nO GQ )> H -...

94
IBM ® SecureWay ® Trust Authority nO GQ %:)> H;- v| 3 1.: 1 SA30-0873-00 IBM

Transcript of nO GQ )> H -...

IBM®

SecureWay®

Trust Authority

nO GQ %:)> H;-

v| 3 1.: 1

SA30-0873-00

IBM

IBM®

SecureWay®

Trust Authority

nO GQ %:)> H;-

v| 3 1.: 1

SA30-0873-00

IBM

VG!

L $8 W vx &0; gkOb |! 59 dLvG :VGgW;! VB O] $8& P8JC@.

JG(1999b 10y)

L %: IBM SecureWay Trust Authority,ANW% 5648-D09, v| 3 1.: 1! {kGg, DSG! /0w mCOb |nv p

g DS 1.: W v$ v|! {kKOY.

© Copyright International Business Machines Corporation 1999b. All rights reserved.

qw

&1e Trust Authority $8 . . . . . . 1

&2e 3d . . . . . . . . . . . . . 3

&3e f} . . . . . . . . . . . . . 5

RA %:)> W<: Xq . . . . . . . . 5

jslz 0:- . . . . . . . . . . 5

RA %:)> 3! . . . . . . . . . 6

nO % dLv! W<: . . . . . . . 6

jslz Nu d; . . . . . . . . . 7

nO sB !K . . . . . . . . . . 9

GQ .8 . . . . . . . . . . . . 10

RA %:)> W<: . . . . . . . . . 10

68 [w . . . . . . . . . . . . . 12

68 &b . . . . . . . . . . . . 12

8y _N d; Kv . . . . . . . . 13

8bGB Nu Kv . . . . . . . . 13

^B!- /% 1C . . . . . . . . 13

Kv Q5 3$ . . . . . . . . . . 14

dLvg 9Ze v 3$ . . . . . . . 14

AN<: _ Gei .8 . . . . . . . 15

az [w . . . . . . . . . . . . . 15

68 az 8b . . . . . . . . . . 15

9v dLv!- az 8b . . . . . . 16

WqG <NgW %C . . . . . . . . 16

Wq S: 8b . . . . . . . . . . 17

6! w:d. 8b. . . . . . . . . 18

G # L? . . . . . . . . . . . 18

% - )b 6$ . . . . . . . . . 19

% `G - bX $D . . . . . . . . 19

%!- 9Ze 1C . . . . . . . . 20

6! v` . . . . . . . . . . . . . 20

9v 9Ze! kQ 6! . . . . . . . 20

30 9Ze! kQ 6! . . . . . . . 21

S: * /f . . . . . . . . . . . 22

/? b# /f . . . . . . . . . . 22

d; ANDO v$ . . . . . . . . 23

V. _! . . . . . . . . . . . . 23

d; BN . . . . . . . . . . . . 23

8y sBN d; /v . . . . . . . 24

d; E} . . . . . . . . . . . . 24

;E !I: /f . . . . . . . . . 24

Nu 8y . . . . . . . . . . . . 25

Nu kR . . . . . . . . . . . . 25

CRL!- Nu &E . . . . . . . . 26

5^N! kQ GQ !K . . . . . . . 26

RA %:)> >a . . . . . . . . . . 27

&4e $8 . . . . . . . . . . . . 29

nO . . . . . . . . . . . . . . 29

g|nO . . . . . . . . . . . . 29

% jslz vx . . . . . . . . . 30

nO . . . . . . . . . . . . . . 31

qnO: $% . . . . . . . . . . 31

nO GQ . . . . . . . . . . . . 31

nO %LM#L: . . . . . . . . . 31

nO 5^N . . . . . . . . . . . 32

nO 9Ze . . . . . . . . . . . 33

9Ze S: . . . . . . . . . . . 33

Nu . . . . . . . . . . . . . . 33

Nu b| . . . . . . . . . . . . 33

Nu kR qO . . . . . . . . . . 34

p:d. . . . . . . . . . . . . 34

8P L' . . . . . . . . . . . . 34

Nu . . . . . . . . . . . . . . 34

jslz Nu . . . . . . . . . . 35

CA Nu . . . . . . . . . . . . 35

-v GB e! Nu . . . . . . . . 36

© Copyright IBM Corp. 1999b iii

Nu .e . . . . . . . . . . . . 36

Nu sLA gL, . . . . . . . . 36

;E !I: . . . . . . . . . . . 36

|. . . . . . . . . . . . . . . 37

W<: &n . . . . . . . . . . . 37

Nu W GQN) . . . . . . . . . 38

?C |. . . . . . . . . . . . . 38

RA %:)> vx -m4 . . . . . . 38

d; ANDO . . . . . . . . . . 38

&5e |6gW . . . . . . . . . . . 41

68 G . . . . . . . . . . . . . 41

68 Je . . . . . . . . . . . . 41

g| $GH 68 . . . . . . . . . 44

Kv Q5 IG . . . . . . . . . . 45

dLvg 9Ze v IG . . . . . . . 45

az G . . . . . . . . . . . . . 45

|. 6! . . . . . . . . . . . . 46

Nu kR g/ . . . . . . . . . . 47

<NgW G . . . . . . . . . . . . 48

6! w:d. L%. . . . . . . . . 49

d; W NuG S: . . . . . . . . 49

Nu .e . . . . . . . . . . . . 51

&xH Nu /| . . . . . . . . . 51

<NgW Wl . . . . . . . . . . 53

nO d;G sB . . . . . . . . . 53

G 5r; . . . . . . . . . . . . . 54

Internet Explorerk JVM . . . . . . . 55

6l:G 08e k< . . . . . . . . . 56

VGgW . . . . . . . . . . . . . 59

s% W -q: s% . . . . . . . . . 61

|C $8 . . . . . . . . . . . . . 65

kn} . . . . . . . . . . . . . . 67

vN . . . . . . . . . . . . . . 83

iv Trust Authority: RA %:)> H;-

&1e Trust Authority $8

IBM®

SecureWay®

Trust AuthorityB gkZ& NuOm EZ VB kE; 8

eOb 'Q v\L wTGn VB @kANW%; &xUOY.

v 6wG nO W Nu $%! {s pvP Nu; _`, x% W |.R v V5

O UOY.

v PKIX(X.509 v| 3k xk 0 ON86) W CDSA(xk %LM 8H F0X

3) O#- %X; vxT8Na -q: &xZ #G s#nk:; ckUOY.

v pvP -m W 8H ANd]; kX .#hGG pg ggZ& NuOb '

Q v\; &xUOY.

v jslz W ,sLp. b] nO bI: VkG /?:; &xUOY.

v O#-H kE W nO $8G 8H ze5*; kX bP:; 8eUOY.

Trust Authority C:[: IBM AIX/6000®

W Microsoft Windows NT-v C

'{!- G`R v V@OY. Y=: L C:[G Vd bITOY.

v EZ VB CA(Nu b|)B pvP NuG |< sLA gL,; |.UOY.

Nu-G Nu .G:; 8uOb 'X CAB _`OB Nu- ""! kX p

vP -m; v`UOY. NuL u Ls /?Ov JYB gG; 8uOb '

X CRL(Nu kR qO)! -mOb5 UOY. -m 0& 8Y .GOT 8#

Ob 'X IBM SecureWay 4758 PCIO#- ZAN<- nG O#- Oe

~n& gkR v V@OY.

v RA(nO GQ)B gkZ nO hDG |. 8:)& 3.UOY. RAB gk

ZG qnO: 0?; vxOB Nu8L _`Gm W/Q NuL c!H gk

Z!T8 _`I v V5O UOY. |. 8:)B Z?-H AN<:* gwG

Gg a$; kX 3.I v V@OY.

v % b] nO NMdL:B jslz, -v W b8 q{(9: VPN(!s3Nk

W.v)) e!, :6. +e, 8H |Z lm); 'Q Nu 9f; kLOT X

]OY.

© Copyright IBM Corp. 1999b 1

v Windows @kANW%N Trust Authority ,sLp.& gkOi V> gk

Z! % jslz& gkOv Jm5 Nu; 9fOm |.R v V@OY.

v % b]G |. NMdL:N RA %:)>: xN nO cgZ! nO d;;

BNOE* ENOm NuL _`H D! Nu; |.R v VT UOY.

v (g -jC:[: " (g 9ZeG ^Cv Nu Ze (MAC)& hjUOY.

(g %LM! (g %LM#L:! bOH LD /fGE* h&GB fl!B

MAC& kX 'T; (vR v V@OY.

v $% "C.B @kANW% 3_Z! nO AN<:& gkZ $GR v V5

O UOY.

v O#- #x; 'Q kU vx. kE; NuOb 'X, Vd Trust Authority

8:dRB bOC }:H 3Nk 0N -mGn V@OY. 0 W MAC nG

8H @j'.B KeyStoresB 8# 5*!- O#-Gm zeKOY.

v IBM SecureWayp:d.! kQ kU vx. p:d.B /? Nu W kR

H Nu! kQ $8& LDAP Xv |D8N zeUOY.

v IBM WebSphere™

Application ServerW IBM HTTP Server! kQ kU

vx. % -vB RA -vM T2 [kO) ^Cv& O#-Om d;; Nu

Og G5H vEZ!T Nu; |[UOY.

v vs; kX W bIL TuH IBM DB2®

Universal Database! kQ kU

vx

2 Trust Authority: RA %:)> H;-

&2e 3d

6wL Trust Authority! GX 8#GB 8H @kANW%; .m V8i {}

Q Z] um-& .m VB gkZ8 Xg @kANW%! W<:R v V@O

Y. pvP Nu nG Z] um-& xOB gw: {}Q $8& &xT8Na

Z] um-& d;R v V@OY. nO d;G %LMB d;; BNOE* E

}Ob 'Q Gga$G bXL KOY. nO d;L BNGi Trust Authority

RA(nO GQ)B d;; 3.Om Trust Authority CA(Nu b|)B Nu& _

`UOY. nO d; W NuG 9ZeB O#-H nO %LM#L:! sVUO

Y.

nO d;; r!Om L 9Zei; |.OB ML |. 8:)TOY. ''N 6

w: Trust Authority! L 8:)G ON& Z?-O5O 8:Og ANW%: L

nO %LM& r!UOY. Y% '!B gkZM 0: RA |.Z! pg G\;

UOY.

Trust Authority RA %:)>(nO GQ %:)>): nO d;; 3.Om W a

zN }:GB 9Ze& |.Ob 'Q GUI(W!H gkZ NMdL:)TOY. RA

%:)>: RA |.ZN- Y=G 8:)& vxUOY.

v d;; BNOE* E}Ob 'X, 8y _N nO d;G r!

v /$ /|G Nu GB /$ gkZ! SOB NuG 9Ze& KvOb 'Q

68 Xq

v 9ZeG <NgW Kd

v NuG /? b# 3$

v Nu GB nO d;G sB& /fOb 'Q 6! v`

v 6! xN; 3mOB 9Ze 7!

RA %:)>: O>G 8H VC4TOY. LM; gkOAi /$ 8:)& v

`Ob 'Q GQ; .m Vn_ Og {}Q pvP Nu; &bO) Nu; ^

F_ UOY.

© Copyright IBM Corp. 1999b 3

|C V&

5 dLvG :RA %:)> W<: Xq;

10 dLvG :RA %:)> W<:;

4 Trust Authority: RA %:)> H;-

&3e f}

L }G V&B RA |.ZN- v`X_ OB Y=G 8:)! kQ v'; &

xUOY.

v jslz Xq W RA %:)> 3!

v RA |.Z! Gb 'Q jslz Nu W GQ .8

v d; W Nu [w; 'Q nO %LM#L: 68

RA %:)> W<: Xq

L }!-B RA %:)>; gkOb |! OaX_ R g| 8:)! kX 3

mUOY.

v RA %:)>; G`Ob 'Q % jslz 3$

v RA %:)> 3!

v JdQ Nu; 9fOb 'X Trust Authority nO % dLv! W<:

v CA Nu .8 D % jslz! kQ jslz Nu .8

v RA |.ZN- [wOb 'Q GQN) .8

jslz 0:-

RA %:)>; 'Q % jslz& 0:-OAi Y= [w; v`OJC@.

1. Y=G vxGB % jslz _ O*& Microsoft Windows 95, 98GB NT

C'{! 3!OJC@.

v Netscape NavigatorGB Communicator,1.: 4.51 Ls

v Microsoft Internet Explorer,1.: 4.01(-q: Q 1 wT) Ls

Internet ExplorerG fl, Java !s bh(JVM) 1.: 5.00, te 3167

LsG v|; .m Vn_ UOY. 55 dLvG :Internet Explorerk JVM;

!-B G` _N JVMG 1.:& G0OB f} W JdQ fl Xg 1

.:& wW9LeOB f}! kX 3mUOY.

© Copyright IBM Corp. 1999b 5

V: NetscapeGB Microsoft! &xOB xD v|G &0; 3!X_ UO

Y. Y% GEw<! &xOB v|: /w 5n L\G pnN VC4;

G`R ' $8& CY#T %COv JB fl! V@OY.

2. % jslz& /fOJC@.

v NetscapeG fl, 1#gW ^:& -n Java& 0:-OJC@.

v Internet ExplorerG fl, Options ^:& -n Java& 0:-OJC@.

V: RA %:)> VC4 d8gW! kQ VE $8B ReadmeDO!- p&g

v TvR v V@OY. ReadmeDO; 8OAi IBM SecureWay Trust

Authority % gL.G Library dLv! W<:OJC@.

http://www.ibm.com/software/security/trust/library

RA %:)> 3!

RA %:)>; 3!Ob 'Q 3$ ANW%! W<:OB f}! kX-B gk

ZG 6w!- KA Y MTOY.

1. Xg C:[ |.ZNNM gkZG nO 5^N! kQ URL; .8OJC@.

2. 6w8NNM TvQ 3! vCgW! {#JC@.

3. 3! AN<: _ ARA.! %CGi nO 5^N! kQ URL; &xOJ

C@.

3!! OaGi IBM SecureWay Trust Authority RA%:)>: ANW% F

!G C[ ^:! *83OY.

V: Trust Authority! kQ VE $8B ReadmeDO!- p&gv TvR v

V@OY. ReadmeDO; 8OAi IBM SecureWay Trust Authority% g

L.G Library dLv! W<:OJC@.

http://www.ibm.com/software/security/trust/library

nO % dLv! W<:

nO; 'X % dLv! W<:OAi Y= [w; v`OJC@.

6 Trust Authority: RA %:)> H;-

1. nO % dLv! W<:Ob 'X Xg 6wG URL; TvOJC@. URL

: Y= |D; .T KOY.

http://MyWebServer/MyDomain/index.jsp

)b!- MyWebServerB Trust Authority nO GQL 3!Gn VB -v

G #:. L'TOY. MyDomain: Xg Trust Authority C:[! VB n

O 5^NG 8: L'TOY.

2. RA %:)>; 'X 0:-Q jslz& )JC@.

3. Y= URL; TBOJC@.

v NetscapeG fl, '!! VB X:. sZ! URL; TBOJC@.

v Internet ExplorerG fl, VR! VB X:. sZ! URL; TBOJC

@.

4. Enter 0& )#JC@.

Trust Authority nO % dLv! %CKOY. b; 3!G fl L dLvG

L': Z] um- >MTOY.

5. 3=8N Trust Authority nO -q:& gkOB fl!B -vG CA Nu

3!& )#JC@.

L Nu: jslz! nO -q:MG kE; NuR v VT UOY. Y=!

L -q:& gkR 'B L \h& }+X5 KOY.

jslz Nu d;

L }!-B RA %:)>; G`R v V5O Ob 'X Trust Authority nO

dLv& gkO) jslz Nu; d;OB f}! kX 3mUOY.

V: RA |.ZN- -v* e!& nOOE* GB ):!& g|nOX_ R f

l5 V; v V@OY. W/Q 8:)! |CH 5r;; 8Ai Trust

Authority gkZ H;-& |mOJC@.

gkZG 6w! B5O nO @kANW%; gkZ $GQ f}L +yLD! {

s /?Q Nu; rb 'Q }w! ^sz v V@OY. F!!-B b;{N \

h! kX 3+{8N 3mOm V@OY. gkZG gL.! {UQ }w! kX

-B Xg C:[ |.Z!T .GOJC@.

&3e f} 7

jslz Nu; 9fOAi Y= [w; v`OJC@.

1. jslz& kX nO % dLv! W<:OJC@.

2. nO /|!- qO; -m jslz Nu; 1COJC@.

3. 6!!- nO; 1COJC@.

4. .N; )#JC@.

gkZ! d;Q nO gDL %CKOY.

5. % dLvG vCgW! {s Je TB; OaOJC@. Je!B Y= N 3

G =GL V@OY.

v gkZ |C $8& TBOb 'Q X:. sZ! wTH nO $8 =G

v gkZ! xOB Nu |C $8& TBOb 'Q X:. sZ! wTH N

u d; $8 =G. =GG 1C Je! *; TBOv JB fl, Trust

AuthorityB gkZ! d;OB NuG /|z ,|H b;*; {kUOY.

Y= Je! /w VGOJC@.

Nu /|

gkZ! RA %:)>! W<:Ob 'X &CX_ OB(6wG d8

kN) jslz NuG >y& 1COJC@. Nu /|! kX-B 5

1 dLvG :&xH Nu /|;!- 3mUOY.

jslz! kQ CA Nu 3!

Nu /|! #/GB Xg CA Nu; -/ Nu; .8OJC@. L

\_& )#i CA NuL oC YnNeKOY.

L Nu: gkZ! RA %:)>; gkR ' nO @kANW%z

G kE; jslz! NuR v VT UOY. n !v L/N gkZ

! LL ?OQ CA Nu; .m VB fl!B G Y% NuL Jd

x@OY.

|Z lm VR

|Z lm kv& 1COAi gkZG |Z lm VR& &xX_ U

OY.

|Z lm kv

d; az! kQ |Z lm; ^8Ai L Wq; 1COJC@.

8 Trust Authority: RA %:)> H;-

5| @d

gkZ! &xOB 5| @dG kR.Z |B& _ boOJC@. _

D nO d;G sB& !KOb 'X-B L& Km Vn_ UOY.

5^N L'

gkZ! |.R nO 5^NG L'; &xOJC@.

Je! |Q Z<Q ;kL u JdQ fl!B Trust Authority gkZ H;

-G |6gW }; |mOJC@.

6. nO d; &b; )#JC@.

Trust Authority! nO gD; vEQ D Xg $8G /?:; KuUOY.

v gD! @y! VB fl!B gkZ!T @y& KA ]OY. gD; /f

Om nO d; YC &b; )#JC@.

v gD! @y! xB fl!B Y% % dLv! gkZG d; ID& %C

UOY.

7. d; ID& _ boX NJC@. L ID! *_! gkZ& D0O) \8Na

gkZB d;G sB& !KOm Xq! I ' Nu; vER v VT KO

Y. % dLv! 3mH kN Y= _ O*& v`OJC@.

v L -i8N 1T 9FM Nu; !KR v V5O % dLv! O6)&

OJC@.

v 9FC ' &xR v V5O d; ID& bOOJC@.

v d; ID! |Z lm8N 5xOb& bY.JC@.

nO sB !K

nO d;G sB& !KOAi nOOB ?H gkZ! %%G& _x % dLv

N 9F!E* Y= \h& v`OJC@.

1. nO % dLv! W<:OJC@.

