SlideShare a Scribd company logo
1 of 8
THE ROLE & FUNCTION OF
CERTIFYING AUTHORITIES
Dr. Suchita Bhovar
The role & function of certifying
authorities
■ Certificate Authority is a trusted entity that issues Digital Certificates and
Public-private Key pairs.
■ The role of the Certificate Authority is to guarantee that the individual
granted the unique certificate is, in fact, who he or she claims to be.
■ A certificate authority is a trusted entity that issues electronic documents that
verify a digital entity’s identity on the internet.
■ The electronic documents, which are called digital certificates, are an
essential part of secure communication and play an important role in the
public key infrastructure(PKI)
Features of Certifying Authorities
■ The certificate Authority verifies that the owner of the certificate is who he
says he is.
■ A certificate authority can be a trusted third party which is responsible for
physically verifying the legitimacy of the identity of an individual or
organisation before issuing a digital certificate
■ A Certifying Authority can be an external (public) Certifying Authority like
Verisign, Thawte or comodo, or an internal (private) Certificate Authority
configured inside our network.
Functions of a certifying Authority
■ Certifying Authority is a critical security service in a network.
■ A Certificate Authority performs the following functions.
■ Certificate Authority Verifies the Identity:
– The Certificate Authority must validate the identity of the entity who
requested a digital certificate before issuing it.
Certificate Authority issues digital certificates:
- Once the validation process is over, the Certificate Authority issues the
digital certificate to the entity who requested it.
- Digital certificate can be used for encryption (example: Encryption web
traffic), code signing, authentication etc.,
Functions of a certifying Authority
 Certificate Authority maintains Certificate Revocation List
 The Certificate Authority maintains Certificate Revocation List.
 A certificate revocation list is a list of digital certificates which are no longer
valid and have been revoked and therefore should not be relied by anyone.
Exercising supervision over the activities of the Certifying authorities.
Certifying public keys of the Certifying Authorities
Laying down the standards to be maintained by the Certifying Authorities
Specifying the qualifications and experience which employees of the Certifying
Authorities should possess;
Specifying Authorities shall conduct their business specifying the content of
written, printed or visual material and advertisements that may be distributed or
used in respect of a Electronic Signature and the Public Key.
Specifying the form and content of a Electronic Signature Certificate and the key.
Specifying the form and manner, in which accounts shall be maintained by the
Certifying Authorities.
Specifying the terms and conditions subject to which auditors may be appointed and
the remuneration to be paid to them.
Facilitating the establishment of any electronic system by a Certifying Authority
either solely or jointly with other Certifying Authorities and regulation of such
systems;
shall conduct their dealings with the subscribers;
Resolving any conflict of interests between the Certifying Authorities and the
subscribers;
Laying down the duties of the Certifying Authorities;
Maintaining a data-base containing the disclosure record of every Certifying
Authority containing such particulars, as may be subjected to conditions.
THANK YOU

More Related Content

Similar to The role of certifying authorities in IPR

Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Contribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdfContribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdfXtratrust Digisign Pvt ltd
 
Digital Signature
Digital Signature Digital Signature
Digital Signature Vakilsearch
 
IRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a ProfileIRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a ProfileIRJET Journal
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010SC Leung
 
Digital signature certificate in chennai
Digital signature certificate in chennaiDigital signature certificate in chennai
Digital signature certificate in chennaiSharpdigitalsignature
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commercemahesh tawade
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
eSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for DigitisationeSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for Digitisationitnewsafrica
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authorityKrutiShah114
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
Blockchain based approach to KYC sharing
Blockchain based approach to KYC sharingBlockchain based approach to KYC sharing
Blockchain based approach to KYC sharingVasiliy Suvorov
 

Similar to The role of certifying authorities in IPR (20)

Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Contribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdfContribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdf
 
Digital Signature
Digital Signature Digital Signature
Digital Signature
 
Digital Signature in Gurgaon
Digital Signature in GurgaonDigital Signature in Gurgaon
Digital Signature in Gurgaon
 
Digital signature price in chennai
Digital signature price in chennaiDigital signature price in chennai
Digital signature price in chennai
 
IRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a ProfileIRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a Profile
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
Digital signature in chennai
Digital signature in chennaiDigital signature in chennai
Digital signature in chennai
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Digital signature price in chennai
Digital signature price in chennaiDigital signature price in chennai
Digital signature price in chennai
 
Digital signature certificate in chennai
Digital signature certificate in chennaiDigital signature certificate in chennai
Digital signature certificate in chennai
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
eSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for DigitisationeSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for Digitisation
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
Blockchain based approach to KYC sharing
Blockchain based approach to KYC sharingBlockchain based approach to KYC sharing
Blockchain based approach to KYC sharing
 

