The implementation method of applet digital signature under the new security characteristic of JAVA2
Beijing fee
Since Java technology began to be applied, there has been a great deal of concern about the security of the Java platform and the security issues that arise as a result of the deployment of Java technology. In particular, after the release of Java2 in November 1998, the Java security architecture has undergone a fundamental improvement, and for end users it can protect files and private data from malicious programs or viruses, and identify the identity of the code provider. For developers, by using the API approach, security features can be integrated into the application because the API's architecture can define and integrate the use of specific resources, encryption, security management, policy management, and provide classes to manage public key/key pairs and trust the user group's public key certificates. At the same time, system administrators, developers, and users can use the tools it provides to manage key libraries, generate digital signatures in jar files, integrity detection of signatures, and create and modify policy files. Java security, according to the Java designer, consists of 2 aspects, first providing Java as a secure platform for users to safely run Java programs, and second, to provide security tools and services implemented in the Java programming language. It allows Java technology to be applied to areas such as the business community that are very sensitive to security. This article will introduce the security of JAVA2 and the implementation of the applet digital signature under the new feature in these two aspects.
JAVA2 uses a new security architecture, as shown in Figure 1, and provides many new features based on this security architecture.
Fig. 1 JDK1. 2 Safe Mode
1. 1 Dense-grain access control
This ability exists in the JDK from the very beginning. But to use it, the creator of the application has to do a lot of programming work
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.