2. nO /|!- gkZ! d;Q nOG /|; 1COJC@.

3. 6!!- sB !K; 1COJC@.

4. .N; )#JC@.

&3e f} 9

gkZG d;! kQ $8& .8Ob |! gkZG Ex; NuX_ OB

JeiL -i! %CKOY.

5. Je! $8& &xOJC@.

v d; ID!-, nO gD; &bQ D! %CGzx d; ID& TBOJC

@.

v 5| @d!-, nO gD! &x_x Mz ?OQ 5| @d; TBOJC

@.

6. nO sB !K; )#JC@.

^Cv! d;G vg sB& *8@OY.

v gkZG d;L Fw 8y _N fl!B *_! YC 9FM !KR v

V@OY.

v gkZG jslz NuL _`H fl, nO sB !K; )#i NuL Y

nNeKOY.

7. xOB fl % dLvG vCgW! {s Nu; 8JC@.

GQ .8

RA %:)>! kQ GQ; N)^b 'X C:[ |.Z!T d;Ob |!, Y

= 8:)& OaOJC@.

v jslz Nu; d;Q Y= |.R nO 5^N; v$OJC@.

v jslz Nu W WM #/GB CA Nu; gk _N % jslzN YnN

eOJC@.

RA %:)> W<:

RA %:)>; C[OAm R '6Y, Uz Y=; v`X_ UOY.

1. RA |.Z NuL Netscapejslz! VB fl, G` _N pg Netscape

<G; ]8JC@.

2. Windows [w %CY!- C[ → ANW% → IBM SecureWay Trust

Authority → RA %:)>; 1COJC@.

10 Trust Authority: RA %:)> H;-

RA %:)>G URL; d;Oi gk _N % jslzM -v! 8H(,s

Lp. Nu) <G; C[OB M! ?GUOY. -v! Xg URLG ;k;

G91 v V8Ai, W |! gkZ! /?Q RA |.ZN- Nu; ^F_

UOY. jslz! gkZ!T Nu; &CO5O ARA.R MTOY. AR

A.B gkOB jslz! {s Y(OY.

3. RA |.Z!T Nu; &COJC@.

V: Internet Explorer& gkOB fl!B jslz <G 5_! gkZ! -

v! &CQ V> Nu; jslz! Z?8N &bUOY. L fl BN

; d8OB ARA.B %CGv J@OY. L NuL FQ Y% Nu;

&bOAi jslz& >aQ D YC C[X_ UOY.

% jslz! RA %:)> VC4; YnNeO) Jb-UOY.

v VC4; YnNeOB ?H jslz -iG F!J!- n 3G ^Cv&

< v5 V@OY. 9& ii, jslz! Java& Jb-Om VYB M;

K.B ^Cv& < v5 V@OY.

v Jb- _!B AN<:! OaGbnv s6* 2RBv& *8;B x`

| 7k! %CKOY. Jb- _! @y! _}Oi x`| 7k! X_m

O]{N fm ^Cv! *83OY.

Jb-! OaGi RA %:)>; < v V@OY. L& gk Xq! H MTO

Y. gkZG Nuz ,|H nO 5^N! kQ nO d;z NuG |.& C[

R v V@OY.

V: Netscape!- RA %:)>! W<:OB fl, RA %:)>!- 0?Ov

J: $ O$ C#L fzOi NetscapeB gkZG Nu; YC d8UOY.

L _!{N 8H: gkZ! RA %:)>; L3 >aOb |! d^Q k

+N Z.& 0_ OB fl! gkZG 6w; 8#UOY.

&3e f} 11

68 [w

68 G; 1CO) 68& XqOJC@. 68B El s<OT R v5 V8g

xk{N /:; !vB 9Ze Wl; KvR v5 V@OY. GQ KvR 9Z

e v& &QO) KvR v V8g 9Ze& < ' dLv! %CI 9ZeG v

& v$R v5 V@OY.

68 &b

68 G!- [wOAB nO d; W Nu 9Ze& KvOb 'Q 68& Xq

OJC@. 68B d; GB NuG vg sB& bX8N R v5 Vm W ;E

W 8b /:; bX8N R v5 V@OY. L N !vG |V ;!- gk !I

Q Y% Je& gkT8Na 68& 8Y <POT R v5 V@OY.

1. GG Je& gkO) 68& XqOJC@. gk !IQ Jei; xOB v

8- aUO) 68& <POT R v V@OY. 41 dLvG :68 Je;B

Je! kX 3mUOY.

v Je 'N ?-& L?Oi GG F!J! Xg Je! kQ 5r;L %C

KOY.

v gkZ! w" *; v$Ov Jm5 68& G`R v V@OY. L8T O

i Y% /:zB s| xL 8y _N pg d;G 9Ze& KvOT K

OY.

2. xOB fl KvR 9Ze v! kQ Q5& /fOJC@.

3. xOB fl, az G!- az& < ' dLv! %CR 9Ze v& /fO

JC@.

4. 68 Xq! OaGz8i 68 &b; )#JC@.

68 az& bY.B ?H x`| 7k! 68 AN<:G x`|; %CU

OY. 68 az! XqGi az GL Z?8N %CKOY.

5. az G!- [wOAB 9Ze& #8JC@.

|C V&

12 Trust Authority: RA %:)> H;-

:8y _N d; Kv;

:8bGB Nu Kv;

44 dLvG :g| $GH 68;

8y _N d; Kv

68 G!- Y= _ O*& v`OJC@.

v n2 *5 v$Ov J: sBN 68& G`OJC@. L8T Oi 8y _ s

B& v$OB Mz 0@OY.

v xOB fl, 68 /|G 1CgW; /fOv J: sB!-, KvR 9Ze

! kQ _! /:; v$OJC@. 9& in, gkZ! 8y _N Y% d;

; 3.Ob |! ):!G nO d;; 3.O5O |.Z! d8QYm !$

X >CY. L fl!B gkZG 68! Xg N0G L'; v$R v V@

OY.

8bGB Nu Kv

68 G!- /$ b# ;! 8b! 9$Gn V8g ;E !IQ NuG 9Ze

& KvOb 'Q 68& XqOJC@.

1. 68 /|!-, ;E !I: W 8b0; 1COJC@.

2. ;E !I:!- qO; -m ;E !I; )#JC@.

3. /$ b# ?H 8b! I NuG 9Ze8; KvOb 'X 68& <POT

OJC@. 8b OZ |'!- Y= [w; v`OJC@.

v C[!- !e L% 8b OZ& TBOE* 1COJC@.

v >a!- !e J: 8b OZ& TBOE* 1COJC@.

|C V&

22 dLvG :/? b# /f;

^B!- /% 1C

/% Je! /%& TBOB kE ^B!- /%& 1COAi Y= [w; v`

OJC@.

&3e f} 13

1. JeG X:. sZ 7! VB [: ^B FL\; )#JC@.

^BL -.i- Xg Je! vg yL* y_ OZ! %CKOY.

2. Y% ,5& 1COAi ^B!- ,5& )#JC@. W/i gkZ! ,5&

1CR v VB qOL %CKOY.

3. y; 1COAi vg yG L' 7! VB -l% _ O*& )#JC@. ^

J -l%& )#i L| yL %CGm @%J -l%& )#i LD yL %

CKOY.

4. /%& 1COAi xOB ^G /%& )#JC@.

^BL ]wm Xg Je!B 1CH /%! %CKOY.

Kv Q5 3$

68 G!- KvGB 9Ze v& &QR v V8g, v$Q v8Y u 9: 9

Ze! vg 68M O!OB fl!5 &QgWL {kKOY. gkZ! 3$O

B &Q: vg Xq _N 68!8 {kKOY.

1. Kv Q5!- qO; -m Q5& 1COJC@. b;*: 150TOY.

L Q5B 68 azG )b! 5b; L(OY.

2. 68G *Sv NP; v$OJC@.

dLvg 9Ze v 3$

68 G!- az GG dLv! %CGB 9Ze v& &QR v V@OY. gk

Z! 3$OB &Q: vg Xq _N 68!8 {kKOY.

1. dLvg 9Ze v!- Y= _ O*& v`OJC@.

v qO; -m Q5& 1COJC@.

v %CGB b;* '! }Z& TBOJC@.

L *: 68G %C& &nUOY.

2. 68G *Sv NP; v$OJC@.

14 Trust Authority: RA %:)> H;-

AN<: _ Gei .8

SGG G!- mI \_& )#m *i PN F! J! VB sB 5*! gk

Z! d;Q AN<:G x`|L %CKOY.

az [w

az G; 1CO) 68G az& %COJC@.

L G: gkZ! KvQ 9Ze& Q Ls %CR v V@OY. dLvg 9Ze

vB 68& &b_; ' gkZ! 1CQ *! {s Y(OY.

68 az 8b

az G!- 68& G`Q D! az& < v V@OY.

68 az!- %G " `!B gkZG 68M O!OB 9Ze! wTGn V@

OY. %!B Y= -iL wTKOY.

L' d; GB Nuz ,|H L'. :, L'G |D8N %C.

d; sB

nO d;G vg sB(9: BNJ). 53 dLvG :nO d;G sB;!-

B " sB *; 3mUOY.

Oa sB

d;! kQ 3.G vg sB(9: |^J)

V> w%L.

d; GB NuG sBM ,|H /%.

vE OZ

nO d;; vEQ /%

68 az& 8Ai Y= [w; v`OJC@.

1. JdQ 9Ze& #8JC@. Y= _!- JdQ 9Ze& #B % 5rL I

SGG [w; v`R v V@OY.

v %& -iL?OE*, -G )b& 6$OE*, %G `; $DOJC@.

&3e f} 15

v dLv!- dLvN L?O) u 9: az& 8JC@.

2. [wOAB 9Ze& #; ', xOB fl Y= [w; v`R v V@OY.

v Q LsG 9Ze& 1CQ D 1CQ 9Ze& Wl8N 3.OJC@.

v \O 9Ze& 1CO) _! <NgW; 8JC@.

V: JdQ 9Ze& KvOv xQ fl!B 68 G8N 9F!- Y= [w;

v`OJC@.

v 68! CY#v J: fl, L& /fQ Y= YC G`OJC@.

v 68! CY% fl, 8Y 9: vG 9Ze& KvR v V5O Kv Q5

& 3$Om 68& YC G`OJC@.

|C V&

14 dLvG :dLvg 9Ze v 3$;

9v dLv!- az 8b

az G!-, %CGB 68 azB )/ dLv! ID V; v5 V@OY. dL

v vB 68M O!OB 9Ze v W gkZ! %C& 'X v$Q dLv )b

! {s Y(OY. sB 5*!B |< dLv vM vg 8m VB dLv! %

CKOY.

v WlG Y= dLvN L?OAi Y= dLv& )#JC@.

v WlG L| dLvN L?OAi L| dLv& )#JC@.

v n dLv Ls ZN !Ai 68 G8N 9F! 68& gG`OB ML 8Y

|& v V@OY. W/i az G: 68 azG 9x0 dLv& YC %CU

OY.

WqG <NgW %C

az G!- Y=; v`OJC@.

1. 68 az %!- gkZG 68 az! XgOB 9Ze `; 1COJC@.

2. <NgW %C& )#JC@.

<NgW GL Z?8N %CGg 1CQ 9ZeG <NgW; %CUOY.

16 Trust Authority: RA %:)> H;-

3. %CG <NgW G!- 8AB <NgWG /|; 1COJC@.

V: az G!- Xg 9Ze& 6l:N Nx )#E* 9Ze& 1CQ Y= <

NgW G; 1CO)5 9ZeG <NgW; %CR v V@OY.

|C V&

21 dLvG :30 9Ze! kQ 6!;

Wq S: 8b

az G!- Y=; v`OJC@.

1. 68 az %!- 9Ze& 1COJC@.

2. <NgW G!- <NgW %C& -/ 9Ze& 8Y s<OT %COJC@.

3. %CG <NgW G!- 8AB S:G /|; 1COJC@. 53 dLvG :<

NgW Wl;!-B S:L Wl-GB f}! kX 3mUOY. b;*: b

; S:TOY.

4. %& ll 8JC@.

%G " `: d; GB NuG S:; *-UOY. 49 dLvG :d; W N

uG S:;!-B d; S:! kX 3mUOY. %!B Y= -L wTKO

Y.

S: L'

S:G L'

S: *

S:G *. L *: d; GB NuG sLA gL, ?H /fI v

5 V@OY.

5. [w! 5rL I fl, %& -iL?OE* -G )b& 6$OE* %G `

; $DOJC@.

|C V&

22 dLvG :S: * /f;

&3e f} 17

6! w:d. 8b

az G!- Y=; v`OJC@.

1. 68 az %!- 9Ze& 1COJC@.

2. <NgW G!- <NgW %C& -/ 9Ze& 8Y s<OT %COJC@.

3. %CG <NgW G!- 6! w:d.& 1COJC@.

4. %& ll 8JC@. %!B WqG sLA gL,!- On- pg L%.G

<NgWL wTGn V@OY.

6! w:d.G " `: Xg Wq! kX kXx 6!! kX 3mUOY.

$8!B 6!! On- /%, %S ggZ W ,| V.L wTKOY. %!

B Y= -L wTGn V@OY.

/% ?OQ `! %CGB 6!G /%

V< 6!& kQ RA |.ZG 8P L' GB 6!& kQ RA ANW%

d; sB

nO d;G sB(9: BNJ). 53 dLvG :nO d;G sB;!-

B " sB *; 3mUOY.

Oa sB

d;! kQ 3. sB(9: |^J)

V. 6! C! RA |.Z! &xQ V.

5. [w! 5rL I fl, %& -iL?OE* -G )b& 6$OE* %G `

; $DOJC@.

|C V&

49 dLvG :6! w:d. L%.;

G # L?

ON fl!B O*G G!- Y% G8N Z?8N L?UOY. Y= 9& |m

OJC@.

v 68 G!- 68& G`OB fl, 68 az! RA %:)>! |^Gi az

G8N L?UOY.

18 Trust Authority: RA %:)> H;-

v 9Ze! kQ <NgW; d;Oi <NgW G8N L?UOY.

v <NgW G!- 6!& OaOi, qO GG 68 azN 9F)OY.

'M Y% fl! G gL& L?OAi %COAB G; )#b8 Oi KOY.

W8T Oi Y=; 9sR v V@OY.

v 68 az& ; D! 68 G8N 9F!B fl 68! )|w %CKOY.

v _xH Wq! kQ <NgW; d;OB fl az GG 68 azN 9F%

v V@OY. W w!- s<OT %CR Y% 9Ze& 1CR v V@OY. G

Y% 68& G`R 'nv 68 azB az G! 2F V@OY.

v az G!- Q 9Ze& 1CQ D! <NgW G8N L?R '6Y <Ng

W G! Xg 9Ze! %CKOY. az G!- 9Ze& 1COv JRE*

Q LsG 9Ze& 1COB fl L G: $8& wTOv J@OY. <Ng

W G!- 6!& &bQ D! $8! Xg G!- vv}OY.

V: <G; C[R ' RA %:)> JeB b;*8; %CUOY.

% - )b 6$

%G - )b& 6$OAi Y= [w; v`OJC@.

1. )b& 6$OAB -G fh! ?-& u8JC@.

2. 6l:& )% sB!- ?-& ^JL* @%J8N xn - Jq& /fO

JC@.

3. xOB Jq!- 6l: \_& u8JC@.

% `G - bX $D

- bX8N `; $DOAi Y= [w; v`OJC@.

v -G %&& )#JC@.

v * x-N $DOAi Q x u )#JC@.

&3e f} 19

%!- 9Ze 1C

Q LsG 9Ze& 1CR v V@OY.

v \O 9Ze& 1COAi Xg `; )#JC@.

v n 3G N"Q 9Ze& 1COAi 9 x0 9Ze& )% Y= Shift 0&

)% $N 6v7 9Ze& )#JC@.

v N"Ov J: n 3G 9Ze& 1COAi Ctrl 0& )% $N " 9Ze&

)#JC@.

v 9Ze 1C; X&OAi Xg 9Ze& YC )#JC@.

6! v`

nO d;! kQ 6!& kOE* NuG 9Ze& w%L.R v V@OY. a

z Gz <NgW G pN! 6!& 1CR v VB Je! wTGn V@OY.

gkZ! kR v VB 6!B gkZ RA |.ZN VB nO 5^N!-G G

Q! {s Y(OY.

9v 9Ze! kQ 6!

az G!- %G " `: 68 azG 9ZeTOY. %! VB Q LsG 9Z

e! kX 6!& v`R v V8g, 6!& v`Ob |! O*G 9Ze& 8Y

s<OT ll < v V@OY.

v 9v 9Ze& 8B ?H 6!& v`OAi Y= [w; v`OJC@.

1. Q LsG 9Ze& 1COJC@.

2. xOB fl, /? b# 3$!- NuL ?B; .T I /? b#; v$

OJC@.

3. xOB fl, d; ANDO 1C!- gkZ! BNOB d;! kX Y%

d; ANDO; v$OJC@. 51 dLvG :&xH Nu /|;!-B "

d; ANDOz ,|H NuG /!! kX 3mUOY.

4. 1CQ Wq! kQ 6! v`!- qO; -m 6!& 1COJC@. 9Z

e |C [w! kQ c!! gkR v VB /OQ 6!TOY.

20 Trust Authority: RA %:)> H;-

5. 6!N- kR& 1COB fl!B VR g/& 1CX_ UOY. kR 1

C g/!- qO; -m g/& 1COJC@. 47 dLvG :Nu kR g

/;!-B " g/G GL& 3mUOY.

6. xOB fl, 6!! kQ V.!- Xg 6!& 3mR V.; TBOJC

@.

7. 6! &b; -/ 1CQ 9Ze! kQ 6!& &bOJC@.

v 6! |! 9ZeG _! <NgW; 8Ai Y= [w; v`OJC@.

1. 9Ze! wTH `; 1COJC@.

2. <NgW %C \_& )#JC@.

|C V&

19 dLvG :% - )b 6$;

19 dLvG :% `G - bX $D;

30 9Ze! kQ 6!

6!& v$Ob |!, <NgW G!- %CH 9Ze! kQ Y% /f; v`

R v V@OY.

1. %C!- 8AB <NgWG /|; 1COJC@.

WqG 3. S:; %COB fl!B %G ON *; /fR v V@OY.

2. Jd! {s ON S: *; /fOJC@. 49 dLvG :d; W NuG S

:;!-B ON S:! kX 3mUOY.

3. xOB fl, /? b# 3$!- NuL ?B; .T I /? b#; v$O

JC@.

4. xOB fl, d; ANDO 1C!- gkZ! BNOB d;! kX Y% d

; ANDO; v$OJC@. 51 dLvG :&xH Nu /|;!-B " d;

ANDOz ,|H NuG /!! kX 3mUOY.

5. %CH Wq! kQ 6! v`!- qO; -m 6!& 1COJC@. 9Ze

|C [w! kQ c!! gkR v VB /OQ 6!TOY.

V: 6!! kRN fl kR! kQ g/5 1CX_ UOY. 47 dLvG :N

u kR g/;!-B /?Q g/! kX 3mUOY.

&3e f} 21

6. xOB fl, 6!! kQ V.!- Xg 6!& 3mR V.; TBOJC@.

