- 1. Objectives
- 2. Certificate Class and Issuance Policy
- 3. Applications and Procedure for Certificates
- 4. Personal Identification
- 5. Responsibilities and Liabilities of Related Parties
- 6. Operation of Certification System and Security Control
- 7. Management of Certification Practice
- 8. Definition of Terms
8. Definition of Terms
2.1 Subscriber (Digital signature Act, Article 2 Clause 11)
Those who have obtained KICA certificates for Public keys on the basis of their contracts with KICA for use of licensed certification services.
2.2 Certification Authority (Digital signature Act, Article 2.Clause 9)
Those who provide licensed certification services by obtaining the designation from the Information & Communications Minister pursuant to Article 4 of the Act.
2.3 Private information (Act, Article 2 Clause 12)
Information pertaining to a living person, whose identity can be recognized by his name or resident registration number, etc., which are contained in that information (Including such information that can be used, not alone but in combination with other information, to easily identify the corresponding person).
2.4 Asymmetric crytosystem (Act, Article 2 Clause 13)
An encryption method in which the key that is used to encrypt information and the key that is used to decrypt information are different.
2.5 Directory
X.500 compliant directory systems that store lists of issued, suspended, or revoked certificates and are used to provide public announcement and search services to users relying on certificates.
2.6 User relying on a certificate
Those who use certificates issued by KICA, trusting their reliability, and carry out transactions with certificate holders.
2.7 Personal identification
The act of verifying the integrity of information concerning the subscriber and his application for issuance, renewal, suspension, or revocation of certificates in order to secure reliability of certificates.
2.8 Certification (Act, Article 2 Clause 6)
Act of verifying or certifying that the Public key matches the Private keys held by corporations or individuals.
2.9 Certification practice system (Act, Article 2 Clause 10)
Systems providing certification services including issuance of certificates and management of records, etc.
2.10 Certificates (Act, Article 2 Clause 7)
Digital data that verifies or certifies Public key matches the Private keys held or used by corporations or individuals.
2.11 Certification practice (Act, Article 2 Clause 8)
Services related to issuance of certificates and maintenance of records related to certification, and other related functions.
2.12 Digital or electronic document (Act, Article 2 Clause 1)
Information or data, which are generated, transmitted by, or stored digitally in computers or other information processing equipment.
2.13 Digital signature (Act, Article 2 Clause 2)
2.14 Public key (Act, Article 2 Clause 4)
Electronic data that is used to authenticate (verify) Digital signature.
2.15 Private keys (Act, Article 2 Clause 3)
Electronic data that is used to generate Digital signature.
2.16 Key pair (Act, Article 2 Clause 5)
Private key and its matching Public key.
2.17 Core certification systems
Systems used for key generation, certificate generation, certificate management, directory, and time stamping service.