USBKEY(学习资料)

更新时间:2023-05-19 07:59:34 阅读: 评论:0

CONTENTS
liyuanC HAP T ER ONE AN INTRODUCTION OF ELECTRONIC KEY (EKEY)....................错误!未定义书签。
1.1  General 错误!未定义书签。
1.2  错误!未定义书签。
1.3  错误!未定义书签。
1.4  错误!未定义书签。
1.5  Typical Application (5)
1.6  Product Model Number (5)
1.7  Development Kit: EDK (6)
CHAPTER TWO      THE INSTALLATION AND USE 错误!未定义书签。
2.1  Installing Process (6)
2.2 How to U eKey (7)
CHAPTER THREE    THE APPLICATION FOR DIGITAL CERTIFICATES THROUGH EKEY错误!未定义书签。
3.1  What Is 错误!未定义书签。雅虎日语在线翻译
3.2  eKey CSP & Its 错误!未定义书签。
3.3  Using eKey to Apply for .错误!未定义书签。CHAPTER FOUR      RELEVANT CREDENTIALS (11)
Enclod 1 The Credential of Scientific Rearch and Manufacturing Enterpri for Commercial Cryptogram Products Appointed by National Commercial Cryptogram Committee (11)
Enclod 2 The Credential of Sales Unit for for Commercial Cryptogram Products Appointed by National
Commercial Cryptogram Committee (12)
Enclod 3 The Certificate of Technical Identification of Commercial Cryptogram Product (12)
CHAPTER ONE AN INTRODUCTION OF ELECTRONIC KEY (EKEY) 1.1General Product Description
With popularization and application of network technique, social life is carrying an earth-shaking change in various fields as internet develops with an unprecedented speed. Due to the features of Internet in terms of opening, stateless, and freedom, network curity, especially in some aspects, such as ID authentication, electronic signature, and data encryption, appearing in network information exchange, has become a central issue concerned by people.pigs
People have taken many measures to protect network curity. One of the most common ways is to
realize encryption and signature through software. However, there exists a hidden danger here in this way, since it must be executed in PC or rver processor which means this processor can obtain the encrypted key. This is the fatal weakness of encrypted key by software encryption, becau a HeiKe can read the key from outside PC and u it without authorization. Once he owns this key, he can encrypt and decrypt the captured data outside the system. Virus “Lovely Bug” fully indicates how easy to operate PC.
Facing innumerable invasion of HeiKe, facing potential danger of large internal information loss of the enterpri, we shall acknowledge that what we have made efforts in is not much enough and we need more effective methods to protect our internet curity.
Therefore, we should adopt such a kind of encrypted hardware, where cryptogram key is stored and encryption operation is completed so that the external system of the hardware cannot track the cryptogram key.
Thus, parating encrypted hardware from system is the only choice for encryption curity. In the process of software encryption, cryptogram key will be transmitted to data or PC processor while in the process of hardware encryption data will be transmitted to the cryptogram key which is stored in t
broadcasting
he special curity hardware. Such hardware can also operate the required encrypted algorithm at a high speed so that nobody can access the cryptogram key, for it is not stored in a PC which can be accesd anytime. Hence, this is the only way of real curity without invasion of PC Virus or Trojan hor Virus.
Our eKey is such a kind of encrypted hardware with curity document systems!
Electronic key (or “Electronic Token”)—eKey—is an indispensable information safety product for modern computer network, mainly ud as electronic key and ID card in network client-rver. eKey is a USB hardware token integrating a smart chip with a reader, with the features of exquisite design and being easy to carry with one. It can be operated in any computer which has USB interface. Having the functions of digital signature, ID authentication, cure encryption and decryption of information & data, and personal credential storage, eKey can be applied for the fields as below: ID authentication, e-Commerce, on-line banking, document encryption and decryption, and cure e-Mail, and can provide a quick and cure solution for building up a safety information platform in the fields mentioned above.