7. 6! &b; -/ 6!& &bOJC@.

|C V&

19 dLvG :% - )b 6$;

19 dLvG :% `G - bX $D;

S: * /f

<NgW G!- nO d;; BNOE* OaH d;! kQ 6!& v`R '

ON S:G *; /fR v V@OY.

1. %C!- qnO: AN<: /v& 1COJC@.

2. w%L.OAB S:8N -iL?OJC@.

gkZ! w%L.R v VB *: u *; TBOb 'Q X:. sZ* Y

% *; 1COb 'Q qO sZ& .m V@OY. 49 dLvG :d; W N

uG S:;!-B ON S:! kX 3mUOY.

3. xOB *; TBOE* 1COJC@.

V: d; ANDOG *L gkZ! 3$Q *! l1R v5 V@OY.

/? b# /f

az GL* <NgW G!- nO d;; BNOE* OaH d;! kQ 6!&

v`R ' Nu! kQ /? b#; /fR v V@OY. /? b# 3$!- /

%G |'& v$OJC@. /%& &xOAi ^B; -/ , Y= xOB /%

& )#JC@. /%& w" TBOB fl!B ^B! gkH Mz ?OQ |D

; gkO) X:. sZ& $lJC@.

v C[ OZ!- NuL ?B; .T I /%& v$OJC@.

v >a OZ!- NuL 8b! I /%& v$OJC@.

6!& &bOi gkZ! v$OB /? b#L RAN |^KOY.

V: d; ANDOG *L gkZ! 3$Q *! l1R v5 V@OY.

22 Trust Authority: RA %:)> H;-

d; ANDO v$

az GL* <NgW G!- nO d;; BNR ' Nu [:! gkR Y% d

; ANDO; v$R v V@OY.

d; ANDO 1C!- Y= _ O*& 1COJC@.

v qO!- d; ANDO; 1COJC@. qOG ANDO: gkZ! v$O5

O c!H MiTOY. 51 dLvG :&xH Nu /|;!-B " d; AND

Oz ,|H Nu! kX 3mUOY.

v vg ANDO gk; 1COJC@. LML b;*TOY. L b;*: vg A

NDOL gkZ! v$O5O c!H ML FQ fl!5 x`R v VT U

OY.

gkZ! v$OB ANDO: 6!& &bQ D! d;; 3.Om Nu; [:

Ob 'X gkKOY.

V. _!

az GL* <NgW G!- v` _N 6!& 3mOb 'Q V.; _!R v

V@OY.

1. 6! v`!- 6!& 1COJC@.

2. 6!! kQ V.!- X:. sZ! V.; TBOJC@. Vk 512 .Z&

gkR v V@OY.

3. 6! &b; -/ 9Ze& w%L.R ' V.; wTC0JC@.

6!& &bOi Xg 9Ze! gkZG V.L _!KOY.

d; BN

az GL* <NgW G _ O*!- d;; BNR v V@OY.

v az G; gkOB fl!B BNR 9Ze& Q Ls 1CR v V@OY.

v <NgW G; gkOB fl %CH d;; BNOb |! ON S:G *;

/fR v V@OY.

n@ Q J G!- Y= [w; v`OJC@.

&3e f} 23

1. 6! v`!- BN; )#JC@.

2. 6! &b; )#JC@.

8y sBN d; /v

az GL* <NgW G!- d; 8y& /vR v V@OY. az G; gkO

B fl!B 8y sB& /vR 9Ze& Q Ls 1CR v V@OY.

n@ Q J G!- Y= [w; v`OJC@.

1. 6! v`!- 8y /v& )#JC@.

2. 6! &b; )#JC@.

d; E}

az GL* <NgW G _ O*!- d;; ENR v V@OY. az G; g

kOB fl!B ENR 9Ze& Q Ls 1CRv V@OY.

n@ Q J G!- Y= [w; v`OJC@.

1. 6! v`!- E}; )#JC@.

2. 6! &b; )#JC@.

;E !I: /f

az GL* <NgW G!- NuG ;E !I:; /fR v V@OY. ;E !

IQ Nu; ;E R!N R v V8g W ]kN5 R v V@OY. az G;

gkOB fl!B Q LsG 9Ze& 1CQ Y= Xg Wl! kQ ;E !I

: sB& /fR v V@OY.

n@ Q J G!- Y= [w; v`OJC@.

1. 6! v`!- Y= _ O*& )#JC@.

v d;; ;E !I8N T

v d;; ;E m!I8N T

2. 6! &b; )#JC@.

24 Trust Authority: RA %:)> H;-

Nu 8y

az GL* <NgW G!- Nu; OC{8N 8yR v V@OY. az G;

gkOB fl!B 8yR Nu; Q Ls 1CR v V@OY.

n@ Q J G!- Y= [w; v`OJC@.

1. 6! v`!- kR& )#JC@.

2. g/!- 8y& 1COJC@.

V: CRL! vOGn VB ?H Xg NuL 8b! Gv JB Q L 6!&

_D! x9R v V@OY.

3. 6! &b; )#JC@.

L 6!& v`Oi 9Ze! kQ 3. S:L w%L.KOY. kR g/ S:

G *: 8yN 3$KOY.

|C V&

26 dLvG :CRL!- Nu &E;

Nu kR

az GL* <NgW G!- Nu; kRR v V@OY. az G; gkOB f

l!B kR! kO) Q Ls Nu 1CR v V@OY.

n@ Q J G!- Y= [w; v`OJC@.

1. 6! v`!- kR& )#JC@.

2. g/!- Xg g/& 1COJC@.

V: g/& 8yN 1COB fl!B NuL 8b! Gv JB Q _D! 6

!& x9R v V@OY.

3. 6! &b; )#JC@.

L 6!& v`Oi 9Ze! kQ 3. S:L w%L.KOY. kR g/ S:

: gkZ! v$Q *8N 3$KOY.

|C V&

&3e f} 25

25 dLvG :Nu 8y;

:CRL!- Nu &E;

CRL!- Nu &E

Y= g/ _ Q !vN CRL!- Nu; &EOAB fl! V; v V@OY.

v u Ls /?Ov J: Nu; CRL!- &EOB fl

v g/& kRN O) L|! kR_x Nu; g0:-OAB fl

V: kR b# ?H! 8b! H NuG fl!B YC 0:-R v x@OY.

az GL* <NgW GG CRL!- Nu; &ER v V@OY. az G; g

kOB fl!B CRL!- &ER Nu; Q Ls 1CR v V@OY.

n@ Q J G!- Y= [w; v`OJC@.

1. 6! v`!- kR& )#JC@.

2. g/!- CRL!- &E& 1COJC@.

3. 6! &b; )#JC@.

L 6!& v`Oi 9Ze! kQ 3. S:L w%L.KOY. kR g/ S:

G *: CRL!- &EN 3$KOY.

|C V&

25 dLvG :Nu 8y;

5^N! kQ GQ !K

az G GB <NgW G!- Y= [w; v`OJC@.

1. 6! v`; )#JC@.

2. 6! qO; 8JC@.

'G WqL NuG 9ZeM nO 5^N! kQ nO d;z |CO) gkZ!

v`R v VB [wTOY. 9Ze& < v VB GQ8 .m VB fl, qO!

%CGB /OQ *: gk !IQ 6! x=TOY.

26 Trust Authority: RA %:)> H;-

RA %:)> >a

SGG G!- RA %:)>; >aOAi Y= _ O*& v`OJC@.

v >a& )#JC@.

gkZG 6wL gkZ! kX Y% fN& 3$Ov J: Q gkZB RA

%:)>! W<:_x % dLvN 9F)OY.

v Y% jslz "; ]; 'M 6y!vN &q %CYG [: FL\ !n%

O*& -/ %:)>; ]8JC@. L8T Oi jslz! ]|OY.

&3e f} 27

28 Trust Authority: RA %:)> H;-

&4e $8

L }G V&B RA %:)> 3$!- nO, Nu W |.! |CH 3d; $G

OE* 3mUOY.

nO

nOLu Nu; E;OB MTOY. Trust AuthorityB Q LsG nO f}; &

xOg 6wG $%! {s gk !IQ f}L ^s}OY. gkZB Y= _ Q

!v& v`R v V@OY.

v % jslz& kX Trust Authority nO gD; O:O) &bUOY. b;

Trust Authority 3!!- nO gD: Z] um- >MsB % dLv! V

@OY. gL.! {s-B L dLvG L'L Y& v5 V@OY.

v 8Y qxD{N f}8N-, g|nO; Q Y= gk _N v):WLG! 3

!H Trust Authority ,sLp. @kANW%; kX g|nO *; Trust

Authority! &xUOY.

RA(nO GQ) |.ZN- RA %:)>! W<:Ob 'X Nu; nOX_ U

OY. *_! nO % dLv& gkO) ON gkZ& g|nOR v5 V@O

Y.

nO gDG %LMB RA %:)>!- < v VB %LM#L: 9ZeN L?

UOY.

g|nO

Trust Authority& gkOi ANW% GB |.Z! ag gkZ& g|nOR

v V@OY.

Nu; 'X Y% gw; g|nOOB fl, L& 'Q C*.@B Y=z 0@

OY.

© Copyright IBM Corp. 1999b 29

v g|nOOAB 3N! kQ $8& .8X_ UOY. $8B ggZNNM r

; v5 Vm 6wG 9Ze(9: %LM#L:G $8)& gkR v5 V@OY.

v % jslz!- nO dLv! W<:UOY. /$N; g|nOOb 'Q n

O gDL V@OY.

v 3Nz Xg 3NL xOB Nu /|! kX 3mOB $8& &xO) gD

; O:UOY. W Y=!B gD; &bUOY.

v d; sB& !KUOY.

g|nO d;L BNGi gkZB .#hG ID, O#, d;; BNQ RAG

URL n; ^T KOY.

v L $8& |-, |Z lm GB Nm; kX g|nOQ 3N!T |^UOY.

1C{8N, g|nOQ 3NG mG& 'X Y% d; $8! wTGn VB g

|nO DO; &xR v V@OY. ggZB Nu; d;R Xq! I ' g

kZ! 8;B Za& gkUOY.

g|nO 8:)! |Q 5r; 8OAi Trust Authority gkZ H;-& |m

OJC@.

% jslz vx

Trust Authority!-B gkZ! Y= % jslz _ O*& kX nO gD;

O:Om &bT8Na nO d;; [:R v V@OY.

v Microsoft Internet Explorer,1.: 4.0 Ls

v Netscape NavigatorGB Communicator,v| 3.0 Ls

RA %:)>! W<:Ob 'X JdQ jslzB L jslziG 8Y VE

9'; d8UOY.

30 Trust Authority: RA %:)> H;-

nO

nOLu pvP Nu; 3N GB b8 #<<!T N)OB AN<:TOY. Trust

Authority!-B nO! U- ANW% GB RA |.Z! nO d;C T2 &

xH $8& r!UOY. W Y=!B Xg d;G BN )NM |h xL, Trust

Authority RA! nO %LM#L:! d;! kQ 9Ze& [:UOY. Nu;

N)Ob 'Q a$L ;Avi Trust Authority CA(Nu b|)! Nu; _`U

OY.

qnO: $%

ANW%: gkZG [w; RA |.ZN- _!R ' nO $8G ON! 6w

G qnO: $%; {kUOY. ANW%L r!R v VB $8 /|: gkZ

! r!OB >y8Y z 9bOg, *: $.XvB fbL V@OY(9: VR s

V bv). Trust Authority& gkOi 6wL W/Q ANW%! $% $8& &

xR v V@OY. L ANW%: Z< r!!- Xg $8& gkUOY.

nO GQ

Trust Authority!- RAB -v @kANW%TOY. RAB Y=; wTO) g

kZG nO! JdQ ON |. 8:)& cgUOY.

v gkZG Ex .N

v d;Z! d;Q S: W GQ; wTQ Nu; ^; Z]L VBv Ku

v NuG [: GB kR d;! kQ BN GB E}

v 8H @kANW%! W<:& C5OB gwL Nu ;G xk 0M ,|H 3

Nk 0& .m VBv Ku

RA %:)>; gkO) Trust Authority RAG ON 6!& C[OE* vCU

OY.

nO %LM#L:

Trust Authority nO %LM#L:B nO 9Ze& zeUOY. nO %LM#

L:B IBM DB2®

Universal DatabaseN [:H |h| %LM#L:TOY. Trust

&4e $8 31

AuthorityB 9Ze& O#-UOY. Ov8, RA %:)>; kX xN RA |.

ZB kNPG nO $8& P; v V@OY.

nO 5^N

" Trust Authority C:[: \O nO 5^N; .m V@OY. L 5^N: 6

w!- nO W Nuz ,|H qnO: $%, Nu $% W Zx; $GUOY.

Zx! W<:OAB gkZB Xg Zx! kQ 5^N! nOGn Vn_ UO

Y.

RA -v RA.~n! 3!Gn VB fl, )b!B nO @kANW%; 3$

R v VT OB A9Sv)! wTGn V@OY. L RA.~nB RA! vxO

B n2 pn* $%5 gkR v V@OY. 5^N L', pn W 3! fN! n

O @kANW%! W<:Ob 'Q URL; |:UOY.

9& in, xk % -vG L'L MyPublicWebServerLm 5^N L'L

MyDomainN fl, nO @kANW%! W<:Ob 'X-B Y= URL; gk

OT KOY.

http://MyPublicWebServer/MyDomain/

Trust Authority C:[: nO @kANW%z T2 b; Java -v dLv

(index.jsp)& wTUOY. L dLvB nO 5^N! kQ URLN %CGg, n

O -q:& &xUOY.

v e!G gkZB L % dLvN #F! Nu; d;Om ZEG jslz N

u; ;EOE* kRUOY.

v L gkZi; vxOAi Xg % dLvN L?O) RA %:)>! W<:

Ob 'Q gkZG Nu; kfX_8 UOY. W/i L Nu; gkO) Y

% gkZi; g|nOR v V@OY.

nO 5^Nz ,|H nO d;z Nu |C [w; Ob 'X RA %:)>!

W<:UOY.

32 Trust Authority: RA %:)> H;-

nO 9Ze

Nu! kQ " d;: Trust Authority RA! &bGB nO gDTOY. " n

O d;: nO %LM#L: 9ZeN zeGT KOY. L 9Ze! kQ w%

L.B d;! kQ pg 6!(d; ENnv wT)& ]5UOY. NuL [:G

B fl!B ?OQ 9Ze! Xg Nu! |CH pg L%.& ]5UOY. {

s- nO 9Ze!B d; W d;z ,|H NuG sLA gL,!- On-

pg L%.! wTKOY.

9Ze S:

nO %LM#L:! VB 9ZeG S:: nO d;; 3mOB /vTOY. O

aH d;G fl /vB N)H Nu5 3mUOY. b8 S:: 6wL qnO:

$%; }`OB % 5r; VB 3. /vTOY. ON S:z W *: RA %:

)>; kX RA |.Z! .NR v V@OY.

Nu

NuLu #<< GB 3N; 'X pvP Nu; [:OB MTOY. Trust

AuthorityG fl Nu: nO d;; r!Om BNQ D!8 _}UOY. nO

G azN CA(Nu b|)B Nu; _`UOY. Trust AuthorityG fl _`G

B NuG /|: 6wG qnO: $%z O|:; /vUOY.

Nu b|

Trust Authority!- CAB 6wG $%! {s pvP NuG _`; cgOB

-v ANW%TOY.

Trust AuthorityB -N EZOB CAiL Nu:G uEN VfG Nu; BN

OB % ?GOB s# Nu; vxUOY. Trust AuthorityB CA h~5 vx

UOY. CAB h~!- s'! VB CA& EZOg Nu:G uEN L CAG

Nu; BNUOY.

&4e $8 33

Nu kR qO

Trust Authority RAB $b{N #]8N CRL(Nu kR qO); x%UOY.

CRL: u Ls /?Ov J: Nu; *-Q M8N-, Xg Nu; &COB R

/Z! NuGv J5O UOY.

n2 CA, RA GB @kANW%Lgv L qO! W<:O) NuG kR )N

& G0R v V@OY. LM: V> gkZ! 6wG 8H @kANW%! W<

:OAm R ' Trust Authority RA! 8H; &xOB Q !v f}TOY.

p:d.

Trust Authority! Nu; zeOb 'X gkOB p:d.B IBM SecureWay

p:d.TOY. L p:d.B 6wL /0w Trust AuthorityM T2 gkOb

'X 3$Q MO v5 V8g, GB gkZ! L|! 3!O) Y% @kANW

%z T2 gkXB p:d.O v5 V@OY.

Trust Authority! p:d.! W<:Ob 'X gkOB ANd]: LDAP(f.

p:d. W<: ANd])TOY.

8P L'

DN(8P L')Lu pvP Nu; 'Q p:d. WqG Q dRTOY. DN: p

:d.G h~ 86!- WqG '!& m/OT D0UOY.

Nu

NuLu Nu 8/ZG Ex; 8uOB CA! GX -mGB pvP Z] um

-TOY. Nu 8/ZB Y% gwz %LM& Vm ^; ' GB 8H @kAN

W%! kQ W<:& d;R ' Nu; Nu8N gkR v V@OY. Trust

Authority!-B -v, @kANW% W e!(9: A0M, :6. +e n)nv! p

N gkZ W s# #! NuOb 'Q Nu; .m Vn_ UOY.

Trust AuthorityB Y= |V!- X.509v3 Nu; vxUOY.

v jslz Nu

34 Trust Authority: RA %:)> H;-

v -v Nu

v e! Nu

v PKIX Xv @kANW%! W<:Ob 'Q Nu

v CA! kQ s# Nu

Trust AuthorityB Y= ANd]i5 vxUOY.

v SSL

v S/MIME

v IPSec

v PKIX CMP

b; Trust Authority 3!B L/Q |VM ANd]; b]8N O) YgQ N

u /|; &xUOY. {s- nOZB ZEG Jd! KBB Nu; d;R v

V@OY. 51 dLvG :&xH Nu /|;!-B Nu /|! kX 3mUOY.

jslz Nu

jslz Nu: O]{8N % jslz! O#-H DON zeOB pvP Z

] um-TOY. ON @kANW%!-B gkZ! :6. +e* Y% E<!

0& zeR v V@OY. Trust Authority C:[!-B gkZ! % jslz&

kX w" jslz Nu; d;R v V@OY. *_! JdQ fl!B nO %

dLvN 9F! Xg Nu; ;EOE* kRR v V@OY.

CA Nu

Trust Authority -v! &CR Nu; .m VB pg jslz, -v, e! G

B @kANW%: #/GB CA Nu5 .m Vn_ UOY. L Nu: Trust

Authority CA! _`Q Nu; .m VB -v!-G kE; NuOb 'X J

dUOY.

8H Trust Authority nO -q:& gkOAi gk _N jslz! Trust

Authority CA Nu; .m Vn_ UOY. 3=8N Trust Authority nO % d

Lv& f.R ' L Nu; r; v V@OY. W D!B nO -q:NNM N

u; d;R '6Y L Nuz #/GB Xg CA Nu; YnNeR v V@O

Y.

&4e $8 35

9& in 2b 8bG SSL jslz Nu; d;OB fl!B Xg Nuz #

/GB CA Nu; ^; v V@OY.

V: NetscapeG Jb 1.:B Trust Authority -v! &COB gL. Nu;

ckR v Vz@OY. L Nu: Xg -vMG -v Nu kE W ,sLp

. Nu kE pN! kX ck !I_@OY. Ov8, NetscapeG VY 1.

