Operating Systems and Profiles. Product Marketing Group Munich, Germany September 2010
|
|
- Julian Watson
- 6 years ago
- Views:
Transcription
1 Overview of CSSI supported Operating Systems and Profiles Product Marketing Group Munich, Germany
2 CSSI compliance matrix for native smart card OS types 2
3 native smart card OS and profile matrix (1) card Operating Sytem ACOS EDU V1 ACOS EDU V2 proprietary profiles (backwards EDU EDU ACOS A04 A-Trust Corporate ACOS A05 A-Trust Corporate ACOS EMV-A03 EDU Corporate ACOS SMARTMX EDU, A-Trust Corporate CardOS M4 Siemens Corporate CardOS Siemens Corporate CardOS 4.01(a) Siemens Corporate charismathics profiles ID cards MOC CardOS 4.20 Siemens, Minidriver CNS CardOS 4.2B Siemens, Minidriver CNS X CardOS 4.2C Siemens, Minidriver CNS CardOS 4.2C DI Siemens, Minidriver CNS CardOS 4.30 Siemens, Minidriver CNS CardOS 4.3B Siemens, Minidriver CNS CardOS 4.4 Siemens, Minidriver CNS 3
4 native smart card OS and profile matrix (2) card Operating Sytem charismathics plug n crypt (CardOS 4.3B) Eutronsec ITSEC-I (CardOS M4.01a) Eutronsec ITSEC-I (CardOS 4.3B) Eutronsec ITSEC-P (StarCOS SPK 2.4) Eutronsec FIPS (StarCOS SPK 2.4) GoldKey PIV token Micardo EC 2.0 proprietary profiles (backwards Siemens Siemens Siemens AET, G&D AET, G&D PIV Micardo Micardo EC 2.3 Micardo Micardo P2.1 NetKey (TCOS V2R1) Micardo Telesec NetKey E4/2000 Tl Telesec charismathics profiles ID cards MOC, Minidriver, Minidriver, Minidriver Corporate Corporate CNS CNS CNS 4
5 native smart card OS and profile matrix (3) card Operating Sytem PAV ABACOS 2.0 StarCOS 30 proprietary profiles (backwards charismathics profiles ID cards MOC PKCS#15 StarCOS SPK 2.3 AET, G&D Corporate StarCOS SPK 2.4 AET, G&D Corporate StarCOS SPK 3.0 AET, G&D TCOS USB Crypt Token Telesec TCOS 2 Telesec TCOS 2.x Vasco DigiPass 860 (CardOS 4.01a) Vasco DigiPass 860 (CardOS 4.3B) Telesec Telesec Telesec 5
6 CSSI compliance matrix for Java-based cards and tokens 6
7 Java cards and profile matrix (1) card Operating Sytem Axalto Cyberflex Access 64K V2c Cardlogix Java V2.2.1 proprietary profiles (backwards ActivIdentity charismathics profiles ID cards Gemalto EMV PKI X Gemalto TPC DM 72K PIV PIV,,(IAS) IAS Gemalto TOP IM GX4 X GemXpresso Pro X GemXpresso Pro R3.x X Giesecke & Devrient Sm@rtCafe Expert 64K Giesecke & Devrient Sm@rtCafe Expert 2.0 Giesecke & Devrient Sm@rtCafe Expert 2.1 Giesecke & Devrient Sm@rtCafe Expert 2.1 T=0 Giesecke & Devrient Sm@rtCafe Expert 3.0/3.1 Giesecke & Devrient Sm@rtCafe Expert 3.2 ActivIdentity X AET, G&D X AET, G&D X AET, G&D X AET, G&D X AET, G&D X MOC 7
8 Java cards and profile matrix (2) card Operating Sytem proprietary profiles (backwards charismathics profiles ID cards Giesecke & Devrient AET, G&D X Sm@rtCafe Expert 5.0 Idopte Token X (Oberthur Cosmo V5.4) JCOP 20 FINEID X JCOP 21 (all configurations) AET, Raak Mini Driver FINEID, INSS X JCOP 30 AET, Raak Mini Driver FINEID X JCOP 31 (all configurations) AET, Raak Mini Driver FINEID, INSS JCOP 41 (all configurations) AET, Raak Mini Driver FINEID X JCOP J2 (all configurations) AET, Raak Mini Driver FINEID JCOP J3 (all configurations) AET, Raak Mini Driver FINEID JCOP J4 (all configurations) AET, Raak Mini i Driver FINEID JCX32 jtop v2 JCX36 jtop15 T=0 J-IDMark MOC X 8
9 Java cards and profile matrix (3) card Operating Sytem proprietary profiles (backwards charismathics profiles ID cards MOC KEBT KONA101 KEBT KONA132 KEBT KONA25 KEBT KONA26 Oberthur CosmopolIC v4 Oberthur ID one Cosmo 64K V5.2 ActivIdentity PKCS#15 INSS Oberthur ID one Cosmo 64K V5.4 FINEID Oberthur ID one Cosmo V5.2 PIV PIV Oberthur ID one Cosmo V7.0 FINEID X Oberthur ID one Cosmo V7.0-a FINEID X Oberthur ID one Cosmo V7.0-n FINEID X Oberthur ID one Cosmo V7.0 IAS ECC Safran Morpho / Sagem Orga J-ID Mark 64K Safran Morpho / Sagem Orga YPSID2 IAS IAS X 9
