Notice that the server does not need to have the client's key in its trust store (and vice versa) because the ca is trusted.
注意,该服务器不需要让客户端的密钥在其信任存储区中(反之亦然),因为该CA是受信任的。
The trusted third party vouches for the public key and identifying information by issuing the certificate with its signature.
可信的第三方通过使用其自己的签名发出证书,为公开密匙和识别信息做证明。
Another section in the key database is the trust store and it contains all of the public keys of things that are trusted by the queue manager.
密钥数据库中的另一部分是信任存储区,它包含由该队列管理器信任的数据的所有公钥。
Among the various ways of doing this, the most widely used is to have one or more trusted third parties vouch for the public key.
实现此目的的方法有许多种,其中最常用的是对公开密匙使用一个或多个可靠的第三方证明。
When opened, you can create, modify, and delete private key and trusted certificate entries.
在打开时,您可以创建、修改和删除私钥和受信任证书项。
Kerberos was designed based on secret key cryptography and using trusted third party authentication.
Kerberos是根据秘密密钥加密并使用可信第三方身份验证而设计的。
All keystore entries (key and trusted certificate entries) are accessed with unique aliases.
所有keystore项(密钥和信任的证书项)都是用唯一别名访问的。
Initialize this instance using the current trust manager (encapsulating the trusted CAs) and the key manager (encapsulating the client's credential).
使用当前的信任管理员(封装带信任的CA)以及密钥管理员(封装客户端的证书)初始化该实例。
XKMS allows for easy management of public key infrastructure (PKI) by abstracting the complexity of managing the PKI from client applications to a trusted third party.
通过将管理公钥基础设施(PublicKey Infrastructure,pki)的复杂性从客户机应用程序提取到一个可信任的第三方机构中,XKMS使得管理PK i变得非常容易。
Finally, I mention the trusted host environment as an alternative to setting up public-private SSH key pairs.
最后,我要提一下作为一种替代方案来设置公私ssh密钥对的可信主机环境。
The output is likely to continue with a message to the effect that the key is not certified with a trusted signature.
输出结果可能继续是一条消息,大致意思是密钥不能被一个可信签名所认证。
This mechanism ensures that only the trusted party can perform the decryption of the message, being the only one owning the right private key.
此机制确保了只有受信方可以执行消息的解密,而此受信方只能是拥有正确私钥的一方。
Because our client certificate will be self-signed, we'll need to configure the client's public key certificate as a trusted signer for the server.
因为我们的客户机证书将是自签署的,所以我们需要将客户机的公钥证书配置为服务器受信任的签署者。
In our case, because the server's certificate will be self-signed, we need to configure the server's public key certificate as a trusted signer for the client.
在我们的示例中,由于服务器的证书是自签署的,我们需要将服务器的公钥证书配置为客户机受信任的签署者。
A key benefit here is that you may find potential new hires with the added benefit of personal recommendations from what may be a trusted source.
这里一个关键的好处是,您可能发现潜在的新的雇员,并且可以获得可靠的个人建议。
When an SSL-protected page is requested, the browser identifies the server as a trusted entity and initiates a handshake to pass encryption key information back and forth.
当请求一个SSL 保护的页面时,浏览器认为服务器是一个可信任的实体,并且启用一个连接来回传递加密的信息。
When receiving the encrypted message, the trusted party USES its private key to decrypt the session key and then USES it to decrypt the message.
当收到加密的消息时,受信任方使用其私钥解密会话密钥,然后使用它解密消息。
The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.
可信主机身份验证和公私ssh密钥对身份验证方法是类似的,在很大程度上实现相同的结果。
Authentication is provided in the form of a service ticket, issued by a trusted authentication service in the domain and encrypted with the target resource manager's secret key.
认证是以服务令牌(service ticket)的形式提供的,这是由域中的一个可信认证服务发出的,并使用目标资源管理器的密钥进行了加密。
Conversely, when the search engine key words to determine the page, the picture instead of ALT-attribute is a trusted reference point.
反过来讲,当搜索引擎要判断网页的关键词时,图片的ALT -代替属性是一个可信任的参考点。
Export the client public key certificate so it can be imported into the service's store of trusted client certificates by typing the following command.
通过键入下面的命令,导出客户机公钥证书以将其导入到受信任的客户机证书的服务器存储中。
In the real world, the certificates are typically themselves signed by some trusted authority such as VeriSign or an internal entity so you know that the public key is legitimate.
在现实世界中,证书通常由一些受信任的机构(如versign)或者某个内部实体进行签名,这样您便可以知道公钥是合法的。
This paper discusses key security technologies for a smart grid system, including public key infrastructures and trusted computing.
本文讨论了一个智能电网系统的关键安全技术问题,包括公钥基础设施和可信计算。
The digital credential would be a "voluntary trusted identity" system that would be the high-tech equivalentof a physical key, a fingerprint and a photo ID card.
该数字证书可以成为一个“自愿受信身份”系统,从而成为物理密钥、指纹以及身份证的高科技等价物。
The security model is the core content in the trusted information system and the key field of the trusted computing research.
安全模型既是可信信息系统的核心内容,也是可信计算研究的重要领域。
A trusted third party is employed to transfer trust, and an additional public key is used to set up the secure channel for transmitting the private key.
该方案使用一个可信第三方实现信任转移,增添一个用户公钥用于建立私钥传输的安全信道。
A trusted third party is employed to transfer trust, and an additional public key is used to set up the secure channel for transmitting the private key.
该方案使用一个可信第三方实现信任转移,增添一个用户公钥用于建立私钥传输的安全信道。
应用推荐