& 'Q .N 68 W d;! k
X ESOm ?2{N @d v\; &xUOY. GQ C
:[! kQ ag{N 8H 'h dR& D0Om 8H '
]; 3.Ob 'Q Zx; /v8vUOY. 6v78N
PKIB _dQ qvO: E!! pvP C# RN -q:
& &xUOY.
xk/3Nk 0 V. xk/3Nk 0 V: 0 V O# [
:}G 3d _ ONTOY(0 |. .&!; XaOb '
X DiffieM Hellman! GX 1976b! R3J). W 3d
! {#i " 3NL 0 V; R/Og O*& xk 0,
Y% O*& 3Nk 0N N(OY. 3Nk 0! qPN
/vGB ]i! " 3NG xk 0B x%KOY. [E
ZM vEZ! qP $8& x/R Jd! x@OY. p
g kE!B xk 08 |CGm 3Nk 0B |[GE*
x/GB OL x@OY. 5;L* xN! kqO) ON
kE $NG 8H; 'X u Ls ON kE $N; E
ZR v V5O 8i Jd! x@OY. /OQ d8gW
: xk 0& EZ(Nu) fD8N(9: EZ p:d.N)
gkZM ,|CQ_ QYB MTOY. xk $8& gk
Oi )8gv qP ^Cv& [ER v V@OY. W/
* 3Nk 0N8 ^Cv& O#-R v V8g W ^C
vB h9H vEZG \6 R/TOY. GQ 0 V O#
[:}: 3Nk8N(O#-) S8 FOs Nu(pvP -
m)!5 gkL !IUOY.
xk TL.~L NMdL:(CGI). % dLvM % -
v #G %X $8 |[ f}.
xk %LM 8H F0X3(CDSA). D;M b] 8H
@kANW%G 8H -q: W 8H |.! kQ w}{
"Y}; $GOb 'X 3_H M. D;M C'{L @k
ANW%; 8Y H|OT 8#R v V5O IntelL 3
_Q MTOY.
68 Trust Authority: RA %:)> H;-
xk O#- F0X3(CCA). Vd IBM D;C C'{
!- O# [:}! kQ O|H "Y; !IOT XVB
IBM RA.~n. YgQ ANW!V pnN [:H @k
ANW% RA.~n& vxUOY. @kANW% RA.
~nB DES W RSA O#-& wTO) $|'Q O#
- bI; v`OB CCA -q:& #bR v V@OY.
8P L'(DN). p:d.! zeH %LM WqG m/
L'. DN: p:d. h~ 86!- Q WqG '!& %
CUOY.
8P NZy T"(DER). BER! kQ &`; &xUO
Y. DERB NZy T"L ckOB NZy /| _ \
O*G NZy /|8 1CT8Na [EZG IG pN
& &EUOY.
93 8H b|(NSA). L$NG xD{N 8H \<.
9& kE \<(ITU). $N W 3N \'! |<hG k
E W.v) W -q:& kUOB 9& 6w. kE bz,
T& W %X $8G 15{N x3ZTOY.
9& %X b8(ISO). MN \!- D;M W.v) A
Nd]! L#bnv pg M! kQ %X; 3_ W .
3Ob 'X 8:H 9&{N 6w.
GQN). Zx W<:! kQ c!.
UO Zx '! 3$Z(URL). NM] sG Zx VR
v$; 'Q 3h. URL: ANd], #:. L' GB IP
VR& mCUOY. /$ bhNNM Zx! W<:Ob '
X JdQ w. x#, fN, Zx <NgW5 mCUOY.
bP:. GQL xB skf!TB )3Gv JB /:.
b; NZy T"(BER). ASN.1(_s 8. %b} 1)!
- bzQ %LM NZy \'! kX ISO 8825!- v
$Q T". L T": _s 8.L FQ NZy bz; v
$UOY.
*
;N 86. :06& |mOJC@.
Y
\x lm |[ ANd](SMTP). NM] s!- |Z
lm; |[OB ANd].
ks. v$ GB 1CH %LM R:.
k*{ O# [:}. O#- W X6! 0: 0& gk
OB O# [:}. L 0! 8H:G |GL KOY. 0
! kbGi )8gv ^Cv& X6R v VT KOY.
0! qPN /vGB ?H!8 kEG qPL /vKO
Y. qk*{ O# [:}z q3OJC@.
k*{ 0. O#- W X6! pN gkR v VB 0.
k*{ O# [:}; |mOJC@.
%LM O#- %X(DES). xD %X8N- 1977b L
$N!- $G W BNQ O#- mO O#(cypher). x
!B IBML 3_Q M8N-, x3H LD xP: ,8
z$; ED vgB _ KAvm $|OT gkGm VB
O#- C:[TOY.
DESB k*{ O#- C:[TOY. {s- kE! gk
I fl [EZM vEZ! pN 0: qP 0& ]eC
Km Vn_ UOY. L 0B ^Cv O#- W X6! g
kKOY. GQ O# |D8N Oe p:)! DO; z
eOB nG \O gkZ O#-!5 gkR v V@O
Y. DESB 64q. mO )b& !vg O#- _!B 56
q. 0& gkUOY. x!B Oe~n!- 8vO5O 3
hH MTOY. NISTB xD{N L$N O# %X8N
- 5b6Y gNuL Lgn}OY.
%LM ze5* sLj/.(DL). Nu, CRL, 0, $%
W b8 8H |C @j'.G 58 %LM zeR! W
<:R v V5O OB pb.
kn} 69
5^N. 8H 5^N W nO 5^N; |mOJC@.
nO. Trust Authority!-, NM] s!- gkR Z]
um-& 9fOB AN<:. nO!B NuG d;, ;E
W kR! wTKOY.
nO GQ(RA). nO d;L 3= vEH 'NNM N
uL kRI 'nv 6wG qnO: $%L ]5I v V
5O Ob 'X pvP Nu; |.OB RA.~n.
nO %LM#L:. Nu d; W _`H Nu! kQ $
8& !vm VB M. %LM#L:B nO %LM& z
eOm |< sLA gL,! I# Nu %LMG /fg
W pN& zeUOY. %LM#L:B RA AN<:M b
8 $%; kX, GB RA %:)>; gkOB |.Z!
