這是一項基于PKI但又不屬于傳統的PKI加密解密的新技術,還沒成為全球的安全標準。我也難說明它是怎么樣的VERIFY DIGITAL SIGNATURE。
還是給你一個官方的解說吧。就當是為混2分
Yahoo!雅虎 Anti-Spam Resource Center反垃圾郵件資源中心
Home FAQs Tools Tips Fun Facts Spam and the Law DomainKeys家居常見工具小費訓事實和法律domainkeys郵件
DomainKeys: Proving and Protecting Email Sender Identitydomainkeys:電子郵件寄件人身份證明和保護
Email spoofing - the forging of another persons or companys email address to get users to trust and open a message - is one of the biggest challenges facing both the Internet community and anti-spam technologists today.電子郵件欺騙-偽造他人或公司的電子郵件信箱得到了用戶的信任與公開的信息,是雙方面臨的最大挑戰之一,網上社區反垃圾郵件技師. Without sender authentication, verification, and traceability, email providers can never know for certain if a message is legitimate or forged and will therefore have to continually make educated guesses on behalf of their users on what to deliver, what to block, and what to quarantine, in the pursuit of the best possible user experience.無寄件人認證、審核、追蹤、電子郵件提供商如果能永遠不知道某些訊息是合法或偽造,因而必須不斷的猜測,代其向用戶提供什么,什么座什么檢疫,在追求最佳的用戶經驗.
DomainKeys is a technology proposal that can bring black and white back to this decision process by giving email providers a mechanism for verifying both the domain of each email sender and the integrity of the messages sent (i.e,. that they were not altered during transit).domainkeys是技術方案,可以使黑白回到這一決定的過程給予核查機制電子郵件提供商都屬于每個電子郵件發送者發出的信息和誠信(醋酸.他們沒有改變過境期間). And, once the domain can be verified, it can be compared to the domain used by the sender in the From: f ield of the message to detect forgeries.而一旦域可以驗證,就好比是用域的由寄件人:六油田的發現是偽造的訊息. If its a forgery, then its spam or fraud, and it can be dropped without impact to the user.如果是偽造的,那就郵件或欺詐行為,而且可以減少對用戶沒有影響. If its not a forgery, then the domain is known, and a persistent reputation profile can be established for that sending domain that can be tied into anti-spam policy systems, shared between service providers, and even exposed to the user.如果不是偽造的,那么,已知域,概況聲譽與執著,可設立派出域可以捆扎成反垃圾郵件政策體系服務提供商之間共享,甚至暴露用戶.
For well-known companies that commonly send transactional email to consumers, such as banks, utilities, and ecommerce services, the benefits of verification are more profound, as it can help them protect their users from "phishing attacks" - the fraudulent solicitation for account information, such as credit card numbers and passwords, by impersonating the domain and email content of a company to which users have entrusted the storage of these data.對于知名公司共同向消費者發出電子郵件交易,如銀行、公用事業、商貿服務、好處核查更深刻,因為它可以幫助他們保護其用戶從"釣魚攻擊"的欺騙性勸帳戶信息如信用卡號碼和密碼,冒充域和電子郵件的內容,用戶紛紛向公司委托這些資料儲存. For these companies, protecting their users from fraud emails translates directly into user protection, user satisfaction, reduced customer care costs, and brand protection.對于這些企業,保護其用戶直接翻譯成詐騙電子郵件用戶保護,用戶滿意,降低客戶服務成本、品牌保護.
For consumers, such as Yahoo!對于消費者來說,如雅虎 Mail users or a grandparent accessing email through a small mid-western ISP, industry support for sender authentication technologies will mean that they can start trusting email again, and it can resume its role as one of the most powerful communication tools of our times.郵箱用戶通過電子郵件或外祖父母存取小中西部商、工業支援寄件人認證技術將意味著他們可以信任的電子郵件后再次啟動,它可以恢復其作為世界上最強大的通信工具的時代.
Standardization and License Terms標準化與許可條件
DKIM is the result of the ongoing commitment from numerous industry players to develop an open-standard e-mail authentication specification, and industry collaboration has played a critical role in the process.dkim是由于許多業者正在承擔發展開放標準電子郵件認證規格和產業合作起到了關鍵的作用. Industry leaders who played a valuable role in furthering the development of the DKIM specification include, Alt-N Technologies, AOL, Brandenburg Internetworking, Cisco, EarthLink, IBM, Microsoft, PGP Corporation, Sendmail, StrongMail Systems, Tumbleweed, VeriSign and Yahoo!.業領導者的角色,發揮了寶貴的發展更進一步的dkim規格包括,競標氮技術,美國在線、勃蘭登堡互聯思科,earthlink,IBM公司、微軟公司、中Pgp總公司Sendmail的,strongmail系統tumbleweed,但Verisign和雅虎. The participation of these companies has been instrumental in creating this single, signature-based e-mail authentication proposal.參與這些公司一直在制造這種單一簽名的電子郵件認證提案. The authoring companies will continue to work with these organizations and the IETF on the standardization of the DomainKeys Identified Mail (DKIM) specification so that industry-wide agreement on the best method for validating the identification of email senders can be reached.該公司將繼續致力于創作與這些團體和有關IETF工作的規范化domainkeys確定郵件(dkim)規格,使整個行業的協議的最佳方法驗證電子郵件發送者身份才能達成. DomainKeys Identified Mail has begun advancing through the IETF Internet standards process to be ultimately approved as an IETF Internet Standard.domainkeys確定郵件已經開始通過因特網因特網標準過程進最終被批準為國際標準IETF工作.
For historical reference, Yahoo!為歷史借鑒,雅虎! has submitted the DomainKeys framework as an Internet-Draft entitled " draft-delany-domainkeys-base-03.txt .已將domainkeys框架作為因特網決議題為"導流delany-domainkeys基地-03.txt. Yahoo!s DomainKeys Intellectual Property may be licensed under either of the following terms:雅虎國domainkeys知識產權牌可以以下其中一條規定:
Yahoo!雅虎 DomainKeys Patent License Agreementdomainkeys專利許可協議
GNU General Public License version 2.0 (and no other version).GNU通用公共許可證2.0版(無其它版).
Yahoo!s DomainKeys Intellectual Property includes the following patent(s) and patent application(s).雅虎國domainkeys知識產權包括以下專利申請專利(S)和(S)號.