10 Java cards and profile matrix (4) card Operating Sytem proprietary profiles (backwards charismathics profiles ID cards MOC Safran Morpho / Sagem Orga YPSID3 IAS ECC IAS IAS Setec SetCard+ 64K FINEID 10
11 CSSI compliance matrix for non smart card based devices 11
12 non smart card based device matrix Card Operating Sytem Privaris Plus ID 60 Privaris Plus ID 75 Privaris Plus ID 90 Wibu CodeMeter Dongle Proprietary Profiles (backward charismathics Profiles ID cards MOC Corporate 12
13 CSSI compliance matrix for Trusted Platform Modules 13
14 Trusted Platform Modules Atmel TPM 1.1 / 1.2 AT97SC3201, AT97SC3202, AT97SC3201S Broadcom TPM 1.1 / 1.2 BCM5751M Infineon TPM 1.1/1.2 SLD9630TT 1.1 Intel TPM 1.2 ST Microelectronics TPM 1.1/1.2 ST19NP18, ST19WP18 Nuvoton TPM 1.1/1.2 PC21100 Compliance with NTRU/Infineon TPM connector Compatibility with Wave system s Embassy Trusted Suite 14
15 contact charismathics for more info 15
SafeSign Identity Client Standard
This document contains information of a proprietary nature. No part of this manual may be reproduced or transmitted in any form or by any means electronic, mechanical or otherwise, including photocopying
More informationDatasheet. System requirements OpenLimit Base components 2.5
Datasheet System requirements OpenLimit Base components 2.5 Date: 26.05.2009 Content 1 System requirements 3 1.1 Operating systems 3 1.2 Hardware 3 1.3 Software 4 1.4 Smartcards 4 OpenLimit CC Sign 4 OpenLimit
More informationvsec:cms S-Series Introduction Release Notes Release October 16 th, 2018
vsec:cms S-Series Release Notes Release 5.3.0.0 October 16 th, 2018 Introduction This document provides information about the vsec:cms S-Series product suite release. The information provided in this document
More informationSafeSign Identity Client Standard. Release Document for OS X
SafeSign Identity Client Standard Release Document for OS X 1 Table of Contents Table of Contents... 2 Table of Figures... 5 Document Information... 6 About SafeSign Identity Client... 7 About A.E.T. Europe
More informationvsec:cms S-Series Introduction Release Notes Release April 27 th, 2018
vsec:cms S-Series Release Notes Release 5.1.0.0 April 27 th, 2018 Introduction This document provides information about the vsec:cms S-Series product suite release. The information provided in this document
More informationProduct Description. SafeSign Identity Client Standard Version 2.3 for MAC OS X 10.4
SafeSign Identity Client Standard Version 2.3 for MAC OS X 10.4 This document contains information of a proprietary nature. No part of this document may be reproduced or transmitted in any form or by any
More informationIntroduction to Electronic Identity Documents
Tutorial Introduction to Electronic Identity Documents Klaus Schmeh cryptovision I'm Klaus Schmeh, Chief Editor Marketing at cryptovision. I have published a number of books. Identity Documents Conventional
More informationCERTIFICATE MAINTENANCE and REVIEW RECORD
CERTIFICATE MAINTENANCE and REVIEW RECORD HUNGUARD Informatics and IT R&D and General Service Provider Ltd. as a certification authority assigned by the assignment document No. 001/2010 of the Minister
More informationSafeSign Identity Client Standard Version 3.5. Release Document for Windows
. Release Document for Windows Table of Contents Table of Contents Table of Contents... II Warning Notice... III Document Information... IV About the Product... V 1 About this Document... 1 2 Release Information...
