CA, also known as certificate issuing center, as a trusted third party in e-commerce transactions, undertakes the responsibility of verifying the legitimacy of public keys in public key systems. The CA Center issues a digital certificate to each user who uses the public key. The function of digital certificate is to prove that the user listed in the certificate legally owns the public key listed in the certificate.
To apply for the qualification of ca digital authentication certificate, users should apply to CA first if they want to get their own certificate. After the CA identifies the identity of the applicant, it assigns a public key to the applicant, and the CA binds the public key to the identity information of the applicant, and forms a certificate after signing it and sends it to the applicant. If the user wants to verify the authenticity of another certificate, he will use the CA's public key to verify the signature on that certificate. Once the certificate is verified, it is considered valid.
Digital certificates provide electronic authentication for secure communication between two parties. On the Internet, intranet or extranet, digital certificates are used to realize identity identification and electronic information encryption. A digital certificate contains the identification information of the owner of the public key and the private key of the key pair, and the identity of the certificate holder can be authenticated by verifying the authenticity of the identification information.
legal ground
People's Republic of China (PRC) electronic signature method
Thirteenth electronic signatures meet the following conditions at the same time, as reliable:
(1) When the electronic signature production data is used for electronic signature, it belongs to the exclusive rights of the electronic signer;
(2) When signing, the electronic signature production data is only controlled by the electronic signer;
(3) Any changes to the electronic signature after signature can be found;
(4) Any changes to the content and form of the data message after signature can be found.
The parties can also choose to use electronic signatures that meet their agreed reliable conditions.