U.S. Patent Number 6,986,049, issued January 10, 2006美國專利數量6,986,049發布2006年1月10日
U.S. Patent Application Serial Number 10/805,181, filed March 19, 2004美國專利申請序號八百○五分之一十○,181,立案2004年3月19日
PCT Application PCT/US2004/007883, filed March 15, 2004厘應用pct/us2004/007883,立案2004年3月15日
PCT Application PCT/US2005/008656, filed March 15, 2005厘應用pct/us2005/008656,立案2005年3月15日
In accordance with RFC2026, Yahoo!按照rfc2026雅虎! has also submitted the above license statement to the IETF as an IPR Disclosure.上述許可,也已向IETF工作作為知識產權聲明披露. Have license feedback?有執照的反饋?
Reference Implementation實施范圍
In addition to the Internet-Draft, Yahoo!除了因特網草案,雅虎! has developed a reference implementation for DomainKeys that can be plugged into Message Transfer Agents (MTAs), such as qmail.制定了實施范圍,可為domainkeys誘惑訊息傳遞代理(多邊),例如qmail郵件. A version of this software has been released and is available at //domainkeys.sourceforge.net/ .這個軟件版本已經獲釋,現已在//domainkeys.sourceforge.net/. Sendmail has developed a DomainKey implementation for their popular MTA (both the commercial and freeware versions).Sendmail的執行他們制定了domainkey熱門甲硫(包括商業、免費版本). In fact, Sendmail, Inc. has released an open source implementation of the Yahoo!事實上,Sendmail的華碩已公開發表的消息<雅虎 DomainKeys specification for testing on the Internet and is actively seeking participants and feedback for this Pilot Program.domainkeys規格測試于互聯網和反饋,并積極尋求參與這項試辦計畫.
How DomainKeys Works如何domainkeys工程 How it Works - Sending Servers它如何送服務器
There are two steps to signing an email with DomainKeys:有兩個步驟,簽署了與domainkeys電子郵件:
Set up: The domain owner (typically the team running the email systems within a company or service provider) generates a public/private key pair to use for signing all outgoing messages (multiple key pairs are allowed).成立:域所有者(通常隊辦起了公司的電子郵件系統或服務提供商)產生公共/私人鑰匙使用所有簽字離任訊息(多重關鍵雙雙獲準). The public key is published in DNS, and the private key is made available to their DomainKey-enabled outbound email servers.公鑰刊登的DNS,關鍵是提供給私人的domainkey驅動游電子郵件伺服器. This is step "A" in the diagram to the right.這一步的"A"在圖的權利.
Signing: When each email is sent by an authorized end-user within the domain, the DomainKey-enabled email system automatically uses the stored private key to generate a digital signature of the message.簽字:每發送電子郵件特準終端用戶的領域How it Works - Receiving Servers它如何接收服務器
There are three steps to verifying a signed email:有三個步驟,核實簽名電子郵件: Preparing: The DomainKeys-enabled receiving email system extracts the signature and claimed From: domain from the email headers and fetches the public key from DNS for the claimed From: domain.準備:domainkeys-接收電子郵件系統,使提取簽名并聲稱來自:從電子郵件、綠頭域公鑰來自聲稱來自域名為:域. This is step "C" in the diagram to the right.這一步的"C"的圖權.
Verifying: The public key from DNS is then used by the receiving mail system to verify that the signature was generated by the matching private key.驗證:公共密鑰則用來從域名系統的接收郵件核實簽字私鑰產生配對. This proves that the email was truly sent by, and with the permission of, the claimed sending From: domain and that its headers and content werent altered during transfer.這證明,真正的電子郵件發送、許可,由派出稱:域,其頭和內容都沒有改變,在轉讓.
Delivering: The receiving email system applies local policies based on the results of the signature test.運送:適用土政策接收電子郵件系統基于簽名測試結果. If the domain is verified and other anti-spam tests dont catch it, the email can be delivered to the users inbox.如果域驗證和其他反垃圾郵件測試也沒有漁獲,電子郵件可交付給用戶的inbox. If the signature fails to verify, or there isnt one, the email can be dropped, flagged, or quarantined.如果未能核實簽名,或有沒有一個能降的電子郵件、國旗或查封. This is step "D" in the diagram on the right.這一步的"D"在正確的圖.
In general, Yahoo!一般來說,雅虎! expects that DomainKeys will be verified by the receiving email servers.預料將經domainkeys接收電子郵件伺服器. However, end-user mail clients could also be modified to verify signatures and take action on the results.但是,最終用戶的郵件客戶還可改裝核實簽字并采取行動的結果. Frequently Asked Questions常見問題
How will this help stop spam?如何幫助阻止垃圾郵件?
How will this help stop fraud/phishing attacks?如何幫助制止欺詐/網絡釣魚攻擊?
Wont spammers just sign their messages with DomainKeys?剛剛簽署的電文不會與domainkeys濫發電郵?
What does DomainKeys verify?什么domainkeys查證?
Why sign the entire message?所以整個標志信息?
Does DomainKeys encrypt each message?是否每個domainkeys加密信息?
What public/private key technology is used for DomainKeys?什么公/私鑰用于科技domainkeys?
Who issues the public/private key pairs required by DomainKeys?誰的問題公/私鑰雙雙要求domainkeys?
Does DomainKeys require signing of the public key by a Certificate Authority (CA)?domainkeys是否需要簽署的公鑰證書管理局(星期六)?
How are DomainKeys revoked?如何domainkeys撤銷?
Why not just use S/MIME?為什么不能用收盤/默?
How does DomainKeys work with mailing lists?如何domainkeys與郵寄名單?
Who implements DomainKeys?實行domainkeys誰?
Which mail transfer agents (MTAs) support DomainKeys?其中郵件傳遞代理(多邊)支持domainkeys?
How do I deploy DomainKeys?我如何部署domainkeys?
I dont use my domains SMTP server to send email.我不使用我的域的SMTP服務來電子郵件. How do I use DomainKeys?domainkeys我該如何使用?
How can I send you feedback?我如何送你的反饋?
How will this help stop spam?如何幫助阻止垃圾郵件?
Several ways.幾種方式. First, it can allow receiving companies to drop or quarantine unsigned email that comes from domains that are known to always sign their emails with DomainKeys, thus impacting spam and phishing attacks.一是它可以讓公司接收電子郵件簽名下降或檢疫來自已知的領域,總是與domainkeys簽名電子郵件、垃圾郵件、釣魚攻擊從而沖擊. Second, the ability to verify sender domain will allow email service providers to begin to build reputation databases that can be shared with the community and also applied to spam policy.二能力驗證電子郵件發送者域將使服務提供商開始建造名聲數據庫是可以共享的社會,也適用于垃圾郵件的政策. For example, one ISP could share their "spam vs. legit email ratio" for the domain www.example.com with other ISPs that may not yet have built up information about the credibility and "spamminess" of email coming from www.example.com.例如一商可以分享他們的"濫發電郵的比率比legit"www.example.com域與其他供應商可能尚未建立起資料的可信度和"spamminess"的電子郵件來自www.example.com. Last, by eliminating forged From: addresses, we can bring server-level traceability back to email (not user-level - we believe that should be a policy of the provider and the choice of the user).最后,從消除偽造:地址我們能夠把服務器級別可追蹤回電子郵件(不用戶級,我們相信應該是一個政策的提供者和用戶的選擇). Spammers dont want to be traced, so they will be forced to only spam companies that arent using verification solutions.濫發電郵不想追查,所以他們將被迫只能利用郵件企業不核查辦法.