More informationSmart Cards, Tokens, Security And Applications
Smart Cards, Tokens, Security And Applications ComSignTrust e-signature Smart Card Tokens - ComSignTrust e-signature Smart Card Tokens - Gemalto, the world leader in digital security and ComSignTrust (CST),
More informationNOTE: Please check this product's web page on HP.com for current compatibility information.
Overview Models E6D77AA Introduction Add an extra layer of security at the point of data entry with the HP USB SmartCard CCID Keyboard, which includes an integrated smart card reader to help simplify access
More informationDIGIPASS CertiID. Installation Guide 3.1.0
DIGIPASS CertiID Installation Guide 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationQuickSpecs. Models. HP USB Smart Card Keyboard. Overview
Overview Models ED707AA Introduction Boost your security, simplify access procedures and reduce the costs associated with managing networks by preventing unauthorized access to your computers and networks
More informationMindshare 2018 The Nine Steps to Your Company ID:
Mindshare 2018 : An IT Hero s Quest to Get Smart Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 Hooray! Your company has won a lucrative contract!
More informationQuickSpecs. Models. Introduction. Key Benefits. Compatibility. HP USB Smart Card CCID Keyboard. Overview
Overview Models E6D77AA Introduction Add an extra layer of security at the point of data entry with the HP USB SmartCard CCID Keyboard, which includes an integrated smart card reader to help simplify access
More informationS-Series Administration Guide Version 4.8
S-Series Administration Guide Version 4.8 vsec:cms versasec.com 1(338) All information herein is either public information or is the property of and owned solely by Versasec who shall have and keep the
More informationNOTE: Please check this product's web page on HP.com for current compatibility information.
:: Seite 1 von 6 :: Datenblatt zum Produkt HP HP CCID SMARTCARD KEYBOARD mit DC# 783628 :: Overview Models E6D77AA Introduction Add an extra layer of security at the point of data entry with the HP USB
More informationSymantec Encryption Desktop Version 10.3 for Windows Release Notes
Symantec Encryption Desktop 10.3 for Windows Release Notes Page 1 of 20 Symantec Encryption Desktop Version 10.3 for Windows Release Notes Thank you for using this Symantec Corporation product. These Release
More informationOpen Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014
The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps
More informationFujitsu mpollux DigiSign Client Technical References
Fujitsu mpollux DigiSign Client Technical References This reference document contains technical information necessary for system administrators, who are installing Fujitsu mpollux DigiSign Client in their
More informationACR38U-I1. Smart Card Reader. Technical Specifications V1.11. Subject to change without prior notice.
ACR38U-I1 Smart Card Reader Technical Specifications V1.11 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Modern Design... 3 1.3. Ease
More informationMarket Trends and Veridos solutions for epassports & ID Documents
Market Trends and Veridos solutions for epassports & ID Documents Ludger Holtmann, Senior Product & Portfolio Manager Michael Ruhland-Bauer, Head of Product Mangement Documents Agenda Introducing Veridos
More informationACR3801. FIPS 201 Certified. PC-linked Smart Card Reader. Technical Specifications.
ACR3801 PC-linked Smart Card Reader FIPS 201 Certified Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types...