:B ,sLp. Nu <G! kX CA Nu; d8UOY.

-v GB e! Nu

gkZG [wG ONN fl!B -v* e!! kQ Nu; d;R v V@O

Y. % jslz& kX &xGB nO gD; gkOJC@.

Nu; d;OB -v GB e!B PKCS #10d; |D; gkO)_ UOY.

Nu .e

Nu .e: X.509v3 NuG |D!- 1C{N dRTOY. .e; kX _! J

e& Nu! kUR v V@OY. Trust AuthorityB 6wL _`OB Nu; g

kZ $GR v V5O OB Nu .e Wl; &xUOY. L _! JeB qn

O: AN<: /vsm UOY.

RA %:)>!- 9Ze& < ' 3. S:; %COT Oi L Jei; < v

V@OY. ON fl!B Je *; w%L.R v5 V@OY.

Nu sLA gL,

Nu; d;Oi Xg Z] um-G /? b# ?H vSGB sLA gL,L C

[KOY. L sLA gL,: NuL kRGE* 8b! I ' >aKOY.

NuL ;EGB fl, u 9ZeB nO %LM#L:! [:KOY.

;E !I:

NuG ;E !I:: gkZ! RA %:)>!- /fR v VB /: _ O*

TOY.

36 Trust Authority: RA %:)> H;-

v Nu; ;E !I8N Oi, Xg NuG 8/ZB 8 NuL /?Q sBN V

B ?H! u Nu; E;R v V@OY. ;E !IQ Nu; R/Oi nO

AN<: W nO [wL \x- KOY.

v Nu; ;E R!I8N Oi Xg NuG R/ZB 8b! I 'nv bYA

_ Og W D!5 )|w NuL JdQ fl!B YC nO; X_ UOY.

nO C 8/ZB 3= nOR 'M 6y!vN pg $8& &xX_ UOY.

ON gkZB Z< ;E d;; &bR v V@OY.

v ;E !IQ jslz Nu; .m VB gkZB nO % dLv!- ;E;

d;R v V@OY.

v PKIX Xv @kANW%! W<:Ob 'Q ;E !IQ Nu; .m VB g

kZB Trust Authority ,sLp. @kANW%; gkO) ;E; d;R v

V@OY.

|.

RA |.ZN- [wOAi Uz RA %:)>; gkOAB % jslz! kX

Nu; d;Om ^F_ UOY. jslz Nu; .8Q D!B RA %:)>!

W<:OAm R '6Y jslz Nu; &bX_ UOY. RA %:)>!- S

GG nO 9Ze GB d;; 8E* W! kQ 6!& v`OAi {}Q DO

GQ; .m Vn_ UOY.

L }!-B NuG gk W |.M |CH V&i; YlOY.

W<: &n

W<: &n qO(ACL): ;N Trust Authority gkZ, e!, RA.~nG N

u W GQN)& UOY. 9& in, RA %:)> vx -m4: RA |.Z!

RA %:)>! W<:R v Vb |! ACL; gkO) nO GQ |.Z& N

uOm GQ; N)UOY.

&4e $8 37

Nu W GQN)

Nu: Ex um; &xOB ]i GQN)B n2 [w; Ob 'Q GQ; &

xUOY. Trust Authority!-B V> gkZ! 8H @kANW%! W<:Ob

|! 6wL Nuz GQN) pN& d8R v V@OY. W/i Nu 8/ZB

ZEL gk _N @kANW%L H|OYB M; .ER v V@OY.

?C |.

Trust AuthorityB \O nO 5^N; &xOv8 Q LsG RA |.Z! Xg

5^N ;!- [wR v V@OY. RA %:)> -m4z RAB ):!! LL

9Ze |C [w; Om VB fl Y% ):!! 9Ze& w%L.Ov xO5

O 3hGn V@OY. Ov8, Q LsG |.Z! ?C! 0: 9Ze& < v

B V@OY.

RA %:)> vx -m4

RA %:)> vx -m4: RA |.Z!T RA %:)> -q:& &xOB Trust

Authority @kANW%TOY. -m4: RA |.Z! 68& G`R ' $8&

]/Og RA |.Z! 9Ze! kQ /f GQ; N)R ' 9Ze& w%L.

UOY.

d; ANDO

Trust AuthorityB 6wL nO W Nu; \x-Ob 'X gkR v VB d;

ANDOG b; <.& &xUOY. d; ANDO: nO d;G S:z 3.&

&nUOY. " d; ANDO!B Nu; 'Q [C..! wTGn V@OY. v

xGB Nu |V! kQ YgQ d; ANDOL V@OY.

Wq! kQ d; ANDOG L': W S: _ O*TOY. JdQ fl!B n

O d;; BNR ' Y% d; ANDO; v$R v V@OY.

O*G d; ANDO L': d; S:z T2 *-Gm Y% d; ANDO L

': b; S:z T2 *-GB M; < v5 V@OY. LM: RA |.Z GB

38 Trust Authority: RA %:)> H;-

RA AN<:! n2 !!- d; ANDO; +C_YB M; GLUOY. d;

S:G ANDO: nO d;G Y% S:z T2 m$Gz@OY. b; S:G A

NDO: vg d; ANDOTOY.

&4e $8 39

40 Trust Authority: RA %:)> H;-

&5e |6gW

L }G V&B RA %:)>! %CGB Je 3m, /?Q Je * W S:G

GL& wTUOY. V&B RA %:)>!- Xg $8! JdOT I '!& b

X8N O) 8:Gz@OY.

68 G

68 G!- Nu GB nO d; $8& KvOB 68& XqR v V@OY.

G!B Y= bIL wTGn V@OY.

v 68 Xq& 'Q Je

v 68 G`; 'Q 68 &b \_

v 8:)! kQ 5r;

– GG F!J! VB sB 5*. L 5*: Je m/G 5r;, Trust

Authority ^Cv W AN<: _G x`| 7k& %CUOY.

– G! kQ 5r; \_

68 az! XqGi RA %:)>L Z?8N az G; %CUOY.

68 Je

68& XqR 'B JdQ 8- 9: Je& gkOJC@. ON JeG fl, g

kZ! 1CQ Y% JeM s# h8{N fl!B gkR v x@OY.

v 68 /|!- Y= _ O*& )#JC@.

– sB, L' W w%L. /%0: sB& bX8N nO d; GB NuG 9

Ze& KvOAB fl

– ;E !I: W 8b0: ;E !I:L* 8b $8! JdQ NuG 9Ze

& KvOAB fl

v 68 /|!- sB, L' W w%L. /%0; 1CQ fl, Y= Je& g

kO) Jd! {s 68& <POT R v V@OY.

© Copyright IBM Corp. 1999b 41

– sB!- qO; gkO) pg sBG Wq GB O*G /$ sB& .m

VB Wq8; KvOJC@. qO!- Y= d; sB *G O*& 1CO

JC@. b; 1C: 8y _TOY.

|< sB! |h xL pg nO d;; KvUOY.

"v uN "vH nO d;; KvUOY.

8y _

BNGE* E}Gv J: d;; KvUOY. ON 8y _N d;

: ET d;Lg gkZG a$; JdN UOY. Y% d;: g

kZ! 3.R v Vb |! `#G _! $8& bY.m VB d

;TOY. L IG: b;*TOY.

BNJ RA GB RA |.Z! BNQ d;; KvUOY. ,|H NuG s

B! Y& v5 V@OY.

E}J RA GB RA |.Z! BN; ENQ d;; KvUOY.

OaJ RA GB RA |.Z! BNOE* E}Q d;; KvUOY. L s

BN BNH d;! kX-B Xg NuL LL gkZ!T |^H

MTOY.

– Y= Je& gkO) /$ L'z ,|H d; GB NuG 9Ze8; K

vOJC@.

- :!- L'; &\Q :; TBOJC@. L'G 3= n [Z& TBO

) Xg [ZN C[OB pg :; KvR v5 V@OY. 9& in Smi

& TBOi, Smith, Smithers, SmileyW ″Smi″N C[OB b8 :!

kQ 9Ze& KvOT KOY.

- L'!- L'; TBOJC@. L'G 3= n [Z& TBO) Xg .

ZN C[OB pg L'; KvR v5 V@OY. 9& in ″Joh*″&

TBOi, Johanna, John, JohanW ″Joh″N C[OB b8 L'L wT

H 9Ze& KvOT KOY.

– V> w%L. /% |'& gkO) /$ b# ?H V>{8N w%L.

H Wq8; KvOJC@. /%G |'& v$OJC@.

- /% *!B v$H b;*L x@OY.

42 Trust Authority: RA %:)> H;-

- n@ Je!-g /%& v$Ov J8i 68G *SvM O!OB pg

9Ze& KvUOY.

/%& &xOAi ^B; -/ , Y= xOB /%& )#JC@. /%&

w" TBOB fl!B ^B! gkH Mz ?OQ |D; gkO) X:

. sZ& $lJC@.

C[ |'!- !e L% /%.

L Je& xi8N 2\ NB fl 68B >a JeG /% L|

(Xg /% wT)! w%L.H pg 9Ze& KvUOY.

>a |'!- !e VY /%.

L Je& xi8N 2\ NB fl 68B C[ JeG /% LD

(Xg /% wT)! w%L.H pg 9Ze& KvUOY.

v 68 /|!- ;E !I: W 8b0; 1CQ fl, Y= Je& gkO) J

d! {s 68& <POT R v V@OY.

– ;E !I:!- qO; gkO) NuG ;E !I )N& bX8N 68

& OJC@. qO!- Y= * _ O*& 1COJC@.

;E !I

Fw 8b! Gv J: fl Nu; ;ER v V@OY.

;E R!I

Nu; ;ER v x@OY.

– 8b /%G |'& gkO) /$ b# ?H! 8b! 9$Gn VB Wq

8 KvOJC@. /%G |'& v$OJC@.

- b;*: x@OY.

- n@ Je!-g /%& v$Ov J8i 68G *SvM O!OB pg

9Ze& KvUOY.

/%& &xOAi ^B; -/ , Y= xOB /%& )#JC@. /%&

w" TBOB fl!B ^B! gkH Mz ?OQ |D; gkO) X:

. sZ& $lJC@.

C[ !e L% 8b /%.

&5e |6gW 43

L Je& xi8N 2\ NB fl 68B >a JeG /% L|

(Xg /% wT)! 8b! GE* 8bI 9$N pg 9Ze& K

vUOY.

>a !e J: 8b /%.

L Je& xi8N 2\ NB fl 68B C[ JeG /% LD

(Xg /% wT)! 8b! GE* 8bI 9$N pg 9Ze& K

vUOY.

v Y= Je _ O* GB pN& gkO) 68G 3. W %C& &nOJC

@.

Kv Q5

68M O!OB 9Ze v! s6gv s|Ov Jm KvR 9ZeG

Vk v. Y= _ O*& 1COJC@.

– 50

– 100

– 150

– 250 (b;*)

– +&Q(O!OB pg 9Ze& KvT)

dLv )b

az GG " dLv! %CR 9Ze v. 68 az!- L dLvi

; L?X !g JdQ 9Ze& #; v V@OY. Y= _ O*& 1

COE* %CGB b;* '! }Z& w" TBOJC@.

– 10

– 15(b;*)

– 20

– 25

g| $GH 68

g| $GH /OQ 68B 8y _N pg d;; KvOB b; 68TOY.

44 Trust Authority: RA %:)> H;-

Kv Q5 IG

68 G!- Kv Q5 3$! gkR v VB IG: Y=z 0@OY.

v 50

v 100

v 150

v 250 (b;*)

v +&Q(O!OB pg 9Ze& KvT)

L IGi: az GG 68 az! %CGB 9Ze v! 5b; L(OY.

dLvg 9Ze v IG

68 GG dLvg 9Ze v!- 1CR v VB IG: Y=z 0@OY.

v 10

v 15(b;*)

v 20

v 25

v %CGB b;* '! TBOB SGG v

L IGi: az GG 68 az %C! 5b; L(OY.

az G

az G!- 68 G`G az& < v V@OY. G!B Y= bIL wTGn V

@OY.

v 68 az! wTGn VB %

– " `!B 68M O!OB WqG 9Ze! in V@OY.

– -G *! bX8N `; $DR v V@OY.

– -G )b& 6$O) W Jq& /fR v V@OY.

– %G dLv! %C -i8Y u d fl! -iL?; kX az& < v

V@OY.

– az! 9v dLv! ID VB fl Y= dLvM L| dLv& -/ d

Lv& < v V@OY.

&5e |6gW 45

V: Y= dLv* L| dLv& d;R 'B `#G v,L V; v5 V

@OY. dLvB gkZ! JdN R ' -v!- KvGGN vg d

Lv8 NCN gkR v V@OY.

v xOB fl NuG /? b#; 3$Ob 'Q Je

v d; BNC xOB fl Y% d; ANDO; v$Ob 'Q Je

v 1CQ Q LsG Wq; 3.OB % gkR v VB 6!G 1C qO. 6!

! kRN fl kR! kQ g/ 1C qO5 V@OY.

v gkZ! v`OB 6!! kX V.; 7NR v VB V. Je

v 9Ze& 8Y s<OT %COb 'Q <NgW %C \_. L \_& )#i

RA %:)>L <NgW G; %CUOY.

v gkZ! 1COB 6!& OaOb 'Q 6! &b \_

v 8:)! kQ 5r;

– GG F!J! VB sB 5*. L 5*: Je m/G 5r;, Trust

Authority ^Cv W AN<: _G x`| 7k& %CUOY.

– G! kQ 5r; \_

68 G; )#i 68 G8N 9F!- 68& <POT OE* Y% 68& X

qR v V@OY.

|. 6!

9Ze |C [w! kQ c!! gkR v VB /OQ 6!TOY. Y= _ Q

!v& < v V@OY.

BN nO d;; BNO) nOZ!T d;Q Nu; &xR v V@OY.

8y /v

a$; ,bUOY. \N R:NNM $8& TvR Jd! V; ' GB

\v 9Ze! V.; _!OAm R ' LM; gkOJC@.

E} nO d;; E}UOY.

kR NuG /?:; >aUOY.

46 Trust Authority: RA %:)> H;-

V: g/& 8yN O) Nu; kROB fl!B NuL 8b! Gv J

B Q _D! 6!& x9R v V@OY. g/& CRL!- &EN

Ob8 Oi #\w Xg Nu; YC kRR v V@OY.

d;; ;E R!I8N T

;E !IQ Nu; ;E R!I8N /fUOY.

d;; ;E !I8N T

;E R!IQ Nu; ;E !I8N /fUOY.

gk !IQ 6! x=

gkZ! nO 5^N!- 9Ze& < v VB GQ8 .m V=; *8

@OY.

Nu kR g/

Nu; kRR 'B kR g/& 1CX_8 UOY. Y=: Nu; kRR ' 1

CR v VB /?Q g/iTOY.

9ZeG <NgW; %COm 3. S:; < ' kR g/ S:!B Y= * _

O*! wTI v5 V@OY.

CA 0! UsJ

Nu b|G 0! UsGz@OY.

NuL k<J

gkZ! u Nu; .m V8GN Xg NuL JdOv J@OY.

g/ x=

gkZ! g/& &xOv Jm kR& d;_@OY.

x! k5! u Ls /?Ov J=

Nu R/Z! u Ls x!G k5& 'Q Nu; JdN Ov J@OY.

gkZ !T /f

gkZ! u Ls Nu; JdN _x !TG; .m Vv J@OY.

gkZ 0! UsJ

gkZG 3Nk 0! UsGz@OY.

&5e |6gW 47

V: Y= g/B kR 6!! v$gWL }b5O UOY.

Nu 8y

Nu; kROb8YB q0:-Ob 'Q kR 6!& /fUOY. CRL

! vOGn VB ?H 8b! Gv JB fl! QX Xg Nu; *_

! 0:-R v V@OY. F!G CRL!- &E& |mOJC@.

CRL!- &E

8y _N Nu! kQ kR 6!& /fUOY.

v NuL 8b! H fl! CRL!- Xg Nu; &EO) CRL; $

.UOY.

v NuL 8b! Gv J: fl!B YC 0:-KOY.

<NgW G

<NgW G!-B 68M O!OB 9Zei!- gkZ! 1CQ 9ZeG <N

gW; < v V@OY. G!B Y= bIL wTGn V@OY.

v 8AB <NgWG /|; 1COb 'Q qO. L qO!B WqG 6! w:

d.M Xg Wq! SOB )/ S: WlL wTKOY. 53 dLvG :<N

gW Wl;!-B L Wli! kX 3mUOY.

v gkZ! 1CQ <NgWG /|; %COB %

– S:; %COB fl " `!B S:z W *L wTKOY. nO d;;

BNR 'B ON *; w%L.R v V@OY.

– 6! w:d.& %COB fl " `: Wq! kX kXx 6!& *8@

OY.

– -G *; bX8N `; $DR v V@OY.

– -G )b& 6$O) W Jq& /fR v V@OY.

v xOB fl NuG /? b#; 3$Ob 'Q Je

v d;; BNR ' xOB fl Y% d; ANDO; v$Ob 'Q Je

v gkR v VB 6!G 1C qO. 6!! kRN fl kR! kQ g/ 1C

qO5 V@OY.

v gkZ! v`OB 6!! kX V.; 7NR v VB V. Je

48 Trust Authority: RA %:)> H;-

v -i; ;EOb 'Q <NgW -i ;E \_

v gkZ! 1COB 6!& OaOb 'Q 6! &b \_

v 8:)! kQ 5r;

– GG F!J! VB sB 5*. L 5*: Je m/G 5r;, Trust

Authority ^Cv W AN<: _G x`| 7k& %CUOY.

– G! kQ 5r; \_

68 G; )#i 68 G8N 9F!- 68& <POT OE* Y% 68& X

qR v V@OY. az G; )#i az G8N 9F!- 68 azM |CH [

w; hSR v V@OY.

6! w:d. L%.

az GG 68 az %M <NgW GG 6! w:d. %B /gQ -; .m

V@OY. d; sB -: nO d;! kQ RA 6!& 3mUOY. Oa sB

-: d;! kQ 3. sB& 3mUOY.

v az GG 68 az %B 68 azG " Wq! kQ vg sB& %CUO

Y.

v <NgW G! VB 6! w:d. %G -: %CGB WqG vg sBS8

FOs L|G " sB5 %CUOY.

d; W NuG S:

Y= S:i: d; S:8N PyKOY. ON S:G *: /fR v V@OY.

qnO: AN<: /v

nO AN<: _! 6wL &xOB *. NuG kR g/B L S:!

- gkR v V@OY.

Z] um- 8b OZ

NuG 8b 9$ /%.

Z] um- ;E !I sB

NuG ;E !I )N& *8@OY.

&5e |6gW 49

Z] um- UUID

%LM#L: 9Ze! vN; &xOb 'X }:GB Vd 0N |k m

/ D0Z.

@y Ze

_}Q @yG /|; *8;B ;N Ze. L JeM @y b3 JeB

?OQ @y! kX 3mUOY.

@y b3

RA %:)> d;; 3.OB ?H @y! _}Q Trust AuthorityG A

N<: GB b8 dR.

L' E;ZG L'. k3B E;ZG L'; *8;v8 _# L'L* _#

L' S.[Z! *! wTI v5 V@OY.

Oa sB

d;! kQ 3. sB. 6! w:d.! L sB& %CUOY. 53 dL

vG :nO d;G sB;!-B " sB *; 3mUOY.

