Ning Jiajun China PKI Forum July 7, 2004 - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

Ning Jiajun China PKI Forum July 7, 2004

Description:

Construct method. Topological Structure. Background. There are more than 70 CAs in China ... JLCA. BCA. Thank You ! E-Mail: ningjj_at_mx.cei.gov.cn. Tel: 86-10 ... – PowerPoint PPT presentation

Number of Views:39
Avg rating:3.0/5.0
Slides: 13
Provided by: jess75
Category:
Tags: pki | china | construct | forum | jiajun | july | ning

less

Transcript and Presenter's Notes

Title: Ning Jiajun China PKI Forum July 7, 2004


1
Ning Jiajun China PKI ForumJuly 7, 2004
Chinese Bridge CA Project
2
Outline
  • Background
  • Participant
  • Object
  • Contents
  • Principle
  • Construct method
  • Topological Structure

3
Background
  • There are more than 70 CAs in China
  • Different technical systems
  • Interoperability among CAs is a big problem
  • Other Difficulties

4
Participants
  • Bridge CA State Information Center
  • 6 CA will be bridged
  • Beijing CA,
  • Shanghai CA,
  • Tianjin CA,
  • Jilin CA,
  • Fujian CA,
  • China Telecom CA

5
Object
  • Time Start 2003. 10, Finish 2004. 9
  • Can initially provide 30 million
    cross-certifications per year.
  • Realize interoperability among 6 CAs.
  • Provide interoperability technology and
    management standards
  • If the prototype of the bridge CA succeeds, it
    will be upgraded to become the operational China
    central bridge CA

6
Contents
  • The Bridge CA system
  • 6 CAs modification so as to be bridged
  • the standards of interoperability drafting
  • Bridge CA API exploitation

7
Principles
  • Keep the security level of CAs be bridged
  • There is no affection to the applications 6 CAs
    already serviced
  • Follow international and national standards

8
Strategies
  • Continuity
  • There should not be any affection to the
    business operation on the 6 PCAs
  • Efficiency
  • The whole BCA system should be efficient
  • Reliability
  • Related PKI products must be mature and
    fully examined on the market

9
Strategies
  • High security
  • Must adopt highest security technology and
    management available
  • Expansibility
  • Must be very easy to be upgraded to the
    central BCA
  • Controllability
  • There must not be any back-door and
    malicious code within the system

10
Construct method
  • Requirement, risk, cost balance analysis
  • Integration
  • Coherence
  • Easy operation
  • Flexibility
  • Multiple protection

11
Topological Structure
12
Thank You !
E-Mail ningjj_at_mx.cei.gov.cn Tel 86-10-68558924
Write a Comment
User Comments (0)
About PowerShow.com