I'm guessing this is what
mcdhappy80 is talking about.
http://en.wikipedia.org/wiki/Public_key_infrastructure
Public Key Infrastructure (
PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.
[1] In
cryptography, a
PKI is an arrangement that binds
public keys with respective user identities by means of a
certificate authority (
CA). The user identity must be unique within each CA domain. The binding is established through the registration and issuance process, which, depending on the level of assurance the binding has, may be carried out by software at a CA, or under human supervision. The PKI role that assures this binding is called the Registration Authority (
RA). The RA ensures that the public key is
bound to the individual to which it is assigned in a way that ensures
non-repudiation.
The term
trusted third party (
TTP) may also be used for
certificate authority (
CA). The term PKI is sometimes erroneously used to denote
public key algorithms, which do not require the use of a CA.