SECTION .0200 - DEFINITIONS
18 NCAC 10 .0201 APPLICABLE DEFINITIONS
In addition to the definitions in the Electronic Commerce
Act, Article 11A of Chapter 66 (G.S. 66-58.1 et seq.), the following apply to
the rules in this Chapter:
(1) Affiliated Individual. An "affiliated
individual" means the subject of a certificate that is associated with a
sponsor approved by the Certification Authority (such as an employee affiliated
with an employer). Certificates issued to affiliated individuals are intended
to be associated with the sponsor and the responsibility for authentication
lies with the sponsor.
(2) Asymmetric Cryptosystem. "Asymmetric
cryptosystem" means a computer-based system that employs two different but
mathematically related keys. The keys are computer-generated codes having the
following characteristics:
(a) either key can be used to electronically
sign or encrypt data, such that only the other key in that key pair is capable
of verifying the electronic signature or decrypting the signed data; and
(b) the keys have the property that, knowing one
key, it is computationally infeasible to discover the other key.
(3) Authorized Certification Authority.
"Authorized Certification Authority" means a Certification Authority
that has been issued a Certification Authority license by the North Carolina
Department of the Secretary of State to issue certificates that reference the
rules in this Chapter.
(4) Certification Authority Revocation List.
"Certification Authority Revocation List" means a time-stamped list
of revoked Certification Authorities digitally signed by a Certification
Authority or the Electronic Commerce Section.
(5) Certificate. "Certificate" means a
record which:
(a) identifies the certification authority
issuing it;
(b) names or identifies its subscriber;
(c) contains a public key that corresponds to a
private key under the control of the subscriber;
(d) identifies its operational period or period
of validity;
(e) contains a certificate serial number and is
digitally signed by the Certification Authority issuing it; and
(f) conforms to the ITU/ISO X.509 Version 3
standards or other standards accepted under the Rules in this Chapter. As used
in the rules in this Chapter the term "Certificate" refers to
certificates that expressly reference the rules in this Chapter in the
"Certificates Policy" filed for an X.509 v.3 certificate.
(6) Certificate Manufacturing Authority.
"Certificate Manufacturing Authority" means an entity that is
responsible for the manufacturing and delivery of certificates signed by a
Certification Authority, but is not responsible for identification and
authentication of certificate subjects (i.e., a Certificate Manufacturing
Authority is delegated the certificate manufacturing task by a Certification
Authority).
(7) Certificate Revocation List. "Certificate
Revocation List" means a Certification Authority digitally signed,
time-stamped list of revoked certificates.
(8) Certification Authority. "Certification
Authority" means an entity authorized by the Secretary of State to
facilitate electronic commerce. A Certification Authority is responsible for
authorizing and causing certificate issuance. A Certification Authority may
perform the functions of a Registration Authority and a Certificate Manufacturing
Authority, or it may delegate or outsource either of these functions. A
Certification Authority vouches for the connection between an entity and that
entity’s electronic signature. A Certification Authority performs two
essential functions:
(a) First, it is responsible for identifying and
authenticating the intended subscriber named in a certificate, and verifying
the subscriber possesses the private key corresponding to the public key listed
in the certificate; and
(b) Second, the Certification Authority actually
creates (or manufactures) and digitally signs the certificate. The certificate
issued by the Certification Authority represents the Certification Authority's
statement as to the identity of the person named in the certificate and the binding
of that person to a particular public-private key pair.
(9) Certification Practice Statement.
"Certification Practice Statement" means documentation of the
practices, procedures, and controls employed by a Certification Authority
issuing, suspending, or revoking certificates and providing access to same. A
Certification Practice Statement shall contain, at a minimum, detailed
discussions of the following topics:
(a) technical security controls, including
cryptographic modules and management;
(b) physical security controls;
(c) procedural security controls;
(d) personnel security controls;
(e) repository obligations, including
registration management, subscriber information protection, and certificate
revocation management; and
(f) financial responsibility.
(10) Electronic Commerce Act. The term "Electronic
Commerce Act" means The North Carolina Electronic Commerce Act, G.S. 66,
Article 11A.
(11) Electronic Commerce Section. "Electronic
Commerce Section" means the component of the North Carolina Department of
the Secretary of State responsible for reviewing Certification Authority
license applications and administering the Electronic Commerce Act in North
Carolina.
(12) Electronic signature. "Electronic
signature" means any identifier or authentication technique attached to or
logically associated with an electronic record intended by the party using it
to have the same force and effect as the party's manual signature.
(13) Federal Information Processing Standards. The term
"Federal Information Processing Standards" means Federal standards
prescribing specific performance requirements, practices, formats,
communications protocols for hardware, software, data, and telecommunications
operation.
(14) Internet Engineering Task Force. "Internet
Engineering Task Force" means a large, open international community of
network designers, operators, vendors, and researchers concerned with the
evolution of the Internet architecture and the smooth operation of the
Internet.
(15) ITS Security Director. "ITS Security
Director" means the ITS Security Director of North Carolina State
government as designated by the Chief Information Officer for North Carolina
State Government.
(16) ITU/ISO X.509 Version 3 standards. "ITU/ISO
X.509 Version 3 standards" means Version three of the X.509 standards
promulgated by the International Telecommunications Union and the International
Organization for Standardization.