Back to Questions回到問題
How will this help stop fraud/phishing attacks?如何幫助制止欺詐/網絡釣魚攻擊?
Companies that are susceptible to phishing attacks can sign all of their outgoing emails with DomainKeys and then tell the world this policy so that email service providers can watch and drop any messages that claim to come from their domain that are unsigned.公司易受釣魚攻擊的跡象都能夠打出自己的電子郵件與domainkeys然后告訴全世界,使這一政策能夠收看電子郵件服務提供商和落任何訊息,聲稱是來自域簽名. For example, if the company www.example.com signs all of its outgoing email with DomainKeys, Yahoo!舉例來說,如果公司www.example.com打出招牌,其所有的電子郵件同domainkeys雅虎! can add a filter to its SpamGuard system that drops any unsigned or improperly signed messages claiming to come from the domain www.example.com, thus protecting tens of millions of example.coms customers or prospective customers from these phishing attacks.它可以增加一個過濾系統,spamguard滴簽名或擺放任何訊息簽名自稱來自域www.example.com,保護千百萬example.com的客戶或準客戶從這些網絡釣魚攻擊.
Back to Questions回到問題
Wont spammers just sign their messages with DomainKeys?剛剛簽署的電文不會與domainkeys濫發電郵?
Hopefully!但愿! If they do, theyll make it easier for the Internet community to isolate and drop/quarantine their messages using the methods described above in "How will this help stop spam?"否則,人家較易互聯網社會孤立和落/檢疫信息的利用上述方法在"如何幫助阻止垃圾郵件"? Eliminating the uncertainty of "did this email really come from the domain example.com?" will facilitate a whole range of anti-spam solutions.消除不確定性"這真是電子郵件來自example.com域?"方便了一系列反垃圾郵件解決方案.
Back to Questions回到問題
What does DomainKeys verify?什么domainkeys查證?
DomainKeys examines the From: and Sender: headers domain to protect the user and deliver the best possible user experience.domainkeys審核:與發貨:頭域維護用戶和用戶提供最佳的體驗. Desktop mail clients like Microsoft Outlook show these headers in their user interfaces.微軟Outlook郵件客戶桌面顯示這些頭象的用戶界面. If the user establishes their trust based on the these domains, then so should any system built to verify whether that trust is warranted.如果用戶信任的基礎上,確立了這些領域系統建成后,應查證是否有值得信任.
Back to Questions回到問題
Why sign the entire message?所以整個標志信息?
DomainKeys signs the entire message to allow the receiving server to also verify that the message wasnt tampered with or altered in transit.domainkeys跡象整個服務器接收到的訊息,讓訊息,也未核實篡改變造過境. By signing the headers and the body, DomainKeys makes it impossible to reuse parts of a message from a trusted source to fool users into believing the email is from that source.簽訂箱與身體domainkeys它無法再用部分賀詞信靠欺騙用戶們相信,電子郵件是從源頭. Back to Questions回到問題
Does DomainKeys encrypt each message?是否每個domainkeys加密信息?
DomainKeys does not encrypt the actual message - it only pre-pends a "digital signature" as a header.domainkeys不加密的實際消息只是預未決的"數字簽名"為標題.
Back to Questions回到問題
What public/private key technology is used for DomainKeys?什么公/私鑰用于科技domainkeys?
DomainKeys currently uses an RSA public/private key method.domainkeys目前使用的RSA公/私鑰方式. The key length is decided by the domain owner.關鍵是由長度域所有者.
Back to Questions回到問題
Who issues the public/private key pairs required by DomainKeys?誰的問題公/私鑰雙雙要求domainkeys?
The domain owner, or an agent or service provider acting on their behalf, should generate the key pairs that are used for their DomainKeys-enabled mail system.域所有者或代理人或服務提供商代表他們行事產生的關鍵,應該是用于對它們domainkeys-使郵件系統.
Back to Questions回到問題
Does DomainKeys require signing of the public key by a Certificate Authority (CA)?domainkeys是否需要簽署的公鑰證書管理局(星期六)?
DomainKeys does not require a CA.domainkeys不需要證. Much like a trusted Notary Public, Certificate Authorities are used in public/private key systems to sign, or "endorse," public keys so that the external users of public keys can know that the public keys they receive are truly owned by the people who sent them.猶如信賴公證,公證書使用部門/私鑰簽制度、或"贊同",使外部用戶公共密鑰公共密鑰公共密鑰可以知道他們是否真正擁有的人送. Since DomainKeys leverages DNS as the public key distribution system, and since only a domain owner can publish to their DNS, external users of DomainKeys know that the public key they pull is truly for that domain.自domainkeys杠桿作為公鑰分配域名系統由于只有一個域可以擁有自己的DNS出版、外部用戶domainkeys知道公鑰是真正為他們牽到域. The CA is not needed to verify the owner of the public key - the presence in that domains DNS is the verification.證不需要驗證公鑰主人-駐留在該領域的域名是核實. However, it is possible that Certificate Authorities may become a valuable addition to the DomainKeys solution to add an even greater level of security and trust.但是證機關也有可能會成為一項寶貴的domainkeys除了增添更大程度地解決安全和信任.
Back to Questions回到問題
How are DomainKeys revoked?如何domainkeys撤銷?
DomainKeys allows for multiple public keys to be published in DNS at the same time.domainkeys允許多種公共鑰匙刊登的DNS在同一時間. This allows companies to use different key pairs for the various mail servers they run and also to easily revoke, replace, or expire keys at their convenience.這使公司對使用不同的重點,對各郵件服務器,也能輕易地撤銷他們來說,代替,或在方便的鑰匙屆滿. Thus, the domain owner may revoke a public key and shift to signing with a new pair at any time.因此,車主可撤銷公鑰域,轉向以新簽署一雙隨時.
Back to Questions回到問題
Why not just use S/MIME?為什么不能用收盤/默?