More informationLecture 11. Security Protocols. Cryptographic Standards. Companies Developing Cryptographic Hardware
Lecture 11 Security Protocols Cryptographic Standards Companies Developing Cryptographic Hardware Secure Communication Systems (e.g., DMS) Security protocols (e.g., S-MIME, SSL, IPSec) Security mechanisms
More informationcryptovision Enterprise product line Use Smart Cards, the smart way
cryptovision Enterprise product line Use Smart Cards, the smart way cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 Mindshare 2016 - Enterprise 2 cryptovision
More informationSecurity Target (ST)
Security Target (ST) Electronic Signature Application OPENLiMiT SignCubes base components 2.1 Version 2.1.6.1 Certification ID: BSI-DSZ-CC-0432 OPENLiMiT SignCubes AG Zuger Str. 76 B 6411 Baar Switzerland
More informationOracle Enterprise Single Sign-on Universal Authentication Manager. Installation Guide Release E
Oracle Enterprise Single Sign-on Universal Authentication Manager Installation Guide Release 11.1.1.5.0 E21030-01 March 2011 Oracle Enterprise Single Sign-on Universal Authentication Manager, Installation
More informationFAMILY BROCHURE. Gemalto SafeNet Authenticators. Diverse Form Factors for Convenient Strong Authentication
FAMILY BROCHURE Gemalto Authenticators Diverse Form Factors for Convenient Strong Diverse Form Factors for Convenient Strong. Offering the broadest range of authentication methods and form factors supported
More informationIdentity and Authentication PKI Portfolio
Identity and Authentication PKI Portfolio Gemalto offers comprehensive public key infrastructure (PKI) authentication solutions that provide optimal levels of security. Supporting a wide portfolio of IDPrime
More informationThe Gemalto offer for PKI market in Russia
The Gemalto offer for PKI market in Russia Miroslaw TOCICKI, Technical Consultant September 18th, 2014 Agenda Introduction Gemalto IdA portfolio Java PKI cards for developers GOST certified solution IDPrime
More informationSagem Orga Strong, Global, Innovative.
Sagem Orga Strong, Global, Innovative. CTST François Blanchard Global Account Marketing Manager 2 Market drivers The game has changed Mobile Network Operators are now WEB service providers Convergence
More informationSecure your PKCS#11 token against API attacks!
M. Bortolozzo, G. Marchetto, R. Focardi Università di Venezia, Italy focardi@dsi.unive.it G. Steel LSV, CNRS & ENS de Cachan, France graham.steel@lsv.ens-cachan.fr Abstract PKCS#11 defines a widely adopted
More informationAnalysing Cryptographic Hardware Interfaces with Tookan
Analysing Cryptographic Hardware Interfaces with Tookan Graham Steel joint work with R. Bardou, M. Bortolozzo, M. Centenaro, R. Focardi, Y. Kawamoto, L. Simionato, J.-K. Tsay Graham Steel September 23,
More informationApplication Notes ANCT18-9Oct013ks(TrueCrypt)
ANCT18-9Oct013ks().odt Purpose of Application: Using the CrypToken as access key to encrypted drives Version: 7.1a (Win32/64), CrypToken Kit 1.50 or higher Last Update: 16 October 2013 by Steffen Kaetsch
More informationUsing PKCS#11 Security Devices for Recording Web Surfing Sessions and for Executing Web Load Tests
Ingenieurbüro David Fischer AG A Company of the Apica Group http://www.apicasystem.com Using PKCS#11 Security Devices for Recording Web Surfing Sessions and for Executing Web Load Tests 2010, 2015 July
More informationSecurity Target (ST)
Electronic Signature Application OPENLiMiT SignCubes base components 2.0, Version 2.0.1.1 with OPENLiMiT SignCubes PDF Plugin, Version 2.0.1.1 for Adobe Certification ID: BSI-DSZ-CC-0299 OPENLiMiT SignCubes
More informationACR38U PocketMate. Smart Card Reader. Technical Specifications. Subject to change without prior notice
ACR38U PocketMate Smart Card Reader Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Ingenious Design... 3 1.3.
