Application examples for digital certificates
Tutorial with ID 1 from current 11


Warning: Undefined array key "autor" in /is/htdocs/wp1006193_XB7RPIEALD/www/abylonsoft.com/tutorial/seite.php on line 129

Warning: Undefined array key "datum" in /is/htdocs/wp1006193_XB7RPIEALD/www/abylonsoft.com/tutorial/seite.php on line 129

Author: - Published on:

Application example for digital certificates

Digital Certificates consist of a special data set in which the properties of objects and persons are stored. Information can include the name and digital signature of the issuer, the validity period and scope, the name and other information of the owner, as well as their public key. For authentic certificates, the information in the certificate is verified by an official certification authority (CA Certificate Authority) and confirmed by the digital signature.

The highlight of this procedure is that no single encryption and decryption password is required. The certificate, on the other hand, consists of a public key and a private key, whereby the private part cannot be inferred from the public part of the certificate. The public part of the certificate can and should be freely accessible in corresponding databases or publicly distributed. The public key is used to encrypt data and check signatures for authenticity. The private and secret key is used to decrypt and sign data.

The technology of digital or public key certificates is used to protect data and ensure authenticity and integrity in the digital world. The use of digital certificates in everyday life is very diverse, e.g:

  • Document-Signature: Guarantees the authenticity of documents, which guarantees the binding nature of documents, especially in business life (comparable to a handwritten signature).
  • Email-Signature: Authentication of the sender and protection against content changes.
  • Code Signing: Ensures authenticity and integrity of software programs or macro scripts in MS Office.
  • Encrypted network communication: Automatic encryption of data via networks or the Internet using the familiar SSL, HTTPS, IPsec or VPN methods.
  • Data encryption: The asymmetric encryption of data is manifold, whereby a so-called hybrid encryption system is usually used. This is also the case with the abylonsoft products abylon BASIC, abylon KEYSAFE, abylon CRYPTDRIVE etc..
  • Email encryption: The encryption of the email texts and attachments with the well-known procedures S/MIME (see also abylon CRYPTMAIL) or PGP (is not supported by abylonsoft software products).
  • Authentication: In addition to the knowledge of a password or biometric features, the identity can be verified by possession of an authentic certificate (e.g. on a chip card or token).
  • Online-Tickets: The validity and integrity of the tickets is guaranteed by the printout of a digital certificate in combination with personal identification.
  • CRM solution: In customer relationship management, authentication and access protection mechanisms against data theft and TLS/SSL are used for secure data transmission.
  • uvm.

NOTE: The self-signed certificates created with abylon SELFCERT are not qualified in the sense of the German Signature Act (SigG §2 No. 7) and cannot legally replace a handwritten signature. In the private or locally limited business environment, however, they offer good services. The software abylon SELFCERT is offered free of charge as Freeware without guarantee.

Themed software for:
Application examples for digital certificates

Software abylon SELFCERT

abylon SELFCERT:

Creating self-signed X.509 Test certificates

Info Purchase Test

Software abylon CRYPTMAIL

abylon CRYPTMAIL:

Encryption and signature of emails; incl. Outlook AddIn

Info Purchase Test

Software abylon ENTERPRISE

abylon ENTERPRISE:

Security-Suite for professional use

Info Purchase Test

Enter comment

Please use our support form for support requests Support form!


I have understood and accept the Privacy Policy.