The program for work in system WebMoney Transfer.
Unique identification number of the participant of system which consists of 12 figures.
Title signs WebMoney
The universal registration units used for carrying out of calculations in system WebMoney Transfer.
The electronic account for carrying out of operations with title signs WebMoney. Number of a purse consisting of 12 figures with a prefix, serves as payment requisites of the owner of the WM-identifier.
Prefix before the purse number, designating conformity of title signs stored on a purse to certain type of the maintenance (currency) given by one of Guarantors of system.
The commercial or credit organisation providing input/conclusion of means in/from systems on the instructions of owners of WM-purses of corresponding type.
The digital certificate which is given out to participant WebMoney Transfer, given in the certification Center personal given (assured by the notary or the representative of the Center of certification). The WM-certificate characterises the status of the participant in system.
The requirement of WM-transaction from the participant, contains number, the sum and operation appointment.
Any data sent between participants, authenticity and which integrity is assured by the Center of Certification of transaction of system WebMoney Transfer.
ECP (the elektronno-digital signature)
The binary sequence received by means of calculations (cryptographic procedure) with use of a confidential key and the open electronic message. ECP allows to supervise integrity of the electronic message and unequivocally to define its author. ECP is electronic analogue of the usual signature on paper documents though has the features. Properties of mathematical algorithm of creation and check ECP are a guarantee of impossibility of a fake of such signature extraneous persons. Thus use of asymmetric cryptography allows the owner of a confidential key to sign the message, and to check up — to any user who has a corresponding open key. Thus it is impossible again resubscription the changed message, not having a confidential key. Thus, transferring the message and together with it ECP, can guarantee addressees an invariance of the document and the author of the signature.
The cryptographic procedure, allowing to check up integrity and to define authenticity of the electronic message on the basis of an open key and the open electronic message.
The binary sequence which is written down in memory of the computer of the user (on a diskette or other carrier). The key consists of two parts: a confidential key and an open key. The confidential key is stored only at the user, and used at performance ECP, enciphering, decryption. The open key can be stored on a server of certification of system and is accessible on reading to all users of system WebMoney Transfer. The open key is used for check ECP, enciphering and decryption.
Authenticity acknowledgement, establishment of the validity of the information is exclusive on the basis of internal structure of the information irrespective of an information source. In report SSL authentication it is carried out by check of the elektronno-digital signature. ECP the checked subject can be checked up by means of its open key, but thus to create the correct signature it is possible only possessing the closed key of the subject known only to the owner (i.e. to the subject). Thus, knowing an open key of the client and having offered it to sign the block of data, it is possible, having checked up its signature, precisely to identify it and authenticate.
Acknowledgement of authenticity of information objects by the third party which is not participating in process of an information exchange. By means of described above authentication it is possible to make sure of authenticity of a source of the message at interaction of two objects. However for this purpose it is necessary, that co-operating objects prior to the beginning of actual data transmission have exchanged some key information. This information concern used for authentication algorithm and a key. The problem arises, when it is necessary to be convinced of authenticity of the object which earlier was not participating in an information exchange. Unique way to reach it is delegation to the third party of the right of acknowledgement of authenticity. The third party is called as "the certification Center». To be convinced of authenticity the certification Center communicates with the object which authenticity he confirms.
The certification centre (CC)
The Hardware-software complex realising functions of release of certificates of open keys of users and lists of withdrawn certificates.
The list of the withdrawn certificates
The file containing identifiers of ahead of schedule withdrawn certificates, users corresponding to compromised confidential keys.
The identification information on the user and its open key, signed ECP with use of a confidential key of the Center of certification. The certificate of an open key of the Center of certification is available for all users of system, and each of them can make sure of authenticity of certificates of other users. There are three kinds of the digital certificates used in SSL: the server certificate, the personal certificate and certificate CC.
The personal certificate
It should certify the document which is given out CC to each of co-operating objects, which authenticity. The personal certificate contains the information on object (for example, the WM-identifier, e-mail), and also its closed key, and serves for identification of the client.
Serves for authentication of the Center of certification. With its help the certificate of a server and the personal certificate subscribe. Certificate CC should is stored on a server and on the computer of the client that the server and a browser could check up authenticity of the certificates signed by it.
The server certificate
Allows to make sure of authenticity of a web-server.
Storehouse of certificates
Special place in memory of the computer (smart cards are possible and tokens-devices) in which digital certificates of system are stored.