Glossary
823
PKCS #11
The public-key cryptography standard that governs cryptographic
tokens such as smart cards.
PKCS #11 module
A driver for a cryptographic device that provides
cryptographic services, such as encryption and decryption, via the PKCS #11
interface. A PKCS #11 module (also called a cryptographic module or cryptographic
service provider) can be implemented in either hardware or software. A PKCS #11
module always has one or more slots, which may be implemented as physical
hardware slots in some form of physical reader (for example, for smart cards) or as
conceptual slots in software. Each slot for a PKCS #11 module can in turn contain a
token, which is the hardware or software device that actually provides
cryptographic services and optionally stores certificates and keys. Netscape
provides a built-in PKCS #11 module with Certificate Management System.
PCKS #12
The public-key cryptography standard that governs key portability.
policy module
A rule (implemented as a Java class) that validates the contents of
a certificate request for that rule and formulates the contents of the certificate to be
issued.
private key
One of a pair of keys used in public-key cryptography. The private
key is kept secret and is used to decrypt data encrypted with the corresponding
public key.
proof-of-Archival (POA)
Data signed with the private Data Recovery Manager
transport key that contains information about an archived end-entity key,
including key serial number, name of the Data Recovery Manager, subject name of
the corresponding certificate, and date of archival. The signed proof-of-archival
data is the response returned by the Data Recovery Manager to the Registration
Manager or Certificate Manager after a successful key archival operation. See also
Data Recovery Manager transport certificate.
public key
One of a pair of keys used in public-key cryptography. The public key
is distributed freely and published as part of a certificate. It is typically used to
encrypt data sent to the public key’s owner, who then decrypts the data with the
corresponding private key.
public-key cryptography
A set of well-established techniques and standards that
allow an entity to verify its identity electronically or to sign and encrypt electronic
data. Two keys are involved: a public key and a private key. A public key is
published as part of a certificate, which associates that key with a particular
identity. The corresponding private key is kept secret. Data encrypted with the
public key can be decrypted only with the private key.
Содержание Certificate Management System 6.1
Страница 1: ...Administrator s Guide Netscape Certificate Management System Version6 1 February 2003...
Страница 28: ...Documentation 28 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 68: ...Support for Open Standards 68 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 82: ...Uninstalling CMS 82 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 166: ...How a Registration Manager Works 166 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 382: ...ACL Reference 382 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 566: ...Managing Policy Plug in Modules 566 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 710: ...1 3 Organization Security Policies 710 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 716: ...Object Identifiers 716 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 762: ...DNs in Certificate Management System 762 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 794: ...Managing Certificates 794 Managing Servers with Netscape Console December 2001...
Страница 810: ...The SSL Handshake 810 Managing Servers with Netscape Console December 2001...
Страница 828: ...828 Netscape Certificate Management System Administrator s Guide February 2003...