: E;ZG :.

L| d; ID

NuL ;EH fl L|G nO d;! kX }:H ID& *8;B N

ZyH .Z-.

nO 5^N

NuG 8/Z!T H|Q Zx; &xOB nO 5^N.

d; ID

nO d;! kX }:H ID& *8;B NZyH .Z-.

d; ANDO L'

nO d;G 3.& 'Q &n. L ANDO!B Nu! kQ [C..!

wTGn V@OY. L ANDOG *: ANDOz sLR fl gkZ!

v$Q b8 gW! l1UOY. 51 dLvG :&xH Nu /|;!-B

" d; ANDOz ,|H NuG /!! kX 3mUOY.

V: 9Ze! kQ S:; < ' N 3G d; ANDOL *-GB M;

< v5 V@OY. d; S:: O*G ANDO; *-Om b; S

50 Trust Authority: RA %:)> H;-

:: Y% ANDO; *-R v V@OY. LM: RA |.Z! z

EG n2 C!! d; ANDO; +CQ {L V=; GLUOY. d

; S:G ANDO: nO d;G Y% S:z T2 m$Gz@OY.

b; S:G ANDO: vg d; ANDOTOY.

d; sB

nO d;G sB. 6! w:d.! L sB& %CUOY. 53 dLvG

:nO d;G sB;!-B " sB *; 3mUOY.

d; /v

nO AN<: _! d;Z! &xQ *.

Nu .e

.e: L'=* VG |BN Nu! _!Gg Nu! kX %CGB S:! SR

v5 V@OY. Y=G Nu .e: 8H @kANW%; gkOAB 3NG Nu

; 'X vkR v V@OY.

v b; &`

v 0 k5

v L' &`

v 3Nk 0 gk b#

v V< 3< L'

&xH Nu /|

Trust Authority C:[: vxGB Nu |V W ANd]! kQ )/ Nu /

|; &xUOY. /f gW!B Y% /? b#L wTKOY. NuG L': X

g NuG /? b#z 0G Vd k5& KAVB %Cb *R; UOY. )/ b

I! kQ 3m; 8Ai kn}; |mOJC@.

CA s# Nu

Nu; 8/OB CA! Nu; _`Q CA! GX EZGB Nu; !z

v V5O UOY. L Nu: pvP -m W NN @b& &xUOY.

&5e |6gW 51

1b W 2b 8b %LM O#-

8/Z! %LM& O#-R v V5O UOY. L Nu: Y% q{8N

gkGv J@OY.

1b W 2b E-mail 8#

8/Z! S/MIME(Secure Multi-Purpose Internet Mail Exchange)A

Nd]; gkR v VT UOY. L ANd]: |Z lm GB b8

MIME @j'.& 8#UOY. b3G Nu, ^Cv +a:, _E NN @

b W bP:; &xUOY. V> gkZ! kQ O]{N 1CTOY.

1b W 2b 8b IPSec

NM] ANd] P68N NM] s! |[GB %LMG +a: W b

P:; 8eUOY. IPSec Nu: gkZ 8YB %LM& 'Q MLg,

>> slM! v$KOY.

1b W 2b 8b 0 O#- |k

8/Z! 0& O#-R v V5O UOY. L Nu: Y% q{8N g

kGv J@OY.

1b W 2b 8b NN @b

^CvG _E NN @b* vE NN @b& fvOb 'X ^Cv O#

- W pvP -m bI; &xUOY.

1b W 2b 8b -m |k

8/Z! DO; pvP fD8N -mR v VT UOY. L Nu: Y

% q{8N gkGv J@OY.

1b W 2b % ,sLp. Nu

% jslz! ,sLp. Nu SSL <G! |)R v VT UOY. L

Nu; kX jslz gkZB /$ 8H % gL.! W<:R v V@

OY. Nu: pvP -m, NN @b W 0 O#-& &xOg, V> g

kZ! kQ O]{N 1CTOY.

1b W 2b % -v Nu

-v! -v Nu SSL <G! |)R v VT UOY. L Nu: pvP

-m W 0 O#-& &xUOY.

52 Trust Authority: RA %:)> H;-

Y% ):!& 'X g|nOOB nOZ* gw: {UQ Nu /|; d;R v

V@OY. d; ANDO; v$R 'B Nu /|G O*! kQ [C..! w

TKOY.

V: gkZ! 8B qO: L qOz O!Ov J; v5 V@OY. 6w! {s

-B L' GB Ivn &x Wqnv /f_; v Vb '.TOY. gkZ

! 8B qO: GQ nO 5^N! kQ gkZG GQ! {s ^s}OY.

<NgW Wl

<NgW G!- %C Je& gkO) 8AB S:G Wl; 1CR v V@O

Y. RA %:)>G pg <NgW; < v VB M: FUOY. ON S:: Q

LsG Wl! *83OY. gkZ! < v VB <NgWG >yB Y=z 0@

OY.

b; S:

%LM#L: 9ZeM ;z{8N ,|H S:.

d; S:

nO d;; 3mOB S:.

3. S:

gkZG qnO: $%! {% 3.& 3mOB S:. L S:!B kR

g/ S:L wTKOY. S: *: 8yGE* GB 9xC0b 'X CRL

!- &EH Nu; D0OB %! 5r; ]OY.

6! w:d.

d; GB OaH d;! kX kXx pg 6!G %.

nO d;G sB

pg sBB 6! w:d.G L%.TOY.

d; sB!B Y=L wTKOY.

BNJ nO d;L BNGz@OY.

OaJ RA GB RA |.Z! nO d;; BNOE* E}_@OY. BNH d

;G fl!B NuL gkZ!T |^Gz@OY.

&5e |6gW 53

V: LM: nO d;! kQ V> d; sBTOY. OaH d;G Oa

sBB d;! 5b; L!B DS 6!M L%.& |6UOY. 9&

in, NuL ;EGE* kRGB fl Oa sBB Xg gW; *

8;v8 d; sBB )|w OaJTOY.

8y _

nO d;L KdGz; v Vv8 Fw BN GB EN& bY.m V@

OY.

"v nO d;L "vGz@OY.

E} nO d;L E}Gz@OY. NuL _`Gv JR@OY.

Oa sB!B Y=L wTKOY.

|^ gkZ! LkR v VB % dLvN NuL |^Gz@OY.

.$ |^

gkZ! Nu; % jslzN YnNeO4@OY.

_` nO d;L BNGm NuL _`Gz@OY.

L_` NuL Fw _`Gv JR@OY. L sBB d;! kX 6!! kX3

Bv )N& *8;v J@OY.

;EJ 9ZeM ,|H Nu! ;EGn az{8N u 9ZeM ET NuL }

:KOY.

kRJ 9ZeM ,|H NuL kRGn Z] um-! +?UOY.

G 5r;

RA %:)>: pg G! xk{N Y= 5r;; &xUOY.

sB 5*

GG F! J! VB L 5*: Y=; %CUOY.

Je m/ 5r;

6l:& Je '! u8i Xg Je! kQ 5r;L %CKO

Y.

54 Trust Authority: RA %:)> H;-

Trust Authority ^Cv

^Cv! fmNv @yNv& *8;B FL\z T2 -iL?

!IQ X:. sZ! %CKOY.

x`| 7k

gkZ! d;Q AN<:G x`|; 8) ]OY.

5r; \_

L \_& -/ gk _N G! kQ 5r;; %CR v V@OY.

V: gkZ! %COB 5r;!B nO GQ %:)> H;-! kQ q

w5 wTKOY. qw!- Xg Wq; )#i L %! in VB S

GG V&& %CR v V@OY.

|C V&

18 dLvG :G # L?;

Internet Explorer k JVM

Internet ExplorerM T2 gkOb 'Q RA %:)>; 3!Ob |! Java !

s bh(JVM)G Y= 1.:& .m Vn_ UOY.

v 1.: 5.00, te 3167 Ls

.m VB MS JVMG v|; G0OAi Y= _ O*& v`OJC@.

v Internet Explorer!- Java \V; )JC@.

v DOS mI`; -m jview& TBOJC@.

8mGB v| x#B 5.00.3167LsLn_ UOY.

gk _N JVM; wW9LeX_ OB fl!B Javak Microsoft bz % d

Lv!- JdQ 1.:& YnNeR v V@OY.

&5e |6gW 55

6l:G 08e k<

6l: xL RA %:)>; gkX_ OB fl!B Y= %& |6OJC@.

?-/J! '! 0 6[

O]

C#>a D! <G gC[ F5 0

RA %:)>; >aUOY. Ctrl-x

vg %CH G! kQ 5r;; >OY. F1 0

G H!-G [w

kNPG Je!- G 9LmN L?UOY. Ctrl-'J -l%

G Y% G 9Lm; 1COm Xg G; %

CUOY.

@%J -l%B Y= G8N L?C

5OY. ^J -l%B L| G8N

L?C5OY.

G H!- -iL?UOY. PgDn 0B F!J8N -iL?UO

Y. PgUp 0B 'J8N -i L?

UOY.

Je H!-G [w

kNPG Je!- Y= JeN L?UOY. Tab

kNPG Je!- L| JeN L?UOY. Shift-Tab

% GB X:. 5*!- Y= JeN L?U

OY.

Ctrl-Tab

% GB X:. 5*!- L| JeN L?U

OY.

Ctrl-Shift-Tab

56 Trust Authority: RA %:)> H;-

?-/J! '! 0 6[

% H!-G [w

- * bX8N `; $DUOY. Alt-n. )b!- n: %CGB -G

vNTOY. 9& in, N x0 -;

bX8N $DOAi Alt-2& )(O

Y.

- )b& 6$UOY. 6l: xLB R!IUOY.

`!- `8N L?Om `; 1CUOY. F!J -l%B Q ` F!N L?

UOY. 'J -l%B Q ` 'N L

?UOY.

`G |'& 1CUOY. Shift-'J -l%* Shift-F!J -

l%! |'!- " `; 1CUOY.

N"Ov J: `; 1CUOY. 6l: xLB R!IUOY.

` ;G ?!- ?N L?UOY. Tab 0B Q ? @%J8N L?UO

Y. Shift-Tab 0B Q ? ^J8N

L?UOY.

m} !IQ fl vg ?; m}UOY. F2 0B m}R ?; 1OY. Enter

0B /fgW; .`Om ?!- *

)OY. Esc 0B /fgW; .`O

v Jm ?!- *)OY.

qOG Wq! kQ [w

qO; 1OY. 'J -l% GB F!J -l%.

WqG qO; L?UOY. F!J -l%B F!N L?UOY.

'J -l%B 'N L?UOY.

qO!- Wq; 1COm qO; ]@OY. Enter 0

1CgW; /fOv Jm qO; ]@OY. Esc 0

>a D Y= JeN L?UOY. Tab

&5e |6gW 57

?-/J! '! 0 6[

sp@ \_ <.! kQ [w(<.B O*G JeN #VJ)

sp@ \_ gL& L?Om W _ O*&

1CUOY.

F!J -l%B F!N L?UOY.

'J -l%B 'N L?UOY.

Je& >aUOY. Tab

/% 3$

/% Je ;!- ?-& L?UOY. @%J -l%B @%J8N L?UO

Y. ^J -l%B ^J8N L?UO

Y.

/% Je!- ^B; 1OY. 'J -l% GB F!J -l%

^BG ,5& /fUOY. Ctrl-PgDn 0& )#i 1b U8N

L?UOY. Ctrl-PgUp 0& )#i

1b ZN L?UOY.

^BG y; /fUOY. PgDn 0& )#i Q ^ U8N L

?UOY. PgUp 0& )#i Q ^

ZN L?UOY.

^B!- Xg yG 3= GB ! NP8N

/fUOY.

Home 0& )#i yG 3=8N L

?UOY. End 0& )#i yG !

8N L?UOY.

^BG V& /fUOY. F!J -l%B Q V F!N L?

UOY. 'J -l%B Q V 'N L

?UOY.

^B!- /; /fUOY. @%J -l%B Og @%J8N L

?UOY. ^J -l%B Og ^J8

N L?UOY.

^B!- @C /%N L?UOY. Ctrl-Home

-6%CH /%& 1CUOY. Enter

/%& 1COv Jm ^B; ]@OY. Esc

mI \_! kQ [w

mI \_N L?UOY. Tab

mI; G`UOY. xi 0 GB Enter 0

58 Trust Authority: RA %:)> H;-

VGgW

L %G $8B L9!- &xGB &0 W -q:& 'Q MTOY. Y% *s!

-B L %! p^H &0, -q: GB bIiL &xGv J; v5 V@OY.

vg Xg v*!- gkL !IQ &0 W -q:! kQ $8B IBM 5wk%

!T .GOJC@. IBM &0, ANW% GB -q:& p^_Ym X- Xg IBM

&0, ANW% GB -q:8 gkR v VYB GLB FUOY. IBMG v{ g

jG; 'XOv JB Q bIs ?nQ Y% &0, ANW% GB -q:& kE

gkR v V@OY. W/*, IBMg L\G &0, ANW% GB -q:& gk

R ' W [?; r! W KuOB M: gkZG %STOY.

IBM: L %!- mGGB V&! kX /c& .m VE* vg bx_O v V

@OY. L %; &xOB ML /c! kQ gkG; N)OB M: FUOY. g

kG! |X-B -i; kX F! VRN .GOG v V@OY.

150-010

-o/0C 5nw8 )G5? 25-11, Qxty

Q9 FL.q.% VD8g

v{gjGN

2YL.(DBCS) $8! kQ gkG! |X-B Xg v*G IBM v{gjGN

N .GOE* -i; kX F! VRN .GOJC@.

IBM World Trade Asia Corporation Licensing

2-31 Roppongi 3-chome, Minato-ku

Tokyo 106, Japan

Y= ;k: 59 W Xg v* }T! O!Ov JB 9!!B {kGv J@O

Y. IBM: n0Q >yG mC{ GB OC{ 8u xL L %; :vskN; &

xUOY. )b!B /$ q{zG {U: GB GE !I:, q'X n! kQ O

C{ 8uL wTG* L! 9QGB M: FUOY. ON 9!!-B /$ E!

! Vn- mC{ GB OC{ 8uG wb! ckGv J; v5 V@OY. {s

- L ;kL gkZ!T {kGv J; v5 V@OY.

© Copyright IBM Corp. 1999b 59

L %!B bzsG N$.:L* bGsG @y! V; v V@OY. L %G $

8B $b{8N /fGg, /fgW: 3$G! kUKOY. IBM: g| kv x

L p&s5 L %!- 3mOB &0 W ANW%; /fOE* 31R v V@

OY.

L %!- |6Q IBM L\G % gL.B \v mG& 'X &xH MLg X

g % gL.& _5Ob 'Q ML FUOY. Xg % gL.G ZaB ; IBM

&0; 'Q ZaG ON! FOg W/Q % gL.& gkOB M: gkZ ;

NL 1CR .&TOY.

IBM: m4L &xOB $8& m4!T n0Q G+5 N)Ov Jm {}OY

m }"OB fD8N gk GB PhR v V@OY.

(i) 6Z{8N [:H ANW%z(L ANW%; wTO)) b8 ANW% #G $

8 3/, (ii) 3/H $8G s# gk nG q{8N L ANW%! kQ $8&

xOB gkGZB F! VRN .GOCb YxOY.

150-010

-o/0C 5nw8 )G5? 25-11, Qxty

Q9 FL.q.% VD8g

RA.~n gw;N

L/Q $8B gka n; qTX- Xg b# W 6G! {s gkL !IUO

Y.

L %!- 3mOB gkG ANW%z W/Q ANW%; gkR v VB pg

gkG Zai: IBM m4 h`-, IBM 9& ANW% gkG h`- GB L

M ?nQ h`6GO!- IBM! GX &xKOY.

)b! wTH :I ZaB &nH /fO!- x$Gz@OY. W/GN b8 n

5 /f!- r: azM )T Y& v V@OY. ON x$*: 3_ \h C:

[!- r: MO v V8g, L/Q x$*L O]{8N gkR v VB C:[

!-5 0; MLsm 8eR v x@OY. S8 FOs, ON x$!B _$; k

X r: MLGN G& *z Y& v V@OY. L %G gkZB /$ /f! X

gGB Za& .NX_ UOY.

60 Trust Authority: RA %:)> H;-

IBM &0 L\G M! |Q $8B Xg &0G &6w< W b#0, W\ gk

!IQ xD R:& kX 8Q MTOY. IBM: IBM &0L FQ Mz |CH

R8gWL* :I W #/: .&! kX-B 8eOv J8g WM 0: &0:

W:.Ov JR@OY. IBM &0L FQ &0G :I! kQ .GB Xg &6

w<N OJC@.

IBMG bD fbL* G5! |Q xmB g| kv xL /fGE* 68I v

V8g LB \v q{L* q%& &COB M! v*v J@OY.

%CH pg IBM &0G !]: IBMG Ge RqZ !]LZ C<Lg g| k

v xL /fI v V@OY. E! !]: YgR v V@OY.

s% W -q: s%

Y=: L9 GB b8 9!! nOH IBMgG s%TOY.

IBM

AIX

AIX/6000

DB2

DB2 Universal Database

SecureWay

WebSphere

Trust Authority ANW%(″ANW%″)!B DB2 Universal DatabaseG ON! w

TGn V@OY. ANW% gkG; .m, ANW%L gk GB }:OB %LM

G ze W |.k8N gkOB fl!8 L 8:dRi; 3! W gkR GQ

L V@OY. 9& in, 68 GB 8m- }:; 'X Y% @kANW%G %

LM#L:N ;N ,aOB M: gkG! wTGv J@OY. ANW%L 3!H

Mz ?OQ bh!- L ANW%z T2 gkOB fl!8 L 8:dRi; 3

! W gkR GQL V@OY.

ANW%!B IBM WebSphere Application ServerW IBM HTTP Web

Server(″IBM -v″)G ON! wTGn V@OY. ANW%! kQ gkG; .

m VB fl! FOi IBM -v& 3!OE* gkR GQL x@OY. IBM -

VGgW 61

vB ANW%L 3!H Mz ?OQ bh! sVX_ Og IBM -v& ANW

%z 05N 3!OE* gkR GQ: N)Gv J@OY.

Java W pg Java b] s% W NmB L9 W b8 9!! nOH Sun

Microsystems,Inc.G s%TOY.

Microsoft, Windows, Windows NTW Windows NmB L9 W b8 9!!

nOH Microsoft CorporationG s%TOY.

UNIXB X/Open Company Limited.& kX 6!{8N gkGL N)GB L

9 W b8 9!!-G nOs%TOY.

Pentium: L9 W b8 9!! nOH Intel CorporationG s%TOY.

L ANW%!B RSA Data Security, Inc.NNM &x^: 8H R

A.~n! wTGn V@OY. Copyright © 1994 RSA Data Security, Inc. All

rights reserved.

L ANW%!B Hewlett-Packard CompanyNNM &x^: STL(%X [C..

sLj/.)L wTGn V@OY. Copyright (c) 1994.

v gkZB IBM! qk; vROv Jm L RA.~nM H;-& n2 q{8

Ng gk, 9g, v$, hw GB GER v V@OY. \, 'G z[G $8&

pg 9g;! mCX_ Og, &xOB H;-! 'G z[G $8M L c!

$8& pN mCX_ UOY. Hewlett-Packard CompanyB L RA.~nG

SG q{zG {U:; 8uOv J8g, mC{ GB OC{ 8u xL ″vs

kN″ &xUOY.

