Public Key Infrastructure PKI PKI (Piblic Key Infrustructure) is a key management platform that adheres to established standards. It can provide cryptographic services such as encryption and digital signatures and the necessary key and certificate management systems for all network applications. The basic composition of PKI Mpo Fanout Patch Cord,Mpo-Lc Duplex Hybrid Cable,Double Sheath Hybrid Cable,Duplex Om4 Hybrid Cable ShenZhen JunJin Technology Co.,Ltd , https://www.jjtcl.com
Beginning in the mid-1970s, a complete PKI system must have an authoritative certification authority (CA)
Digital certificate store key backup and recovery system certificate invalidation system application interface construction PKI will also start to build around these five systems.
Certification authority (CA): the authority that applies for and issues digital certificates. The CA must have authoritative characteristics;
Digital certificate library: used to store the digital certificates and public keys that have been issued, so that users can obtain the certificates and public keys of other users they need;
Key backup and recovery system: If the user loses the key used to decrypt the data, the data will not be decrypted, which will cause legal data loss. To avoid this, PKI provides a mechanism for backing up and restoring keys. However, it should be noted that the backup and recovery of the key must be completed by a trusted institution. Moreover, the key backup and recovery can only be used for the decryption key, and the signed private key cannot be backed up to ensure its uniqueness.
Certificate revocation system: The certificate revocation system is an essential component of PKI. As with various ID documents in daily life, the certificate may also need to be invalidated within the validity period, because the key medium may be lost or the user's identity may be changed. To achieve this, PKI must provide a series of mechanisms for revoking certificates.
Application interface: The value of PKI is to enable users to easily use security services such as encryption and digital signatures. Therefore, a complete PKI must provide a good application interface system so that various applications can be secure, consistent, and trusted. Interact with PKI to ensure the integrity and ease of use of a secure network environment.