zhenzhihy
驱动小牛
驱动小牛
  • 注册日期2006-01-12
  • 最后登录2013-06-18
  • 粉丝0
  • 关注0
  • 积分1001分
  • 威望112点
  • 贡献值0点
  • 好评度110点
  • 原创分0分
  • 专家分0分
阅读:2158回复:6

问一下以前的数字签名证书(2000下,XP),在vista 64BIT是否还可以继续使用?

楼主#
更多 发布于:2007-03-27 20:01
  我公司原有代码签名证书,2001年申请的,现在想支持64 vista,不知道那个证书给驱动签名还是否有效?有知道的给解答一下,如果无效是否需要重新购买或对证书进行升级之类的?,谢谢!
znsoft
管理员
管理员
  • 注册日期2001-03-23
  • 最后登录2023-10-25
  • 粉丝300
  • 关注6
  • 积分910分
  • 威望14796点
  • 贡献值7点
  • 好评度2410点
  • 原创分5分
  • 专家分100分
  • 社区居民
  • 最爱沙发
  • 社区明星
沙发#
发布于:2007-03-27 22:11
对于应用层软件应该有效

对于驱动,有兄弟说只能用基于ms根证书发布的签名证书
http://www.zndev.com 免费源码交换网 ----------------------------- 软件创造价值,驱动提供力量! 淡泊以明志,宁静以致远。 ---------------------------------- 勤用搜索,多查资料,先搜再问。
GNiDiA
驱动小牛
驱动小牛
  • 注册日期2006-10-11
  • 最后登录2017-10-09
  • 粉丝0
  • 关注0
  • 积分1002分
  • 威望145点
  • 贡献值0点
  • 好评度124点
  • 原创分0分
  • 专家分0分
  • 社区居民
板凳#
发布于:2007-03-28 23:11
只要没超期就应该是可以用的,我用的证书是V3的,签名的驱动可以在64位VISTA上用,不过需要用Vista DDK的签名工具。
bigbian
驱动牛犊
驱动牛犊
  • 注册日期2003-08-23
  • 最后登录2013-01-24
  • 粉丝0
  • 关注0
  • 积分10分
  • 威望74点
  • 贡献值0点
  • 好评度24点
  • 原创分0分
  • 专家分0分
地板#
发布于:2007-04-05 10:18
用ms根证书和你自己的证书,两个一起用DDK带的工具作一个签名打到驱动上就可以了。
做人要厚道
znsoft
管理员
管理员
  • 注册日期2001-03-23
  • 最后登录2023-10-25
  • 粉丝300
  • 关注6
  • 积分910分
  • 威望14796点
  • 贡献值7点
  • 好评度2410点
  • 原创分5分
  • 专家分100分
  • 社区居民
  • 最爱沙发
  • 社区明星
地下室#
发布于:2007-04-06 20:58
现在清楚了.需要用交叉签名,v3的证书和ms的根一起签才可以..
http://www.zndev.com 免费源码交换网 ----------------------------- 软件创造价值,驱动提供力量! 淡泊以明志,宁静以致远。 ---------------------------------- 勤用搜索,多查资料,先搜再问。
AllenZh
驱动老牛
驱动老牛
  • 注册日期2001-08-19
  • 最后登录2015-11-27
  • 粉丝19
  • 关注10
  • 积分1316分
  • 威望2387点
  • 贡献值7点
  • 好评度321点
  • 原创分0分
  • 专家分0分
5楼#
发布于:2007-04-23 22:40
引用第2楼GNiDiA2007-03-28 23:11发表的“”:
只要没超期就应该是可以用的,我用的证书是V3的,签名的驱动可以在64位VISTA上用,不过需要用Vista DDK的签名工具。

请问兄的的证书是那个机构颁发的?都有那些文件?如果方便可msn交流谢谢
1,承接Windows下驱动/应用开发 2,本人原创虚拟鼠标/键盘,触摸屏,虚拟显卡,Mirror驱动,XP无盘的SCSI虚拟磁盘驱动等 3,windows下有尝技术服务(包括BUG调试,员工培训等) 欢迎深圳和海外企业联系.msn:mfczmh@sina.com
alphapiao
驱动小牛
驱动小牛
  • 注册日期2002-06-21
  • 最后登录2011-05-04
  • 粉丝0
  • 关注0
  • 积分1004分
  • 威望155点
  • 贡献值0点
  • 好评度109点
  • 原创分1分
  • 专家分0分
6楼#
发布于:2007-04-30 14:24
Determining which Cross-certificate to Use
Microsoft has issued one cross-certificate for each public key root certificate for CAs who have agreed to support the use of Software Publisher Certificates for kernel-mode code signing. This correct cross-certificate must be used when digitally signing kernel-mode code.

A CA might have one or more root certificates under which they issue Software Publisher Certificates.

To determine which cross-certificate you need to use for kernel-mode code signing:

1.
 In the Microsoft Management Console (MMC), add the Certificates snap-in (certmgr.msc) to view your code-signing certificate.
 
2.
 Locate your signing certificate in the certificate store, and then double-click it.
Your certificate is listed in one of these locations, depending on how the certificate was installed:

• The Current User, Personal, Certificates store, or
 
• The Local Machine Certificates store.
 