More from suchita74

Characteristics or Nature of Financial Services.pptx
Characteristics or Nature of Financial Services.pptxCharacteristics or Nature of Financial Services.pptx
Characteristics or Nature of Financial Services.pptxsuchita74
 
blackboxandwhiteboxtesting in software testing.ppt
blackboxandwhiteboxtesting in software testing.pptblackboxandwhiteboxtesting in software testing.ppt
blackboxandwhiteboxtesting in software testing.pptsuchita74
 
Agile Development Models in Software EngineeringE.pptx
Agile Development Models in Software EngineeringE.pptxAgile Development Models in Software EngineeringE.pptx
Agile Development Models in Software EngineeringE.pptxsuchita74
 
gantt chart & pert in Software engineering.pptx
gantt chart & pert in Software engineering.pptxgantt chart & pert in Software engineering.pptx
gantt chart & pert in Software engineering.pptxsuchita74
 
ITERATIVE model in software engineering.pptx
ITERATIVE model in software engineering.pptxITERATIVE model in software engineering.pptx
ITERATIVE model in software engineering.pptxsuchita74
 
networking.ppt
networking.pptnetworking.ppt
networking.pptsuchita74
 
Subfields of Artificial Intelligence.pptx
Subfields of Artificial Intelligence.pptxSubfields of Artificial Intelligence.pptx
Subfields of Artificial Intelligence.pptxsuchita74
 
Means End Analysis (MEA) in Artificial.pptx
Means End Analysis (MEA) in Artificial.pptxMeans End Analysis (MEA) in Artificial.pptx
Means End Analysis (MEA) in Artificial.pptxsuchita74
 
What is Fuzzy Logic in AI and applications.pptx
What is Fuzzy Logic in AI and applications.pptxWhat is Fuzzy Logic in AI and applications.pptx
What is Fuzzy Logic in AI and applications.pptxsuchita74
 
venture capital.pptx
venture capital.pptxventure capital.pptx
venture capital.pptxsuchita74
 
Knowledge-Based Agent in Artificial intelligence.pptx
Knowledge-Based Agent in Artificial intelligence.pptxKnowledge-Based Agent in Artificial intelligence.pptx
Knowledge-Based Agent in Artificial intelligence.pptxsuchita74
 
dominance of MNCs.pptx
dominance of MNCs.pptxdominance of MNCs.pptx
dominance of MNCs.pptxsuchita74
 
Rational Agent.pptx
Rational Agent.pptxRational Agent.pptx
Rational Agent.pptxsuchita74
 
5_lectureslides.pptx
5_lectureslides.pptx5_lectureslides.pptx
5_lectureslides.pptxsuchita74
 
4-220218152210.pdf
4-220218152210.pdf4-220218152210.pdf
4-220218152210.pdfsuchita74
 
factors affecting IM.pptx
factors affecting IM.pptxfactors affecting IM.pptx
factors affecting IM.pptxsuchita74
 
ALAN TURING MACHINE.pptx
ALAN TURING MACHINE.pptxALAN TURING MACHINE.pptx
ALAN TURING MACHINE.pptxsuchita74
 
SEI-CMM.pptx
SEI-CMM.pptxSEI-CMM.pptx
SEI-CMM.pptxsuchita74
 
RAD MODEL.pptx
RAD MODEL.pptxRAD MODEL.pptx
RAD MODEL.pptxsuchita74
 
ASSIGNMENT.pptx
ASSIGNMENT.pptxASSIGNMENT.pptx
ASSIGNMENT.pptxsuchita74
 

More from suchita74 (20)

Characteristics or Nature of Financial Services.pptx
Characteristics or Nature of Financial Services.pptxCharacteristics or Nature of Financial Services.pptx
Characteristics or Nature of Financial Services.pptx
 
blackboxandwhiteboxtesting in software testing.ppt
blackboxandwhiteboxtesting in software testing.pptblackboxandwhiteboxtesting in software testing.ppt
blackboxandwhiteboxtesting in software testing.ppt
 
Agile Development Models in Software EngineeringE.pptx
Agile Development Models in Software EngineeringE.pptxAgile Development Models in Software EngineeringE.pptx
Agile Development Models in Software EngineeringE.pptx
 
gantt chart & pert in Software engineering.pptx
gantt chart & pert in Software engineering.pptxgantt chart & pert in Software engineering.pptx
gantt chart & pert in Software engineering.pptx
 
ITERATIVE model in software engineering.pptx
ITERATIVE model in software engineering.pptxITERATIVE model in software engineering.pptx
ITERATIVE model in software engineering.pptx
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
Subfields of Artificial Intelligence.pptx
Subfields of Artificial Intelligence.pptxSubfields of Artificial Intelligence.pptx
Subfields of Artificial Intelligence.pptx
 
