To Certicom
Press Releases
Events
In The News
Corporate Info
Partners
Job Ops
Products
ECC Info
Services
Downloads
Tech Support
Standards Updates
Contact Us



Certicom's Trustpointâ public-key infrastructure (PKI) product line is a comprehensive, cross-platform PKI technology suite that enables rapid development and deployment of policy-agile trust management solutions.

Read the Press Release...

Introduction

Certicom's Trustpointâ PKI product line is a comprehensive set of software components, products, and tools for public-key infrastructure (PKI) development and deployment. Trustpoint PKI products are uniquely suited for building policy-agile trust management solutions that accurately capture and realize real-world business processes, security requirements, and human-oriented trust models. Trustpoint PKI products significantly extend the ability of developers to provide user-friendly, built-in application security for any platform including the new generation of mobile and wireless devices. Trustpoint PKI products offer the most comprehensive and flexible computing platform coverage in the industry and support open standards for PKI interoperability and protection of security infrastructure investment. Time-to-market is critical for any application. Trustpoint PKI software components are designed to maximize developer productivity and minimize the time needed for implementing customized certificate profiles, registration models, or other application-specific policies.


Benefits

Flexible

Certicom's Trustpoint PKI product line offers developers a robust platform with multiple software components, libraries, APIs, and development tools that empowers them to realize virtually any PKI enrollment, administration, or operations scheme.

Multi-platform Support

Trustpoint PKI products provide comprehensive computing platform coverage through Java™ and C++/C libraries. Trustpoint PKI product line components include built-in support for certificate and cryptographic algorithm standards specifically designed for use in securing mobile systems.

Open Industry Standards

Trustpoint PKI products offer compliance with stable IETF standards for third-party PKI interoperability at the protocol and certificate format level.

Time-to-market

Trustpoint PKI products are based on object-oriented Java™ and C++ technology. This facilitates rapid development of robust PKI solutions.


Platform Components

Trustpointâ Certificate Toolkits

Trustpointâ Certificate Toolkits provide developers with a comprehensive set of object-oriented components for public-key certificate creation, consumption, and life cycle management. These tools may also be used to develop custom end-entity and relying party software solutions.

  • Java™ and C++/C for multi-platform support from handhelds to mainframes
  • ASN.1, PKCS, X.509, and IETF PKIX structures and protocol standards
  • Both binary and source code libraries are available for licensing

Trustpointâ Certificate Authority (CA)

The Trustpointâ Certificate Authority (CA) provides a standards-based certificate issuance and management system (CIMS) platform for creating, issuing, publishing, and revoking public-key certificates. The Trustpointâ CA application interfaces with registration authority (RA) subsystem components using standard IETF certificate management protocol messages. A 100% Java-based application, the Trustpoint CA interfaces with supporting database and directory components through standard Java Database Connectivity (JDBC) and Java Naming and Directory Interface (JNDI) APIs.

Trustpoint Registration Authority (RA)

The Trustpointâ Registration Authority (RA) is a complete, scalable, and highly configurable solution for implementing PKI registration authority subsystems. Working in cooperation with one or more certificate authorities (CAs), the RA subsystem coordinates the collection, evaluation, and integration of data from the various sources of information and authorization that are part of the certificate subject registration process. The RA subsystem interfaces with principals requesting certificates, sources and processes authorized for approving certificate requests, and designated certificate authorities for final request policy processing, certificate signing and publishing.

Trustpointâ Administrative Console

The Trustpointâ Administrative Console is an application used to configure system policies and perform other administrative tasks. Administrators use the console's graphical and menu driven interfaces to configure operational policy and modify or manually approve certificate requests.

Trustpointâ End-Entity (EE) Software

Trustpointâ end-entity (EE) applications enable certificate subjects to request new certificates, check the status of existing requests, and revoke certificates. Components interoperate using IETF PKIX standards including CMP and CRMF.


S P E C I F I C A T I O N S

Supported Standards

Certificate Profiles

  • X.509v1, X.509v2, X.509v3
  • IETF PKIX Internet X.509 Public Key Infrastructure Certificate and CRL Profile (RFC 2459)
  • IETF Certificate Management Protocols (RFC 2510)
  • IETF Certificate Request Message Format (RFC 2511) Public Key Cryptography Standards
  • PKCS #1, PKCS #3, PKCS #5, PKCS #7, PKCS#8, PKCS #9, PKCS #10, PKCS #11, PKCS #12
  • All major digital signature algorithm standards are supported including RSA, DSA, and Elliptic Curve DSA.

Platform Support

  • Linux, Microsoft Windows 95/98/NT, Solaris, HP/UX, UNIX, Java™ JDK 1.1, JDK 1.2, Palm Computing Platform, Microsoft WinCE, embedded systems. Call for latest platform availability.

return


 
Copyright © Certicom Corp., 1997-2000. All rights reserved.
Information subject to change.
http://www.certicom.com