BLOG

Uncategorized

HONEY POT

In Computer terminology a honey pot is a computer security mechanism set to detect or in some manner counteract attempts...
Read More
Uncategorized

Block Chain

Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or...
Read More
Uncategorized

IINFRASOL TECH INFO

Read More

A Public Key Infrastructure (PKI) is a set of roles of Polices ,Hardware Software procedures needed to create manage disuse, store and revoke digital signing and manage PKI The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, INTERNET banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred.
PKI is an arrangement that binds with respective identities of entities (like people and organizations). The binding is established through a process of registration and issuance of certificates at and by a (CA). Depending on the assurance level of the binding, this may be carried out by an automated process or under human supervision.
The PKI role that assures valid and correct registration is called a registration authority (RA). An RA is responsible for accepting requests for digital certificates and authenticating the entity making the request.PKI, a registration authority is usually called a subordinate CA.[2]
An entity must be uniquely identifiable within each CA domain on the basis of information about that entity. A third-party (VA) can provide this entity information on behalf of the CA.
The Digital Signing is designed in Hardware token like Pen drive or if it organization it will be deploy at Data center it called Hardware Secure Module(HSM) it look like Hardware Server