L ANW%!B Silicon Graphics Computer Systems, Inc.8NNM &x ^:

STL(%X [C.. sLj/.) RA.~n! wTGn V@OY. Copyright (c)

1996–1999.

v gkZB IBM! qk; vROv Jm L RA.~nM H;-& n2 q{8

Ng gk, 9g, v$, hw GB GER v V@OY. \, 'G z[G $8&

pg 9g;! mCX_ Og, &xOB H;-! 'G z[G $8M L c!

62 Trust Authority: RA %:)> H;-

$8& pN mCX_ UOY. Silicon GraphicsB L RA.~nG SG q{

zG {U:; 8uOv J8g, mC{ GB OC{ 8u xL ″vskN″ &

xUOY.

b8 8g, &0 W -q:m: 8g m/G s% GB -q: s%TOY.

VGgW 63

64 Trust Authority: RA %:)> H;-

|C $8

Trust Authority &0 H;-B IBM SecureWay Trust AuthorityH;-

CD-ROM! PDF(L? !I .- |D) W HTML |D8N &xGn V@OY.

ON #`0G HTML v|: &0z T2 3!Gg gkZ NMdL:& kX W

<:R v V@OY.

#`0L &[H LD &0L /fGz; v5 V=; VvOJC@. VYG &0

$8 W gkZ! 1CQ pn W |D8N H #`0! W<:OB }! kQ Z

<Q ;k: ReadmeDO; |mOJC@. VE v|G ReadmeDO: Y= V

R! VB IBM SecureWay Trust Authority% gL.G Library dLv!- T

vR v V@OY.

http://www.ibm.com/software/security/trust/library

Trust Authority sLj/.!B Y=G H;-! wTGn V@OY.

3! W G`

L %!-B &0G 3d& &xUOY. &0 d8gW; *-Om 3! }

w& 3mOg " &0 8:dR! gk !IQ BsN 5r;! W<:

OB f}! kQ $8& &xUOY. L %: &0z T2 NbGn h

wKOY.

C:[ |. H;-

L %!B Trust Authority C:[ |.! kQ O]{N $8! wTG

n V@OY. -vG C[ W _v, O# /f, -v 8:dR |., (g

v` W %LM +a: !K G`; 'Q }w! wTGn V@OY.

8: H;-

L %!B 3$ 6}g& gkO) Trust Authority C:[; 8:OB f

}! kQ $8! wTGn V@OY. 6}g& 'Q BsN 5r;; 8

B ?H L H;-G HTML v|! W<:R v V@OY.

nO GQ %:)> H;-

L %!B RA %:)>; gkO) Nu sLA gL, |<! ID N

© Copyright IBM Corp. 1999b 65

u; |.OB f}! kQ $8! wTGn V@OY. %:)>G BsN

5r;; 8B ?H L H;-G HTML v|! W<:R v V@OY.

gkZ H;-

L %!B Nu 9f W |. f}! kQ $8! wTGn V@OY. Trust

Authority jslz nO gD; gkO) Nu; d;, ;E W kRO

b 'Q }w! &xGn V@OY. GQ PKIX Xv Nu; 'X g|n

OOB f}z Trust Authority ,sLp.& gkO) L Nu; |.O

B f}! kX-5 p^Om V@OY. ,sLp.G BsN 5r;; 8

B ?H L H;-G HTML v|! W<:R v V@OY.

Trust Authority % gL.G Library dLv!B Trust AuthorityG 3!, |.

W gk! 5rL GB b8 .-! wTGn V@OY. 9& in, nO AN<

:& gkZ $GOB f}! kQ _! v'; < v V@OY.

66 Trust Authority: RA %:)> H;-

kn}

L kn}: ;.! *@B uNn kn* #

wOv J: knM W `n& $GOm gk

Z! |I Vn R kn& $GOm V@OY.

kn W W $GB Y= Za!- _iQ MT

OY.

v IBM Dictionary of Computing, New York:

McGraw-Hill, 1994.

v American National Standard Dictionary for

Information Systems, ANSI X3.172–1990,

American National Standards Institute

(ANSI), 1990.

v The Answers to Frequently Asked

Questions, Version 3.0, California: RSA

Data Security, Inc., 1998.

!

!s 3Nk W.v)(VPN). |-1L FQ NM]; g

kO) x] ,a; 8`OB 3Nk %LM W.v). g

kZiL |- 8g! FQ NM] -q: &xZ(ISP)&

kX |g{ W.v) Zx! W<:Ob '.! 6w<

!- x] W<: qk; sg NP }`R v V@OY.

VPN: GQ %LM 3/G 8H:; bsC5OY. b8

G f-. bzG fl ^Cv ;k: O#-C3 v V

8* R: W VRB O#-C3 v x@OY. VPN b

z!-B gkZ! |< $8 P6(;k W lu); O#

-Om 86-Q MN ,a; .3R v V@OY.

(g NW. Trust Authority!- (g L%.6Y O*

?G 9Ze& zeOB %LM#L:G WLm.

(g -v. (g ,sLp.NNM (g L%.& vE

Om L& (g NW! bOOB Trust Authority -v.

(g -jC:[. Trust Authority!- 8H |C 6!

! kQ Nk; vxOB -jC:[. ]6 -q: jw

; 'Q xk 0 O# [:}!- _%Q %X <. _

X9.57 %XG GegW; XvUOY.

(g _{. m.{ fN |D8N H %LMN-, L%.

x-& ,aOB %LM. (g _{; kX .#hGL*

Xg 0?G bO; _{R v V@OY.

(g ,sLp.. Trust Authority (g -vN (g L

%.& |[OB C:[G SG ,sLp.. (g ,sL

p.B (g -vN L%.& |[Ob |! (g -vM

G ,a; 3$UOY. ,aL 3$H D ,sLp.B (

g -jC:[ ,sLp. sLj/.& gkO) L%.

& (g -v! |^UOY.

3f| %LM#L: ,a:(ODBC). -N Y% %LM

#L: C:[; W<:Ob 'Q %X.

3f| C:[ s#,a(OSI). ISO!- NuQ D;M

W.v7 %X L'.

3Nk 0. R/Z8 gkR v VB xk/3Nk 0 V

G 0. L 0& kX R/Z! 3Nk .#hG; vEO

E* pvP Nu; v`R v V@OY. 3Nk 0N -

mH %LMB Xg xk 0N8 .NL !IUOY. x

k 0M q3OJC@. GQ xk/3Nk 0 V; |mO

JC@.

TL.~L. q#/ W.v) GB @kANW%L -N

kER v V5O OB bI{ \'.

© Copyright IBM Corp. 1999b 67

f. p:d. W<: ANd](LDAP). p:d. W<

:! gkGB ANd].

xk 0. Y% gkZ! gkR v V5O X VB x

k/3Nk 0 VG 0. .#hG; 0 R/Z!T v$O

E* pvP Nu; .NR v V5O UOY. xk 0N

O#-H %LMB Xg 3Nk 0N8 X6L !IUO

Y. 3Nk 0M q3OJC@. GQ xk/3Nk 0 V;

|mOJC@.

xk 0 O# [:} %X(PKCS). YgQ D;M w<

G k%Ziz T2 RSA ,8R!- 1991b! 3_Q q

x D { N w < # % X . L % X : RSA O # - ,

Diffie-Hellman y`, O# b] O#-, .eH Nu 8

., O#- ^Cv 8., 3Nk 0 $8 8. W.m N

u 8.; 8fUOY.

v PKCS #1: RSA xk 0 O#- C:[; gkT8

Na %LM& O#-OB f}; 3mUOY. pvP

-m W pvP @u! gkOB ML W q{TOY.

v PKCS #7: O#- ^CvG O] |D; v$UOY.

v PKCS #10: Nu d;G %X 8.; v$UOY.

v PKCS #11: :6. +e nG O#- e!& 'Q b

z 63{ ANW!V NMdL:& $GUOY.

v PKCS #12B gkZG 3Nk 0, Nu, b8 qP $

8 n; zeOE* |[Ob 'Q L? !IQ |D

; v$UOY.

xk 0 ON86(PKI). xk 0 O# [:}; b]8

N OB 8H RA.~nG %X. PKIB pvP Nu, N

u b|, nO GQ, Nu |. -q: W Pj p:d.

-q: C:[TOY. LM: NM] sG .#hG! |

CH " skfG Ex W GQ; .NOB % gkKO

Y. L .#hG!B Ex .NL JdQ 6[L ,|I

v V@OY. 9& in &H- T{Z, |Z lm ^C

v [:Z GB ]6 E!& .NOB fl! V@OY.

PKIB xk O#- 0M /?Q 3NL* 6w<!- N

uOB gkZ Nu; [:O) WM 0: 3.& v`U

OY. pvP Nu, Z] um, pvP -m; .NOb '

X gkGB xk O#- 0M NuL wTH BsN p

:d.& &xUOY.

PKIB xk O#- 0& 'Q .N 68 W d;! k

X ESOm ?2{N @d v\; &xUOY. GQ C

:[! kQ ag{N 8H 'h dR& D0Om 8H '

]; 3.Ob 'Q Zx; /v8vUOY. 6v78N

PKIB _dQ qvO: E!! pvP C# RN -q:

& &xUOY.

xk/3Nk 0 V. xk/3Nk 0 V: 0 V O# [

:}G 3d _ ONTOY(0 |. .&!; XaOb '

X DiffieM Hellman! GX 1976b! R3J). W 3d

! {#i " 3NL 0 V; R/Og O*& xk 0,

Y% O*& 3Nk 0N N(OY. 3Nk 0! qPN

/vGB ]i! " 3NG xk 0B x%KOY. [E

ZM vEZ! qP $8& x/R Jd! x@OY. p

g kE!B xk 08 |CGm 3Nk 0B |[GE*

x/GB OL x@OY. 5;L* xN! kqO) ON

kE $NG 8H; 'X u Ls ON kE $N; E

ZR v V5O 8i Jd! x@OY. /OQ d8gW

: xk 0& EZ(Nu) fD8N(9: EZ p:d.N)

gkZM ,|CQ_ QYB MTOY. xk $8& gk

Oi )8gv qP ^Cv& [ER v V@OY. W/

* 3Nk 0N8 ^Cv& O#-R v V8g W ^C

vB h9H vEZG \6 R/TOY. GQ 0 V O#

[:}: 3Nk8N(O#-) S8 FOs Nu(pvP -

m)!5 gkL !IUOY.

xk TL.~L NMdL:(CGI). % dLvM % -

v #G %X $8 |[ f}.

xk %LM 8H F0X3(CDSA). D;M b] 8H

@kANW%G 8H -q: W 8H |.! kQ w}{

"Y}; $GOb 'X 3_H M. D;M C'{L @k

ANW%; 8Y H|OT 8#R v V5O IntelL 3

_Q MTOY.

68 Trust Authority: RA %:)> H;-

xk O#- F0X3(CCA). Vd IBM D;C C'{

!- O# [:}! kQ O|H "Y; !IOT XVB

IBM RA.~n. YgQ ANW!V pnN [:H @k

ANW% RA.~n& vxUOY. @kANW% RA.

~nB DES W RSA O#-& wTO) $|'Q O#

- bI; v`OB CCA -q:& #bR v V@OY.

8P L'(DN). p:d.! zeH %LM WqG m/

L'. DN: p:d. h~ 86!- Q WqG '!& %

CUOY.

8P NZy T"(DER). BER! kQ &`; &xUO

Y. DERB NZy T"L ckOB NZy /| _ \

O*G NZy /|8 1CT8Na [EZG IG pN

& &EUOY.

93 8H b|(NSA). L$NG xD{N 8H \<.

9& kE \<(ITU). $N W 3N \'! |<hG k

E W.v) W -q:& kUOB 9& 6w. kE bz,

T& W %X $8G 15{N x3ZTOY.

9& %X b8(ISO). MN \!- D;M W.v) A

Nd]! L#bnv pg M! kQ %X; 3_ W .

3Ob 'X 8:H 9&{N 6w.

GQN). Zx W<:! kQ c!.

UO Zx '! 3$Z(URL). NM] sG Zx VR

v$; 'Q 3h. URL: ANd], #:. L' GB IP

VR& mCUOY. /$ bhNNM Zx! W<:Ob '

X JdQ w. x#, fN, Zx <NgW5 mCUOY.

bP:. GQL xB skf!TB )3Gv JB /:.

b; NZy T"(BER). ASN.1(_s 8. %b} 1)!

- bzQ %LM NZy \'! kX ISO 8825!- v

$Q T". L T": _s 8.L FQ NZy bz; v

$UOY.

*

;N 86. :06& |mOJC@.

Y

\x lm |[ ANd](SMTP). NM] s!- |Z

lm; |[OB ANd].

ks. v$ GB 1CH %LM R:.

k*{ O# [:}. O#- W X6! 0: 0& gk

OB O# [:}. L 0! 8H:G |GL KOY. 0

! kbGi )8gv ^Cv& X6R v VT KOY.

0! qPN /vGB ?H!8 kEG qPL /vKO

Y. qk*{ O# [:}z q3OJC@.

k*{ 0. O#- W X6! pN gkR v VB 0.

k*{ O# [:}; |mOJC@.

%LM O#- %X(DES). xD %X8N- 1977b L

$N!- $G W BNQ O#- mO O#(cypher). x

!B IBML 3_Q M8N-, x3H LD xP: ,8

z$; ED vgB _ KAvm $|OT gkGm VB

O#- C:[TOY.

DESB k*{ O#- C:[TOY. {s- kE! gk

I fl [EZM vEZ! pN 0: qP 0& ]eC

Km Vn_ UOY. L 0B ^Cv O#- W X6! g

kKOY. GQ O# |D8N Oe p:)! DO; z

eOB nG \O gkZ O#-!5 gkR v V@O

Y. DESB 64q. mO )b& !vg O#- _!B 56

q. 0& gkUOY. x!B Oe~n!- 8vO5O 3

hH MTOY. NISTB xD{N L$N O# %X8N

- 5b6Y gNuL Lgn}OY.

%LM ze5* sLj/.(DL). Nu, CRL, 0, $%

W b8 8H |C @j'.G 58 %LM zeR! W

<:R v V5O OB pb.

kn} 69

5^N. 8H 5^N W nO 5^N; |mOJC@.

nO. Trust Authority!-, NM] s!- gkR Z]

um-& 9fOB AN<:. nO!B NuG d;, ;E

W kR! wTKOY.

nO GQ(RA). nO d;L 3= vEH 'NNM N

uL kRI 'nv 6wG qnO: $%L ]5I v V

5O Ob 'X pvP Nu; |.OB RA.~n.

nO %LM#L:. Nu d; W _`H Nu! kQ $

8& !vm VB M. %LM#L:B nO %LM& z

eOm |< sLA gL,! I# Nu %LMG /fg

W pN& zeUOY. %LM#L:B RA AN<:M b

8 $%; kX, GB RA %:)>; gkOB |.Z!

GX w%L.I v V@OY.

nO 5^N. Zx, $%, W.m /$ Nu nO AN<

:M |CH 8: IGG }U. 5^N L': nO @k

ANW%; G`OB % gkGB URLG O' }UTO

Y.

nO /v. nO S:; |mOJC@.

nO S:. nO gD! wTH nO /v. L *: n

O _! r: $8& ]5UOY. nO S:G *: Z]

um-! /?Q |< C# ?H ?OOT /vKOY.

nO @kANW%. #<< nO(9: jslz, slM, |

Z lm, 8H ,sLp. @kANW% n) W |< s

LA gL, ?HG Nu |.& 'X /v-H v\; &

xOB Trust Authority @kANW% A9Sv).

nO AN<:. Trust Authority!-, gkZM gkZG

xk 0& NuO) .#hG! |)C3 v V5O gk

Z& /?-OB \h. L AN<:B NCL* %; b

]8N R v V8g, gkZ# s#[k; kX Z?-

Om |.R v V@OY.

p:d.. kE(|Z lm GB O#- 3/ n)z |C

H $8& 'Q $* zeRN gkOb 'X mHH h

~{ 86. p:d.B PKI 86! Jv dRN /$ W

q(xk 0, Nu W Nu kR qO n); zeUOY.

p:d. ;G %LMB .. |D8N h~{8N 8:

Gg ..G G 'B g.! XgKOY. 'NB s' 9

' 6w<! 30 9!, $N GB 8g& *8@OY. g

kZ* e!B 8k " ..G .AN %CKOY. .A

! XgOB gkZ, 6w, v*, 9! W e! ""!B

Z<G WqL wTGn V@OY. " Wq: /|-H S

:8N Lgnvg, L S:i: Xg WqL *8;B @

j'.! kQ $8& &xUOY.

p:d.G " Wq: ,|H DN(8P L')z ,aGn

V@OY. LM: G&{8N 8gOB @j'.! m/Q

M8N KAx S:L wTGn VB fl! m/X}O

Y. Y=G 9& DN; ll 8i, 9!(C)B L9, 6w

(O): IBM, 6w \'(OU)B Trust, 8k L'(CN):

CA1N M; < v V@OY.

C=US/O=IBM/OU=Trust/CN=CA1

p:d. -v. Trust Authority! wTH IBM

SecureWayp:d.. L p:d.B LDAP %X; v

xOg DB2& W b]8N gkUOY.

pU. iWsne!- 8:)& 3.OB ANW%. 5r

;L JdQ 6GL _}R fl +6G #bKOY. k

3B C:[L Z?8N G`C0GN gkZ! pU; N

DR JdB x@OY. pU: 58{8N 8gR v5 V

m C:[L O$ #]; Nm g}:R v5 V@OY.

L kn(pU8N _=)B E-!- *B MTOY. vg

B DAEMON(Disk And Execution MONitor)G `n

N X.Gm V@OY.

pvP -m. [EZG Ex; 8uOB .- GB %L

M! _!H Ze- ^Cv.

pvP -m: G& -m8Y u P: 8H 9'; &x

UOY. W L/B pvP -mL O#-H L' GB \

xQ D0 Ze C.n! FOs, -mGB ^CvG O

#-H d`Lb '.TOY. W/GN ^Cv! pvP -

70 Trust Authority: RA %:)> H;-

m; T8Na [EZG .GQ Ex; &xUOY. ([E

ZG 08 -m; [:R v V@OY.) GQ -mGB ^

CvG ;k; m$R v5 V@OY(O#-H ^Cv d

`: ^Cv ;kz ]eC O!X_ Og O!Ov J;

fl!B -mL +?-KOY). W/GN pvP -m;

Q ^Cv!- 9gO) Y% ^Cv! {kR vB x8

g LB d` GB XC! O!Ov Jb '.TOY. -

mH ^Cv! kQ /fL On/ fl!B Xg -m G

Q +?-KOY.

pvP -m Km.r(DSA). pvP -m %XG ON

N gkGB xk 0 Km.r. O#-!B L Km.r

; gkR v x8g pvP -m!8 gkR v V@O

Y.

pvP Nu. Nu; |mOJC@.

pvP Nu-. EZR v VB & 3Z! 3NL* #<

<! kX _`Q |Z Z] um-. " Nu-B CA 3

Nk 0& gkO) -mL Lgn}OY. 3N, qvO:,

6w<G Ex; 8uUOY.

CA *R! {s-B NuL NM]s!- |Z qvO:

& v`Ob 'Q RvZG GQ; umUOY. n2 G

L!-B pvP Nu-! n| icuL* Gk 9w u

m-M 0: *R; UOY. {s- L pvP Nu-B

Xg 3Nk 0G RvZ! /$ e-business0?; v`

R v VB GQL V=; umUOY.

