[go: up one dir, main page]

Wood, 2022 - Google Patents

The Department of the Treasury Public Key Infrastructure (PKI) X. 509 Certificate Policy

Wood, 2022

View PDF
Document ID
6961059668129691143
Author
Wood D
Publication year

External Links

Snippet

Note: The term “policy” is used in this document in the context of X. 509 Certificate Policy (CP) as opposed to how the term “policy” is generally used at the Department of the Treasury. The United States Department of the Treasury has implemented a Public Key …
Continue reading at pki.treas.gov (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/009Trust

Similar Documents

Publication Publication Date Title
Ford A public key infrastructure for us government unclassified but sensitive applications
Chokhani et al. RFC2527: Internet x. 509 Public Key Infrastructure Certificate Policy and Certification Practices Framework
Wood The Department of the Treasury Public Key Infrastructure (PKI) X. 509 Certificate Policy
PUBLIC et al. UNITED STATES DEPARTMENT OF THE TREASURY
Network Solutions Network Solutions certification practice statement
Authority X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA) Version 10.2
Authority X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA) Version 10.0 April 30, 2019
Authority X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA) Version 8.0 August 29, 2018
Authority X. 509 Certificate Policy for the FTI Certification Authority
Authority X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA) Version 7.0 March 12, 2018
Authority X. 509 Certificate Policy For The Federal Bridge Certification Authority (FBCA)
Authority X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA) Version 6.0 January 26, 2018
NFI Entrust Managed Services Non-Federal Identity (NFI) Public Key Infrastructure Certificate Policy
Authority X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA) Version 5.0 December 10, 2015
Authority X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA) Version 4.0 March 12, 2015
Authority X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA) Version 3 October 9, 2014
Policy Certification Practice Statement
Authority X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA)
Authority Revision History
Authority Swedish Social Insurance Agency Certification Practices Statement
Root OISTE Foundation
Lesecq et al. ONLINE CAS CERTIFICATION POLICY
Poulain et al. Offline CAS Certification Policy–Certification Practises Statement
Framework X. 509 Certificate Policy For The US Federal PKI Common Policy Framework
Authorities X. 509 Certificate Policy For The E-Governance Certification Authorities