Suppose that you have received from Susan
sCount.jar, which
contains the Count.class file, and 
Example.cer, which
contains the public key certificate for the public key corresponding
to the private key used to sign the JAR file.
Even though you created these files and they haven't
actually been transported anywhere, you can simulate 
being someone other than the creater and sender, Susan.
Pretend that you are now Ray.
Acting as Ray, you will create a keystore named
exampleraystore and will use it to import the certificate
into an entry with an alias of susan.
A keystore is created whenever you use a keytool 
command specifying a keystore that doesn't yet exist.
Thus we can create the exampleraystore and import the 
certificate via a single keytool command. Do the following
in your command window.
Example.cer. (You should
actually already be there, since this lesson assumes that you stay
in a single directory throughout.)
keytool -import -alias susan -file Example.cer -keystore exampleraystore
The keytool command will print out the certificate information 
and ask you to verify it, for example, by comparing the displayed certificate
fingerprints with those obtained from another (trusted) 
source of information. (Each fingerprint is a relatively short number 
that uniquely and 
reliably identifies the certificate.) For example, in the real world you might
call up Susan and ask her what the fingerprints should be. She can get the
fingerprints of the Example.cer file she created by 
executing the command
keytool -printcert -file Example.cer
keytool, the certificate has not been modified
in transit. In that case you let keytool proceed with placing  
a trusted certificate entry in the keystore. 
The entry contains the public key certificate 
data from the file Example.cer and is assigned the alias
susan.