Electronic identifiers

Electronic identifier
Electronic identifier uaToken

USB-dongle with the hardwarily realized standard of coding, complete analogue of a smart-card. It is applied for the hardware authorization of users at access to informational resources, protection of electronic correspondence, etc.

Electronic identifier uaToken RF

It is uaToken with the built-in radio frequency identification tag (RFID). It is used as a uniform device for access to premises and to informational resources. Supports all possibilities of "usual" uaToken.

    Electronic identifier uaToken is a compact device in the form of USB-dongle and serves for authorization of the user in a network or on a local computer, for protection of electronic correspondence, for safe remote access to informational resources, and also for reliable storage of personal data.

Electronic identifier

    uaToken with success substitutes any password protection systems, in act now it is not necessary to remember an army of logins and complex passwords, all of them are reliably stored in memory of the token. All that the user needs to do - to connect a token to a USB-port and to type a PINcode. Thus, two-factor authentification is performed when access to the information can be received, only possessing a unique token and knowing some unique combination of characters (PIN-code).

    uaToken appears as a successful alternative to other hardware carriers of the key information: smart-cards, i-buttons, not to mention diskettes.

    Indeed, uaToken is an analogue of a smart-card, but for operation with it no additional equipment (reader) is required, data is reliably stored in a nonvolatile memory of the token in capacity up to 128 KB, strong body of uaToken is steady against external effects.

    Basis of the uaToken makes a microcontroller that fulfils coding of data and memory, in which user data is stored (passwords, certificates, keys of encoding, etc).

    Electronic identifiers are usually used in a complex with appropriate soft hardware. uaToken supports the main industry standards, that allows to easily use tokens in the already existing systems of information safety.

    uaToken is developed taking into account modern requirements to devices of protection of information from unauthorized access.

 


Electronic identifier
Purpose

In the complex with appropriate soft hardware uaToken can be used for solution of the following tasks:

Authentification

Substitute of a password protection at access to DataBases, Web-servers, VPN-networks and the security-oriented applications for hardware-software authentification.

Encoding of connections at access to mail servers, database servers, Webservers, file servers, authentification at a remote administration, etc.

Data protection
  • Protection of electronic mails (digital signature, encoding).
  • Protection of access to a computer (authorization of the user at an entrance to an operating system).
Corporate usage

Usage in application software and systems of electronic trade for storage of housekeeping information, personal users information, passwords, encoding keys, digital certificates and any other confidential information. uaToken can appear as the uniform identification device for access of the user to different elements of corporate system and to provide, for example, necessary differentiation of access, automatic digital signature of created documents, authentification at access to computers and applications of system.

Two-factor authentification:

  • For access to shared data a presence of uaToken is enough;
  • For access to the closed data besides a presence of uaToken it is necessary to enter a correct PIN-code.
Technical Characteristics
Main characteristics:
  • Based on the protected microcontroller
  • Interface: USB
  • EEPROM memory: 8, 16, 32, 64 and 128 Kbytes
  • Overall dimensions: 58х16х8 mm
  • Weight: 6,3 g
  • 32-bits unique serial number
  • Supported operating systems: Windows 98/ME/2000/XP/2003/Vista/2008 Server
  • Support of standards: ISO/IEC 7816, PC/SC, Microsoft Crypto API and Microsoft Smartcard API, PKCS#11 (v. 2.10 +), GOST 28147-89.
  • Own Crypto Service Provider and ICC Service Provider with standard sets of interfaces and functions of API
  • Possibility of integration in any smartcard-oriented software products (e-mail-, internet-, payment systems and others)
File system
  • Built-in file system under standard ISO/IEC 7816
  • Transparent coding of a file system in accordance with GOST 28147- 89
  • Quantity of created folders and level of an enclosure are limited only by a memory size of a token
Authentification and confidentiality
  • Two-factor authentification
  • Limitation of a number of attempts of PIN-code input
  • 3 levels of access to the token: Guest, User, Administrator
Additional possibilities
  • Support of standard X.509 and algorithms RSA, DES (3DES), RC2, RC4, MD4, MD5, SHA-1
  • Usage of uaToken for asymmetric data encoding and for operation with digital certificates from any smartcard-applications
uaToken RF identifiers

uaToken RF is a usb-token with built-in Radio Frequency Identification tag (RFID tag). It is intended for access of users to informational resources of a computer and for physical access to buildings and premises.

Electronic identifier
uaToken RF unites possibilities of usb tokens, smart-cards and contactless electronic passes:
  • Strict two-factor authentification at access to a computer and to the protected informational resources;
  • Safe storage of cryptographic keys and digital certificates;
  • Application in systems of control and access management, in systems of registration working time and audit of employees movement;
  • Usage in the form of pass for electronic checkpoints.
Electronic identifier

uaToken RF is irreplaceable in complex security systems. Contactless pass for exit out from a premise and an instrument for access into a computer network are united in one dongle. A security system can be configured so, that an employee simply physically cannot leave access to the confidential information. For an exit out from a premise it is necessary to have uaToken RF, and at disconnecting of the identifier from a USB-port of a computer user's session is automatically locked.

uaToken RF has all possibilities of "usual" electronic identifiers uaToken and is compatible with ready solutions on the basis of uaToken.

Three lines of uaToken RF differing by the integrated radio frequency identification tags are produced:

  • uaToken RF (EM) - support of EM-Marine standard
  • uaToken RF (HID) - support of HID standard
  • uaToken RF (IND) - support of Indala standard

In each line there are three models uaToken RF, differing by a memory size: 8, 16, and 32 Kbytes.

Thus, uaToken RF represents a budgetary, simple in maintenance combined identification device. uaToken RF perfectly suits any companies and organizations which wish to increase complex security due to usage of the uniform device of access to premises and to data on computers.


   Ask YOUR questions about
"Electronic identifiers"

  Message is being sent... Please wait.