ST4 SECURITY by zvt20327

VIEWS: 8 PAGES: 4

									             Smart Technologies for Security

                   ST4 SECURITY




Physical Access                                         Logical Access




Data Encryption                                      Digital Certificates




QSB2B, 28 Maniakiou Str., Athens, 13231 Greece, Tel: +30 210 5065892,
 Fax: +30 210 5057072, website: www.qsb2b.gr, e-mail: info@qsb2b.gr
        Global Solution for Business Security
In the modern enterprise environment the access and the distribution of electronic data should become
using powerful safety policies.

Secure access to informative systems, use of electronic signatures, secure data distribution and data
encryption are high priorities in any safety planning for all Enterprise’s and Organizations.

                              ST4 Security Corporate ID cards
ST4 Security smart cards provide the following capabilities:

      Secure Logical Access for Windows 2000/XP under Windows 2003 PKI Environment
      Secure Physical Access Capability
      Secure VPN Access
      Ε-mail Digital Signature and Encryption using Windows 2003 PKI Certificates
      Ε-mail Digital Signature and Encryption using other PKI Provider Certificates
      Document Digital Signature
      Hybrid Data Encryption
      Secure Password Management (User Based) using On Card Password Database
      QSB2B CSP (Cryptographic Service Provider) – Microsoft Signed
      PKI enabled using onboard crypto-processor
      On board Private Keys generation
      2 - factor authentication (something you have–something you Know)
      High Storage Capacity (up to 1MB)
      Hybrid Technology (Contact and Contacless Interface)
      Biometric support (expected soon)




             QSB2B, 28 Maniakiou Str., Athens, 13231 Greece, Tel: +30 210 5065892,
              Fax: +30 210 5057072, website: www.qsb2b.gr, e-mail: info@qsb2b.gr
Card Manager

QSB2B Card Manager is the Middleware of ST4 Security card, with the following technical
characteristics:

     Enrolling for Digital ID's (Certificates)
     Importing New Keys and Certificates
     Listing and Viewing Certificates
     Registering and Un-registering Certificates
     Changing and Unblocking the User PIN (Private Identification Number)
     Selecting Default Smart Card Reader
     On Card Password Database*
     QSB2B CSP (Cryptographic Service Provider)

 * Multiple usernames - passwords management for easy access to different informative systems -
 websites etc.


Cryptography

QSB2B Crypto is the Middleware using ST4 Security card in order to encrypt sensitive data stored in
file system, USB device, Network drives e.t.c. For the encryption use, the Symmetric algorithm key AES
- 128 bits plus the Asymmetric algorithm key RSA - 1024 bits (Hybrid Encryption) combined with the
personal Encryption ID Key that user creates.

Files and/or folders quickly and easily encrypted and/or compressed through friendly interface. To
decrypt must have ST4 Security card and PIN code.

Physical Access Control

ST4 Security card can be used for physical access control.

QSB2B can develop custom smart cards applications and cover any specialized need of the enterprise
environment. Custom applications can work with ST4 Security card that Enterprise’s and
Organization's already have been supplied and are functioned in their own business environment.




             QSB2B, 28 Maniakiou Str., Athens, 13231 Greece, Tel: +30 210 5065892,
              Fax: +30 210 5057072, website: www.qsb2b.gr, e-mail: info@qsb2b.gr
ST4 Security Card Specifications

     FEATURE                CONTACTLESS MODE                             CONTACT MODE

Card OS                            Fully compliant with Java Card™ 2.1.1
Standard           ISO / IEC 14443 Type B              ISO / IEC 7816
Protocol           T=CL                                T=1 / T=0
Transfer
                   106 kbits/s to 424 kbit/s                  9,6 kbit/s to 76,8 kbits/s
Speed
NV Memory          Up to 1MB Flash Memory                     Up to 1MB Flash Memory
Endurance          100,000 cycles                             100,000 cycles
RAM                8KB                                        8KB
CPU                16-bit                                     16-bit
Supply Voltage     Input:5V, Internal:2V                      Input:5V, Internal:2V
CPU                16 bit                                     16 bit
                   Contact: 15 MHz
CPU Speed                                                     Up to 24 MHz
                   Contact less:13,56 MHz
ROM                8 Kb                                       4 Kb
                   RSA 1024 bit to 1152 bit                   RSA 1024 bit to 1152 bit
                   ESIGN 1152 bit                             ESIGN 1152 bit
Co-processor
                   Elliptic curve cryptography                Elliptic curve cryptography
                   160 bit to 256 bit, etc.                   160 bit to 256 bit, etc.
Co-processor       Contact: 15 MHz
                                                              30 MHz
Speed              Contact less: 13,56 MHz
                   External clock: 3 MHz to 5 MHz,            External clock: 3 MHz to 5 MHz, 30
PLL
                   30 MHz                                     MHz
                   Frequency:13,56 MHz
RF
                   NRZ/BPSK-NRZ

Cryptographic Features
      FEATURE                                          ALGORITHM
HASH                                              SHA-1, MD5, RIPEMD160
Symmetric Key                                           DES, T-DES
Asymmetric Key                    RSA (512 / 768 / 1,024 bits), DSA (512 / 768 / 1,024 bits)

Security Features
EAL4+
Multilayered secure design
Low level firmware integrity and security features
Secure manufacturing and delivery process




             QSB2B, 28 Maniakiou Str., Athens, 13231 Greece, Tel: +30 210 5065892,
              Fax: +30 210 5057072, website: www.qsb2b.gr, e-mail: info@qsb2b.gr

								
To top