RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2
2010/10/18 14:11:38

The protected information media

The protected information media allow to organize two-factor user identification when it is necessary to provide the password or a PIN code from the carrier for login and the device.

Select following features of use of information media:

  • User authentication in the operating system, services of the directory and networks (operating systems of Microsoft, Linux, Unix, Novell).
  • Protection of computers against unauthorized loading.
  • Strict authentication of users, access isolation, protection of the data transferred on network in Web resources (Online stores, e-commerce).
  • E-mail – formation of the EDS and data encryption, access control, protection of passwords.
  • Encryption systems with public key (PKI), certification centers – storage of certificates of X.509, reliable and safe storage of key information, considerable - reduction of risk of a compromise of private key.
  • The organization of secure channels of data transmission (VPN technology, the IPSec and SSL protocols) – authentication of users, key generation, key exchange.
  • Workflow systems – creation of the legally significant protected document flow using the EDS and enciphering (transfer of tax statements, agreements and the other commercial information on the Internet).
  • Business applications, databases, ERP systems – authentication of users, storage of the configuration information, EDS and enciphering of the transferred and stored data.
  • The systems of Client-Bank, electronic payments – ensuring the legal importance of the made transactions, strict mutual authentication and authorization of clients.
  • Cryptography – ensuring convenient use and safe storage of key information in the certified means of cryptographic information protection (cryptoproviders and cryptolibraries).
  • Terminal access and thin clients – authentication of users, storage of parameters and settings of a session.
  • Disk encryption – differentiation and access control to the protected data, authentication of users, storage of encryption keys.
  • Data encryption on disks – authentication of users, enciphering key generation, storage of key information.
  • Support of legacy applications and replacement of password protection by more reliable two-factor authentication.

  • The USB token represents the information medium by the form reminding the USB USB stick. Bright representatives of this type of the protected information media are eToken and ruToken which developers are Aladdin companies and the Asset respectively.