GX w%L.I v V@OY.
nO 5^N. Zx, $%, W.m /$ Nu nO AN<
:M |CH 8: IGG }U. 5^N L': nO @k
ANW%; G`OB % gkGB URLG O' }UTO
Y.
nO /v. nO S:; |mOJC@.
nO S:. nO gD! wTH nO /v. L *: n
O _! r: $8& ]5UOY. nO S:G *: Z]
um-! /?Q |< C# ?H ?OOT /vKOY.
nO @kANW%. #<< nO(9: jslz, slM, |
Z lm, 8H ,sLp. @kANW% n) W |< s
LA gL, ?HG Nu |.& 'X /v-H v\; &
xOB Trust Authority @kANW% A9Sv).
nO AN<:. Trust Authority!-, gkZM gkZG
xk 0& NuO) .#hG! |)C3 v V5O gk
Z& /?-OB \h. L AN<:B NCL* %; b
]8N R v V8g, gkZ# s#[k; kX Z?-
Om |.R v V@OY.
p:d.. kE(|Z lm GB O#- 3/ n)z |C
H $8& 'Q $* zeRN gkOb 'X mHH h
~{ 86. p:d.B PKI 86! Jv dRN /$ W
q(xk 0, Nu W Nu kR qO n); zeUOY.
p:d. ;G %LMB .. |D8N h~{8N 8:
Gg ..G G 'B g.! XgKOY. 'NB s' 9
' 6w<! 30 9!, $N GB 8g& *8@OY. g
kZ* e!B 8k " ..G .AN %CKOY. .A
! XgOB gkZ, 6w, v*, 9! W e! ""!B
Z<G WqL wTGn V@OY. " Wq: /|-H S
:8N Lgnvg, L S:i: Xg WqL *8;B @
j'.! kQ $8& &xUOY.
p:d.G " Wq: ,|H DN(8P L')z ,aGn
V@OY. LM: G&{8N 8gOB @j'.! m/Q
M8N KAx S:L wTGn VB fl! m/X}O
Y. Y=G 9& DN; ll 8i, 9!(C)B L9, 6w
(O): IBM, 6w \'(OU)B Trust, 8k L'(CN):
CA1N M; < v V@OY.
C=US/O=IBM/OU=Trust/CN=CA1
p:d. -v. Trust Authority! wTH IBM
SecureWayp:d.. L p:d.B LDAP %X; v
xOg DB2& W b]8N gkUOY.
pU. iWsne!- 8:)& 3.OB ANW%. 5r
;L JdQ 6GL _}R fl +6G #bKOY. k
3B C:[L Z?8N G`C0GN gkZ! pU; N
DR JdB x@OY. pU: 58{8N 8gR v5 V
m C:[L O$ #]; Nm g}:R v5 V@OY.
L kn(pU8N _=)B E-!- *B MTOY. vg
B DAEMON(Disk And Execution MONitor)G `n
N X.Gm V@OY.
pvP -m. [EZG Ex; 8uOB .- GB %L
M! _!H Ze- ^Cv.
pvP -m: G& -m8Y u P: 8H 9'; &x
UOY. W L/B pvP -mL O#-H L' GB \
xQ D0 Ze C.n! FOs, -mGB ^CvG O
#-H d`Lb '.TOY. W/GN ^Cv! pvP -
70 Trust Authority: RA %:)> H;-
m; T8Na [EZG .GQ Ex; &xUOY. ([E
ZG 08 -m; [:R v V@OY.) GQ -mGB ^
CvG ;k; m$R v5 V@OY(O#-H ^Cv d
`: ^Cv ;kz ]eC O!X_ Og O!Ov J;
fl!B -mL +?-KOY). W/GN pvP -m;
Q ^Cv!- 9gO) Y% ^Cv! {kR vB x8
g LB d` GB XC! O!Ov Jb '.TOY. -
mH ^Cv! kQ /fL On/ fl!B Xg -m G
Q +?-KOY.
pvP -m Km.r(DSA). pvP -m %XG ON
N gkGB xk 0 Km.r. O#-!B L Km.r
; gkR v x8g pvP -m!8 gkR v V@O
Y.
pvP Nu. Nu; |mOJC@.
pvP Nu-. EZR v VB & 3Z! 3NL* #<
<! kX _`Q |Z Z] um-. " Nu-B CA 3
Nk 0& gkO) -mL Lgn}OY. 3N, qvO:,
6w<G Ex; 8uUOY.
CA *R! {s-B NuL NM]s!- |Z qvO:
& v`Ob 'Q RvZG GQ; umUOY. n2 G
L!-B pvP Nu-! n| icuL* Gk 9w u
m-M 0: *R; UOY. {s- L pvP Nu-B
Xg 3Nk 0G RvZ! /$ e-business0?; v`
R v VB GQL V=; umUOY.
Nu-!B NuQ #<<! 3NNv bhNv GB D
;M ANW%Nv! |Q $8! in V@OY. o, X
g #<<! NuH xk 0! V@OY.
6
^Cv d`. SG )bG ^Cv& gkOm m$ fL
G g; bBOB kR! R!IQ bI. MD5B ^Cv
d` Km.rG Q 9TOY.
^Cv Nu Ze(MAC). [EZM vEZ gL! x/
GB qP 0. [EZB L& NuOm vEZB KuU
OY. Trust Authority!- MAC 0B CA W (g 8
:dR& 'Q KeyStores! zeKOY.
pb/:. RSA xk 0 O#- C:[!- N 3G +
Rv(pM q)& vX- }:H v(n). RSA pb/:G V
{ )bB 8H d8! {s ^s}OY. pb/:! ,
vO u 9: 8HL Lgn}OY. RSA ,8R!- G
eOB 0 )bB 0G gk! {s Y(OY. o, 3N
kLi 768q., bwkLi 1024q., CAG 0 Vz 0
: FV _dQ 0! kX-B 2048q.TOY. 768q.
0B VRQ 2004bnvB 8HGB M8N 9sKOY.
+a:. C:[!- GQL xB v$; ]vR fl C
:[L %LMG +a:; 8#UOY(GQL xB )3;
]vOB %LMG bP:; 8#OB MzB ]kN).
+a: !K. \N 8:dRMG .#hG; kX }:H
(g 9Ze& !KOB M.
.- O#- 0(DEK). O]{8N, DES nG k*{
O#-/X6 0.
