![]() This process forms an SSL certificate chain that ensures that both dispatcher and recipient can rely on the authenticity of the certified key. The issuer key has to prove its validity with a certificate. This signature can in turn be verified by the public key of the certificate issuer. ![]() A digital signature verifies the certificate of the public recipient key. A digital certificate proves the authenticity, scope of application and jurisdiction of the public recipient key. ![]() The dispatcher retrieves the public key of the recipient. The following process is the foundation for this and is completed within a matter of seconds: The SSL encryption protocol encrypts the exchange of data using a number of keys, which are authenticated through various digital certificates.
0 Comments
Leave a Reply. |