were not enough. Digital Ids, in conjunction with encryption, solve this problem by providing a secure solution, assuring the identity of all parties involved in a transaction. Besides, as long as Digital Ids are used for a validity of electronic transaction, including e-mail, electronic commerce, groupware and electronic funds transactions that consist on a server, similarly, a secure server should have its own Digital Id to assure users that affiliation is legitimate. How Digital Certificates works?Digital Ids use asymmetric key encryption based on two related keys, one private and one public. The public key is made available to everyone who wants to correspond with he owner. It's used to verify the message encrypted with the private key.In this way, the security of the message or the correspondence depends on the security of the private key that should be protected against unauthorized use.The key pair is bound to the name of he user and other identifying personal information. Once being in a browser, Digital Id works as electronic credentials checked by sites which give them the ability to restrict access to particular users.How do we use Digital Certificates?Once receiving digitally signed messages, you are able to verify that no forgery or false transaction has been made by knowing the sender's Digital Id. When you send a message, you can sign it and enclose your Digital Id just to assure the recipient that you are the real sender of the message. By forming a hierarchical chain of Digital Ids, one id can testify the previous one's authentication. A top- level certification authority is found at the end of the chain whose public key is published.Digital Ids are also used to identify yourself to secure servers such as membership biased web servers.How do we get Digital Certificates?A Digital Id can be required from Verisign using the online enrollment service to re...