Bivotong certification machine
in terms of cost performance, the price of Tianwei's foreign certificate is not low, with a code signature of 5000; Jingan seems to have no code signature; It seems that watcom has adjusted its price recently, but it is still cheaper. The code signature is 2888
Oh, there is also the problem of passing 360 detection. Code signature does not pass the detection function, but it allows 360 to quickly identify the identity of software developers. If you make a signature for the Trojan horse and give it to 360 scan, it will not pass.
2) ways of account cancellation in the business hall: if the user cancels the account in the business hall on his own initiative or for some passive reasons such as arrearage, his / her passport account number will be automatically cancelled;
-
the general anti-virus software is aimed at the function and nature of the software itself
-
and the signature of digital certificate is to verify the identity of the software developer, improve the reliability of the software and prevent the code from being tampered
-
if the antivirus software reports a virus, it is likely that the software has been reported recently or has been detected to have a problem, which has nothing to do with the digital certificate. If you have any questions about the software code, you can consult the certificate issuing center< br />
How to apply for SSL certificate? The main steps are as follows:
1. Generate certificate request file CSR
CSR (certificate secure request) is the certificate request file. The first step for the webmaster to apply for SSL certificate is to generate CSR certificate request file. The system will generate two keys, one is the public key, the other is the private key, which is stored on the server. To generate CSR files, webmasters can refer to the documents of web server, general Apache, etc., use OpenSSL command line to generate key + csr2 files, Tomcat, JBoss, resin, etc., use keytool to generate JKS and CSR files, IIS creates a pending request and a CSR file through the wizard
warm reminder: if you are applying for watcom SSL certificate, its digital certificate store https://buy.wosign.com It has been supported that CSR files are automatically generated by the system, and users do not need to generate CSR files on the web server in advance
2. Select CA organization to apply for SSL certificate
CA Organization (certificate authority), which is also called certificate authority, is a trusted third party in e-commerce transactions, and is responsible for the legitimacy inspection of public key in public key system. How to choose CA organization? It is suggested to consider the following points:
(1) it is globally trusted and has passed the WebTrust international certification. SSL certificate is universal and supports more browsers
(2) fast response and 24-hour technical support. Because SSL certificate is related to the safety, credibility and normal operation of the website, as well as the reputation and sales of the website, once there is a problem, it must be solved at the first time, so the service and technical support of Ca manufacturers must be provided 24 hours a day
(3) support Chinese and English. Because most of the domestic websites are for customers who can understand Chinese, supporting Chinese SSL certificate can improve customers' awareness of the company's purchasing SSL certificate to protect its information security and the company's brand influence
(4) high cost performance. Because SSL certificate is a long-term information security basic protection measure for websites, especially e-commerce financial websites, it needs a certain cost, so cost performance should also be considered. Domestic server certificate is sold by the original factory, and there is no agent to earn the middle price difference, so its cost performance is much higher than that of foreign SSL certificate3. Submit CSR to CA for authentication
CA generally has two authentication methods:
(1) domain name authentication. Generally through the way of administrator mailbox authentication, this way of authentication speed is fast, but the certificate issued does not have the name of the enterprise, only shows the website domain name, that is, we often say the domain name SSL certificate
(2) enterprise document certification. The business license of the enterprise is required
authentication of the above two methods is called EV SSL certificate. EV SSL certificate can make the browser address bar turn green, so authentication is also the most strict. EV SSL certificate is mostly used in finance, e-commerce, securities and other fields with higher requirements for information security protection
4. Obtain SSL certificate and install
after receiving SSL certificate issued by Ca organization, deploy SSL certificate to server, key + cer directly to Apache file, and then modify httpd.conf file; Tomcat and others need to import the certificate cer file issued by Ca into JKS file, it to the server, and then modify server.xml; IIS needs to process the pending request and import the CER file
for the specific graphic tutorial of SSL certificate installation, please visit: webpage link
1. The client first needs to send its own encryption rules to the server
2. The server determines the encryption algorithm, and then transmits the identity information of the server back to the browser with SSL certificate, including the server IP, public key, certificate authority, etc
3. After obtaining the certificate, the browser verifies the validity of the SSL certificate, such as whether the CA organization is trusted, whether the certificate is expired, and whether the IP of the server is consistent with its own request. After passing the verification, a series of random numbers will be generated, and then the public key in the SSL certificate will be used for encryption. By using the agreed hash to calculate the handshake information, the random number encrypted just now is encrypted again and sent to the server
4. After receiving the information sent by the browser, the server first uses the password to decrypt the handshake information sent by the browser and verify his hash. If it is consistent, the server uses the private key to decrypt the password. After that, a handshake message will be encrypted with a password and sent to the browser again
5. The browser decrypts and calculates the hash of the handshake message. When it is consistent with the message sent by the server, the handshake ends
websites usually go through the above processes after installing SSL certificates, so the overall speed of the website is affected. However, in the actual test, this effect can be ignored, because users can't feel the speed has changed.