S/MIME was developed for user-to-user message signing and encryption and by design should be independent of the sending and receiving servers.收盤/默研制用戶對用戶的信息加密和簽署了設計和應該獨立于發送和接收服務器. We believe that DomainKeys should be a natural server-to-server complement to S/MIME and not a replacement.我們相信應該是一個天然domainkeys服務器對服務器補充收盤/默不更換. Additionally, since S/MIME is used by many security-conscious industries, we need to ensur
1、使用IE訪問專利電子申請網,使用證書登錄。個人用戶填上身份證號作為用戶代碼,看得到自己的證書,但是發現忘記了密碼。
2、打開IE選項,通過“內容”“證書”,找到當初下載的專利申請網上的證書。選擇該證書,點擊“導出”。
3、點擊“下一步”,選擇“是,導出私鑰”。
4、格式選擇為“個人信息交換”,“則包含證書路徑中的所有證書”,“啟用證書隱私”。
5、設置一個方便記憶的密碼,這次不要再忘記了。
6、點擊“瀏覽”指定導出文件名。
7、找到該導出文件,復制到“CProgramFiles(x86)kairendeCA證書控件”目錄中。原來忘記密碼的那個文件可以從該目錄移除。
8、關閉IE,重新打開,使用新的證書密碼登錄電子申請網了。
專利申請密鑰是指在申請專利過程中,用于驗證申請人身份并保護申請文件安全的一組密碼。在進行電子申請時,申請人需要使用專利申請密鑰對申請文件進行加密和簽名,確保申請文件的完整性和真實性。專利申請密鑰一般由國家知識產權局或其他相關機構頒發,并且具有一定的時效性,需要定期更新。只有持有有效專利申請密鑰的申請人才能進行電子申請,確保專利申請的安全性和可信度。
專利申請密鑰是用于驗證和保護專利申請信息的一種安全機制。在提交專利申請時,申請人需要通過申請密鑰來確認自己的身份和訪問權限。申請密鑰通常由國家知識產權局或其他相關機構發放,申請人需要提供一定的申請材料以獲得密鑰。
專利申請密鑰的作用有以下幾個方面:
1. 身份驗證:專利申請密鑰可以確保申請人的身份是真實和合法的,防止他人冒名頂替。
2. 信息保護:專利申請密鑰可以保護申請人的專利申請信息不被未經授權的人訪問和使用。只有持有正確密鑰的人才能查看和處理申請信息。
3. 申請流程管理:專利申請密鑰可以用于管理申請流程,包括提交申請、繳費、修改和撤回等操作。只有持有密鑰的人才能執行這些操作,確保申請過程的安全性和可控性。
4. 可追溯性:專利申請密鑰可以用于追蹤和記錄專利申請的操作和變更歷史。這有助于管理和監督申請流程,確保其透明和公正。
專利申請密鑰在專利申請過程中發揮著重要的作用,旨在保護申請人的權益和保密信息,并確保申請流程的安全和可靠。
電信技術名詞解釋:什么是藍牙一、什么是藍牙技術所謂藍牙(Bluetooth)技術,實際上是一種短距離無線電技術,利用“藍牙”技術,能夠有效地簡化掌上電腦、筆記本電腦和移動電話手機等移動通信終端設備之間的通信,也能夠成功地簡化以上這些設備與因特網Internet之間的通信,從而使這些現代通信設備與因特網之間的數據傳輸變得更加迅速高效,為無線通信拓寬道路。說得通俗一點,就是藍牙技術使得現代一些輕易攜帶的移動通信設備和電腦設備,不必借助電纜就能聯網,并且能夠實現無線上因特網,其實際應用范圍還可以拓展到各種家電產品、消費電子產品和汽車等信息家電,組成一個巨大的無線通信網絡。“藍牙”技術屬于一種短距離、低成本的無線連接技術,是一種能夠實現語音和數據無線傳輸的開放性方案,目前無線通信的“藍牙”剛剛露出一點兒芽尖,卻已經引起了全球通信業界和廣大用戶的密切關注。二、藍牙的由來藍牙以公元10世紀統一丹麥和瑞典的一位斯堪的納維亞國王的名字命名。它孕育著頗為神奇的前景:對手機而言,與耳機之間不再需要連線;在個人計算機,主機與鍵盤、顯示器和打印機之間可以擺脫紛亂的連線;在更大范圍內,電冰箱、微波爐和其它家用電器可以與計算機網絡的連接,實現智能化操作。發明藍牙技術的是瑞典電信巨人愛立信公司。由于這種技術具有十分可喜的應用前景,1998年5月,五家世界頂級通信/計算機公司:愛立信、諾基亞、東芝、IBM和英特爾經過磋商,聯合成立了藍牙共同利益集團(Bluetooth SIG), 目的是加速其開發、推廣和應用。此項無線通信技術公布后,便迅速得到了包括摩托羅拉、3Com、朗訊、康柏、西門子等一大批公司的一致擁護,至今加盟藍牙SIG的公司已達到2000多個,其中包括許多世界最著名的計算機、通信以及消費電子產品領域的企業,甚至還有汽車與照相機的制造商和生產廠家。一項公開的技術規范能夠得到工業界如此廣泛的關注和支持,這說明基于此項藍牙技術的產品將具有廣闊的應用前景和巨大的潛在市場。藍牙共同利益集團現已改稱藍牙推廣集團。三、藍牙的技術內容藍牙技術產品是采用低能耗無線電通信技術來實現語音、數據和視頻傳輸的,其傳輸速率最高為每秒1Mb/s,以時分方式進行全雙工通信,通信距離為10米左右,配置功率放大器可以使通信距離進一步增加。藍牙產品采用的是跳頻技術,能夠抗信號衰落;采用快跳頻和短分組技術,能夠有效地減少同頻干擾,提高通信的安全性;采用前向糾錯編碼技術,以便在遠距離通信時減少隨機噪聲的干擾;采用2.4GHz的ISM (即工業、科學、醫學)頻段,以省去申請專用許可證的麻煩;采用FM調制方式,使設備變得更為簡單可靠;“藍牙”技術產品一個跳頻頻率發送一個同步分組,每組一個分組占用一個時隙,也可以增至5個時隙;“藍牙”技術支持一個異步數據通道,或者3個并發的同步語音通道,或者一個同時傳送異步數據和同步語音的通道。“藍牙”的每一個話音通道支持64Kbps的同步話音,異步通道支持的最大速率為721Kbps、反向應答速率為57.6Kbps的非對稱連接,或者432.6Kbps的對稱連接。藍牙技術產品與因特網Internet之間的通信,使得家庭和辦公室的設備不需要電纜也能夠實現互通互聯,大大提高辦公和通信效率。 “藍牙”將成為無線通信領域的新寵,將為廣大用戶提供極大的方便而受到青睞。四、藍牙技術指標和系統參數目前所公布的藍牙技術參數如表1所示。(2001.5)表1 藍牙技術參數工作頻段 ISM頻段,2.402~2.480GHz雙工方式 全雙工,TDD時分雙工業務類型 支持電路交換和分組交換業務數據速率 1Mb/s非同步信道速率 非對稱連接721/57.6kb/s,對稱連接432.6kb/s同步信道速率 64Kb/s功率 美國FCC要求<0dbm(1mW),其他國家可擴展為100mW跳頻頻率數 79個頻點/MHz跳頻速率 1600次/s工作模式 PARK/HOLD/SNIFF數據連接方式 面向連接業務SCO,無連接業務ACL糾錯方式 1/3FEC,2/3FEC,ARQ鑒權 采用反應邏輯算術信道加密 采用0位、40位、60位密鑰語音編碼方式 連續可變斜率調制CVSD發射距離 一般可達10~10cm,增加功率情況下可達100m五、藍牙技術中的名詞術語微微網(Piconet)是由采用藍牙技術的設備以特定方式組成的網絡。