30.11.2012 Views

What is eToken Enterprise? - tlk

What is eToken Enterprise? - tlk

What is eToken Enterprise? - tlk

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>eToken</strong> R2 Features<br />

Hardware Random Number Generation<br />

The <strong>eToken</strong> PRO has a true hardware random number generator that<br />

<strong>is</strong> used internally for RSA key generation and authentication<br />

challenges.<br />

Physically Protected Chip<br />

The <strong>eToken</strong> PRO <strong>is</strong> implemented in a secure chipcard that meets the<br />

ITSEC 4 standard. All data stored on the <strong>eToken</strong> PRO <strong>is</strong> stored<br />

internally within th<strong>is</strong> chipcard and <strong>is</strong> intrinsically secure.<br />

Access Protection<br />

The <strong>eToken</strong> PRO possesses a comprehensive access control<br />

mechan<strong>is</strong>m that protects data and keys stored on the <strong>eToken</strong>. Access<br />

to data can be controlled by a variety of mechan<strong>is</strong>ms, such as<br />

challenge-response authentication or PIN entry.<br />

USB Data Traffic Encryption<br />

Data passing between the <strong>eToken</strong> PRO and the host computer <strong>is</strong><br />

protected using secure messaging, a mechan<strong>is</strong>m that enables selective<br />

encryption and/or authentication of data or traffic. Secure messaging<br />

uses the 3DES symmetric algorithm.<br />

The <strong>eToken</strong> R2:<br />

Uses a secure microcontroller (EEPROM), with 16K/32K bytes of<br />

secured memory, and a 128-bit DESX on-chip processor.<br />

Provides full support for storage of PKI-based keys and<br />

certificates.<br />

Enables compatible implementation with smartcard applications.<br />

Supports PKCS#11, CAPI and Application Protocol Data Unit<br />

(APDU) APIs.<br />

On-board Cryptographic Functionality.<br />

The <strong>eToken</strong> R2 supports the DESX symmetric algorithm with 120-bit<br />

keys. <strong>eToken</strong> R2 uses th<strong>is</strong> algorithm internally to encrypt all sensitive<br />

data and to perform the challenge-response user authentication<br />

protocol. The <strong>eToken</strong> R2 can be used as an encryption/decryption<br />

engine to protect information on a PC.<br />

10 Introduction

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!