Using The Comprehensive Protection Of E

Using The Comprehensive Protection Of E
Many friends do not understand the digital signature. In fact, the number of digital signatures Certificate Also called Digital ID, is a symbol of the identity information of both network communications. Popular talk that the network life identity.

Generally by the public key digital certificates, private keys and digital signatures of three parts. When we send the message to add a digital signature, the same as the digital signature and public key to the message. Receiver, after receiving the public key, it will use it to check the reliability of digital signatures, and restore the message. Receiver can also use the same access to public key encryption on the message at this time of the original sender, you must use the private key can decrypt the contents of the message view. Here we are with a specific application example to describe the whole process of its operation.

2, for a digital certificate Encrypt messages using digital certificates

the first step is to obtain a digital certificate. Currently there are many organizations in the network to provide digital certificates for services, and many are free. As an ordinary user, applications can use the free digital certificates to meet the requirements.

Now we compare the well-known network card through NETCA Electronic Certification system as an example describes the use of the process. Open a browser, enter the address and hit return to open the page, click in the “Certificate Request” link to open the page in the following will show three different types of use of digital certificates, click the “trial-type personal digital certificate request “link, then they pop up a window that prompts to install the CA certificate chain is only a computer, to apply for and use of digital certificates. Therefore need to click “Install Certificate chain” button, then may bring up a “potential conflict of script” message box, click “Yes” to continue to trust this site, then pop up a “security warning” window, informing about the designated Certificate Authority certificate installed, click “Yes” button to confirm the installation.

Seconds waiting a moment that the certificate chain will be prompted to install successfully, while access to personal information to fill in the window, how to fill out detailed personal information, especially e-mail address must be correctly completed. In the personal information below requires the user select the cryptographic service provider, where we recommend you choose “MicrosoftBase Cryptagraphic ProviderV1.0”, in the bottom of the prompts the user to enter some additional information that can be selected fill.

Submit personal information after a while that has been accepted and will be prompted to issue the certificate and show business receiving the certificate number and password, click the page in the “Install Certificate” button. To be safe at this time a verification window will pop-up asks for business receiving the certificate number and password, enter the correct page after the Open to continue click “Install Certificate” button to begin the certificate so that Download Installation. When prompted “Certificate successfully download the certificate application has been successfully loaded.” When prompted, that we have successfully applied for a digital certificate.