微微網的建立是由兩臺設備(如便攜式電腦和蜂窩電話)的連接開始,最多由8臺設備構成。所有的藍牙設備都是對等的,以同樣的方式工作。當一個微微網建立時,只有一臺為主設備,其他均為從設備,而且在一個微微網存在期間將一直維持這一狀況。分布式網絡(Scatternet)是由多個獨立、非同步的微微網形成的。主設備(Master unit)是指在微微網中,如果某臺設備的時鐘和跳頻序列用于同步其他設備,則稱它為主設備。從設備(Slave unit)是指非主設備的設備均為從設備。MAC地址(MAC address)是用3比特表示的地址,用于區分微微網中的設備。休眠設備(Parked units)在微微網中只參與同步,但沒有MAC地址的設備。監聽及保持方式(Sniff and Hold mode)指微微網中從設備的兩種低功耗工作方式。
出現密碼的問題可能和win7系統安裝方式有關,我的體會是,凡是用原盤正常安裝的win7系統(如ISO格式),接收文件時CPC都不會提示密碼,凡是用gho格式封裝系統安裝的win7系統,CPC就會提示輸入密碼。大家看看是不是這么回事?
數字證書一般都是“網上申請下載”,這樣備份后可以在多臺電腦上使用。申請過程從遞交紙質文件,大概1個月不到就下來了,需要提交的紙質文件包括,簽字的注冊請求書1份,2份用戶協議,1份身份證復印件,然后寄到專利局就行了。
紙質文件遞交了以后大概20天左右,你可以登錄臨時賬戶進行查看,如果審核通過會給一個正式的賬戶號的,進去下載電子證書,然后就可以通過CPC平臺進行操作了。對個人信息不會查學歷的,只要是正確的信息,就可以了,不會人為設檻的。擴展資料
1、安全電子郵件
電子郵件中使用數字證書可以建構安全電子郵件證書,主要用戶加密電子郵件的傳輸,保護電子郵件在傳輸和接收過程中的安全。安全電子郵件證書主要有證書持有者的CA機構的簽名、電子郵件地址和公開密鑰這些信息。
一方面,數字證書與電子郵件結合后,就可以在安全電子郵件證書的加密和數字簽名技術的保護下,實現電子郵件的安全傳輸和接收,保證了電子郵件的安全性和完整度。也保證了電子郵件傳輸方和接收方信息的真實性。另一方面,安全電子郵件證書中包括公開密鑰這一信息,就能夠確保電子郵件不被更改,因為只有知道公開密鑰才能使用電子郵件。
2、安全終端保護
隨著計算機網絡技術的發展,電子商務的發展也越來越快,在人們生活和生產中的應用也越來越廣泛,用戶終端和數據的安全問題也日益受到重視。為了避免終端數據信息的損壞或者是泄露,數字證書作為一種加密技術,可以用于終端的保護。
使用正版的軟件和硬件,正確配置系統和網絡并定期進行檢查,防止終端配置被非法篡改。利用網絡安全技術如防火墻對內外網絡進行實質性的隔離。及時更新病毒庫和防病毒軟件,對終端系統實時進行病毒和安全漏洞的掃描,加強對終端系統的安全保護。一旦發現可疑信息,就要立即重點監控,防止其帶來的影響和破壞。
加強訪問終端的控制,利用加密和認證等手段加強信息破解的難度。用戶可以設置一個以數字證書為主的系統登錄方式,加上動態加密,就可以實現對系統的驗證,沒有權限的用戶就無法進入終端系統的訪問,擁有權限的用戶就符合了訪問的要求,保證了訪問終端的一致性。另外還要做到終端網絡和主網絡的分離,減少兩者之間的數據交叉和結合,也避免了終端網絡和主網絡的相互影響,減少風險。
3、代碼簽名保護
網絡信息推廣對很多用戶來說,便捷有經濟,但對軟件的安全是不確定的。用戶對軟件進行分享時,軟件的接收和使用過程中存在著很多不安全因素,即使軟件供應商能夠保證軟件自身的安全性,但也無法抵制盜版軟件和網絡本身存在的不安全因素帶來的不利影響。
4、可信網站服務
我國網站的數量伴隨著計算機網絡技術的發展呈現出日益增長的趨勢,其中的惡意網站、釣魚網站和假冒網站也越來越多,這就增加了用戶對它們識別的難度,一不小心就會將自身的數據信息泄漏,嚴重影響了網絡的安全。當用戶對所使用的網站存在疑慮,不確定其中是否有被篡改和侵襲時,就可以利用數字證書的技術。通過數字證書技術,就可以對不確定的網站先進行驗證和檢查,增加了使用安全網站的機率,也避免了惡意網站、釣魚網站和假冒網站等對網絡造成的損失。
5、身份授權管理
授權管理系統是信息系統安全的重要內容,對用戶和程序提供相對應的授權服務,授權訪問和應用的方法,而數字證書必須通過計算機網絡的身份授權管理后才能被應用。要保證身份授權管理工具的安全性。當系統雙方相互認身份授權系統的工作才能展開。正確使用數字證書,適當授權,完成系統的用戶認證,才能切實保護身份授權管理系統的安全性。
參考資料來源:百度百科-數字證書
這是一項基于PKI但又不屬于傳統的PKI加密解密的新技術,還沒成為全球的安全標準。我也難說明它是怎么樣的VERIFY DIGITAL SIGNATURE。
還是給你一個官方的解說吧。就當是為混2分
Yahoo!雅虎 Anti-Spam Resource Center反垃圾郵件資源中心
Home FAQs Tools Tips Fun Facts Spam and the Law DomainKeys家居常見工具小費訓事實和法律domainkeys郵件
DomainKeys: Proving and Protecting Email Sender Identitydomainkeys:電子郵件寄件人身份證明和保護
Email spoofing - the forging of another persons or companys email address to get users to trust and open a message - is one of the biggest challenges facing both the Internet community and anti-spam technologists today.電子郵件欺騙-偽造他人或公司的電子郵件信箱得到了用戶的信任與公開的信息,是雙方面臨的最大挑戰之一,網上社區反垃圾郵件技師. Without sender authentication, verification, and traceability, email providers can never know for certain if a message is legitimate or forged and will therefore have to continually make educated guesses on behalf of their users on what to deliver, what to block, and what to quarantine, in the pursuit of the best possible user experience.無寄件人認證、審核、追蹤、電子郵件提供商如果能永遠不知道某些訊息是合法或偽造,因而必須不斷的猜測,代其向用戶提供什么,什么座什么檢疫,在追求最佳的用戶經驗.