More informationApplication for Smart Card Management User manual
Application for Smart Card Management User manual for Microsoft Windows systems (7 and newer), Mac OS Warsaw 2019-04-15 tel. + 48 22 390 59 95 email: handlowy@eurocert.pl Content 1. Installation for Windows
More informationTechnical Bulletin: CAC Data Model Change in 144K Dual Interface Cards
DEPARTMENT OF DEFENSE HUMAN RESOURCES ACTIVITY DEFENSE MANPOWER DATA CENTER DoD CENTER MONTEREY BAY 400 GIGLING ROAD SEASIDE, CALIFORNIA 93955-6771 To: DoD CAC Application and Testing Community From: Defense
More informationMobile Devices as Identity Carriers. Pre Conference Workshop October 14 th 2013
Mobile Devices as Identity Carriers Pre Conference Workshop October 14 th 2013 Mobile Market Worldwide Smartphones Market by OS (in thousands of units) 1,400,000 1,200,000 1,000,000 800,000 600,000 400,000
More informationThe Open Protocol for Access Control Identification and Ticketing with PrivacY
The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY
More informationGerman IT Security Certificates
German IT Security Certificates Certified IT Products Certified Protection Profiles Products confirmed according to the Digital Signature act Certified Development/Productionsites Special Edition May 2018
More informationAugust, Actividentity CTO Office
The Open Protocol for Access Control Identification and Ticketing with PrivacY For the Secure Enablement of converged Access and Contactless Transactions August, 2010 Actividentity CTO Office 2 What is
More informationACR38U-A4. Smart Card Reader. Technical Specifications V2.03. Subject to change without prior notice.
ACR38U-A4 Smart Card Reader Technical Specifications V2.03 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Working Principle of SAM... 3 2.0. Features... 4 3.0. Supported
More informationSecurity Target (ST)
Security Target (ST) Electronic Signature Application OPENLiMiT SignCubes base components 2.1 Version 2.1.6.3 for Microsoft InfoPath Technology Certification ID: BSI-DSZ-CC-0494-2008-MA-01 OPENLiMiT SignCubes
More informationThe UICC. Recent Work of ETSI TC Smart Card Platform. Dr. Klaus Vedder Chairman ETSI TC SCP
Dr. Klaus Vedder Chairman ETSI TC SCP The UICC Recent Work of ETSI TC Smart Card Platform 8th ETSI Security Workshop, Sophia Antipolis, France, 16-17 January 2012 ETSI 2012. All rights reserved SIMs, USIMs,
More informationOverview of cryptovision's eid Product Offering. Presentation & Demo
Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 General Requirements Government of Utopia Utopia Electronic
More informationACR38U-BMC. Smart Card Reader. Technical Specifications. Subject to change without prior notice
ACR38U-BMC Smart Card Reader Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Unique Casing... 3 1.3. Plug-and-Play...
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationEND OF SALE ANNOUNCEMENT
Gemalto IDPrime.Net /.Net Bio Smart Cards END OF SALE ANNOUNCEMENT The purpose of this bulletin is to announce End-of-Sale (EOS) and Last-Time-Buy (LTB) plans for Gemalto s IDPrime.Net and IDPrime.Net
More informationSharif University of Technology ICT-Eco-System ICT Innovation Center, Nov. 24,
Sharif University of Technology ICT-Eco-System ICT Innovation Center, Nov. 24, 2016 www.sharif.edu Sharif ICT Eco-System Advanced ICT Research Institute (AICT) Established: 2000 More than 220 experts Consulting,
More informationOracle Enterprise Single Sign-on Authentication Manager. Release Notes Release E
Oracle Enterprise Single Sign-on Authentication Manager Release Notes Release 10.1.4.1.0 E12622-01 October 2008 Oracle Enterprise Single Sign-on Authentication Manager Release Notes, Release 10.1.4.1.0
More informationIDGo Middleware and SDK for Mobile Devices
Smartjac Industries Inc. - Kanalvägen 1A 2nd floor SE-194 61 Upplands Väsby Sweden www.smartjac.com / www.smartjac.biz Phone: +46(8)41071230 - Email: order@smartjac.com IDGo 800 - Middleware and SDK for
More informationSecure Internet Connectivity with the Internet Smart Card
Secure Internet Connectivity with the Internet Smart Card 3 rd ETSI Security Workshop Dr. Walter HINZ ETSI 2007. All rights reserved 3rd ETSI Security Workshop - Sophia-Antipolis, 15-16 January 2008 Agenda
More informationACR38 Smart Card Reader
ACR38 Smart Card Reader Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Smart Card Reader Features... 4 3.0. Smart Card Support... 5 3.1. MCU
More informationACR38T-D1. Smart Card Reader. Technical Specifications. Subject to change without prior notice
ACR38T-D1 Smart Card Reader Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Ease of Integration... 3 2.0. Features...
