www.baroone.co.kr

- HNIP Co., Ltd. -

Issued by

About this certificate

This digital certificate with serial number 0c:3f:d0:71:24:fb:06:7b:54:ce:39:f7:61:68:73:07 was issued on by VeriSign Trust Network.

This certificate has already expired and will cause a warning or error message in the browser it's still listed on this site to allow you to look back on previously issued certificates. If we have found any compliance issues with this certificate they will be shown below. I hope this certificate review is providing you the detailed information in a simple form you where looking for.


We have idenified some issues with this certificate:

  • CAs must support key identifiers and include them in all certificates (RFC 5280: 4.2 & 4.2.1.1)
  • CAs must include keyIdentifer field of AKI in all non-self-issued certificates (RFC 5280: 4.2.1.1)
  • Compliant certificates SHOULD NOT use the noticeRef option (RFC 5280: 4.2.1.4)
  • Sub certificates SHOULD include Subject Key Identifier in end entity certs (RFC 5280: 4.2 & 4.2.1.2)

HNIP Co., Ltd.

Organization: HNIP Co., Ltd.
Organization unit: IT Service Department 1
Organization unit: Terms of use at www.crosscert.com/rpa (c) 04
Organization unit: Authenticated by KECA, Inc.
Organization unit: Member, VeriSign Trust Network
State / Province: Seoul
Locality: Gangnam
Country: KR

VeriSign Trust Network

Organization: VeriSign Trust Network
Organization unit: VeriSign, Inc.
Organization unit: VeriSign International Server CA - Class 3
Organization unit: www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign

Time since certificate expired

This certificate has expire since

Certificate Details

Serial Number (hex): 0c:3f:d0:71:24:fb:06:7b:54:ce:39:f7:61:68:73:07
Serial Number (int): 16282078356931539618312433250970661639
Serial Number lenght: 124 bits, 16 octets

SubjectKeyId:
AuthorityKeyId:

Fingerprint (sha1): 68:e0:fa:c4:71:18:65:9f:fb:42:6b:96:65:20:fd:fa:66:b6:f0:20
Fingerprint (sha256): 00:00:a7:b0:16:78:a6:a5:0b:8d:87:66:d8:8e:ec:18:1a:61:01:32:78:d6:3e:68:16:2a:3e:7b:c8:86:8c:ab


Revocation information

OCSP Server: http://ocsp.verisign.com
CRL Distribution Point: http://crl.verisign.com/Class3InternationalServer.crl

Check the revocation status for the current certificate on www.baroone.co.kr
0
DNS Names
0
Email Addresses
0
IP Addresses

Advanced Certificate Properties

Technical details about this certificate


Public Key Algorithm

RSA

Key Size

1024

Signature Algorithm

SHA1 with RSA

Key Usage

Extended Key Usages

Netscape Server-Gated Cryptography
Server Authentication
Client Authentication

Extensions

6 extensions
No unhandled critical extensions

CA Certificate

This is not a CA certificate

Subject Alternative Names

This certificate doesn't contain any subject alternative names.

Certificate

The complete raw certificate details in PEM and ASN.1 format.

Certificate (PEM)

-----BEGIN CERTIFICATE----- MIIEyTCCBDKgAwIBAgIQDD/QcST7BntUzjn3YWhzBzANBgkqhkiG9w0BAQUFADCB ujEfMB0GA1UEChMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEXMBUGA1UECxMOVmVy aVNpZ24sIEluYy4xMzAxBgNVBAsTKlZlcmlTaWduIEludGVybmF0aW9uYWwgU2Vy dmVyIENBIC0gQ2xhc3MgMzFJMEcGA1UECxNAd3d3LnZlcmlzaWduLmNvbS9DUFMg SW5jb3JwLmJ5IFJlZi4gTElBQklMSVRZIExURC4oYyk5NyBWZXJpU2lnbjAeFw0x MDA0MjEwMDAwMDBaFw0xMTA0MjEyMzU5NTlaMIIBDDELMAkGA1UEBhMCS1IxDjAM BgNVBAgTBVNlb3VsMRAwDgYDVQQHFAdHYW5nbmFtMRcwFQYDVQQKFA5ITklQIENv LiwgTHRkLjEgMB4GA1UECxQXSVQgU2VydmljZSBEZXBhcnRtZW50IDExNTAzBgNV BAsTLFRlcm1zIG9mIHVzZSBhdCB3d3cuY3Jvc3NjZXJ0LmNvbS9ycGEgKGMpIDA0 MSQwIgYDVQQLExtBdXRoZW50aWNhdGVkIGJ5IEtFQ0EsIEluYy4xJzAlBgNVBAsT Hk1lbWJlciwgVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEaMBgGA1UEAxQRd3d3LmJh cm9vbmUuY28ua3IwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKYVbtqUz8Hv EBXd7X2FC1wviSRXP6HRIVr3fvhGllEJNBYvJqL6x+ALNmx+KjYyU0iwuWqx3AUy kVMcKuUinDOy52Uf9YVdxqueuGxncxEbEnfbEcrQEt4sDDa574CQWfGImdz4SKt0 J4tLO6MpIyPhvINgL4MquSjm/MjC98ZHAgMBAAGjggF5MIIBdTAJBgNVHRMEAjAA MIGsBgNVHSAEgaQwgaEwgZ4GC2CGSAGG+EUBBwEBMIGOMCgGCCsGAQUFBwIBFhxo dHRwczovL3d3dy52ZXJpc2lnbi5jb20vQ1BTMGIGCCsGAQUFBwICMFYwFRYOVmVy aVNpZ24sIEluYy4wAwIBARo9VmVyaVNpZ24ncyBDUFMgaW5jb3JwLiBieSByZWZl cmVuY2UgbGlhYi4gbHRkLiAoYyk5NyBWZXJpU2lnbjARBglghkgBhvhCAQEEBAMC BkAwKAYDVR0lBCEwHwYJYIZIAYb4QgQBBggrBgEFBQcDAQYIKwYBBQUHAwIwNAYI KwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC52ZXJpc2lnbi5j b20wRgYDVR0fBD8wPTA7oDmgN4Y1aHR0cDovL2NybC52ZXJpc2lnbi5jb20vQ2xh c3MzSW50ZXJuYXRpb25hbFNlcnZlci5jcmwwDQYJKoZIhvcNAQEFBQADgYEAP58P Xp/HxKnMDFrd/dEfPaYJJVrWqHF323vfkPVyAjwmBfhVSLyGN+1PtVRSUsqUKJaQ A05pnq3LcAkeNvJ/uSf/KDL5hLFRRyEzBMqjX0FI6nXBrdN9bM6rXsI76kmQmLXW v6VHcAooDbdjFOstDLEeG0f9Et+x+Cr+mqEy128= -----END CERTIFICATE-----

Public Key (PEM)

-----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCmFW7alM/B7xAV3e19hQtcL4kk Vz+h0SFa9374RpZRCTQWLyai+sfgCzZsfio2MlNIsLlqsdwFMpFTHCrlIpwzsudl H/WFXcarnrhsZ3MRGxJ32xHK0BLeLAw2ue+AkFnxiJnc+EirdCeLSzujKSMj4byD YC+DKrko5vzIwvfGRwIDAQAB -----END PUBLIC KEY-----

ASN1 Decoded