DomainKeys is a technology proposal that can bring black and white back to this decision process by giving email providers a mechanism for verifying both the domain of each email sender and the integrity of the messages sent (i.e,. that they were not altered during transit).domainkeys是技術方案,可以使黑白回到這一決定的過程給予核查機制電子郵件提供商都屬于每個電子郵件發送者發出的信息和誠信(醋酸.他們沒有改變過境期間). And, once the domain can be verified, it can be compared to the domain used by the sender in the From: f ield of the message to detect forgeries.而一旦域可以驗證,就好比是用域的由寄件人:六油田的發現是偽造的訊息. If its a forgery, then its spam or fraud, and it can be dropped without impact to the user.如果是偽造的,那就郵件或欺詐行為,而且可以減少對用戶沒有影響. If its not a forgery, then the domain is known, and a persistent reputation profile can be established for that sending domain that can be tied into anti-spam policy systems, shared between service providers, and even exposed to the user.如果不是偽造的,那么,已知域,概況聲譽與執著,可設立派出域可以捆扎成反垃圾郵件政策體系服務提供商之間共享,甚至暴露用戶.
For well-known companies that commonly send transactional email to consumers, such as banks, utilities, and ecommerce services, the benefits of verification are more profound, as it can help them protect their users from "phishing attacks" - the fraudulent solicitation for account information, such as credit card numbers and passwords, by impersonating the domain and email content of a company to which users have entrusted the storage of these data.對于知名公司共同向消費者發出電子郵件交易,如銀行、公用事業、商貿服務、好處核查更深刻,因為它可以幫助他們保護其用戶從"釣魚攻擊"的欺騙性勸帳戶信息如信用卡號碼和密碼,冒充域和電子郵件的內容,用戶紛紛向公司委托這些資料儲存. For these companies, protecting their users from fraud emails translates directly into user protection, user satisfaction, reduced customer care costs, and brand protection.對于這些企業,保護其用戶直接翻譯成詐騙電子郵件用戶保護,用戶滿意,降低客戶服務成本、品牌保護.
For consumers, such as Yahoo!對于消費者來說,如雅虎 Mail users or a grandparent accessing email through a small mid-western ISP, industry support for sender authentication technologies will mean that they can start trusting email again, and it can resume its role as one of the most powerful communication tools of our times.郵箱用戶通過電子郵件或外祖父母存取小中西部商、工業支援寄件人認證技術將意味著他們可以信任的電子郵件后再次啟動,它可以恢復其作為世界上最強大的通信工具的時代.
Standardization and License Terms標準化與許可條件
DKIM is the result of the ongoing commitment from numerous industry players to develop an open-standard e-mail authentication specification, and industry collaboration has played a critical role in the process.dkim是由于許多業者正在承擔發展開放標準電子郵件認證規格和產業合作起到了關鍵的作用. Industry leaders who played a valuable role in furthering the development of the DKIM specification include, Alt-N Technologies, AOL, Brandenburg Internetworking, Cisco, EarthLink, IBM, Microsoft, PGP Corporation, Sendmail, StrongMail Systems, Tumbleweed, VeriSign and Yahoo!.業領導者的角色,發揮了寶貴的發展更進一步的dkim規格包括,競標氮技術,美國在線、勃蘭登堡互聯思科,earthlink,IBM公司、微軟公司、中Pgp總公司Sendmail的,strongmail系統tumbleweed,但Verisign和雅虎. The participation of these companies has been instrumental in creating this single, signature-based e-mail authentication proposal.參與這些公司一直在制造這種單一簽名的電子郵件認證提案. The authoring companies will continue to work with these organizations and the IETF on the standardization of the DomainKeys Identified Mail (DKIM) specification so that industry-wide agreement on the best method for validating the identification of email senders can be reached.該公司將繼續致力于創作與這些團體和有關IETF工作的規范化domainkeys確定郵件(dkim)規格,使整個行業的協議的最佳方法驗證電子郵件發送者身份才能達成. DomainKeys Identified Mail has begun advancing through the IETF Internet standards process to be ultimately approved as an IETF Internet Standard.domainkeys確定郵件已經開始通過因特網因特網標準過程進最終被批準為國際標準IETF工作.
For historical reference, Yahoo!為歷史借鑒,雅虎! has submitted the DomainKeys framework as an Internet-Draft entitled " draft-delany-domainkeys-base-03.txt .已將domainkeys框架作為因特網決議題為"導流delany-domainkeys基地-03.txt. Yahoo!s DomainKeys Intellectual Property may be licensed under either of the following terms:雅虎國domainkeys知識產權牌可以以下其中一條規定:
Yahoo!雅虎 DomainKeys Patent License Agreementdomainkeys專利許可協議
GNU General Public License version 2.0 (and no other version).GNU通用公共許可證2.0版(無其它版).
Yahoo!s DomainKeys Intellectual Property includes the following patent(s) and patent application(s).雅虎國domainkeys知識產權包括以下專利申請專利(S)和(S)號.
U.S. Patent Number 6,986,049, issued January 10, 2006美國專利數量6,986,049發布2006年1月10日
U.S. Patent Application Serial Number 10/805,181, filed March 19, 2004美國專利申請序號八百○五分之一十○,181,立案2004年3月19日
PCT Application PCT/US2004/007883, filed March 15, 2004厘應用pct/us2004/007883,立案2004年3月15日
PCT Application PCT/US2005/008656, filed March 15, 2005厘應用pct/us2005/008656,立案2005年3月15日
In accordance with RFC2026, Yahoo!按照rfc2026雅虎! has also submitted the above license statement to the IETF as an IPR Disclosure.上述許可,也已向IETF工作作為知識產權聲明披露. Have license feedback?有執照的反饋?