More informationThe purpose of this bulletin is to announce End-of-Sale (EOS) and Last-Time-Buy (LTB) plans for the etoken PRO Anywhere token.
etoken PRO Anywhere END OF SALE ANNOUNCEMENT The purpose of this bulletin is to announce End-of-Sale (EOS) and Last-Time-Buy (LTB) plans for the etoken PRO Anywhere token. Distribution: SafeNet / Gemalto
More informationNetIQ Enhanced Smart Card Method Installation and Administration Guide. September 2016
NetIQ Enhanced Smart Card Method 3.1.0.0 Installation and Administration Guide September 2016 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT
More informationPublic Key Infrastructures Chapter 06 Private Keys
Public Key Infrastructures Chapter 06 Private Keys Cryptography and Computer Algebra Prof. Dr. Johannes Buchmann Dr. Alexander Wiesmaier Personal security environments Store Private keys Certificates Other
More informationApple Product Security
Apple Product Security Meeting IT Security Needs Fed/Ed XIV Washington,DC - December 14, 2006 Shawn Geddis Enterprise Security Consulting Engineer geddis@apple.com December 2006 Certificates and Keys Everywhere
More informationExpert Embedded Security
Giesecke & Devrient Sm@rtCafé Expert Embedded Security FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation Version 0.7 August 2007 Copyright 2007 Giesecke & Devrient This document may be freely
More informationIOT PLATFORMS AND SOFTWARE
Index Table of Contents Table of Contents... i List of Figures... vi Executive summary... 1 1 The M2M and IoT ecosystem... 3 1.1 Introduction... 3 1.1.1 Evolution of M2M and IoT... 3 1.1.2 M2M/IoT interoperability
More informationProduct Documentation
(/en-us.html) Product Documentation Browse Browse StoreFront 3.1 Technology Preview Search Download full document PDF DOCX PRINT EMAIL System requirements Nov. 12, 2015 When planning your installation,
More informationArchitecture 1 3. SecureToken. 32-bit microprocessor smart chip. Support onboard RSA key pair generation. Built-in advanced cryptographic functions
SecureToken Architecture 1 3 2 32-bit microprocessor smart chip Support onboard RSA key pair generation Built-in advanced cryptographic functions 4 5 6 7 8 9 10 Support onboard digital signing Supports
More informationSxS Authentication solution. - SXS
SxS Authentication solution. - SXS www.asseco.com/see SxS Single Point of Authentication Solution Asseco Authentication Server (SxS) is a two-factor authentication solution specifically designed to meet
More informationThis version of the IDGo 800 middleware contains the following components: IDGo 800 Credential Provider build 01
What s New? Now Supported Doc Ref: D1379783A Date: October 16, 2015 This document presents information about the IDGo 800 V1.2.4-01 for Windows middleware. It shows what has changed since IDGo 800 V1.2.3-04.
