Current location - Quotes Website - Signature design - How to do CA authentication and electronic signature, please know your friends' advice.
How to do CA authentication and electronic signature, please know your friends' advice.
1. Take the conditions for CA to provide electronic authentication services as an example:

(1) Subject qualification: can be a practicing lawyer; Trust machine function or insurance institution registered in Utah; Utah governor, state courts, cities, counties and other institutions that designate public servants to carry out CA certification business according to laws or administrative orders and their certified employees; Any company that obtains a business license in Utah;

(2) Procedure: CA itself must apply for a public key certificate and store it in the public key certificate database established or recognized by the competent authority for public inspection and reading;

(3) Notary qualification: it is necessary to have a notary qualification or at least employ a practitioner with a notary qualification;

(4) Employees must not have serious criminal records: employees must not have serious criminal records or commit other crimes of fraud, misrepresentation or deception;

(5) Professional knowledge: practitioners must have professional knowledge in conducting certification business;

(6) Business guarantee: In addition to government officials or institutions applying for CA business, other applicants must provide business guarantee;

(7) Software and hardware facilities: You must have legal rights to the software and hardware facilities required for CA business;

(8) Business place: You must have a business place in Utah or appoint an agent to perform business on your behalf;

(9) All other regulations of the competent authority must be observed.

2. Electronic signature issuance process

(1) The user first generates his own key pair and sends the public key and some personal identification information to the authentication center.

After authentication, the authentication center will perform some necessary steps to ensure that the request is indeed sent by the user. Then, the authentication center will issue a digital certificate to the user, which contains the user's personal information and his public key information, as well as the signature information of the authentication center.

Users can use their own digital certificates for various related activities. Digital certificates are issued by independent certification authorities. Digital certificates are different, and each certificate can provide different levels of credibility. You can get your own digital certificate from a certificate authority.

(2) At present, the types of digital certificates mainly include: personal digital certificate, company digital certificate, company employee digital certificate, server certificate, VPN certificate, WAP certificate, code signing certificate, and form signature certificate.

(3) Digital certificates have been widely used in various fields. At present, they mainly include: sending secure e-mail, visiting secure websites, online bidding, online signing, online ordering, secure online file transmission, online payment, online tax payment, online stock trading, online shopping and online customs declaration.

Extended data:

affect

1, express and directly recognize the acceptable technical solution standards in the form of direct legislation; (such as Utah, USA; Laws of the Hong Kong Special Administrative Region, etc. )

2. Authorize the competent government departments to formulate corresponding rules, such as the right to issue or revoke the license of CA institutions to engage in electronic authentication business, and the right to impose administrative punishment on CA institutions that violate the rules/illegally operate;

3. Establish clear conditions and procedures for the establishment and management of CA institutions. At the same time, at the level of supervising CA institutions, the government authorities have also established a database of all CA institutions legally registered and engaged in electronic authentication business for customers to inquire.

For example, according to the laws of Utah, the competent authority has established a database containing the detailed documents of all registered CA institutions in its public key certificate database. In addition to general company information (such as company name, address, telephone number, authorized business scope, etc.), it also includes information such as whether the institution that issued the certification certificate has been punished for illegal operation.

Baidu encyclopedia-electronic authentication

Baidu encyclopedia-electronic signature