Application examples for digital certificates Tutorial with ID 1 from current 11
Warning: Undefined array key "autor" in /is/htdocs/wp1006193_XB7RPIEALD/www/abylonsoft.com/tutorial/seite.php on line 129
Warning: Undefined array key "datum" in /is/htdocs/wp1006193_XB7RPIEALD/www/abylonsoft.com/tutorial/seite.php on line 129
Author: - Published on:
Application example for digital certificates
Digital Certificates consist of a special data set in which the properties of objects and persons are stored. Information can include the name and digital signature of the issuer, the validity period and scope, the name and other information of the owner, as well as their public key. For authentic certificates, the information in the certificate is verified by an official certification authority (CA Certificate Authority) and confirmed by the digital signature.
The highlight of this procedure is that no single encryption and decryption password is required. The certificate, on the other hand, consists of a public key and a private key, whereby the private part cannot be inferred from the public part of the certificate. The public part of the certificate can and should be freely accessible in corresponding databases or publicly distributed. The public key is used to encrypt data and check signatures for authenticity. The private and secret key is used to decrypt and sign data.
The technology of digital or public key certificates is used to protect data and ensure authenticity and integrity in the digital world. The use of digital certificates in everyday life is very diverse, e.g:
Document-Signature: Guarantees the authenticity of documents, which guarantees the binding nature of documents, especially in business life (comparable to a handwritten signature).
Email-Signature: Authentication of the sender and protection against content changes.
Code Signing: Ensures authenticity and integrity of software programs or macro scripts in MS Office.
Encrypted network communication: Automatic encryption of data via networks or the Internet using the familiar SSL, HTTPS, IPsec or VPN methods.
Data encryption: The asymmetric encryption of data is manifold, whereby a so-called hybrid encryption system is usually used. This is also the case with the abylonsoft products abylon BASIC, abylon KEYSAFE, abylon CRYPTDRIVE etc..
Email encryption: The encryption of the email texts and attachments with the well-known procedures S/MIME (see also abylon CRYPTMAIL) or PGP (is not supported by abylonsoft software products).
Authentication: In addition to the knowledge of a password or biometric features, the identity can be verified by possession of an authentic certificate (e.g. on a chip card or token).
Online-Tickets: The validity and integrity of the tickets is guaranteed by the printout of a digital certificate in combination with personal identification.
CRM solution: In customer relationship management, authentication and access protection mechanisms against data theft and TLS/SSL are used for secure data transmission.
uvm.
NOTE: The self-signed certificates created with abylon SELFCERT are not qualified in the sense of the German Signature Act (SigG §2 No. 7) and cannot legally replace a handwritten signature. In the private or locally limited business environment, however, they offer good services. The software abylon SELFCERT is offered free of charge as Freeware without guarantee.
Themed software for: Application examples for digital certificates