beautypg.com

Comtrol Hub DeviceMaster User Manual

Page 73

background image

DeviceMaster Installation and Configuration Guide: 2000594 Rev. A

DeviceMaster Security - 73

Understanding Security Methods and Terminology

Who Provides
the
Infrastructure?

A number of products are offered that enable a company or group of companies
to implement a PKI. The acceleration of e-commerce and business-to-business
commerce over the Internet has increased the demand for PKI solutions.
Related ideas are the virtual private network (VPN) and the IP Security
(IPsec) standard. Among PKI leaders are:

RSA, which has developed the main algorithms used by PKI vendors.

Verisign, which acts as a certificate authority and sells software that
allows a company to create its own certificate authorities.

GTE CyberTrust, which provides a PKI implementation methodology and
consultation service that it plans to vend to other companies for a fixed
price.

Xcert, whose Web Sentry product that checks the revocation status of
certificates on a server, using the Online Certificate Status Protocol
(OCSP).

Netscape, whose Directory Server product is said to support 50 million
objects and process 5,000 queries a second; Secure E-Commerce, which
allows a company or extranet manager to manage digital certificates; and
Meta-Directory, which can connect all corporate directories into a single
directory for security management.

The following topic references are from:

http://searchsecurity.techtarget.com

/

PKI (public key infrastructure)

How Public/Private Key Cryptography Works

Who Provides the Infrastructure

Digital Certificate

DH Key

Man in the Middle attack

The RSA Key pair topic reference is from:

http://en.wikipedia.org/wiki/RSA

Term or

Issue

Explanation

This manual is related to the following products: