In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-09-21 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >
Share
Shulou(Shulou.com)11/24 Report--
Thanks to CTOnews.com netizen Windelight for the clue delivery! CTOnews.com March 29, China Unicom CA recently officially joined the SM2 national secret root certificate library, which will be built into the security browser (including ordinary version, enterprise version and Xinchuang version) and synchronously built into the Galaxy Kirin operating system. In addition, it is also supported to be built into the Tongxin and Zhongke Fonde operating system.
In 2018, relying on the browser, 360 launched the "360 Certificate Program". Then, together with Kirin Software, a number of domestic CA, gateway manufacturers and Ukey manufacturers jointly issued the "Independent State Migan Certificate Program". Up to now, more than 20 CA manufacturers have completed the root work of SM2 national secret certificate library, promoting the further development of national secret digital certificate system.
Unicom CA is operated by the Security Department of Unicom Digital Technology Co., Ltd. Unicom CA is an authoritative, notarized and third-party electronic certification service organization approved by the national electronic certification service department, with e-certification service license, commercial password use license, e-government e-certification service license and other qualifications, and takes the lead in participating in the formulation of standards for a number of countries, cryptographic industries and important groups.
CTOnews.com Note: in the field of cryptography and computer security, the root certificate is a public key certificate belonging to the root certificate authority (CA), which is the starting point of the trust chain in the public key infrastructure. Certification authorities play the same role as notaries in the real world, ensuring the identity of e-cert holders in the online world. Many applications (such as operating systems, web browsers) pre-install trusted root certificates, which means that users have authorized applications to review which root certificate authorities are reliable, such as government agencies, professional organizations (such as Google, Let's Encrypt, CAcert.org, Comodo, DigiCert), and so on.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
The market share of Chrome browser on the desktop has exceeded 70%, and users are complaining about
The world's first 2nm mobile chip: Samsung Exynos 2600 is ready for mass production.According to a r
A US federal judge has ruled that Google can keep its Chrome browser, but it will be prohibited from
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
About us Contact us Product review car news thenatureplanet
More Form oMedia: AutoTimes. Bestcoffee. SL News. Jarebook. Coffee Hunters. Sundaily. Modezone. NNB. Coffee. Game News. FrontStreet. GGAMEN
© 2024 shulou.com SLNews company. All rights reserved.