• slide-1
  • slide-2
  • slide-3
  • slide-4
  • slide-5
ID Control's USB Token as affordable and secure authentication method in PKI
ID Control's USB Token provides seamless support to Public key (PKI), through its on-board 1024-bit PKI key generation. A PKI (Public Key Infrastructure) enables users of an unsecured public network such as the Internet to securely and privately exchange data through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates. The private key is given only to the requesting party and the public key is made publicly available (as part of a digital certificate) in a directory that all parties can access. The private key is never shared with anyone or sent across the Internet and requires for that reason "strong authentication" such as MaGer PKI tokens provide.

Public key infrastructure (PKI) is the technology of choice to secure the wired and wireless world—using public key cryptography (PKC) for verifying identity and managing encryption in commercial venues. The sheer volume of commerce on the Internet requires a robust and efficient method of verifying the identity of the person with whom one is doing business and protecting sensitive information. PKI is the security infrastructure that provides PKC and digital signature services, the framework in which the entire process of managing keys and creating and distributing digital certificates takes place.

Additional Security Functions of ID Control's USB key:
Protect your PC with Locking: access control for your PC;
Secure Web Access by strong authentication during logon in an extranet or intranet environment, based on PKI or SSL webserver protected certificate;
Protect Web Applications by which online Software information exchange and transactions. Storing private keys and certificates (online ERP, CRM, groupware user, etc.). The storing of public keys can be customized depending upon a given country security requirments.
Protect E-mail by which e-mail clients or server become a plug-in or webbased PKI enabled environment with e-mail signing, encryption and decryption power.
Protect File and Disk by which Files and partition can be easily encrypted and decrypted with the use of the USB key.

ID Control's USB key has met the following standard, regulatories and directives for:
CE Marking Directive: 93/68/EEC: this CE Marking directive specifies that the ID Control USB PKI product introduced into the EU market is “CE Marked” and has met the standards of EN 55022 1998 + A1 (class B) and EN 550024 1998 + A1.
EMC Compliance:
- ANSI C63.4 -2001: which is the standard that FCC references to perform radiated and conducted emission measurements for information technology equipment (ITE).
- FCC Part 15 Class A: Part 15 is a federal regulation that sets exact limitations on the amount of electromagnetic interference (EMI) allowable from digital computing and other electronic devices.

What's your e-authentication method?

Go to top