Means End Analysis (MEA) in Artificial.pptx
Means End Analysis (MEA) in Artificial.pptxMeans End Analysis (MEA) in Artificial.pptx
Means End Analysis (MEA) in Artificial.pptx
 
What is Fuzzy Logic in AI and applications.pptx
What is Fuzzy Logic in AI and applications.pptxWhat is Fuzzy Logic in AI and applications.pptx
What is Fuzzy Logic in AI and applications.pptx
 
venture capital.pptx
venture capital.pptxventure capital.pptx
venture capital.pptx
 
Knowledge-Based Agent in Artificial intelligence.pptx
Knowledge-Based Agent in Artificial intelligence.pptxKnowledge-Based Agent in Artificial intelligence.pptx
Knowledge-Based Agent in Artificial intelligence.pptx
 
dominance of MNCs.pptx
dominance of MNCs.pptxdominance of MNCs.pptx
dominance of MNCs.pptx
 
Rational Agent.pptx
Rational Agent.pptxRational Agent.pptx
Rational Agent.pptx
 
5_lectureslides.pptx
5_lectureslides.pptx5_lectureslides.pptx
5_lectureslides.pptx
 
4-220218152210.pdf
4-220218152210.pdf4-220218152210.pdf
4-220218152210.pdf
 
factors affecting IM.pptx
factors affecting IM.pptxfactors affecting IM.pptx
factors affecting IM.pptx
 
ALAN TURING MACHINE.pptx
ALAN TURING MACHINE.pptxALAN TURING MACHINE.pptx
ALAN TURING MACHINE.pptx
 
SEI-CMM.pptx
SEI-CMM.pptxSEI-CMM.pptx
SEI-CMM.pptx
 
RAD MODEL.pptx
RAD MODEL.pptxRAD MODEL.pptx
RAD MODEL.pptx
 
ASSIGNMENT.pptx
ASSIGNMENT.pptxASSIGNMENT.pptx
ASSIGNMENT.pptx
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

The role of certifying authorities in IPR

  • 1. THE ROLE & FUNCTION OF CERTIFYING AUTHORITIES Dr. Suchita Bhovar
  • 2. The role & function of certifying authorities ■ Certificate Authority is a trusted entity that issues Digital Certificates and Public-private Key pairs. ■ The role of the Certificate Authority is to guarantee that the individual granted the unique certificate is, in fact, who he or she claims to be. ■ A certificate authority is a trusted entity that issues electronic documents that verify a digital entity’s identity on the internet. ■ The electronic documents, which are called digital certificates, are an essential part of secure communication and play an important role in the public key infrastructure(PKI)
  • 3. Features of Certifying Authorities ■ The certificate Authority verifies that the owner of the certificate is who he says he is. ■ A certificate authority can be a trusted third party which is responsible for physically verifying the legitimacy of the identity of an individual or organisation before issuing a digital certificate ■ A Certifying Authority can be an external (public) Certifying Authority like Verisign, Thawte or comodo, or an internal (private) Certificate Authority configured inside our network.
  • 4. Functions of a certifying Authority ■ Certifying Authority is a critical security service in a network. ■ A Certificate Authority performs the following functions. ■ Certificate Authority Verifies the Identity: – The Certificate Authority must validate the identity of the entity who requested a digital certificate before issuing it. Certificate Authority issues digital certificates: - Once the validation process is over, the Certificate Authority issues the digital certificate to the entity who requested it. - Digital certificate can be used for encryption (example: Encryption web traffic), code signing, authentication etc.,
  • 5. Functions of a certifying Authority  Certificate Authority maintains Certificate Revocation List  The Certificate Authority maintains Certificate Revocation List.  A certificate revocation list is a list of digital certificates which are no longer valid and have been revoked and therefore should not be relied by anyone.
  • 6. Exercising supervision over the activities of the Certifying authorities. Certifying public keys of the Certifying Authorities Laying down the standards to be maintained by the Certifying Authorities Specifying the qualifications and experience which employees of the Certifying Authorities should possess; Specifying Authorities shall conduct their business specifying the content of written, printed or visual material and advertisements that may be distributed or used in respect of a Electronic Signature and the Public Key. Specifying the form and content of a Electronic Signature Certificate and the key.
  • 7. Specifying the form and manner, in which accounts shall be maintained by the Certifying Authorities. Specifying the terms and conditions subject to which auditors may be appointed and the remuneration to be paid to them. Facilitating the establishment of any electronic system by a Certifying Authority either solely or jointly with other Certifying Authorities and regulation of such systems; shall conduct their dealings with the subscribers; Resolving any conflict of interests between the Certifying Authorities and the subscribers; Laying down the duties of the Certifying Authorities; Maintaining a data-base containing the disclosure record of every Certifying Authority containing such particulars, as may be subjected to conditions.