Old Miraheze Wiki Pages:PDI UsedOIDs: Difference between revisions
THIS>Liaochina m Added column for 1.3.6.1.4.1.60218.1.1.1.6 but with no description, it should be documented later. |
m 17 revisions imported: Import the dump of the "LI AO's Wiki (Miraheze)" wiki. |
||
(8 intermediate revisions by 2 users not shown) | |||
Line 12: | Line 12: | ||
!OID node | !OID node | ||
!Object and concept indicated | !Object and concept indicated | ||
!Type (O-> object, C-> concept, R-> root node) | !Type (O-> regular object, C-> concept that dipicted as object, R-> root node object) | ||
|- | |||
|1.3.6.1.4.1.59191.2.11 | |||
|(not disclosed) | |||
|C | |||
|- | |||
|1.3.6.1.4.1.59191.2.13 | |||
|(not disclosed) | |||
|C | |||
|- | |||
|1.3.6.1.4.1.59191.2.14 | |||
|(not disclosed) | |||
|C | |||
|- | |- | ||
|1.3.6.1.4.1.59191.2.15 | |1.3.6.1.4.1.59191.2.15 | ||
Line 33: | Line 45: | ||
|(not yet to be documented) | |(not yet to be documented) | ||
|R, C | |R, C | ||
|- | |||
|[[PDI OIDNode 1.3.6.1.4.1.60218.1.1.1.7|1.3.6.1.4.1.60218.1.1.1.7]] | |||
|A kind of certificate policy for X.509 certificates. Used to indicate such usage under the Certificate Policy section of an X.509 certificate, version 3. The policy enforces the certificate will be used as credential which authenticates one or more particular users within one or more Microsoft Entra ID tenants, and such certificate will be identified by Microsoft Entra ID, the PKI, with registered user identity bindings at high confidence. | |||
|C | |||
|- | |- | ||
|1.3.6.1.4.1.60218.21.1 | |1.3.6.1.4.1.60218.21.1 | ||
|(not used for naming) Root node of OIDs naming objects which fall under the category of ''notable objects'' as defined by the Hidden Library Project. | |(not used for naming) Root node of OIDs naming objects which fall under the category of ''notable objects'' as defined by the Hidden Library Project. | ||
|R, N/A | |R, N/A | ||
|- | |||
|1.3.6.1.4.1.60218.21.1.4416 | |||
|An iPhone device. This device is later confirmed that the battery and front panel components are not genuine Apple parts. This device no longer exists because it was destroyed; some parts of main logic board remains for further use, including the recovery of data and reassembling. | |||
|O | |||
|- | |||
|1.3.6.1.4.1.60218.21.1.6647 | |||
|A laptop PC from Lenovo, the brand controller and product desinger. This laptop computer was sent from someone else as a gift. | |||
|O | |||
|- | |- | ||
|1.3.6.1.4.1.60218.21.1.8644 | |1.3.6.1.4.1.60218.21.1.8644 | ||
|(not fully disclosed) A Secure DNS endpoint. The endpoint was provided by Cloudflare as part of its Zero Trust service. | |(not fully disclosed) A Secure DNS endpoint. The endpoint was provided by Cloudflare as part of its Zero Trust service. | ||
|O | |||
|- | |||
|1.3.6.1.4.1.60218.21.1.46217 | |||
|(not fully disclosed) An Android device. This is a virtual Android device emulated by the BlueStacks software. | |||
|O | |O | ||
|- | |- | ||
Line 49: | Line 77: | ||
|(not used for naming) Root node of OIDs naming any object which can fall under a particular group, named object groups considered as individual objects in OID application. The usage of this OID node is defined by the Hidden Library Project. | |(not used for naming) Root node of OIDs naming any object which can fall under a particular group, named object groups considered as individual objects in OID application. The usage of this OID node is defined by the Hidden Library Project. | ||
|R, N/A | |R, N/A | ||
|- | |||
|1.3.6.1.4.1.60218.21.2.6517 | |||
|(not fully disclosed) All of the objects, in each of them an Internet connection with a particular topology on Internet data centre exchanges which meets certain criteria. | |||
|O | |||
|- | |- | ||
|1.3.6.1.4.1.60218.21.2.8019 | |1.3.6.1.4.1.60218.21.2.8019 | ||
Line 54: | Line 86: | ||
|O | |O | ||
|- | |- | ||
|1.3.6.1.4.1.60218.21.2.82961 | |[[PDI OIDNode 1.3.6.1.4.1.60218.21.2.82961|1.3.6.1.4.1.60218.21.2.82961]] | ||
|(not fully disclosed) All of the objects, in each of them a photo which shows appearance of a particular object clear, and does not contain any images which can be identified that shows up the body of Li Ao in full or in part, and which meets another certain criteria. | |(not fully disclosed) All of the objects, in each of them a photo which shows appearance of a particular object clear, and does not contain any images which can be identified that shows up the body of Li Ao in full or in part, and which meets another certain criteria. | ||
|O | |O |
Latest revision as of 16:37, 28 September 2024
Information
This page lists OID nodes including root nodes that have been allocated for use on research works of Li Ao and the LI AO Internal Governing Body of Science Studies in the field of computer science & IT, and for satisfying the needs of other researches and studies.
