ID Control USB Token with 1 GB Flash Memory 401020 Benutzerhandbuch
Produktcode
401020
The USB token with the
storage system (64K) for PKI
keys, certificates and other
user credentials creating a
perfect individual recognition
method for secure access,
strong authentication and
storage system (64K) for PKI
keys, certificates and other
user credentials creating a
perfect individual recognition
method for secure access,
strong authentication and
ID Control USB Keys
Operating systems:
ME/2000/2003/XP
Support possibility and
standard:
PKCS#11, X.509 certificate, SSL
v3, RSA, etc.
Store medium:
EEPROM(8K/32K/64K)
Outside:
64x16x8mm
Weight:
5-7g
Interface:
USB Type 1.1/ 2.0
Power through driver:
Additional powersource is not
necessary
Power consumption:
<50mA
Additional system:
Not necessary
The memory cell
rewrites:
Above 100,000
System requirements:
Above Pentium, above 32MB
memory
ID Control USB Key 1008
ID Control USB Key 1032
ID Control USB Key 3000
Technical specifications
The USB token
with the storage
system (32K) for
user credentials
creating a perfect
individual recogni-
tion method for
with the storage
system (32K) for
user credentials
creating a perfect
individual recogni-
tion method for
ID Control B.V.
De Trompet 2960
1967 DD HEEMSKERK
Tel. +31 (0) 888-SECURE (Holland)
Tel. +49 (0)1803-SECURE (Germany)
E-mail: info@idcontrol.net
Website: www.idcontrol.net
www.idcontrol.net
Bringing Trust into the virtual world
non-repudiation (digital signatures).
secure access based on strong two-factor authentication
(something you “know” (ID/password) and “have”
(token).
(something you “know” (ID/password) and “have”
(token).
The USB token with the stor-
age system (8K) for PKI keys,
certificates and other user
credentials (ID/password),
creates a perfect identity re-
cognition and control method
for secure access, strong
age system (8K) for PKI keys,
certificates and other user
credentials (ID/password),
creates a perfect identity re-
cognition and control method
for secure access, strong
authentication and non-repudiation (digital signatures).
Other security functions are computer access protection with time based access
control, PKI storage and digital signature generation, password manager with
automatic retrieval and fill-out function, file, folder and disk protection by encryption
and decryption, e-mail security, secure Windows logon, secure remote access (VPN),
etc.
control, PKI storage and digital signature generation, password manager with
automatic retrieval and fill-out function, file, folder and disk protection by encryption
and decryption, e-mail security, secure Windows logon, secure remote access (VPN),
etc.
Key Security Functions