Nu-!B NuQ #<<! 3NNv bhNv GB D

;M ANW%Nv! |Q $8! in V@OY. o, X

g #<<! NuH xk 0! V@OY.

6

^Cv d`. SG )bG ^Cv& gkOm m$ fL

G g; bBOB kR! R!IQ bI. MD5B ^Cv

d` Km.rG Q 9TOY.

^Cv Nu Ze(MAC). [EZM vEZ gL! x/

GB qP 0. [EZB L& NuOm vEZB KuU

OY. Trust Authority!- MAC 0B CA W (g 8

:dR& 'Q KeyStores! zeKOY.

pb/:. RSA xk 0 O#- C:[!- N 3G +

Rv(pM q)& vX- }:H v(n). RSA pb/:G V

{ )bB 8H d8! {s ^s}OY. pb/:! ,

vO u 9: 8HL Lgn}OY. RSA ,8R!- G

eOB 0 )bB 0G gk! {s Y(OY. o, 3N

kLi 768q., bwkLi 1024q., CAG 0 Vz 0

: FV _dQ 0! kX-B 2048q.TOY. 768q.

0B VRQ 2004bnvB 8HGB M8N 9sKOY.

+a:. C:[!- GQL xB v$; ]vR fl C

:[L %LMG +a:; 8#UOY(GQL xB )3;

]vOB %LMG bP:; 8#OB MzB ]kN).

+a: !K. \N 8:dRMG .#hG; kX }:H

(g 9Ze& !KOB M.

.- O#- 0(DEK). O]{8N, DES nG k*{

O#-/X6 0.

Y

YL.Ze. JavaDDO/! }:Om JavaNMA.M

! G`OB bh 63 Ze.

_`H Nu qO(ICL). _`H Nuz NuG vg s

B! kQ O|Q qO. Nu: OC x#M sB0N v

N-Gn V@OY. L qO: CA! |.Og CA %L

M#L:! zeGn V@OY.

f-.. W.v)#G $8 e'; &QOB W.v)#

TL.~L. 8k \NG GQL xB gk8NNM ;N

W.v)& 8HOb 'X gkKOY.

8H 5^N. ?OQ CA! GX NuH Nu-& R/

Q Wl(8g, [w WlL* @, 30 GB $N \<).

kn} 71

CA! -mQ Nu-& R/Q gkZi: 0: CA! -

mQ Nu-& .m VB Y% gkZG Ex; EZR v

V@OY.

8H RO h~(SSL). V> gkZ!T VkQG um

:; &xOB ;e 8H -q:& !x IETF %X k

E ANd]. pvPN 8HGB kE $N; &xUOY.

SSL gk !I -vB Ws %X HTTP d;L FQ Y

% w.!- SSL ,a d;; BNUOY. SSL: N p

) #G kE; 3$Ob 'Q E# 3/L \ Q x _

}X_ R ' <G; [:UOY. W Y=!B kEL O

#-KOY. ^Cv +a: !K: SSL <GL 8bGb

nv G`KOY.

8H |Z .#hG(SET). EZR v xB W.v) s

!- 8HH Ek+e* v] +e vR; KxOB jw

%X. L %X: NuG _`; d;Ob '.! +e R

vZ, sN, +e _^ :`G Nu; kUC5OY.

NN. 9& in gkZ! [EQ /$ ^Cv* &bQ

/$ d;; NNOB Mz 0L |L FQ M8N EN

OB M.

NN @b. .-G -mZ! .-! -mQ M; W8v

J: M8N ENOv J5O pvP 3Nk 0& gkO

B M.

jslz. % jslz& |mOJC@.

jslz Nu. pvP Nu: ,sLp.x NuLsm

5 UOY. L Nu: SSL gk !IQ % -v& kX

CA! _`UOY. O#-H DOG 0& kX Nu 8/

ZB %LM& O#-Om X6Om -mR v V@OY.

O]{8NB % jslz! L 0i; zeUOY. ON

@kANW%!-B :6. +e* Y% E<! 0& z

eO5O ckOm V@OY. pvP Nu; |mOJC@.

qk*{ O# [:}. O#- W X6; 'X -N Y

% qk*{ 0& gkOB O# [:}. " gkZB Q

VG 0& ^T Gg, L _!- xk 0B pg gkZ

! W<:R v V8g 3Nk 0B gkZ ZE!T8

KA}OY. 8H .#hG: xk 0M L! k@OB 3

Nk 0! O!O) .#hGG X6L !IQ fl!8

Lgn}OY. LM; 0 V O# [:}Lsm5 UOY.

k*{ O# [:}z q3OJC@.

q?b kE. [EZM vEZ! ?C! 8gOv JF

5 GB kE pe.

qP:. GQL xB %LM )3NNMG 8#.

qP: 8# -- ^O(PEM). NM] qP: 8# -

- ^O %X8N-, NM] s!- H|Q |Z lm;

&xOb 'X IAB(Internet Architect Board)! $CQ

%X. PEM ANd]: O#-, Nu, ^Cv +a:, 0

|.& &xUOY.

qnO: AN<: @j'.. /$ nO [w; v`O

B % gkGB Ze <.(9: nO d; sB !K GB

xk 0 vE )N Ku).

qnO: AN<: [C... v$H x-N G`GB q

nO: AN<: @j'.G p=.

g

gkZ Nu. ^CvG x! [:Z& D0Om ^Cv

R/Z& $g-OB /?: Ku AN<:. GQ bkQ

V> gkZ* C:[z kE _Nv5 .NUOY.

gL. Nu. CA Nuz /gOv8 /$ % gL.!

kX-8 /?Q Nu. CA Nu; |mOJC@.

g|nO. Trust Authority!- Q gkZ(k3B |.

Z)! Y% gkZ& nOR v V5O OB AN<:. d

;L BNGi RAB Xg gkZ! LD Trust Authority

,sLp. @kANW%; gkO) Nu; 9fR v V

5O OB $8& &xUOY.

72 Trust Authority: RA %:)> H;-

s# Nu. 3Nk -m 0M ,|H xk 0! in V

B Nu; Q CA! Y% CA!T _`OB EZ p(.

O]{8N s# 8uH Nu; gkOi O*G |. c

g 5^N! wTH ,sLp. C:[L* #e #<<

! Y% 5^N! wTH ,sLp. C:[L* #e #

<<M H|OT kER v V@OY.

-m. -m; }:Ob 'X 3Nk 0! gkOB M.

-m _N ^Cv& gkZ! %Svm BNT; TuO

B v\8N- gkKOY.

-m/Ku. -mQYB M: -m; }:Ob 'X 3N

k pvP 0& gkOB MTOY. KuQYB M: -

m; KuOb 'X k@OB xk 0& gkOB MTO

Y.

-v. (1) W.v)!- DO -v nG Y% :WLG

8N bI; &xOB %LM :WLG. (2) TCP/IP!-

,sLp./-vN N#B Y% gL.! VB C:[G

d;; 3.OB W.v) ;G C:[.

-v Nu. % -v! SSLk .#hG; 3.R v V

5O CA! _`Q pvP Nu. SSL ANd]; gkO

) jslz! -v! ,aGi -v! jslzN W x

k 0& [EUOY. L/Q z$; kX -vG Ex;

NuR v V@OY. O#-H $8& -v! 8> v5

V@OY. CA Nu, pvP Nu W jslz Nu; |

mOJC@.

-m4. Javagk !I -v! _! bI; &xOB -

vx ANW%.

:6. +e. gkZG pvP 0& zeOb 'X gk

GB 8k Ek+e )bG Oe~nG O>. :6. +

e!B O# 8HL !IUOY.

:06. p:d.M |CH M8N-, -N Y% @j'

. /|#G |h& $GOB ;N 86.

EZ 5^N. ?OQ CA! GX NuH Nu-& R/

OB #<<iG }U.

EZ p(. Nu GQL Y% Nu GQ; umOB f

}; &nOB 86{N T".

EZ D;M b](TCB). 6wG D;M 8H $%; }

U{8N G`OB RA.~n W Oe~n dR. 8H $

% Gv! 5b; L!B dR GB dR NP: 8Hz

|CH M8N- TCBG ONTOY. TCBB 8H fh

N &QGB @j'.TOY. 8H $%; G`OB ^?

Or: s4 xLO|X_ Og, GQL xB C:[ /

G! kQ W<: GQ; rv xO5O X_ UOY.

F

O# [:}. D;M 8H! Vn- O] X:.G O#

- W O#- X:.G X6; 'Q x", GL, f} n.

O# X6(decrypt). O#- AN<:& G`kROB M.

O#-. (1) {gQ X6 Ze& !x gw8L X6;

kX x! $8& r; v V5O $8& Z/B M. (2)

W GL& {bb 'Q %LM //z |CH M.

O#-/X6. 9$H vEZG xk 0& gkO) W g

w; 'X %LM& O#-Q D %LM X6! xk 0

M V; LgB 3Nk 0& gkOB M.

VC4. JavapnN bOGm Java#/ % jslz!

- G`GB D;M ANW%. JavaVC4Lsm5 UO

Y.

W<: &n qO(ACL). /$ ZxG gk; GQL V

B gkZ!TN &QOb 'Q ^?Or.

":.s]. /gQ bz; gkOB NM]G D}0. 9

: 8giL m4, D.J, ;N :G n )/ }\! k

X % x3, |ZsE!, ^Cv |[, Wl~n& {kO

m V@OY.

kn} 73

#e #<<. CA! FQ NuG V<.

@j'.. 4< vb 3h* ANW!V! Vn- _s

86- %LM W W %LMM ,|H 6[. ,!:& |

mOJC@.

@j'. D0Z(OID). ASN.1(_s 8. %b} 1)!

- $GQ /|8N- |. q{8N v$H %LM *.

@j'. /|. p:d.! zeC3 v VB @j'.

>y. 9& in N-, 8GG, e!, 3N, ANW% GB

AN<: n.

d; ID. RA! kQ Nu d;; m/OT D0OB

24-323G .ZN H ASCII *. L *: Nu d; .

#hG! gkGn d;G sB GB WM |CH Nu;

KvR v V@OY.

ye MLe %(WWW). OL[Lpn %LM& !x D

;M#! W.v) ,aL .3H NM] NP. L %L

MiL $8& &xOg WWW W NM]G Y% %L

M! kQ 5)& &xR v V@OY. WWW Zx: %

jslz ANW%; kX W<:KOY.

% jslz. %:)> PC!- G`Gn gkZ! ye

MLe % GB NC HTML dLv& #F< v V5O

XVB ,sLp. RA.~n. %z NM]!- gkL

!IQ + OL[Lpn %LM }U! kQ xkG W<

:& &xOB Kv 58TOY. n2 jslzB X:.

M W!H; pN %CR v VB ]i, n2 jslzB

X:.8 %CR v V@OY. kNPG jslz! FTP

.#hGz 0: Vd NM] kE |D; 3.UOY.

% -v. jslz ANW%8NNMG $8 Zx d;

! @dOB -v ANW%. -v& |mOJC@.

/OZe. ISO 10646!- $GQ 16q. .Z <.. /

OZe .Z NZy %X: $8 3.! gkGB 9& .

Z ZeTOY. /OZe %X: |<hG _dQ :)3

.& wTOg, RA.~nG 9&- W v*-& 'Q b

J& &xUOY. Java ANW!V /fG pg R: Z

eB /OZeN bOKOY.

/|. @j'. /|; |mOJC@.

N:O:. DB2! Vn- N:O:B %LM& zeOm

@kANW%; v`Ob 'Q m.{ %LM#L: |.

/fTOY. 8: E3/vG xk <.& )/ %LM#

L:! kX $GR v V5O ckUOY.

Nu. (1) 3N, qnO:, 6w<G Ex; 8uUOY.

(2) kE _N skfG Ex; G0OB AN<:.

Nu b|(CA). 6wG 8H $%; XvOm Nu |

DG 8H |Z EP; v$R %SL VB RA.~n.

CAB RANNMG Nu _`, ;E W kR d;; 3

.UOY. CAB RAM s#[kO) Nu W CRL; p

:d.! x%UOY. pvP Nu; |mOJC@.

Nu $%. xk 8H d8gW; !vB /$ ,!:G

@kANW%! kQ NuG {k !I:; v$OB T

"; mCQ }U. 9& in Nu $%: /$ Nu /

|; kX gkZ! Vnx !] |' H!- s0! k

Q .#hG; v`O5O ckR MNv )N& v$R

v V@OY.

Nu kR qO(CRL). Nu b|L kRQ NuG qO

8N- pvP -m W C# RNL {kH qO. L q

OG Nui: ck R!N #VKOY. pvP Nu; |

mOJC@.

Nu ANDO. xOB Nu /|; $GOB /!iG

}U(9: SSL Nu GB IPSec Nu). L ANDO: N

u gg W nO; |.OB % 5rL KOY. _`ZB

ANDOG L'; /fOm xOB NuG /!(9: /?

b#, 0 k5, DN &` n); v$R v V@OY.

Nu .e. Nu! _! Je& wTC3 v V5O O

B X.509v3 Nu |DG 1C{ bI. %X .e W g

kZ $G .eL V@OY. %X .e: 0 W $% $

74 Trust Authority: RA %:)> H;-

8& wTQ YgQ q{, V< W _`Z S:, Nu f

N &` n; 'Q MTOY.

NM]. D;M#! |Z{ ,a; &xOB |<h{N

W.v) }U. NM]: D;MiL |Z lm GB %

jslz nG RA.~n e!& kX -N kER v V

5O X ]OY. O*G W.v)! VB nn kPiL

NM]; 8:O) /gQ Y% W.v)M wJN ,a

OB ML W Q 9TOY.

N.s]. 8k f-. Z! sVOB bw ;G W.v

). NM]G D}0N- WM /gQ bz; gkUOY.

bz{8N N.s]: NM]; `# .eQ M! Rz

UOY. HTML W HTTPB L _!- 8m-H MTO

Y.

O] X:.(plaintext). O#-Gv J: %LM.

cleartextG ?Gn.

Z

Z] um-. Nu 3/C 3NG Ex; .NOb 'X

gkGB bP $8. W.v) D;C /f! Vn- Z

] um-G !e O]{N /|: CA! [: W -m

Q NuTOY.

Z9n vx(NLS). pn, k-, /% W C# |D, }

Z %b& wTO) v*0 /:! {% wL!; &0 ;

!- vxOB M.

|[ &n ANd]/NM] ANd](TCP/IP). LAN W

WAN; 'X kn(peer-to-peer),a: bI; vxOB

kE ANd] <..

$% "C.. nO @kANW%!-, @kANW%L #

bOB 6w $G ANW%. $% "C.! v$H T"

: 6wG qnO: W 8H 1#gW; nO AN<:!

{kUOY.

6! w:d.. Z] um-G sLA gL,!- `{H

L%.G p=.

w

<N /?: .N. Nu; _`Q EZ h~ ;G pg

CA BNG /?: .N. 9& in Q CA! Y% CA

& kX -m Nu; _`Q fl, N -m: pN gk

Z! &COB NuG /?: Ku z$; kX /?-K

OY.

Vm CA. PKI CA h~G G '! VB CA.

_s 8. %b} 1(ASN.1). $8 %LMG 8.; $

GOB % gkGB ITU %b}. )/ !v #\Q %L

M /|; $GOm WM 0: /|G D0 W * v$;

'Q %b}; v$Q MTOY. L %b}: |[C $

8 O#- fDG &Q xL $8G _s{ 8.; $G

X_ R '6Y {kC3 v V@OY.

+

Ze -m. G` ANW%; pvP -m8N -mOb '

Q bz. Ze -m: NM]; kX PjH RA.~n

G EZ5& tLb 'X 3hH MTOY.

,sLp.. (1) -vNNM x/ -q:& vEOB b

I{ \'. (2) Y% D;M* ANW%G -q:& d;

OB D;M* ANW%.

,sLp./-v. Q gL.G ANW%!- Y% gL.

G ANW%8N d;; [EOm @d; bY.B Pj

3.G Q p(. d;OB ANW%; ,sLp., @dO

B ANW%; -vN N(OY.

,!:. 4< vb 3h GB ANW!V!- xk $G

& x/O) xk /:, 6[, [w /:; x/OB @

j'. Wl.

kn} 75

0. $8G O#- W X6; 'X O# [:}! gk

GB g.

0 V. qk*{ O# [:}! gkGB k@ 0. Q 0

B O#-! gkGm Y% 0B X6! gkKOY.

8

MN. VPN bz! Vn- NM]; kX LgnvB d

8 C! !s v!# ,a. ,aH ?H!B x] gkZ

! MN; gkO) bw<G 3Nk W.v)G -vM

8H W O#-H 86- $8& 3/R v V@OY.

.#hG ID. g|nO nO d;! kQ @d8N RA

! &xOB D0Z. Trust Authority ,sLp. @kA

NW%; G`OB gkZ! g| BNH Nu; 9fR

v V5O UOY.

D

DO |[ ANd](FTP). D;M#G DO |[; '

X gkOB NM] ,sLp./-v ANd].

%X |k 6)w pn(SGML). 6)w pn& bzO

B %X. HTML: SGML; b]8N UOY.

ANd]. D;M# kE; 'X y$H T`.

AOC -v. W<:& d;OB D;M(D;M A)M W

<:GB D;M(D;M B) gLG _3Z. W/GN V>

gkZ! A D;MNNM Zx; d;Oi L d;L A

OC -vN v$KOY. AOC -v!-B d;; [:

O) B D;MNNM @d; ^: Y= W @d; V>

gkZ!T L[UOY. AOC -vB f-. ;NNNM

ye MLe % Zx! W<:R ' /kUOY.

O

OL[X:.. gkZ! .-G %C W Kv; 'X 6

l:N )& v VB \n, 8, W!HL wTH X:..

LM 0: \n, 8 GB W!H; OL[5)sm Og

OL[5)& KvOB M; 5)QYm UOY.

OL[X:. 6)w pn(HTML). % dLvG Zy;

'Q 6)w pn. LM: SGML! bJOm V@OY.

OL[X:. .#hG ANd](HTTP). % s!- O

L[X:. DO; |[Ob 'Q NM] ,sLp./-v

ANd].

}Z

3_ DES. O] X:.& < x O#-C0B k*{ K

m.r. L& 'Q 9: f}iL VbB Ov8, !e H

|Q Y_ O#- |D: < 3G -N Y% 0& gk

OB 3_ DESTOY.

4758 PCI O#- ZAN<-. m:IG DES W RSA

O#- 3.& &xOB ANW!VL !IQ /6 ]@

bIG O#- PCI v: +e. O#- AN<:B +e

s! ;eH 8H e!!- v`KOY. +eB FIPS

PUB 140-1 9' 4 %XG v]Q d8gW; XvUO

Y. RA.~nB ;eH 8H e!!- G`KOY. Ek

+e E!B SET %X; gkOB Q 9TOY.

64x NZy. MIME; gkQ 2x %LM& //Ob

'Q O]{N f}.

A

ACL. W<: &n qO.

ANSI. L9 %X ,8R.

ANSI(American National Standards Institute). N

!H 6w<!- [:Q ANC`n& .3Om L9; S

GG jw %X; /v8vOB \<. }jZ, RqZ, O

]{N LM }\8N Lgn}OY.

