Digital certificates are currently the most mature and widely used information security technology in the world. Digital certificates are based on cryptography and use technologies such as digital signatures, digital envelopes, and timestamp services to establish an effective trust mechanism on the Internet. It mainly contains the certificate owner's information, the certificate owner's public key and the signature of the certificate authority. In layman's terms, a digital certificate is the identity card of an individual or organization on the Internet.
The so-called certification authority (CA, Certificate Authority) uses public key basic technology to provide network identity authentication services. It is responsible for issuing and managing digital certificates and is an authoritative and impartial third-party trust. mechanism. The role of CA is similar to the institutions that issue certificates in our real life, such as ID card processing institutions.
CA certificate, as the name suggests, is a certificate issued by a CA. Everyone can find tools to create certificates. But a certificate made by a little kid like you is of little use. Because you are not an authoritative CA organization, the certificate you create yourself is not authoritative.
The functions of the CA certificate:
The first function is to verify whether the HTTPS website you open is trustworthy
The second function is to verify whether the files you install are Tampered
At present, most executable files (such as software installation packages, drivers, security patches) released by well-known companies or organizations carry digital signatures. It is recommended that everyone check to see if there is a digital signature before installing the software. If so, follow the above steps to verify it. If the digital signature is invalid, it is recommended that you do not install it, as there will be security risks.