More informationSC-3 USB Token. QUICK Reference. Copyright 2007 CRYPTOCard Corporation All Rights Reserved
SC-3 USB Token QUICK Reference Copyright 2007 CRYPTOCard Corporation All Rights Reserved 091807 http://www.cryptocard.com Table of Contents OVERVIEW... 1 OPERATING MODES & OPTIONS... 2 USING THE SC-3 USB
More informationSmart Card Forum Prague Secured Access for entreprise
IIIII Smart Card Forum Prague Secured Access for entreprise Jérôme Soufflot Bus dev EMEA Channel Manager May 20, 2010 Agenda Gemalto Presentation Overview Gemalto IAM offer Update on Smart Card & components
More informationWindows Smart Card Logon Use Case
Windows Smart Card Logon Use Case Issue Smart Card Logon versasec.com 1(13) Table of Contents Windows Smart Card Logon Use Case... 3 Step 1 Configuring a Windows Smart Card Logon Template... 3 Step 2 Configuring
More informationSafeSign Identity Client Standard
This document contains information of a proprietary nature. No part of this manual may be reproduced or transmitted in any form or by any means electronic, mechanical or otherwise, including photocopying
More informationTivoli Access Manager for Enterprise Single Sign-On
Tivoli Access Manager for Enterprise Single Sign-On Version 6.0 Authentication Adapter Release Notes GC23-6354-03 Tivoli Access Manager for Enterprise Single Sign-On Version 6.0 Authentication Adapter
More informationNovell Enhanced Smart Card Method
Novell Enhanced Smart Card Method Installation Guide Novell Enhanced Smart Card Method 3.0.1 July 17, 2007 INSTALLATION GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties
More informationThe Road to Industry 4.0. Secure Industrial Visibility
The Road to Industry 4.0 Secure Industrial Visibility 2 The Road to Industry 4.0 3 Current situation Industrial digitization is a global trend. It gives insights to production, it reduces pro duction costs
More informationPRODUCT OVERVIEW. SecurePIM. Components
SecurePIM SecurePIM provides secure communication and access to corporate data from ios and Android smartphones or tablets. It enables employees to work remotely, access business-critical data and connect
More informationExpert 3.2
Giesecke & Devrient Sm@rtCafé Expert 3.2 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation Version 1.6 December 2011 Copyright 2011 Giesecke & Devrient This document may be freely reproduced
More informationPublic Key Infrastructures
Public Key Infrastructures How to store private keys? Chapter 6 Private Keys Cryptography and Computeralgebra Vangelis Karatsiolis 1 2 Personal Security Environment (PSE) Realisation of PSEs : Tokens Secure
More informationGerman IT Security Certificates
German IT Security Certificates Certified IT Products Certified Protection Profiles Products confirmed according to the Digital Signature act Certified Development/Productionsites March 2017 7148 German
More informationPublic Key Infrastructures
Public Key Infrastructures Chapter 6 Private Keys Cryptography and Computeralgebra Johannes Buchmann 1 How to store private keys? 2 Personal Security Environment (PSE) Private keys are stored in PSEs 3
More informationCREDENTSYS CARD FAMILY
CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2
More informationADmitMac PKI Executive Summary. 2010, Thursby Software Systems, Inc.
ADmitMac PKI Executive Summary Thursby Software Systems, Inc. November 15,2010 Why ADmitMac PKI? Leverage your existing Active Directory and PKI infrastructure when adding Macintosh computers. Helps meet
More informationSC-1 Smart Card Token. QUICK Reference. Copyright 2007 CRYPTOCard Corporation All Rights Reserved
SC-1 Smart Card Token QUICK Reference Copyright 2007 CRYPTOCard Corporation All Rights Reserved 091807 http://www.cryptocard.com Table of Contents OVERVIEW...1 OPERATING MODES & OPTIONS...2 USING THE SC-1...6
More informationExpert 3.2
Giesecke & Devrient Sm@rtCafé Expert 3.2 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation Version 1.5 June 2008 Copyright 2008 Giesecke & Devrient This document may be freely reproduced and
More information13.56 MHz Contactless Technology How to Order Guide
3.56 MHz Contactless Technology How to Order Guide D00529, Release B.8 September 9, 2008 The most current version of this document is always available for download at: www.hidcorp.com/support To check