Y
YL.Ze. JavaDDO/! }:Om JavaNMA.M
! G`OB bh 63 Ze.
_`H Nu qO(ICL). _`H Nuz NuG vg s
B! kQ O|Q qO. Nu: OC x#M sB0N v
N-Gn V@OY. L qO: CA! |.Og CA %L
M#L:! zeGn V@OY.
f-.. W.v)#G $8 e'; &QOB W.v)#
TL.~L. 8k \NG GQL xB gk8NNM ;N
W.v)& 8HOb 'X gkKOY.
8H 5^N. ?OQ CA! GX NuH Nu-& R/
Q Wl(8g, [w WlL* @, 30 GB $N \<).
kn} 71
CA! -mQ Nu-& R/Q gkZi: 0: CA! -
mQ Nu-& .m VB Y% gkZG Ex; EZR v
V@OY.
8H RO h~(SSL). V> gkZ!T VkQG um
:; &xOB ;e 8H -q:& !x IETF %X k
E ANd]. pvPN 8HGB kE $N; &xUOY.
SSL gk !I -vB Ws %X HTTP d;L FQ Y
% w.!- SSL ,a d;; BNUOY. SSL: N p
) #G kE; 3$Ob 'Q E# 3/L \ Q x _
}X_ R ' <G; [:UOY. W Y=!B kEL O
#-KOY. ^Cv +a: !K: SSL <GL 8bGb
nv G`KOY.
8H |Z .#hG(SET). EZR v xB W.v) s
!- 8HH Ek+e* v] +e vR; KxOB jw
%X. L %X: NuG _`; d;Ob '.! +e R
vZ, sN, +e _^ :`G Nu; kUC5OY.
NN. 9& in gkZ! [EQ /$ ^Cv* &bQ
/$ d;; NNOB Mz 0L |L FQ M8N EN
OB M.
NN @b. .-G -mZ! .-! -mQ M; W8v
J: M8N ENOv J5O pvP 3Nk 0& gkO
B M.
jslz. % jslz& |mOJC@.
jslz Nu. pvP Nu: ,sLp.x NuLsm
5 UOY. L Nu: SSL gk !IQ % -v& kX
CA! _`UOY. O#-H DOG 0& kX Nu 8/
ZB %LM& O#-Om X6Om -mR v V@OY.
O]{8NB % jslz! L 0i; zeUOY. ON
@kANW%!-B :6. +e* Y% E<! 0& z
eO5O ckOm V@OY. pvP Nu; |mOJC@.
qk*{ O# [:}. O#- W X6; 'X -N Y
% qk*{ 0& gkOB O# [:}. " gkZB Q
VG 0& ^T Gg, L _!- xk 0B pg gkZ
! W<:R v V8g 3Nk 0B gkZ ZE!T8
KA}OY. 8H .#hG: xk 0M L! k@OB 3
Nk 0! O!O) .#hGG X6L !IQ fl!8
Lgn}OY. LM; 0 V O# [:}Lsm5 UOY.
k*{ O# [:}z q3OJC@.
q?b kE. [EZM vEZ! ?C! 8gOv JF
5 GB kE pe.
qP:. GQL xB %LM )3NNMG 8#.
qP: 8# -- ^O(PEM). NM] qP: 8# -
- ^O %X8N-, NM] s!- H|Q |Z lm;
&xOb 'X IAB(Internet Architect Board)! $CQ
%X. PEM ANd]: O#-, Nu, ^Cv +a:, 0
|.& &xUOY.
qnO: AN<: @j'.. /$ nO [w; v`O
B % gkGB Ze <.(9: nO d; sB !K GB
xk 0 vE )N Ku).
qnO: AN<: [C... v$H x-N G`GB q
nO: AN<: @j'.G p=.
g
gkZ Nu. ^CvG x! [:Z& D0Om ^Cv
R/Z& $g-OB /?: Ku AN<:. GQ bkQ
V> gkZ* C:[z kE _Nv5 .NUOY.
gL. Nu. CA Nuz /gOv8 /$ % gL.!
kX-8 /?Q Nu. CA Nu; |mOJC@.
g|nO. Trust Authority!- Q gkZ(k3B |.
Z)! Y% gkZ& nOR v V5O OB AN<:. d
;L BNGi RAB Xg gkZ! LD Trust Authority
,sLp. @kANW%; gkO) Nu; 9fR v V
5O OB $8& &xUOY.
72 Trust Authority: RA %:)> H;-
s# Nu. 3Nk -m 0M ,|H xk 0! in V
B Nu; Q CA! Y% CA!T _`OB EZ p(.
O]{8N s# 8uH Nu; gkOi O*G |. c
g 5^N! wTH ,sLp. C:[L* #e #<<
! Y% 5^N! wTH ,sLp. C:[L* #e #
<<M H|OT kER v V@OY.
-m. -m; }:Ob 'X 3Nk 0! gkOB M.
-m _N ^Cv& gkZ! %Svm BNT; TuO
B v\8N- gkKOY.
-m/Ku. -mQYB M: -m; }:Ob 'X 3N
k pvP 0& gkOB MTOY. KuQYB M: -
m; KuOb 'X k@OB xk 0& gkOB MTO
Y.
-v. (1) W.v)!- DO -v nG Y% :WLG
8N bI; &xOB %LM :WLG. (2) TCP/IP!-
,sLp./-vN N#B Y% gL.! VB C:[G
d;; 3.OB W.v) ;G C:[.
-v Nu. % -v! SSLk .#hG; 3.R v V
5O CA! _`Q pvP Nu. SSL ANd]; gkO
) jslz! -v! ,aGi -v! jslzN W x
k 0& [EUOY. L/Q z$; kX -vG Ex;
NuR v V@OY. O#-H $8& -v! 8> v5
V@OY. CA Nu, pvP Nu W jslz Nu; |
mOJC@.
-m4. Javagk !I -v! _! bI; &xOB -
vx ANW%.
:6. +e. gkZG pvP 0& zeOb 'X gk
GB 8k Ek+e )bG Oe~nG O>. :6. +
e!B O# 8HL !IUOY.
:06. p:d.M |CH M8N-, -N Y% @j'
. /|#G |h& $GOB ;N 86.
EZ 5^N. ?OQ CA! GX NuH Nu-& R/
OB #<<iG }U.
