摘要 |
<p>Pirated certificates may be published or become available in an environment which includes computer networks and websites. An information appliance connected to the environment searches for certificates in the environment. When a certificate is found in the environment, the appliance determines whether to alert an entity having an interest in the certificate.</p> |