equal
deleted
inserted
replaced
95 </dlentry> |
95 </dlentry> |
96 </dl> </section> |
96 </dl> </section> |
97 <section><title>Architecture</title> <p>The following diagram shows the basic |
97 <section><title>Architecture</title> <p>The following diagram shows the basic |
98 architecture of the Certificate and Key Management component. The blocks in |
98 architecture of the Certificate and Key Management component. The blocks in |
99 blue are internal to the component. </p> <fig id="GUID-4532D14E-A9FE-595C-8B75-4FA2AE57B8EA"> |
99 blue are internal to the component. </p> <fig id="GUID-4532D14E-A9FE-595C-8B75-4FA2AE57B8EA"> |
100 <image href="GUID-5BB017AA-46AE-5461-9184-98CE7FA898B9_d0e389379_href.jpg" placement="inline"/> |
100 <image href="GUID-5BB017AA-46AE-5461-9184-98CE7FA898B9_d0e389217_href.jpg" placement="inline"/> |
101 </fig> <p>The various blocks in the basic architecture diagram of the Certificate |
101 </fig> <p>The various blocks in the basic architecture diagram of the Certificate |
102 and Key Management component are explained as follows: </p> <ul> |
102 and Key Management component are explained as follows: </p> <ul> |
103 <li id="GUID-0FCBBCA0-CD31-51AB-84D1-93994EAC54E2"><p> <b>Client Application</b>: |
103 <li id="GUID-0FCBBCA0-CD31-51AB-84D1-93994EAC54E2"><p> <b>Client Application</b>: |
104 This is a typical application that accesses the certificates or the keys of |
104 This is a typical application that accesses the certificates or the keys of |
105 the device through Certificate and Key Management component. </p> <p>For example, |
105 the device through Certificate and Key Management component. </p> <p>For example, |