contents

business
 
Internet Security through Smart Card Technology

Secure identity management is essential for high-quality Internet applications. Giesecke & Devrient (G&D), a leading manufacturer of USB security tokens, is expanding its product line to include two new models. The StarSign USB Token model can be personalized in large numbers and flexibly adapted to project security requirements. The StarSign USB Token MicroSD model can be used on a PC without installing driver software and also enables applications to be started directly from the token. Both can be used by PC users for secure authentication, data encryption independent of transmission and document signing. Giesecke & Devrient will be premiering the StarSign USB tokens at the CeBIT.

In comparison to pure authentication with user name and password, this two-factor authentication system offers a considerably higher level of protection, since it requires possession of a USB token as well as the log-on data. The simplest possible operation is key to the success of the USB token.

With these two tokens, G&D is also launching a new design for the complete product family, which is set apart by various performance features. The USB token with smart card plug-in is especially suitable for rapid industrial personalization in high numbers. At the same time, based on their security requirements, customers have the flexibility to select between various proprietary or Java-based smart card operating systems from G&D with differing security standards (such as FIPS 140-2 or EAL 4+).

G&D is rolling out the USB Token MicroSD variant with a combined flash memory of up to one gigabyte. Driver software does not need to be installed on the computer to use the smart card functionality. Particularly advantageous is that users can run the USB Token MicroSD without having administrator rights on their PCs.

Both USB tokens can be personalized during production and by system integrators or certification bodies, as well as in the field by the end customer.



write your comments about the article :: © 2008 Computing News :: home page