数据传输安全解决方案传输安全解决方案......................................................................................................................................1一.总体框架........................................................................................................................................2二.安全需求........................................................................................................................................32.1应用集成和政务集成中的安全需求....................................................................................32.2OA产品的安全需求............................................................................................................41.安全电子邮件................................................................................................................42.电子签章........................................................................................................................53.数字水印........................................................................................................................54.防拷屏............................................................................................................................55.安全加密文档................................................................................................................52.3方案中解决的安全问题和需求.............................................................................................6三PKI方案........................................................................................................................................73.1PKI简介................................................................................................................................7(1)提供用户身份合法性验证机制.....................................................................................7(2)保证敏感数据通过公用网络传输时的保密性.............................................................8(3)保证数据完整性.............................................................................................................8(4)提供不可否认性支持.....................................................................................................83.2非对称密钥加密技术简介....................................................................................................83.3PKI的组成部分....................................................................................................................93.3.1认证和注册审核机构(CA/RA)................................................................................103.3.2密钥管理中心...........................................................................................................113.3.3安全中间件...............................................................................................................12四.PMI部分.....................................................................................................................................134.1什么是PMI.........................................................................................................................134.2为什么需要PMI..................................................................................................................144.3PMI发展的几个阶段.................................