 
3.
 In the Certificate dialog box, select the Certification Path property tab, and then select the top-most certificate in the certification path.
This is the CA that is the issuing root authoring for your certificate.
 
4.
 To view the root authority certificate, select View Certificate, and then click the Details property tab.
 
5.
 Find the Issuer Name and Thumbprint for the issuing CA of this certificate, and then locate the corresponding cross-certificate in the "Root Authority Cross Certificate List" on this page.
 
6.
 Download the related cross-certificate from the "Root Authority Cross Certificate List," and use this cross-certificate when digitally signing kernel-mode code.
 

Top of page
Root Authority Cross-Certificate List
Microsoft provides a specific cross-certificate for each Certificate Authority that issues code-signing certificates for code-signing kernel-mode code. This list shows the correct cross-certificate for the root authority that issued your Software Publisher Certificate. Follow the steps above to identify your Certificate Authority, and then download the related cross-certificate.

Top of page
Baltimore CyberTrust Root
Issuer identification in Certification properties:
CN = Baltimore CyberTrust Root
OU = CyberTrust
O = Baltimore
C = IE

Valid to: Monday, May 12, 2025 4:59:00 PM

Root certificate thumbprint:
d4 de 20 d0 5e 66 fc 53 fe 1a 50 88 2c 78 db 28 52 ca e4 74

Cross-certificate thumbprint:
06 af 96 ac 6c 4a b4 76 aa e9 15 06 d3 7c 2b 1b 48 88 97 e9

 Download cross-certificate for Baltimore CyberTrust Root
(Certificate file in a 37 KB self-extracting zip file)

Top of page
Equifax Secure Certificate Authority
Issuer identification in Certification properties:
OU = Equifax Secure Certificate Authority
O = Equifax
C = US

Valid to: Wednesday, August 22, 2018 9:41:51 AM

Root certificate thumbprint:
d2 32 09 ad 23 d3 14 23 21 74 e4 0d 7f 9d 62 13 97 86 63 3a

Cross-certificate thumbprint:
35 0d 68 90 31 00 98 3f 80 4d b2 65 f9 a5 e2 45 d9 c5 92 28

 Download cross-certificate for Equifax Secure Certificate Authority
(Certificate file in a 37 KB self-extracting zip file)

Top of page
GTE CyberTrust Global Root
Issuer identification in Certification properties:
CN = GTE CyberTrust Global Root
OU = GTE CyberTrust Solutions, Inc.
O = GTE Corporation
C = US

Valid to: Monday, August 13, 2018 4:59:00 PM

Root certificate thumbprint:
97 81 79 50 d8 1c 96 70 cc 34 d8 09 cf 79 44 31 36 7e f4 74

Cross-certificate thumbprint:
d5 59 75 25 e4 fb 50 61 93 e0 95 a8 91 ee 88 f6 aa d1 10 f9

 Download cross-certificate for GTE CyberTrust Global Root
(Certificate file in a 37 KB self-extracting zip file)

Top of page
GlobalSign Root CA
Issuer identification in Certification properties:
CN = GlobalSign Root CA
OU = Root CA
O = GlobalSign nv-sa
C = BE

Valid to: Tuesday, January 28, 2014 5:00:00 AM

Root certificate thumbprint:
2f 17 3f 7d e9 96 67 af a5 7a f8 0a a2 d1 b1 2f ac 83 03 38

Cross-certificate thumbprint:
3e eb 27 50 a1 99 f5 e7 b6 a8 95 24 30 be 50 62 fe 04 e9 e5

 Download cross-certificate for GlobalSign Root CA
(Certificate file in a 37 KB self-extracting zip file)

Top of page
GeoTrust Global CA
Issuer identification in Certification properties:
CN = GeoTrust Global CA
O = GeoTrust Inc.
C = US

Valid to: Friday, May 20, 2022 9:00:00 PM

Root certificate thumbprint:
de 28 f4 a4 ff e5 b9 2f a3 c5 03 d1 a3 49 a7 f9 96 2a 82 12

Cross-certificate thumbprint:
a0 65 5e bd 95 c2 26 f3 e3 bf 06 42 95 cb 5c 94 cb 1d 3b 16

 Download cross-certificate for GeoTrust Global CA
(Certificate file in a 37 KB self-extracting zip file)

Top of page
VeriSign Class 3 Public Primary Certification Authority
Issuer identification in Certification properties:
OU = Class 3 Public Primary Certification Authority
O = VeriSign, Inc.
C = US

Valid to: Tuesday, August 01, 2028 4:59:59 PM

Root certificate thumbprint:
74 2c 31 92 e6 07 e4 24 eb 45 49 54 2b e1 bb c5 3e 61 74 e2

Cross-certificate thumbprint:
58 45 53 89 cf 1d 0c d6 a0 8e 3c e2 16 f6 5a df f7 a8 64 08

 Download cross-certificate for VeriSign Class 3 Public Primary Certification Authority
(Certificate file in a 37 KB self-extracting zip file)
我的博客:xpddk.bokee.com
游客

返回顶部