Current location - Quotes Website - Signature design - What is the use of enterprise digital certificate?
What is the use of enterprise digital certificate?

The role of enterprise digital certificate:

E-commerce system technology based on Internet makes it extremely convenient for customers who shop online to obtain information about businesses and enterprises, but at the same time it also increases the risk of abusing some sensitive or valuable data.

both the buyer and the seller must be true and reliable in all financial transactions conducted on the Internet, and all parties to the transaction, such as customers, businesses and enterprises, should have absolute confidence, so the Internet e-commerce system must ensure very reliable security and confidentiality technology.

in other words, four elements of network security must be guaranteed, namely, confidentiality of information transmission, integrity of data exchange, non-repudiation of sent information, and certainty of trader's identity.

1. Confidentiality of information

Business information in transactions requires confidentiality. If the account number and user name of the credit card are known, it may be stolen, and if the information of ordering and payment is known by competitors, it may lose business opportunities. Therefore, encryption is generally required in the information dissemination of e-commerce.

2. The certainty of the trader's identity

The two sides of online transactions are likely to be strangers and thousands of miles apart. In order to make the transaction successful, we must first be able to confirm the identity of the other party. For merchants, we should consider that the client can't be a liar, and customers will worry that the online store is not a black shop that plays tricks. Therefore, it is the premise of the transaction to confirm the identity of the other party conveniently and reliably.

for banks, credit card companies and sales stores that provide services for customers or users, in order to carry out service activities safely, confidentially and reliably, identity authentication is required.

For the relevant sales stores, they don't know the number of the credit card used by customers, and the stores can only hand over the credit card confirmation to the bank. Banks and credit card companies can use all kinds of confidentiality and identification methods to confirm whether the customer's identity is legal, and at the same time, they should also prevent the problem of refusal to pay and confirm the order and order receipt information.

3. Non-repudiation

Due to the ever-changing business conditions, once the transaction is reached, it cannot be denied. Otherwise, it will inevitably harm the interests of one party. For example, when ordering gold, the price of gold was low, but after receiving the order, the price of gold rose. If the acquirer can deny the actual time of receiving the order, or even the fact of receiving the order, the orderer will suffer losses. Therefore, all links in the communication process of electronic transactions must be undeniable.

4. Non-modifiability

Trading documents cannot be modified, such as ordering gold as mentioned in the above example. After receiving the order, the supplier found that the price of gold has risen sharply. If it can change the contents of the document and change the order number from 1 ton to 1 gram, it will benefit greatly, and then the ordering unit may suffer losses. Therefore, electronic transaction documents should also be unalterable to ensure the seriousness and fairness of the transaction.

While lamenting the great potential of e-commerce, people have to think calmly about how to ensure the fairness and security of transactions and the authenticity of the identities of both parties when conducting transactions and operations on the computer Internet where people don't meet each other. There is a mature security solution in the world, that is, establishing a security certificate architecture.

digital security certificates provide a way to verify identity on the internet. The security certificate system mainly adopts public key system, and others include symmetric key encryption, digital signature and digital envelope.

We can use digital certificates to establish a strict identity authentication system by using symmetric and asymmetric cryptography, so as to ensure that information will not be stolen by others except the sender and receiver; Information is not tampered with during transmission; The sender can confirm the identity of the receiver through the digital certificate; The sender cannot deny his own information.

Extended information:

Enterprise electronic Certificate Authority:

CA, also known as certificate authority center, as a trusted third party in e-commerce transactions, undertakes the responsibility of verifying the legality of public keys in the public key system.

the p>CA center issues a digital certificate to each user who uses the public key, and the role of the digital certificate is to prove that the user listed in the certificate legally owns the public key listed in the certificate.

the digital signature of the p>CA makes it impossible for attackers to forge and tamper with certificates. It is responsible for the generation, distribution and management of digital certificates required by all individuals participating in online transactions, so it is the core link of secure electronic transactions. Thus, the construction of Certificate Authority (CA) center is an essential step to develop and standardize the e-commerce market.

in order to ensure the security, authenticity, reliability, integrity and non-repudiation of information transmitted between users on the internet, it is necessary not only to verify the authenticity of users' identities, but also to have an authoritative, impartial and unique organization responsible for issuing and managing e-commerce security certificates that meet the domestic and international standards for secure electronic transactions.

Baidu encyclopedia-digital certificate