For a list of registration data on the registry of issuer of root nodes, please refer to [Registered Contact Information of OID Nodes as First Registration Authority].
OID Nodes Currently In Use
The table shows a list of OID nodes including the root nodes which are currently allocated and in use.
OID node | Object and concept indicated | Type (O-> regular object, C-> concept that dipicted as object, R-> root node object) |
---|---|---|
1.3.6.1.4.1.59191.2.11 | (not disclosed) | C |
1.3.6.1.4.1.59191.2.13 | (not disclosed) | C |
1.3.6.1.4.1.59191.2.14 | (not disclosed) | C |
1.3.6.1.4.1.59191.2.15 | (not fully disclosed) A kind of certificate policy for X.509 certificates. Used to indicate such usage under the Certificate Policy section of an X.509 certificate, version 3. | C |
1.3.6.1.4.1.59191.2.25 | (not fully disclosed) A kind of key usage for X.509 certificates. Used to indicate such usage under the Extended Key Usage section of an X.509 certificate, version 3. | C |
1.3.6.1.4.1.59191.2.100 | (not fully disclosed) A kind of key usage for X.509 certificates. Used to indicate such usage under the Extended Key Usage section of an X.509 certificate, version 3. | C |
1.3.6.1.4.1.59191.2.15 | (not fully disclosed) A kind of certificate policy for X.509 certificates. Used to indicate such usage under the Certificate Policy section of an X.509 certificate, version 3. | C |
1.3.6.1.4.1.60218.1.1.1.6 | (not yet to be documented) | R, C |
1.3.6.1.4.1.60218.1.1.1.7 | A kind of certificate policy for X.509 certificates. Used to indicate such usage under the Certificate Policy section of an X.509 certificate, version 3. The policy enforces the certificate will be used as credential which authenticates one or more particular users within one or more Microsoft Entra ID tenants, and such certificate will be identified by Microsoft Entra ID, the PKI, with registered user identity bindings at high confidence. | C |
1.3.6.1.4.1.60218.21.1 | (not used for naming) Root node of OIDs naming objects which fall under the category of notable objects as defined by the Hidden Library Project. | R, N/A |
1.3.6.1.4.1.60218.21.1.4416 | An iPhone device. This device is later confirmed that the battery and front panel components are not genuine Apple parts. This device no longer exists because it was destroyed; some parts of main logic board remains for further use, including the recovery of data and reassembling. | O |
1.3.6.1.4.1.60218.21.1.6647 | A laptop PC from Lenovo, the brand controller and product desinger. This laptop computer was sent from someone else as a gift. | O |
1.3.6.1.4.1.60218.21.1.8644 | (not fully disclosed) A Secure DNS endpoint. The endpoint was provided by Cloudflare as part of its Zero Trust service. | O |
1.3.6.1.4.1.60218.21.1.46217 | (not fully disclosed) An Android device. This is a virtual Android device emulated by the BlueStacks software. | O |
1.3.6.1.4.1.60218.21.1.1471 | (not disclosed) | O |
1.3.6.1.4.1.60218.21.2 | (not used for naming) Root node of OIDs naming any object which can fall under a particular group, named object groups considered as individual objects in OID application. The usage of this OID node is defined by the Hidden Library Project. | R, N/A |
1.3.6.1.4.1.60218.21.2.6517 | (not fully disclosed) All of the objects, in each of them an Internet connection with a particular topology on Internet data centre exchanges which meets certain criteria. | O |
1.3.6.1.4.1.60218.21.2.8019 | (not disclosed) | O |
1.3.6.1.4.1.60218.21.2.82961 | (not fully disclosed) All of the objects, in each of them a photo which shows appearance of a particular object clear, and does not contain any images which can be identified that shows up the body of Li Ao in full or in part, and which meets another certain criteria. | O |