EZ p(. Nu GQL Y% Nu GQ; umOB f
}; &nOB 86{N T".
EZ D;M b](TCB). 6wG D;M 8H $%; }
U{8N G`OB RA.~n W Oe~n dR. 8H $
% Gv! 5b; L!B dR GB dR NP: 8Hz
|CH M8N- TCBG ONTOY. TCBB 8H fh
N &QGB @j'.TOY. 8H $%; G`OB ^?
Or: s4 xLO|X_ Og, GQL xB C:[ /
G! kQ W<: GQ; rv xO5O X_ UOY.
F
O# [:}. D;M 8H! Vn- O] X:.G O#
- W O#- X:.G X6; 'Q x", GL, f} n.
O# X6(decrypt). O#- AN<:& G`kROB M.
O#-. (1) {gQ X6 Ze& !x gw8L X6;
kX x! $8& r; v V5O $8& Z/B M. (2)
W GL& {bb 'Q %LM //z |CH M.
O#-/X6. 9$H vEZG xk 0& gkO) W g
w; 'X %LM& O#-Q D %LM X6! xk 0
M V; LgB 3Nk 0& gkOB M.
VC4. JavapnN bOGm Java#/ % jslz!
- G`GB D;M ANW%. JavaVC4Lsm5 UO
Y.
W<: &n qO(ACL). /$ ZxG gk; GQL V
B gkZ!TN &QOb 'Q ^?Or.
":.s]. /gQ bz; gkOB NM]G D}0. 9
: 8giL m4, D.J, ;N :G n )/ }\! k
X % x3, |ZsE!, ^Cv |[, Wl~n& {kO
m V@OY.
kn} 73
#e #<<. CA! FQ NuG V<.
@j'.. 4< vb 3h* ANW!V! Vn- _s
86- %LM W W %LMM ,|H 6[. ,!:& |
mOJC@.
@j'. D0Z(OID). ASN.1(_s 8. %b} 1)!
- $GQ /|8N- |. q{8N v$H %LM *.
@j'. /|. p:d.! zeC3 v VB @j'.
>y. 9& in N-, 8GG, e!, 3N, ANW% GB
AN<: n.
d; ID. RA! kQ Nu d;; m/OT D0OB
24-323G .ZN H ASCII *. L *: Nu d; .
#hG! gkGn d;G sB GB WM |CH Nu;
KvR v V@OY.
ye MLe %(WWW). OL[Lpn %LM& !x D
;M#! W.v) ,aL .3H NM] NP. L %L
MiL $8& &xOg WWW W NM]G Y% %L
M! kQ 5)& &xR v V@OY. WWW Zx: %
jslz ANW%; kX W<:KOY.
% jslz. %:)> PC!- G`Gn gkZ! ye
MLe % GB NC HTML dLv& #F< v V5O
XVB ,sLp. RA.~n. %z NM]!- gkL
!IQ + OL[Lpn %LM }U! kQ xkG W<
:& &xOB Kv 58TOY. n2 jslzB X:.
M W!H; pN %CR v VB ]i, n2 jslzB
X:.8 %CR v V@OY. kNPG jslz! FTP
.#hGz 0: Vd NM] kE |D; 3.UOY.
% -v. jslz ANW%8NNMG $8 Zx d;
! @dOB -v ANW%. -v& |mOJC@.
/OZe. ISO 10646!- $GQ 16q. .Z <.. /
OZe .Z NZy %X: $8 3.! gkGB 9& .
Z ZeTOY. /OZe %X: |<hG _dQ :)3
.& wTOg, RA.~nG 9&- W v*-& 'Q b
J& &xUOY. Java ANW!V /fG pg R: Z
eB /OZeN bOKOY.
/|. @j'. /|; |mOJC@.
N:O:. DB2! Vn- N:O:B %LM& zeOm
@kANW%; v`Ob 'Q m.{ %LM#L: |.
/fTOY. 8: E3/vG xk <.& )/ %LM#
L:! kX $GR v V5O ckUOY.
Nu. (1) 3N, qnO:, 6w<G Ex; 8uUOY.
(2) kE _N skfG Ex; G0OB AN<:.
Nu b|(CA). 6wG 8H $%; XvOm Nu |
DG 8H |Z EP; v$R %SL VB RA.~n.
CAB RANNMG Nu _`, ;E W kR d;; 3
.UOY. CAB RAM s#[kO) Nu W CRL; p
:d.! x%UOY. pvP Nu; |mOJC@.
Nu $%. xk 8H d8gW; !vB /$ ,!:G
@kANW%! kQ NuG {k !I:; v$OB T
"; mCQ }U. 9& in Nu $%: /$ Nu /
|; kX gkZ! Vnx !] |' H!- s0! k
Q .#hG; v`O5O ckR MNv )N& v$R
v V@OY.
Nu kR qO(CRL). Nu b|L kRQ NuG qO
8N- pvP -m W C# RNL {kH qO. L q
OG Nui: ck R!N #VKOY. pvP Nu; |
mOJC@.
Nu ANDO. xOB Nu /|; $GOB /!iG
}U(9: SSL Nu GB IPSec Nu). L ANDO: N
u gg W nO; |.OB % 5rL KOY. _`ZB
ANDOG L'; /fOm xOB NuG /!(9: /?
b#, 0 k5, DN &` n); v$R v V@OY.
Nu .e. Nu! _! Je& wTC3 v V5O O
B X.509v3 Nu |DG 1C{ bI. %X .e W g
kZ $G .eL V@OY. %X .e: 0 W $% $
74 Trust Authority: RA %:)> H;-
8& wTQ YgQ q{, V< W _`Z S:, Nu f
N &` n; 'Q MTOY.
NM]. D;M#! |Z{ ,a; &xOB |<h{N
W.v) }U. NM]: D;MiL |Z lm GB %
jslz nG RA.~n e!& kX -N kER v V
5O X ]OY. O*G W.v)! VB nn kPiL
NM]; 8:O) /gQ Y% W.v)M wJN ,a
OB ML W Q 9TOY.
N.s]. 8k f-. Z! sVOB bw ;G W.v
). NM]G D}0N- WM /gQ bz; gkUOY.
bz{8N N.s]: NM]; `# .eQ M! Rz
UOY. HTML W HTTPB L _!- 8m-H MTO
Y.