1.2Product Functions
Using USB communication interface in line with USB1.1 technique standard,
communication speed 1.5 Mb/s;
初次见面英语怎么说
Display: LED, for power & communication indication;
Smart card built-in, posssing all functions of SmartCOS PK operation system;
Ur memory space: 16K/32K/64K
Maximum power performance: 100mW
Power: 5V, directly supplied by USB interface
agonistRelative humidity: 30%-95%
z eKey = Mingwah USB reader + SmartCOS PK smart card;
z Adopting high-tech materials, eKey can hot plug or pull above 100 thousand times;
z Becau of using chip storage, data will be entirely in safety;
z Standard USB interface; it can be immediately ud when plug-in; you needn’t to worry about the conflict between device and hardware. It will be applied to the following
devices’ USB interface: PC, laptop computer, rver and other network devices.
Communication speed 1.5Mbps;
z Smart card chip built-in, posssing all functions of Smart COS PK operation system; to store data into the chip is very cure;
electricityz Optional EEPROM capacity: 16K/32K/64K, for storage of personal information, cryptogram, cryptogram key, credentials, etc.;
z As cryptogram key is stored in eKey, the operation is also completed in eKey so that it cannot be tracked;
z Supporting DES, 3DES, RSA1024bit, ECC160bit/192bit algorithms;
z Key generation and signature in the token;
z Supporting MD5, SHA-1 data hush algorithm;
streetz Random numbers generation in hardware;
z Driver supporting: Windows98/ME/NT/2000/XP and Linux (optional).
fox1.3Product Features
z128bit memory cell, 12mhz processor;
z Middleware: PKCS#11, Microsoft CSP;
z Up to the standard of X.509V3 digital certificate storage;
z Display lamp for software control
z The sole 64bit ries number in the world;
z Password protection, prevent documents from being read/ revid.
1.4Applicability
z Supporting far-end access rver (IPSec, PPTP, PAP, CHAP, RADIUS, TACACS);
z Access control on enterpri network and worldwide network (HTTP, SSL);
z On-line business, authorization management, account management;
z Working process and electronic signature
z Guard laptop computer against embezzling;
z NT work station logging-in;
z Software protection
z Document or directory encryption;
z E-mail curity (S/MIME, OpenPGP);
z Network device management;
z e-Pur (SET, MilliCent, eWallet);
z e-Government Administration, e-Tax, e-Customs, and on-line curities, etc.
1.5Typical Application
z Log-in and access control
Bad on eKey’s local computer and network landing, authentication tools, including the
tool of network ur management
z Document/mail/directory encryption and decryption
The documents, mails or directories assigned by encrypted eKey holder can be
decrypted and checked by plugging eKey in.
z Safety distribution
Distribute documents to the designated department or person in safety. Only the ur
which holds the special eKey can read the documents.
z Safety dialing
Store dialing information into eKey in advance and then build up remote safety
connection.
z Digital certificate pioneer
z Encrypted rvice module compatible with Microsoft CryptoAPI, to realize a ries of functions, such as digital certificate, signature encryption and website authentication.
1.6Product Model Number
e-Key naming description:    EK --- K  16  04 P    A
1    2    3    4    5    6
1.eKey product ries;
2.K means PK ries; C means PBOC ries;
3.EEPROM capacity;
4.FLASH capacity;回肠荡气
5.system standard: space for MW standard, P for PC/SC
standard;
6.public key algorithm label (A: RSA, B: RSA/ECC, C:
RSA/SFF33, D: DES, E: RSA/SFF33/ECC);
7.SZD-12 is Mingwah external commercial cryptogram
name of eKey including SFF33 algorithm;
8.Each eKey has the sole 13bit production number.
For example:
EK-C16D    indicating PBOC style, 16K byte of EEPROM capacity,
supporting DES algorithm.
EK-K64C    indicating PK style, 64K byte of EEPROM capacity,

本文发布于:2023-05-19 07:59:34,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/78/691985.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:错误   未定义   书签
相关文章
留言与评论(共有 0 条评论)
   
验证码:
推荐文章
排行榜
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图