ASCII. $8 3/; 'Q L9 %X Ze.

76 Trust Authority: RA %:)> H;-

ASCII(American National Standard Code for

Information Interchange). %LM 3. C:[, %L

M kE C:[ W |C eq #G $8 3/! gkG

B %X Ze. ASCII <.B 7q. Ze- .Z(P.<

<)k q.& wTO) 8q.)N Lgnx Ze- .Z

<.& gkOg, .Z <.B &n .Z W W!H .Z

N Lgn}OY.

ASN.1. _s 8. %b} 1.

B

BER. b; NZy T".

C

CA. Nu b|.

CA h~. Trust Authority!-, O*G CA! G ' 8

6! '!Om Vm W 3G >S CA ~L W F!! '

!OB EZ 86. CA& kX nOH gkZ* -vB X

g CA! -mQ Nu; ^T Gg s' vXG Nu h

~; hBUOY.

CA -v. Trust Authority CA(Nu b|) 8:dR&

'Q -v.

CA Nu. gkZG d;C, gk _N % jslz! N

DOv xOB CA!- BNQ Nu. W Y=!B jsl

z! L Nu; gkO) Xg CA! _`Q Nu; 8

/OB -vMG kE; NuUOY.

CAST-64. 64q. mO )bM 6q. 0& gkOB m

O O#(cipher) Km.r. LM: Carlisle AdamsM

Stafford Tavares! GX 3hGz@OY.

CCA. IBM xk O#- F0X3.

CDSA. xk %LM 8H F0X3.

CGI. xk TL.~L NMdL:.

cleartext. O#-Gv J: %LM. O] X:.

(plaintext)G ?Gn.

CRL. Nu kR qO.

CRL _` #]. CA 8: DOG 3$*8N- CRL

; p:d.! x%OB Vb gLG #] C#.

D

DEK. .- O#- 0.

DER. 8P NZy T".

DES. %LM O#- %X.

Diffie-Hellman. _m!(DiffieM Hellman)G L'!-

/!Q L'8N, 8HGv JB E<! kX x/ 0&

.3OB f}.

DL. %LM ze5* sLj/..

DN. 8P L'.

DSA. pvP -m Km.r.

E

e-business. W.v) W D;M& kQ qnO: .#

hG. 00 W -q:G 8T W GE! wTKOY. G

Q pvP kE; kQ Z]G L?L wTKOY.

e-commerce. qnO: # .#hG. NM] s!-G 0

0 W -q:G 8T W GE(-q:, x^Z, GEwZ n

; kQ)! wTKOY. e-businessG b;{N dRTO

Y.

F

FTP. DO |[ ANd].

kn} 77

H

HTML. OL[X:. 6)w pn.

HTTP. OL[X:. .#hG ANd].

HTTP -v. jslz W W.v)G Y% ANW%z

T2 % b] kE; 3.OB -v.

I

ICL. _`H Nu qO.

IETF (Internet Engineering Task Force). NM]k

ANd]G h9 W 3_; _!{8N 3.OB Wl. W

.v) 3hZ, n5Z, }jw<, ,8xG 9&{N }

\; k%UOY. IETFB NM] F0X3G 3_ W N

M]G x0Q gk n; VN YlOY.

IniEditor. Trust Authority!- 8: DO; m}OB

% gkOB 58.

IPSec. IETF!- 3_Q NM] ANd] 8H %X.

IPSecB W.v) h~ ANd]N-, Nu, +a:, W<

: &n W bP:G aU; /?{8N vxOB O#-

8H -q:& &xOb 'X mHH MTOY. -Q N

u bI8N NX L %X: 9: VPN &0 GEwZi

L NM] s!- H|Q v!# ,a; 8`Ob 'Q A

Nd]N- $COm V@OY.

ISO. 9& %X b8.

ITU. 9& kE \<.

J

Java. Sun Microsystemsg!- 3_Q W.v)& N

DOB, C'{ xk D;M bz <.TOY. Java /f

: Java OS,YgQ C'{G !s bh, 4< vb Java

ANW!V pn, )/ ,!:G sLj/.N 8:KOY.

Java !s bh(JVM). YL.ZeG X.; cgOB

Java 18S /fG ON.

Java VC4. VC4; |mOJC@. Java @kANW

%z q3OJC@.

Java pn. VC4z !L|. @kANW%k8N /0

w 3hH Sun Microsystemsg!- 3_Q ANW!V

pn.

Java @kANW%. Java pnN bOH 63{ ANW

%. % jslzG \X:. \N!- G`KOY.

Java ,!:. Java ANW% Ze \'.

K

KeyStore. Trust Authority 8:dR Z] um-(9;

O#-H |DG 0 W Nu)& zeOb 'Q DL.

L

LDAP. f. p:d. W<: ANd].

M

MAC. ^Cv Nu Ze.

MD2. 128q.G ^Cv d` XC Tv(Ron Rivest!

mH). PEM ANd]!- MD5M T2 gkKOY.

MD4. 128q.G ^Cv d` XC Tv(Ron Rivest!

mH). LM: MD28Y n h* u |(OY.

MD5. \fb ^Cv d` XC Tv(Ron Rivest! m

H). MD4! bsH v|TOY. MD5B 512q. mO

G TB X:.& 163G 32q. -jmO8N */OY.

L Km.rG bB: 32q. mO <.N- \O 128q

. XC *; 8:O5O ,aC2 MTOY. GQ PEM

ANd]!- MD2M T2 gkKOY.

78 Trust Authority: RA %:)> H;-

MIME(Multipurpose Internet Mail Extensions). -

N Y% .Z <. pnN H X:.G s# 3/; c

kOB Z/ST gkR v VB :e <.. GQ NM]

lm %X; gkOB 9: vG -N Y% D;M C:

[ #!- V<Lpn |Z lm; ckUOY. 9& i

n |Z lm ^Cv! US-ASCII, 3NQ X:., LL

v, gne& wTC3 v V@OY.

N

NIST. zE NBS(93 %X g+R)N KAx 93 %

X W bz y8. D;M b] jw! Vn- 3f %X

z s#nk:; uxC0B \<TOY.

NLS. Z9n vx.

nonce. gkZ Nu; d;OB -v* @kANW%8

NNM [EGB .Z-. Nu; d;^: gkZ! 3N

k 0& gkO) nonce! -mUOY. gkZG xk 0

M -mH nonce! Nu; d;Q -v* @kANW%

! YC [EKOY. W.m *i -v! gkZG xk

0N -mH nonce& X6OA C5UOY. X6Q nonce

! [EH x! nonceM 08i gkZ! NuKOY.

NSA. 93 8H b|.

O

ODBC. 3f| %LM#L: ,a:.

OSI. 3f| C:[ s#,a.

P

PC +e. :6. +eM /gOg PCMCIA +esm

5 UOY. L +eB :6. +e8Y 6] )m, 8k

u 9: k.; !}OY.

PEM. qP: 8# -- ^O

PKCS. xk 0 O# [:} %X.

PKCS #1. xk 0 O# [:} %X; |mOJC@.

PKCS #10. xk 0 O# [:} %X; |mOJC@.

PKCS #11. xk 0 O# [:} %X; |mOJC@.

PKCS #12. xk 0 O# [:} %X; |mOJC@.

PKCS #7. xk 0 O# [:} %X; |mOJC@.

PKI. xk 0 ON86.

PKIX. X.509v3 b] PKI.

PKIX CMP. PKIX Nu |. ANd].

PKIX Nu |. ANd](CMP). PKIX Xv @kA

NW%zG ,a; !IOT OB ANd]. PKIX

CMP! TCP/IP& Ow |[ ^?Or8N gkOB Q,

RO '!B _s- h~L 8gUOY. LM: _! z

5 |[! kQ vx; !IOT UOY.

PKIX ;kZ. /$ nO 5^NL Trust Authority ,

sLp. @kANW%8NNMG d;; ;kOB% gk

OB xk HTTP -v.

R

RA. nO GQ.

RA |.Z. RA %:)>! W<:O) Nu W Nu

! kQ d;; |.R GQ; N)^: gkZ.

RA %:)>. Z] um- d;; 3.Om Z] um

-! /?Q |< b#! ID L& |.Ob 'Q W!

H NMdL:& RA! &xOB Java VC4.

RA -v. Trust Authority nO GQ 8:dR& 'Q

-v.

kn} 79

RC2. RSA %LM 8H; 'X Ron Rivest! 3hQ

!/ 0 )b mO O#. RCB Ron’s CodeGB Rivest’s

Cipher& *8@OY. DES8Y |#m DESG pTD k

<N- 3hH MTOY. {gQ 0 )b& gkT8Na

DES8Y u H|OE* Rp 0 =v! kX-B z H

|OT 8i v V@OY. 64q.G mO )b& !vg

RA.~n! Vn- DES8Y ` 2-3 h u |(OY.

RC2B DESM 0: peN gkL !IUOY.

RA.~n _%Z y8(SPA)M L$N#G y`!-

RC2 /v sB& &xUOY. LM: ]b BN AN<

:& O]{N O# v$} ]b AN<: 8Y u #\

Om |#T 8in ]OY. W/* |% ]b BNL {

UO5O 8ib 'X-B &0!- RC2 0 )b& 40

q.N ]eC &QCQ_(ON 9\B V8*) UOY. O

#-H + #b WLm; L. hjOAm C5OB 'T

Z& 7b 'X-B _!{N .Z-; gkR v V@O

Y.

RSA. _mZG L'(Rivest, Shamir, Adelman); }

xk 0 O#- Km.r. O#- W pvP -m! gk

KOY.

S

SET. 8H |Z .#hG

SGML. %X |k 6)w pn.

SHA-1(8H XC Km.r). pvP Nu %Xz gk

Ob 'X NIST W NSA!- 3hQ Km.r. L %X

: 8H XC %XLm SHAB %X! gkGB Km.

rTOY. SHAB 160q. XC& }:UOY.

SMTP. \x lm |[ ANd].

SSL. 8H RO h~.

S/MIME. NM]; kX |[GB |Z lmG -m W

O#-& vxOB %X. MIME; |mOJC@.

T

TCP/IP. |[ &n ANd]/NM] ANd].

TP. EZ $%.

Trust Authority. pvP NuG _`, ;E W kR&

vxOB kU IBM SecureWay8H VgG. L Nu:

$|Q NM] @kANW%! gkI v V8g, gkZ

& NuOm EZVB kE; 8eOb 'Q v\; &x

UOY.

U

URL. UO Zx '! 3$Z.

UTF-8. // |D. L |D: 8q. .Z <.8 3.

OB $8 3. C:[L 16q. /OZe& k@OB 8

q.N //Om $8G UG xL L& YC G91 v

V5O UOY.

V

VPN. !s 3Nk W.v).

W

WebSphere Application Server. gkZ! m:I %

gL.& 3_Om |.R v V5O 5MVB IBM &

0. \xQ % x3!- m^ e-business@kANW%!

L # B z $ ; k L O T X ] O Y . WebSphere

Application ServerB % -v W b] n5 <& pN

M 63H Javab] -m4 #x8N Lgn. V@OY.

X

X.500. D;M C:[; s#,aT8Na Yq{ Pj

W 9& p:d. -q:& gkOb 'Q %X. L|!

80 Trust Authority: RA %:)> H;-

B CCITTN KA. Vx 9& kE \<(ITU)M %X

- 9& b8 W 9& |b -P y8(ISO/IEC)!- T

2 $GQ MTOY.

X.509 v| 3 Nu. X.509v3: Nu @kANW% $

8G ze W Kv, Nu Pj $8, Nu kR $8, $

% $8, pvP -m; 'Q $|'Q %LM 86& !

vm V@OY.

X.509v3 AN<:B pg Nu! Vn- C# RN; g

kOB CRL; [:UOY . NuL gkI '6Y

X.509v3 bI: @kANW%L Xg NuG /?:; !

KR v V5O UOY. GQ @kANW%L Xg CRL

! NuL VBv )N& G0R v V5O UOY.

X.509v3 CRL: v$H /? b#! kX [:R v V

@OY. Nu; +?-R v5 VB Y% /f; b]8

N R v5 V@OY. 9& in Q wxL 6w; 0*

B fl Xg Nu: CRL! uLT KOY.

X.509 Nu. N. ^Fi)vm VB Nu %X8N-,

8H |. W 8H NM] W.v) s!-G pvP -

m NuG Ph& vxOb 'X mHH %X. X.509 N

u: EZR v VB & 3Z! pvPN -mQ xk 0

G Ph& 'Q ANC`n& vkOB %LM 86& $

GUOY.

kn} 81

82 Trust Authority: RA %:)> H;-

vN

[!]3d

RA |.Z *R 3

Trust Authority 1

;E !I: 24, 36

Kv Q5

3$ 14

IG 45

az G 45

az! kQ dLv )b

3$ 14

IG 45

8P L' 34

[*]/%, v$ 13

[Y]^B 13

%LM#L: 9Ze

Kv &Q 14

KvR Je 41

g| $GH 68 44

S: 33

6!& 'Q 1C 20

68 12

dLvg v 3$ 14

RA! GQ3. 3

5^N, nO 32

5| @d 7, 9

nO 31

qnO: $% {k 31

% jslz vx 30

Z?- 3, 31

nO 31 (hS)

$% 32

6! 46

8:), RA |.Z 3

Jd 3

nO GQ 31

nO %LM#L: 3, 31

nO 5^N 7, 10, 32, 38

nO 9Ze 33

Kv &Q 14

KvR Je 41

g| $GH 68 44

S: 33

6!& 'Q 1C 20

68 12

dLvg v 3$ 14

RA! GQ3. 3

nO S: 49

nO d;

KvR Je 41

%LM#L: 9Ze 33

nO gD 29

8y 13

g|nO 29

sB 53

d; sB !K 9

% jslz vx 30

Z? r! 31

6! w:d. 49

r! 31

RA |.ZG 7

RA! GQ 3. 3, 20

nO d; sLA gL, 33

nO % dLv

gk 29

nO % dLv (hS)

gk; 'Q CA Nu 7, 35

W<: 6

p:d. W<: 34

[s]9Ze, 1C 20

[6]qO G

dLv 8b 16

dLvg 9Ze v 14

[Y]f} V& 5

8y, Nu 25, 47

8H @kANW% 3

9v |.Z 38

jslz 6

g|nO C*.@ 29

Xq 5, 6

vx 30

URL 6

jslz Nu 7, 10, 35

jslz vx 30

qnO: AN<: /v 22

[g]g|nO 29

8:)& 'Q C*.@ 29

sB

* 53

8b 17

© Copyright IBM Corp. 1999b 83

sB (hS)

vg 41, 53

sB 5* 54

s# Nu 33

-v Nu 36

3!, RA %:)> 6

<NgW G 48

S:, %LM#L: 9Ze 33

S:, Nu W d;

* /f 22

/f 17

8b 17

qnO: AN<: /v 22

d; W Nu 49

Nu .e 51

UsH 0 47

[F]W<: &n qO 37

- *

S: % 48, 49

6! w:d. % 48, 49

68 az % 45

- %&

S: % 17

6! w:d. % 18

68 az % 15

d; S: 49

d; ANDO 23, 38

d; ID 7, 9

% jslz 6

g|nO C*.@ 29

Xq 5, 6

vx 30

URL 6

% jslz vx 29, 30

% dLv, nO

gk 29

gk; 'Q CA Nu 7, 35

W<: 6

/? b# 22, 38, 51

Nu 33, 34, 38

;E !I 36

;E !I: 24, 36

h~ 33

8P L' 34

%LM#L: 9Ze 31

nO -q: gk k5 7, 35

8b 13

|V 34

8y 25

jslz! kQ d; 7

sB 53

s# Nu 33

<NgW 48

d; 3

d; 8y 13

/| 51

/? b# 22

&C 10

6! w:d. 18, 49

x` |. 37

CRL!- &E 26

RA %:)> G`k 7

Nu b| 33

Nu sLA gL, 33, 36

Nu q{ 51

Nu S: 17, 49

Nu /| 51

Nu kR qO 34

Nu .e 36, 51

NuG 8b 13, 22

[Z]e! Nu 36

|Z lm kv 7

$8 V& 29

6! w:d.

8b 18

L%. 49

6! w:d. (hS)

%G - 48

68

3$ 15

;E !I:0 43

8bGB Nu 13

g| $G 44

sB0 41

d; 8y 13

&b 12

Xq 12

vx -m4 38

AN<: _ Gei 15

Je 41

68 az

Kv Q5 3$ 14, 44

9Ze 1C 20

8bGB Nu 13

qO8N %C 15, 45

s<OT %C 16

S: 8b 17

d; 8y 13

6! 20, 21, 23, 24, 25

6! w:d. 8b 18

68 az 8b 15

dLv L? 16

dLvg 9Ze v &Q 14

68 G 41

x`| 7k 54

[w]|6 V& 41

3. S: 49

kR g/ 47

kR, g/ 47

[+]08e, 6l: k< 56

0, Us 47

84 Trust Authority: RA %:)> H;-

[8]

G 5r; 54

G, RA %:)>

az G 15, 45

xk bI 54

5r; 54

<NgW G 16, 48

L? 18

68 G 12, 41

[D]

DO GQ, RA |.Z 10, 20, 21

dLvg 9Ze v, az G 14, 44,

45

%

9Ze 1C 20

S: 17, 49

- )b 6$ 19

6! w:d. 18, 49

68 az 15, 45

dLv L? 16

` $D 19

% 9Ze, 1C 20

AN<: _ Gei 15

ANd] 34

ANd], p:d. W<: 34

ANDO, d; 23, 38

Je 5r; 54

Je, RA %:)>

az G!- 46

5r; 54

<NgW G 48

68 G 41

[O]

c! 46

5^N! kQ .8 10

c! 46 (hS)

5^N; 'Q !K 26

5^NG 6!k 20, 26

CCA h~ 33

CA Nu 7, 35

CRL, Nu &E 26, 47

DDB2 31

IInternet Explorer

b; Nu 10

1.: 55

LLDAP ANd] 34

PPKCS #10Nu; 'Q d; 36

PKIX Xv @kANW% 34

RRA |.Z

5^N! kQ GQ 26

5^N!kQ GQ 46

nO 7

nO %LM#L:! kQ 5b 33

nO sB !K 9

9v |.Z 38

*R 3

Z? 8:) 3, 31

6! 46

RA |.Z (hS)

6! w:d. 18, 49

6!! |Q V. 23

8:) vx -m4 38

RA %:)>! W<:Ob 'Q Nu

7

RA |.Z& 'Q GQ 10

RA |.Z! GQ 6!

;E !I: /f 24

5^N! kQ ck !I 46

5^N; 'X ck !I 26

S: /f 17

d; E} 24

d; 8y /v 24

d; BN 23

d; ANDO 3$ 23

/? b# /f 22

Nu kR 25

V. _! 23

Gei .8 15

RA %:)>

GQN) 10

gk Xq 5

3! 6

W<: 10

W<:R nO 7

>a 27

vx -m4 38

RA %:)> 5r; 41

RA %:)> gk Xq 5

RA %:)> vx -m4 38

RA %:)>! kQ W<: 5, 10

SSecureWay 1

UURL

nO 5^N 32

vN 85

URL (hS)

nO % dLv 6

X

X.509v3 Nu .e 36

86 Trust Authority: RA %:)> H;-

© Copyright IBM Corp. 1999b 87

IBM

ANW% x#: 5648-D09

SA30-0873-00