More informationInteragency Advisory Board Meeting Agenda, December 7, 2009
Interagency Advisory Board Meeting Agenda, December 7, 2009 1. Opening Remarks 2. FICAM Segment Architecture & PIV Issuance (Carol Bales, OMB) 3. ABA Working Group on Identity (Tom Smedinghoff) 4. F/ERO
More informationSafeNet Authentication Client
SafeNet Authentication Client Compatibility Guide All information herein is either public information or is the property of and owned solely by Gemalto. and/or its subsidiaries who shall have and keep
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationPublic Key Infrastructures
Public Key Infrastructures How to store private keys? Chapter 6 Private Keys Cryptography and Computeralgebra Vangelis Karatsiolis Alexander Wiesmaier 1 2 Personal Security Environment (PSE) Realisation
More informationSmart card OMNIKEY 6121 Mobile USB Reader integration with Linux
Smart card OMNIKEY 6121 Mobile USB Reader integration with Linux Tested with Ubuntu 10.04 and Linux Mint 9 Isadora 32/64-bit A. Overview. HID Global's OMNIKEY product brand, one of the world's leading
More informationData Security Features
product brief Intel Desktop Board DQEP Executive Series Mini-ITX Form Factor Mini-size the High Performance Business PC Introducing the Intel Desktop Board DQEP, supporting the Intel Core i vpro and Intel
More informationGiovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security
Giovanni Carnovale Technical Account Manager Southeast Europe The concept of strong authentication Something you have Something you know We authenticate the world 2 Authenticate where? We authenticate
More informationTest Report. For the participants of the SDW InterOp Final Report, secunet Security Networks AG
Test Report For the participants of the SDW InterOp 2013 Final Report, 2013.06.30 secunet Security Networks AG Copyright 2013 by secunet Security Networks AG 2 Final Report, 2013.06.30 SDW InterOp 2013
More informationACR1256U. User Manual V Document Name: ACR1256U- User Manual.doc. Prepared by: Reviewed by: Approved by:
Document Name: - User Manual.doc User Manual V1.00.00 Prepared by: Reviewed by: Approved by: Subject to change without prior notice Version History Date By Changes Version 2014-9-3 Henry Lin First Release
More informationThunderbolt 3 to esata Adapter + USB 3.1 (10Gbps) Port - Mac / Windows
Thunderbolt 3 to esata Adapter + USB 3.1 (10Gbps) Port - Mac / Windows Product ID: TB3ESATU31 This Thunderbolt 3 to esata and USB 3.1 adapter lets you expand the connectivity of your Mac or PC laptop,
More informationBiometrics & Smart Cards In Use Today
Biometrics & Smart Cards In Use Today Christer Bergman President and CEO, Precise Biometrics In Use Today... Alan L. Herto Chief, Systems Integrity Division Requirements Improved IT security & stronger
More informationMobile NFC Services Opportunities & Challenges. NGUYEN Anh Ton VNTelecom Conference 31/10/2010
Mobile NFC Services Opportunities & Challenges NGUYEN Anh Ton VNTelecom Conference 31/10/2010 Agenda 1. Introduction 2. Mobile NFC Overview 3. NFC Ecosystem Key Findings 4. Main NFC challenges 5. What
More informationPRODUCT INFORMATION BULLETIN
PRODUCT INFORMATION BULLETIN ID-One PIV v2.3.2 The electronic Identity card compliant with US specifications for electronic Table of contents 1. Foreword... 3 2. Introduction to PIV cards features... 4
More informationUse Digipass two-factor authentication
DIGIPASS BY VASCO Secure your business Use Digipass two-factor authentication S T R O N G s tat i c PA S S W O R D S O N E - T I M E PA S S W O R D S P u b l i c K E Y I N F R A S T R U C T U R E digipass
More informationDie Zukunft des M-Payment The future of m-payment NFC. Andreas Johne. Düsseldorf, 25. Januar 2008
Die Zukunft des M-Payment Düsseldorf, 25. Januar 2008 Andreas Johne Agenda Brief company presentation M-payment with Near Field Communication Success stories with Page 2 Giesecke & Devrient From Printing
More informationExisting Applications That Use TPMs
Chapter 4 Existing Applications That Use TPMs Even though more than 1 billion TPMs are deployed in the market, and they exist on almost all commercial PCs and servers, very few people know about them.
More informationcryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH
cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 cryptovision cryptovision Gelsenkirchen
More information