Reference Implementation實施范圍
In addition to the Internet-Draft, Yahoo!除了因特網草案,雅虎! has developed a reference implementation for DomainKeys that can be plugged into Message Transfer Agents (MTAs), such as qmail.制定了實施范圍,可為domainkeys誘惑訊息傳遞代理(多邊),例如qmail郵件. A version of this software has been released and is available at //domainkeys.sourceforge.net/ .這個軟件版本已經獲釋,現已在//domainkeys.sourceforge.net/. Sendmail has developed a DomainKey implementation for their popular MTA (both the commercial and freeware versions).Sendmail的執行他們制定了domainkey熱門甲硫(包括商業、免費版本). In fact, Sendmail, Inc. has released an open source implementation of the Yahoo!事實上,Sendmail的華碩已公開發表的消息<雅虎 DomainKeys specification for testing on the Internet and is actively seeking participants and feedback for this Pilot Program.domainkeys規格測試于互聯網和反饋,并積極尋求參與這項試辦計畫.
How DomainKeys Works如何domainkeys工程 How it Works - Sending Servers它如何送服務器
There are two steps to signing an email with DomainKeys:有兩個步驟,簽署了與domainkeys電子郵件:
Set up: The domain owner (typically the team running the email systems within a company or service provider) generates a public/private key pair to use for signing all outgoing messages (multiple key pairs are allowed).成立:域所有者(通常隊辦起了公司的電子郵件系統或服務提供商)產生公共/私人鑰匙使用所有簽字離任訊息(多重關鍵雙雙獲準). The public key is published in DNS, and the private key is made available to their DomainKey-enabled outbound email servers.公鑰刊登的DNS,關鍵是提供給私人的domainkey驅動游電子郵件伺服器. This is step "A" in the diagram to the right.這一步的"A"在圖的權利.
Signing: When each email is sent by an authorized end-user within the domain, the DomainKey-enabled email system automatically uses the stored private key to generate a digital signature of the message.簽字:每發送電子郵件特準終端用戶的領域
How it Works - Receiving Servers它如何接收服務器
There are three steps to verifying a signed email:有三個步驟,核實簽名電子郵件: Preparing: The DomainKeys-enabled receiving email system extracts the signature and claimed From: domain from the email headers and fetches the public key from DNS for the claimed From: domain.準備:domainkeys-接收電子郵件系統,使提取簽名并聲稱來自:從電子郵件、綠頭域公鑰來自聲稱來自域名為:域. This is step "C" in the diagram to the right.這一步的"C"的圖權.
Verifying: The public key from DNS is then used by the receiving mail system to verify that the signature was generated by the matching private key.驗證:公共密鑰則用來從域名系統的接收郵件核實簽字私鑰產生配對. This proves that the email was truly sent by, and with the permission of, the claimed sending From: domain and that its headers and content werent altered during transfer.這證明,真正的電子郵件發送、許可,由派出稱:域,其頭和內容都沒有改變,在轉讓.
Delivering: The receiving email system applies local policies based on the results of the signature test.運送:適用土政策接收電子郵件系統基于簽名測試結果. If the domain is verified and other anti-spam tests dont catch it, the email can be delivered to the users inbox.如果域驗證和其他反垃圾郵件測試也沒有漁獲,電子郵件可交付給用戶的inbox. If the signature fails to verify, or there isnt one, the email can be dropped, flagged, or quarantined.如果未能核實簽名,或有沒有一個能降的電子郵件、國旗或查封. This is step "D" in the diagram on the right.這一步的"D"在正確的圖.
In general, Yahoo!一般來說,雅虎! expects that DomainKeys will be verified by the receiving email servers.預料將經domainkeys接收電子郵件伺服器. However, end-user mail clients could also be modified to verify signatures and take action on the results.但是,最終用戶的郵件客戶還可改裝核實簽字并采取行動的結果. Frequently Asked Questions常見問題
How will this help stop spam?如何幫助阻止垃圾郵件?
How will this help stop fraud/phishing attacks?如何幫助制止欺詐/網絡釣魚攻擊?
Wont spammers just sign their messages with DomainKeys?剛剛簽署的電文不會與domainkeys濫發電郵?
What does DomainKeys verify?什么domainkeys查證?
Why sign the entire message?所以整個標志信息?
Does DomainKeys encrypt each message?是否每個domainkeys加密信息?
What public/private key technology is used for DomainKeys?什么公/私鑰用于科技domainkeys?
Who issues the public/private key pairs required by DomainKeys?誰的問題公/私鑰雙雙要求domainkeys?
Does DomainKeys require signing of the public key by a Certificate Authority (CA)?domainkeys是否需要簽署的公鑰證書管理局(星期六)?
How are DomainKeys revoked?如何domainkeys撤銷?
Why not just use S/MIME?為什么不能用收盤/默?
How does DomainKeys work with mailing lists?如何domainkeys與郵寄名單?
Who implements DomainKeys?實行domainkeys誰?
Which mail transfer agents (MTAs) support DomainKeys?其中郵件傳遞代理(多邊)支持domainkeys?
How do I deploy DomainKeys?我如何部署domainkeys?
I dont use my domains SMTP server to send email.我不使用我的域的SMTP服務來電子郵件. How do I use DomainKeys?domainkeys我該如何使用?
How can I send you feedback?我如何送你的反饋?
How will this help stop spam?如何幫助阻止垃圾郵件?
Several ways.幾種方式. First, it can allow receiving companies to drop or quarantine unsigned email that comes from domains that are known to always sign their emails with DomainKeys, thus impacting spam and phishing attacks.一是它可以讓公司接收電子郵件簽名下降或檢疫來自已知的領域,總是與domainkeys簽名電子郵件、垃圾郵件、釣魚攻擊從而沖擊. Second, the ability to verify sender domain will allow email service providers to begin to build reputation databases that can be shared with the community and also applied to spam policy.二能力驗證電子郵件發送者域將使服務提供商開始建造名聲數據庫是可以共享的社會,也適用于垃圾郵件的政策. For example, one ISP could share their "spam vs. legit email ratio" for the domain www.example.com with other ISPs that may not yet have built up information about the credibility and "spamminess" of email coming from www.example.com.例如一商可以分享他們的"濫發電郵的比率比legit"www.example.com域與其他供應商可能尚未建立起資料的可信度和"spamminess"的電子郵件來自www.example.com. Last, by eliminating forged From: addresses, we can bring server-level traceability back to email (not user-level - we believe that should be a policy of the provider and the choice of the user).最后,從消除偽造:地址我們能夠把服務器級別可追蹤回電子郵件(不用戶級,我們相信應該是一個政策的提供者和用戶的選擇). Spammers dont want to be traced, so they will be forced to only spam companies that arent using verification solutions.濫發電郵不想追查,所以他們將被迫只能利用郵件企業不核查辦法.
