Re: UseCase : Strong Personal Identity Certificate by CA

On 2012-08-13 10:08, Mountie Lee wrote:
> Hi.
> I meant
> CA can issue personal certificate ONCE with strong identity validation.
> I did not though two factor authentication or others PER USE.
> 
> I can search http://www.symantec.com/verisign/digital-id
> but the cert is not enough to trust the personal identity.
> 
> just I expect the new ca service like "Digital ID with Extended Validation" as use case.
> because of web crypto API.

Hi Mountie,
I'm not sure what function you are requesting.

Extended Validation is a CA policy for server certificates that are supposed to be "automatically" highly trusted by user agents.
It is not possible to translate this to client certificates because the relying party is not your platform/user agent/web browser/etc. It is another system

I don't think that even the concept of trusted personal identity is generally acknowledged.
This tends to be rather local, national or community-based.

I have a company certificate.  It is trusted within the company since it was internally issued using an approved process. However, outside of the company it is unknown (non-trusted).

Best regards,
Anders

> 
> best regards
> mountie.
> 
> 
> On Mon, Aug 13, 2012 at 4:35 PM, Anders Rundgren <anders.rundgren@telia.com <mailto:anders.rundgren@telia.com>> wrote:
> 
>     On 2012-08-13 07:46, Mountie Lee wrote:
>     > I think following use case can be considered.
>     >
>     > CA issues strong personal identity certificates.
>     > it can be equivalent level to EVSSL on server side.
>     >
>     > current personal certificate issued by CA is just checking email validity.
>     >
>     > if web crypto API is widely accepted in major user agents
>     > certificate in user agents will have more functionality by using API.
>     >
>     > as a CA, they can consider to issue new type of certificate with strong personal identity validation.
> 
>     Hi Mountie,
> 
>     Certificate provisioning is AFAIK outside of WebCrypto scope.
> 
>     Banks and government agencies in the EU currently deploy their own software for provisioning since none of the user agents out there support provisioning of two-factor (key + PIN) authentication tokens [1].
> 
>     Well, this wasn't entirely correct.  When there is a *business incentive* to support provisioning of two-factor tokens, it is (of course) honored:
>     http://googlecommerce.blogspot.co.uk/2012/08/use-any-credit-or-debit-card-with.html
> 
>     Regards,
>     Anders
> 
>     1] If you only need a client certificate and HTTPS you can use existing schemes like <keygen> and "CertEnroll".
> 
>     >
>     > regards
>     > mountie.
>     >
>     > =======================================
>     > PayGate Inc.
>     > THE STANDARD FOR ONLINE PAYMENT
>     > for Korea, Japan, China, and the World
>     >
>     >
>     >
>     >
> 
> 
> 
> =======================================
> PayGate Inc.
> THE STANDARD FOR ONLINE PAYMENT
> for Korea, Japan, China, and the World
> 
> 
> 
> 

Received on Monday, 13 August 2012 08:41:27 UTC