O] X:.(plaintext). O#-Gv J: %LM.
cleartextG ?Gn.
Z
Z] um-. Nu 3/C 3NG Ex; .NOb 'X
gkGB bP $8. W.v) D;C /f! Vn- Z
] um-G !e O]{N /|: CA! [: W -m
Q NuTOY.
Z9n vx(NLS). pn, k-, /% W C# |D, }
Z %b& wTO) v*0 /:! {% wL!; &0 ;
!- vxOB M.
|[ &n ANd]/NM] ANd](TCP/IP). LAN W
WAN; 'X kn(peer-to-peer),a: bI; vxOB
kE ANd] <..
$% "C.. nO @kANW%!-, @kANW%L #
bOB 6w $G ANW%. $% "C.! v$H T"
: 6wG qnO: W 8H 1#gW; nO AN<:!
{kUOY.
6! w:d.. Z] um-G sLA gL,!- `{H
L%.G p=.
w
<N /?: .N. Nu; _`Q EZ h~ ;G pg
CA BNG /?: .N. 9& in Q CA! Y% CA
& kX -m Nu; _`Q fl, N -m: pN gk
Z! &COB NuG /?: Ku z$; kX /?-K
OY.
Vm CA. PKI CA h~G G '! VB CA.
_s 8. %b} 1(ASN.1). $8 %LMG 8.; $
GOB % gkGB ITU %b}. )/ !v #\Q %L
M /|; $GOm WM 0: /|G D0 W * v$;
'Q %b}; v$Q MTOY. L %b}: |[C $
8 O#- fDG &Q xL $8G _s{ 8.; $G
X_ R '6Y {kC3 v V@OY.
+
Ze -m. G` ANW%; pvP -m8N -mOb '
Q bz. Ze -m: NM]; kX PjH RA.~n
G EZ5& tLb 'X 3hH MTOY.
,sLp.. (1) -vNNM x/ -q:& vEOB b
I{ \'. (2) Y% D;M* ANW%G -q:& d;
OB D;M* ANW%.
,sLp./-v. Q gL.G ANW%!- Y% gL.
G ANW%8N d;; [EOm @d; bY.B Pj
3.G Q p(. d;OB ANW%; ,sLp., @dO
B ANW%; -vN N(OY.
,!:. 4< vb 3h GB ANW!V!- xk $G
& x/O) xk /:, 6[, [w /:; x/OB @
j'. Wl.
kn} 75
0. $8G O#- W X6; 'X O# [:}! gk
GB g.
0 V. qk*{ O# [:}! gkGB k@ 0. Q 0
B O#-! gkGm Y% 0B X6! gkKOY.
8
MN. VPN bz! Vn- NM]; kX LgnvB d
8 C! !s v!# ,a. ,aH ?H!B x] gkZ
! MN; gkO) bw<G 3Nk W.v)G -vM
8H W O#-H 86- $8& 3/R v V@OY.
.#hG ID. g|nO nO d;! kQ @d8N RA
! &xOB D0Z. Trust Authority ,sLp. @kA
NW%; G`OB gkZ! g| BNH Nu; 9fR
v V5O UOY.
D
DO |[ ANd](FTP). D;M#G DO |[; '
X gkOB NM] ,sLp./-v ANd].
%X |k 6)w pn(SGML). 6)w pn& bzO
B %X. HTML: SGML; b]8N UOY.
ANd]. D;M# kE; 'X y$H T`.
AOC -v. W<:& d;OB D;M(D;M A)M W
<:GB D;M(D;M B) gLG _3Z. W/GN V>
gkZ! A D;MNNM Zx; d;Oi L d;L A
OC -vN v$KOY. AOC -v!-B d;; [:
O) B D;MNNM @d; ^: Y= W @d; V>
gkZ!T L[UOY. AOC -vB f-. ;NNNM
ye MLe % Zx! W<:R ' /kUOY.
O
OL[X:.. gkZ! .-G %C W Kv; 'X 6
l:N )& v VB \n, 8, W!HL wTH X:..
LM 0: \n, 8 GB W!H; OL[5)sm Og
OL[5)& KvOB M; 5)QYm UOY.
OL[X:. 6)w pn(HTML). % dLvG Zy;
'Q 6)w pn. LM: SGML! bJOm V@OY.
OL[X:. .#hG ANd](HTTP). % s!- O
L[X:. DO; |[Ob 'Q NM] ,sLp./-v
ANd].
}Z
3_ DES. O] X:.& < x O#-C0B k*{ K
m.r. L& 'Q 9: f}iL VbB Ov8, !e H
|Q Y_ O#- |D: < 3G -N Y% 0& gk
OB 3_ DESTOY.
4758 PCI O#- ZAN<-. m:IG DES W RSA
O#- 3.& &xOB ANW!VL !IQ /6 ]@
bIG O#- PCI v: +e. O#- AN<:B +e
s! ;eH 8H e!!- v`KOY. +eB FIPS
PUB 140-1 9' 4 %XG v]Q d8gW; XvUO
Y. RA.~nB ;eH 8H e!!- G`KOY. Ek
+e E!B SET %X; gkOB Q 9TOY.
64x NZy. MIME; gkQ 2x %LM& //Ob
'Q O]{N f}.
A
ACL. W<: &n qO.
ANSI. L9 %X ,8R.
ANSI(American National Standards Institute). N
!H 6w<!- [:Q ANC`n& .3Om L9; S
GG jw %X; /v8vOB \<. }jZ, RqZ, O
]{N LM }\8N Lgn}OY.
ASCII. $8 3/; 'Q L9 %X Ze.
76 Trust Authority: RA %:)> H;-
ASCII(American National Standard Code for
Information Interchange). %LM 3. C:[, %L
M kE C:[ W |C eq #G $8 3/! gkG
B %X Ze. ASCII <.B 7q. Ze- .Z(P.<
<)k q.& wTO) 8q.)N Lgnx Ze- .Z
<.& gkOg, .Z <.B &n .Z W W!H .Z
N Lgn}OY.
ASN.1. _s 8. %b} 1.
B
BER. b; NZy T".
C
CA. Nu b|.