Back to Questions回到問題
How will this help stop fraud/phishing attacks?如何幫助制止欺詐/網絡釣魚攻擊?
Companies that are susceptible to phishing attacks can sign all of their outgoing emails with DomainKeys and then tell the world this policy so that email service providers can watch and drop any messages that claim to come from their domain that are unsigned.公司易受釣魚攻擊的跡象都能夠打出自己的電子郵件與domainkeys然后告訴全世界,使這一政策能夠收看電子郵件服務提供商和落任何訊息,聲稱是來自域簽名. For example, if the company www.example.com signs all of its outgoing email with DomainKeys, Yahoo!舉例來說,如果公司www.example.com打出招牌,其所有的電子郵件同domainkeys雅虎! can add a filter to its SpamGuard system that drops any unsigned or improperly signed messages claiming to come from the domain www.example.com, thus protecting tens of millions of example.coms customers or prospective customers from these phishing attacks.它可以增加一個過濾系統,spamguard滴簽名或擺放任何訊息簽名自稱來自域www.example.com,保護千百萬example.com的客戶或準客戶從這些網絡釣魚攻擊.
Back to Questions回到問題
Wont spammers just sign their messages with DomainKeys?剛剛簽署的電文不會與domainkeys濫發電郵?
Hopefully!但愿! If they do, theyll make it easier for the Internet community to isolate and drop/quarantine their messages using the methods described above in "How will this help stop spam?"否則,人家較易互聯網社會孤立和落/檢疫信息的利用上述方法在"如何幫助阻止垃圾郵件"? Eliminating the uncertainty of "did this email really come from the domain example.com?" will facilitate a whole range of anti-spam solutions.消除不確定性"這真是電子郵件來自example.com域?"方便了一系列反垃圾郵件解決方案.
Back to Questions回到問題
What does DomainKeys verify?什么domainkeys查證?
DomainKeys examines the From: and Sender: headers domain to protect the user and deliver the best possible user experience.domainkeys審核:與發貨:頭域維護用戶和用戶提供最佳的體驗. Desktop mail clients like Microsoft Outlook show these headers in their user interfaces.微軟Outlook郵件客戶桌面顯示這些頭象的用戶界面. If the user establishes their trust based on the these domains, then so should any system built to verify whether that trust is warranted.如果用戶信任的基礎上,確立了這些領域系統建成后,應查證是否有值得信任.
Back to Questions回到問題
Why sign the entire message?所以整個標志信息?
DomainKeys signs the entire message to allow the receiving server to also verify that the message wasnt tampered with or altered in transit.domainkeys跡象整個服務器接收到的訊息,讓訊息,也未核實篡改變造過境. By signing the headers and the body, DomainKeys makes it impossible to reuse parts of a message from a trusted source to fool users into believing the email is from that source.簽訂箱與身體domainkeys它無法再用部分賀詞信靠欺騙用戶們相信,電子郵件是從源頭. Back to Questions回到問題
Does DomainKeys encrypt each message?是否每個domainkeys加密信息?
DomainKeys does not encrypt the actual message - it only pre-pends a "digital signature" as a header.domainkeys不加密的實際消息只是預未決的"數字簽名"為標題.
Back to Questions回到問題
What public/private key technology is used for DomainKeys?什么公/私鑰用于科技domainkeys?
DomainKeys currently uses an RSA public/private key method.domainkeys目前使用的RSA公/私鑰方式. The key length is decided by the domain owner.關鍵是由長度域所有者.
Back to Questions回到問題
Who issues the public/private key pairs required by DomainKeys?誰的問題公/私鑰雙雙要求domainkeys?
The domain owner, or an agent or service provider acting on their behalf, should generate the key pairs that are used for their DomainKeys-enabled mail system.域所有者或代理人或服務提供商代表他們行事產生的關鍵,應該是用于對它們domainkeys-使郵件系統.
Back to Questions回到問題
Does DomainKeys require signing of the public key by a Certificate Authority (CA)?domainkeys是否需要簽署的公鑰證書管理局(星期六)?
DomainKeys does not require a CA.domainkeys不需要證. Much like a trusted Notary Public, Certificate Authorities are used in public/private key systems to sign, or "endorse," public keys so that the external users of public keys can know that the public keys they receive are truly owned by the people who sent them.猶如信賴公證,公證書使用部門/私鑰簽制度、或"贊同",使外部用戶公共密鑰公共密鑰公共密鑰可以知道他們是否真正擁有的人送. Since DomainKeys leverages DNS as the public key distribution system, and since only a domain owner can publish to their DNS, external users of DomainKeys know that the public key they pull is truly for that domain.自domainkeys杠桿作為公鑰分配域名系統由于只有一個域可以擁有自己的DNS出版、外部用戶domainkeys知道公鑰是真正為他們牽到域. The CA is not needed to verify the owner of the public key - the presence in that domains DNS is the verification.證不需要驗證公鑰主人-駐留在該領域的域名是核實. However, it is possible that Certificate Authorities may become a valuable addition to the DomainKeys solution to add an even greater level of security and trust.但是證機關也有可能會成為一項寶貴的domainkeys除了增添更大程度地解決安全和信任.
Back to Questions回到問題
How are DomainKeys revoked?如何domainkeys撤銷?
DomainKeys allows for multiple public keys to be published in DNS at the same time.domainkeys允許多種公共鑰匙刊登的DNS在同一時間. This allows companies to use different key pairs for the various mail servers they run and also to easily revoke, replace, or expire keys at their convenience.這使公司對使用不同的重點,對各郵件服務器,也能輕易地撤銷他們來說,代替,或在方便的鑰匙屆滿. Thus, the domain owner may revoke a public key and shift to signing with a new pair at any time.因此,車主可撤銷公鑰域,轉向以新簽署一雙隨時.
Back to Questions回到問題
Why not just use S/MIME?為什么不能用收盤/默?
S/MIME was developed for user-to-user message signing and encryption and by design should be independent of the sending and receiving servers.收盤/默研制用戶對用戶的信息加密和簽署了設計和應該獨立于發送和接收服務器. We believe that DomainKeys should be a natural server-to-server complement to S/MIME and not a replacement.我們相信應該是一個天然domainkeys服務器對服務器補充收盤/默不更換. Additionally, since S/MIME is used by many security-conscious industries, we need to ensur