(17) Key pair. The term "key pair" means two
mathematically related keys, having the properties that one key can be used to
encrypt a message that can only be decrypted using the other key, and even
knowing one key, it is computationally infeasible to discover the other key.
(18) Object Identifier. An "object identifier"
means an unambiguous identifying specially formatted number assigned in the
United States by the American National Standards Institute (ANSI).
(19) Operational Period of a Certificate. The
"operational period of a certificate" means the period of its
validity. It begins on the date the certificate is issued (or such later date
as specified in the certificate), and ends on the date and time it expires as
noted in the certificate or as earlier revoked or suspended.
(20) PKIX. The term "PKIX" means an Internet
Engineering Task Force Working Group developing technical specifications for a
public key infrastructure components based on X.509 Version 3 certificates.
(21) Private Key. "Private key" means the key
of a key pair used to create a digital signature. This key must be kept a
secret. It is also known as the confidential key or secret key.
(22) Public Key. "Public key" means the key of
a key pair used to verify a digital signature. The public key is made
available to anyone who will receive digitally signed messages from the holder
of the key pair. The public key is usually provided in a Certification
Authority issued certificate and is often obtained by accessing a repository.
A public key is used to verify the digital signature of a message purportedly
sent by the holder of the corresponding private key. It is also known as the
published key.
(23) Public Key Cryptography. "Public Key
Cryptography" means a type of cryptographic technology employing an
asymmetric cryptosystem.
(24) Registration Authority. The term "Registration
Authority" means an entity responsible for identification and
authentication of certificate subjects, but that does not sign or issue
certificates (i.e., a Registration Authority is delegated certain tasks on
behalf of a Certification Authority).
(25) Relying Party. "Relying party" means a
recipient of a digitally signed message who relies on a certificate to verify
the digital signature on the message.
(26) Repository. "Repository" means a
trustworthy system for storing and retrieving certificates and other
information relating to those certificates.
(27) Repository Services Provider. "Repository
Services Provider" means an entity that maintains a repository accessible
to the public, or at least to relying parties, for purposes of obtaining copies
of certificates or verifying the status of such certificates.
(28) Responsible Individual. "Responsible
Individual" means a person designated by a sponsor to authenticate
individual applicants seeking certificates on the basis of their affiliation
with the sponsor.
(29) Revoke A Certificate. "Revoke a
certificate" means to prematurely end the operational period of a
certificate from a specified time forward.
(30) Secretary. "Secretary" means the North
Carolina Secretary of State.
(31) Sponsor. "Sponsor" means
an organization with which a subscriber is affiliated (e.g., as an employee,
user of a service, business partner, or customer).
(32) Subscriber. A "subscriber" means the
person to whom a certificate is issued. A subscriber means a person who:
(a) is the subject named or identified in a
certificate issued to such person;
(b) holds a private key that corresponds to a
public key listed in that certificate; and
(c) to whom digitally signed messages verified
by reference to such certificate are to be attributed.
(33) Suspend a certificate. "Suspend a
certificate" means to temporarily suspend the operational period of a
certificate for a specified time period or from a specified time forward.
(34) Transaction. "Transaction" means an
electronic transmission of data between an entity and a public agency, or
between two public agencies, including, but not limited to contracts, filings,
and other legally operative documents not specifically prohibited in the
Electronic Commerce Act.
(35) Trustworthy System. "Trustworthy system"
means computer hardware, software, and procedures that:
(a) are secure from intrusion and misuse;
(b) provide a level of availability,
reliability, and correct operation;
(c) are suited to performing their intended
functions; and
(d) adhere to Federal Information Processing
Standards.
(36) Valid Certificate. A "valid certificate"
means one that:
(a) a Certification Authority has issued;
(b) the subscriber listed in it has accepted;
(c) has not expired; and
(d) has not been suspended or revoked.
A certificate is
not valid until it is both issued by a Certification Authority and accepted by
the subscriber.
(37) X.500. "X.500" means a directory standard
/ protocol for connecting local directory services to form one distributed
global directory. X.500 is an OSI (Open System Interconnection) protocol,
named after the number of the ITU (International Telecommunications Union - a
United Nations Specialized Agency) CCITT (International Telegraph and Telephone
Consultative Committee) Recommendation document containing its specification.
This document is known as "Recommendation X.500 (03/00) - Information
technology - Open systems interconnection - The Directory: public-key and
attribute frameworks," and is available from International
Telecommunication Union on the World Wide Web, www.itu.int, 183 Swiss Francs,
price subject to change.
(38) X.509. "X.509" means a standard /
protocol adopted by the International Telecommunication Union (formerly known
as the International Telegraphy and Telephone Consultation Committee). For
purposes of the Rules in this Chapter, all references to X.509 shall be
construed as referring to version 3. Compliance with X.509 versions 1 or 2
shall not be construed as compliance with X.509. This document is known as
"Recommendation X.509 (03/00) - Information technology - Open systems
interconnection - The Directory: public-key and attribute frameworks," and
is available from International Telecommunication Union on the World Wide Web, www.itu.int,
183 Swiss Francs, price subject to change.
History Note: Authority G.S. 66-58.10(a)(1);
Temporary Adoption Eff. February 23, 1999;
Codifier determined on November 23, 1999, agency findings
did not meet criteria for temporary rule;
Temporary Adoption Eff. December 3, 1999;
Eff. March 26, 2001.