CA h~. Trust Authority!-, O*G CA! G ' 8
6! '!Om Vm W 3G >S CA ~L W F!! '
!OB EZ 86. CA& kX nOH gkZ* -vB X
g CA! -mQ Nu; ^T Gg s' vXG Nu h
~; hBUOY.
CA -v. Trust Authority CA(Nu b|) 8:dR&
'Q -v.
CA Nu. gkZG d;C, gk _N % jslz! N
DOv xOB CA!- BNQ Nu. W Y=!B jsl
z! L Nu; gkO) Xg CA! _`Q Nu; 8
/OB -vMG kE; NuUOY.
CAST-64. 64q. mO )bM 6q. 0& gkOB m
O O#(cipher) Km.r. LM: Carlisle AdamsM
Stafford Tavares! GX 3hGz@OY.
CCA. IBM xk O#- F0X3.
CDSA. xk %LM 8H F0X3.
CGI. xk TL.~L NMdL:.
cleartext. O#-Gv J: %LM. O] X:.
(plaintext)G ?Gn.
CRL. Nu kR qO.
CRL _` #]. CA 8: DOG 3$*8N- CRL
; p:d.! x%OB Vb gLG #] C#.
D
DEK. .- O#- 0.
DER. 8P NZy T".
DES. %LM O#- %X.
Diffie-Hellman. _m!(DiffieM Hellman)G L'!-
/!Q L'8N, 8HGv JB E<! kX x/ 0&
.3OB f}.
DL. %LM ze5* sLj/..
DN. 8P L'.
DSA. pvP -m Km.r.
E
e-business. W.v) W D;M& kQ qnO: .#
hG. 00 W -q:G 8T W GE! wTKOY. G
Q pvP kE; kQ Z]G L?L wTKOY.
e-commerce. qnO: # .#hG. NM] s!-G 0
0 W -q:G 8T W GE(-q:, x^Z, GEwZ n
; kQ)! wTKOY. e-businessG b;{N dRTO
Y.
F
FTP. DO |[ ANd].
kn} 77
H
HTML. OL[X:. 6)w pn.
HTTP. OL[X:. .#hG ANd].
HTTP -v. jslz W W.v)G Y% ANW%z
T2 % b] kE; 3.OB -v.
I
ICL. _`H Nu qO.
IETF (Internet Engineering Task Force). NM]k
ANd]G h9 W 3_; _!{8N 3.OB Wl. W
.v) 3hZ, n5Z, }jw<, ,8xG 9&{N }
\; k%UOY. IETFB NM] F0X3G 3_ W N
M]G x0Q gk n; VN YlOY.
IniEditor. Trust Authority!- 8: DO; m}OB
% gkOB 58.
IPSec. IETF!- 3_Q NM] ANd] 8H %X.
IPSecB W.v) h~ ANd]N-, Nu, +a:, W<
: &n W bP:G aU; /?{8N vxOB O#-
8H -q:& &xOb 'X mHH MTOY. -Q N
u bI8N NX L %X: 9: VPN &0 GEwZi
L NM] s!- H|Q v!# ,a; 8`Ob 'Q A
Nd]N- $COm V@OY.
ISO. 9& %X b8.
ITU. 9& kE \<.
J
Java. Sun Microsystemsg!- 3_Q W.v)& N
DOB, C'{ xk D;M bz <.TOY. Java /f
: Java OS,YgQ C'{G !s bh, 4< vb Java
ANW!V pn, )/ ,!:G sLj/.N 8:KOY.
Java !s bh(JVM). YL.ZeG X.; cgOB
Java 18S /fG ON.
Java VC4. VC4; |mOJC@. Java @kANW
%z q3OJC@.
Java pn. VC4z !L|. @kANW%k8N /0
w 3hH Sun Microsystemsg!- 3_Q ANW!V
pn.
Java @kANW%. Java pnN bOH 63{ ANW
%. % jslzG \X:. \N!- G`KOY.
Java ,!:. Java ANW% Ze \'.
K
KeyStore. Trust Authority 8:dR Z] um-(9;
O#-H |DG 0 W Nu)& zeOb 'Q DL.
L
LDAP. f. p:d. W<: ANd].
M
MAC. ^Cv Nu Ze.
MD2. 128q.G ^Cv d` XC Tv(Ron Rivest!
mH). PEM ANd]!- MD5M T2 gkKOY.
MD4. 128q.G ^Cv d` XC Tv(Ron Rivest!
mH). LM: MD28Y n h* u |(OY.
MD5. \fb ^Cv d` XC Tv(Ron Rivest! m
H). MD4! bsH v|TOY. MD5B 512q. mO
G TB X:.& 163G 32q. -jmO8N */OY.
L Km.rG bB: 32q. mO <.N- \O 128q
. XC *; 8:O5O ,aC2 MTOY. GQ PEM
ANd]!- MD2M T2 gkKOY.
78 Trust Authority: RA %:)> H;-
MIME(Multipurpose Internet Mail Extensions). -
N Y% .Z <. pnN H X:.G s# 3/; c
kOB Z/ST gkR v VB :e <.. GQ NM]
lm %X; gkOB 9: vG -N Y% D;M C:
[ #!- V<Lpn |Z lm; ckUOY. 9& i
n |Z lm ^Cv! US-ASCII, 3NQ X:., LL
v, gne& wTC3 v V@OY.
N
NIST. zE NBS(93 %X g+R)N KAx 93 %
X W bz y8. D;M b] jw! Vn- 3f %X
z s#nk:; uxC0B \<TOY.
NLS. Z9n vx.
nonce. gkZ Nu; d;OB -v* @kANW%8
NNM [EGB .Z-. Nu; d;^: gkZ! 3N
k 0& gkO) nonce! -mUOY. gkZG xk 0
M -mH nonce! Nu; d;Q -v* @kANW%
! YC [EKOY. W.m *i -v! gkZG xk
0N -mH nonce& X6OA C5UOY. X6Q nonce
! [EH x! nonceM 08i gkZ! NuKOY.
NSA. 93 8H b|.
O
ODBC. 3f| %LM#L: ,a:.
OSI. 3f| C:[ s#,a.
P
PC +e. :6. +eM /gOg PCMCIA +esm
5 UOY. L +eB :6. +e8Y 6] )m, 8k
u 9: k.; !}OY.
PEM. qP: 8# -- ^O
PKCS. xk 0 O# [:} %X.
