J2ME software Signing certificate and obtaining

Source: Internet
Author: User
Tags decrypt mail

Content Brief

Background

A good J2ME application, and finally, when the program reads the system resources (network, sms,pim,file, etc.) without popping annoying prompts. The purpose of this paper is to explore this knowledge.

Content Introduction

J2ME's certificate can solve the problems raised above, this article is mainly on the network of some solutions and experience to do a summary

Expected readers and suggestions

Developers who need to J2ME program visas assume that developers are already familiar with J2ME.

Because I have a limited level, there are some mistakes in the place, I hope that a lot of exchanges.

MIDlets Visa

What is a Java digital certificate

Original link http://www.blogjava.net/zpuser/archive/2006/07/22/59528.html

Perhaps you have the concept of "digital certificate" is still unfamiliar, in fact, digital certificate is a series of data to mark the identity of network users, used in network communication to identify the identity of the parties to the communication, that is, to solve the internet "who I am" problem, just as the reality of our every A person must have an identity card or a driver's license to prove our identity or some kind of qualification.

The digital certificate is issued by the authoritative and impartial third party institution, the CA Center, the encryption technology with digital certificate as the core can encrypt and decrypt the information transmitted on the network, digital signature and signature verification, ensure the confidentiality and integrality of the information, and the authenticity of the identity of the transaction entity, the non-repudiation of the signature information, So as to ensure the security of network applications.

The digital certificate adopts the public-key cryptosystem, which uses a pair of matching keys to encrypt and decrypt. Each user has a private key (private key) that is only in his possession, which is used for decryption and signature, and has a public key (public key) that can be disclosed externally for encryption and verification of the signature. When a confidential file is sent, the sender uses the receiver's public key to encrypt the data, and the receiver decrypts it with its own private key, so that the information can be safely reached to the destination, even if intercepted by a third party and cannot be decrypted because there is no corresponding private key. Digital means to ensure that the encryption process is an irreversible process, that is, only the private key can be decrypted. In the public key cryptosystem, the RSA system is the most common one.

Users can also use their own private key to deal with information, because the key is only my own, so that other people can not generate files, also formed a digital signature. With digital signatures, you can confirm the following two points:

(1) To ensure that the information is sent by the signer's signature, the signer can not deny or hard to deny;

(2) guarantee that the information has not been changed since it was issued and that the document issued is a real document.

Digital certificates can be used to send secure e-mail, access to security sites, online securities, online bidding procurement, online contract, online office, online payment, online tax and other online security electronic transactions and secure electronic trading activities.

The format of the word certificate generally uses X.509 international standards. At present, the digital certificate authentication center mainly issues the security e-mail certificate, the personal and the Enterprise ID card, the server certificate as well as the code signing certificate and so on several kinds of certificates.

The format of digital certificates follows itutx.509 international standards. A standard X.509 digital certificate contains the following elements:

Version information of the certificate;

The serial number of the certificate, each certificate has a unique certificate serial number;

The signature algorithm used by the certificate, such as the RSA algorithm;

The name of the issuing authority (CA Center) of the certificate, and the naming rules are generally in x.500 format;

The validity period of the certificate is now commonly used in UTC time format, its timing range is 1950-2049;

The name of the owner of the certificate, the naming rules are generally in x.500 format;

The public key of the certificate owner;

The digital signature of the certificate by the certification authority (CA Center).

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.