PKCS #1. xk 0 O# [:} %X; |mOJC@.
PKCS #10. xk 0 O# [:} %X; |mOJC@.
PKCS #11. xk 0 O# [:} %X; |mOJC@.
PKCS #12. xk 0 O# [:} %X; |mOJC@.
PKCS #7. xk 0 O# [:} %X; |mOJC@.
PKI. xk 0 ON86.
PKIX. X.509v3 b] PKI.
PKIX CMP. PKIX Nu |. ANd].
PKIX Nu |. ANd](CMP). PKIX Xv @kA
NW%zG ,a; !IOT OB ANd]. PKIX
CMP! TCP/IP& Ow |[ ^?Or8N gkOB Q,
RO '!B _s- h~L 8gUOY. LM: _! z
5 |[! kQ vx; !IOT UOY.
PKIX ;kZ. /$ nO 5^NL Trust Authority ,
sLp. @kANW%8NNMG d;; ;kOB% gk
OB xk HTTP -v.
R
RA. nO GQ.
RA |.Z. RA %:)>! W<:O) Nu W Nu
! kQ d;; |.R GQ; N)^: gkZ.
RA %:)>. Z] um- d;; 3.Om Z] um
-! /?Q |< b#! ID L& |.Ob 'Q W!
H NMdL:& RA! &xOB Java VC4.
RA -v. Trust Authority nO GQ 8:dR& 'Q
-v.
kn} 79
RC2. RSA %LM 8H; 'X Ron Rivest! 3hQ
!/ 0 )b mO O#. RCB Ron’s CodeGB Rivest’s
Cipher& *8@OY. DES8Y |#m DESG pTD k
<N- 3hH MTOY. {gQ 0 )b& gkT8Na
DES8Y u H|OE* Rp 0 =v! kX-B z H
|OT 8i v V@OY. 64q.G mO )b& !vg
RA.~n! Vn- DES8Y ` 2-3 h u |(OY.
RC2B DESM 0: peN gkL !IUOY.
RA.~n _%Z y8(SPA)M L$N#G y`!-
RC2 /v sB& &xUOY. LM: ]b BN AN<
:& O]{N O# v$} ]b AN<: 8Y u #\
Om |#T 8in ]OY. W/* |% ]b BNL {
UO5O 8ib 'X-B &0!- RC2 0 )b& 40
q.N ]eC &QCQ_(ON 9\B V8*) UOY. O
#-H + #b WLm; L. hjOAm C5OB 'T
Z& 7b 'X-B _!{N .Z-; gkR v V@O
Y.
RSA. _mZG L'(Rivest, Shamir, Adelman); }
xk 0 O#- Km.r. O#- W pvP -m! gk
KOY.
S
SET. 8H |Z .#hG
SGML. %X |k 6)w pn.
SHA-1(8H XC Km.r). pvP Nu %Xz gk
Ob 'X NIST W NSA!- 3hQ Km.r. L %X
: 8H XC %XLm SHAB %X! gkGB Km.
rTOY. SHAB 160q. XC& }:UOY.
SMTP. \x lm |[ ANd].
SSL. 8H RO h~.
S/MIME. NM]; kX |[GB |Z lmG -m W
O#-& vxOB %X. MIME; |mOJC@.
T
TCP/IP. |[ &n ANd]/NM] ANd].
TP. EZ $%.
Trust Authority. pvP NuG _`, ;E W kR&
vxOB kU IBM SecureWay8H VgG. L Nu:
$|Q NM] @kANW%! gkI v V8g, gkZ
& NuOm EZVB kE; 8eOb 'Q v\; &x
UOY.
U
URL. UO Zx '! 3$Z.
UTF-8. // |D. L |D: 8q. .Z <.8 3.
OB $8 3. C:[L 16q. /OZe& k@OB 8
q.N //Om $8G UG xL L& YC G91 v
V5O UOY.
V
VPN. !s 3Nk W.v).
W
WebSphere Application Server. gkZ! m:I %
gL.& 3_Om |.R v V5O 5MVB IBM &
0. \xQ % x3!- m^ e-business@kANW%!
L # B z $ ; k L O T X ] O Y . WebSphere
Application ServerB % -v W b] n5 <& pN
M 63H Javab] -m4 #x8N Lgn. V@OY.
X
X.500. D;M C:[; s#,aT8Na Yq{ Pj
W 9& p:d. -q:& gkOb 'Q %X. L|!
80 Trust Authority: RA %:)> H;-
B CCITTN KA. Vx 9& kE \<(ITU)M %X
- 9& b8 W 9& |b -P y8(ISO/IEC)!- T
2 $GQ MTOY.
X.509 v| 3 Nu. X.509v3: Nu @kANW% $
8G ze W Kv, Nu Pj $8, Nu kR $8, $
% $8, pvP -m; 'Q $|'Q %LM 86& !
vm V@OY.
X.509v3 AN<:B pg Nu! Vn- C# RN; g
kOB CRL; [:UOY . NuL gkI '6Y
X.509v3 bI: @kANW%L Xg NuG /?:; !
KR v V5O UOY. GQ @kANW%L Xg CRL
! NuL VBv )N& G0R v V5O UOY.
X.509v3 CRL: v$H /? b#! kX [:R v V
@OY. Nu; +?-R v5 VB Y% /f; b]8
N R v5 V@OY. 9& in Q wxL 6w; 0*
B fl Xg Nu: CRL! uLT KOY.
X.509 Nu. N. ^Fi)vm VB Nu %X8N-,
8H |. W 8H NM] W.v) s!-G pvP -
m NuG Ph& vxOb 'X mHH %X. X.509 N
u: EZR v VB & 3Z! pvPN -mQ xk 0
G Ph& 'Q ANC`n& vkOB %LM 86& $
GUOY.
kn} 81
vN
[!]3d
RA |.Z *R 3
Trust Authority 1
;E !I: 24, 36
Kv Q5
3$ 14
IG 45
az G 45
az! kQ dLv )b
3$ 14
IG 45
8P L' 34
[*]/%, v$ 13
[Y]^B 13
%LM#L: 9Ze
Kv &Q 14
KvR Je 41
g| $GH 68 44
S: 33
6!& 'Q 1C 20
68 12
dLvg v 3$ 14
RA! GQ3. 3
5^N, nO 32
5| @d 7, 9
nO 31
qnO: $% {k 31
% jslz vx 30
Z?- 3, 31
nO 31 (hS)
$% 32
6! 46
8:), RA |.Z 3
Jd 3
nO GQ 31
nO %LM#L: 3, 31
nO 5^N 7, 10, 32, 38
nO 9Ze 33
Kv &Q 14
KvR Je 41
g| $GH 68 44
S: 33
6!& 'Q 1C 20
68 12
dLvg v 3$ 14
RA! GQ3. 3
nO S: 49
nO d;
KvR Je 41
%LM#L: 9Ze 33
nO gD 29
8y 13
g|nO 29
sB 53
d; sB !K 9
% jslz vx 30
Z? r! 31
6! w:d. 49
r! 31
RA |.ZG 7
RA! GQ 3. 3, 20
nO d; sLA gL, 33
nO % dLv
gk 29
nO % dLv (hS)
gk; 'Q CA Nu 7, 35
W<: 6
p:d. W<: 34
[s]9Ze, 1C 20
[6]qO G
dLv 8b 16
dLvg 9Ze v 14
[Y]f} V& 5
8y, Nu 25, 47
8H @kANW% 3
9v |.Z 38
jslz 6
g|nO C*.@ 29
Xq 5, 6
vx 30
URL 6
jslz Nu 7, 10, 35
jslz vx 30
qnO: AN<: /v 22
[g]g|nO 29
8:)& 'Q C*.@ 29
sB
* 53
8b 17
© Copyright IBM Corp. 1999b 83
sB (hS)
vg 41, 53
sB 5* 54
s# Nu 33
-v Nu 36
3!, RA %:)> 6
<NgW G 48
S:, %LM#L: 9Ze 33
S:, Nu W d;
* /f 22
/f 17
8b 17
qnO: AN<: /v 22
d; W Nu 49
Nu .e 51
UsH 0 47
[F]W<: &n qO 37
- *
S: % 48, 49
6! w:d. % 48, 49
68 az % 45
- %&
S: % 17
6! w:d. % 18
68 az % 15
d; S: 49
d; ANDO 23, 38
d; ID 7, 9
% jslz 6
g|nO C*.@ 29
Xq 5, 6
vx 30
URL 6
% jslz vx 29, 30
% dLv, nO
gk 29
gk; 'Q CA Nu 7, 35
W<: 6
/? b# 22, 38, 51
Nu 33, 34, 38
;E !I 36
;E !I: 24, 36
h~ 33
8P L' 34
%LM#L: 9Ze 31
nO -q: gk k5 7, 35
8b 13
|V 34
8y 25
jslz! kQ d; 7
sB 53
s# Nu 33
<NgW 48
d; 3
d; 8y 13
/| 51
/? b# 22
&C 10
6! w:d. 18, 49
x` |. 37
CRL!- &E 26
RA %:)> G`k 7
Nu b| 33
Nu sLA gL, 33, 36
Nu q{ 51
Nu S: 17, 49
Nu /| 51
Nu kR qO 34
Nu .e 36, 51
NuG 8b 13, 22
[Z]e! Nu 36
|Z lm kv 7
$8 V& 29
6! w:d.
8b 18
L%. 49
6! w:d. (hS)
%G - 48
68
3$ 15
;E !I:0 43
8bGB Nu 13
g| $G 44
sB0 41
d; 8y 13
&b 12
Xq 12
vx -m4 38
AN<: _ Gei 15
Je 41
68 az
Kv Q5 3$ 14, 44
9Ze 1C 20
8bGB Nu 13
qO8N %C 15, 45
s<OT %C 16
S: 8b 17
d; 8y 13
6! 20, 21, 23, 24, 25
6! w:d. 8b 18
68 az 8b 15
dLv L? 16
dLvg 9Ze v &Q 14
68 G 41
x`| 7k 54
[w]|6 V& 41
3. S: 49
kR g/ 47
kR, g/ 47
[+]08e, 6l: k< 56
0, Us 47
84 Trust Authority: RA %:)> H;-
[8]
G 5r; 54
G, RA %:)>
az G 15, 45
xk bI 54
5r; 54
<NgW G 16, 48
L? 18
68 G 12, 41
[D]
DO GQ, RA |.Z 10, 20, 21
dLvg 9Ze v, az G 14, 44,
45
%
9Ze 1C 20
S: 17, 49
- )b 6$ 19
6! w:d. 18, 49
68 az 15, 45
dLv L? 16
` $D 19
% 9Ze, 1C 20
AN<: _ Gei 15
ANd] 34
ANd], p:d. W<: 34
ANDO, d; 23, 38
Je 5r; 54
Je, RA %:)>
az G!- 46
5r; 54
<NgW G 48
68 G 41
[O]
c! 46
5^N! kQ .8 10
c! 46 (hS)
5^N; 'Q !K 26
5^NG 6!k 20, 26
CCA h~ 33
CA Nu 7, 35
CRL, Nu &E 26, 47
DDB2 31
IInternet Explorer
b; Nu 10
1.: 55
LLDAP ANd] 34
PPKCS #10Nu; 'Q d; 36
PKIX Xv @kANW% 34
RRA |.Z
5^N! kQ GQ 26
5^N!kQ GQ 46
nO 7
nO %LM#L:! kQ 5b 33
nO sB !K 9
9v |.Z 38
*R 3
Z? 8:) 3, 31
6! 46
RA |.Z (hS)
6! w:d. 18, 49
6!! |Q V. 23
8:) vx -m4 38
RA %:)>! W<:Ob 'Q Nu
7
RA |.Z& 'Q GQ 10
RA |.Z! GQ 6!
;E !I: /f 24
5^N! kQ ck !I 46
5^N; 'X ck !I 26
S: /f 17
d; E} 24
d; 8y /v 24
d; BN 23
d; ANDO 3$ 23
/? b# /f 22
Nu kR 25
V. _! 23
Gei .8 15
RA %:)>
GQN) 10
gk Xq 5
3! 6
W<: 10
W<:R nO 7
>a 27
vx -m4 38
RA %:)> 5r; 41
RA %:)> gk Xq 5
RA %:)> vx -m4 38
RA %:)>! kQ W<: 5, 10
SSecureWay 1
UURL
nO 5^N 32
vN 85