Electronic identifiers
Electronic identifier uaTokenUSB-dongle with the hardwarily realized standard of coding, complete analogue of a smart-card. It is applied for the hardware authorization of users at access to informational resources, protection of electronic correspondence, etc. Electronic identifier uaToken RFIt is uaToken with the built-in radio frequency identification tag (RFID). It is used as a uniform device for access to premises and to informational resources. Supports all possibilities of "usual" uaToken. |
Electronic identifier uaToken is a compact device in the form of USB-dongle and serves for authorization of the user in a network or on a local computer, for protection of electronic correspondence, for safe remote access to informational resources, and also for reliable storage of personal data. |
|
uaToken with success substitutes any password protection systems, in act now it is not necessary to remember an army of logins and complex passwords, all of them are reliably stored in memory of the token. All that the user needs to do - to connect a token to a USB-port and to type a PINcode. Thus, two-factor authentification is performed when access to the information can be received, only possessing a unique token and knowing some unique combination of characters (PIN-code). uaToken appears as a successful alternative to other hardware carriers of the key information: smart-cards, i-buttons, not to mention diskettes. Indeed, uaToken is an analogue of a smart-card, but for operation with it no additional equipment (reader) is required, data is reliably stored in a nonvolatile memory of the token in capacity up to 128 KB, strong body of uaToken is steady against external effects. Basis of the uaToken makes a microcontroller that fulfils coding of data and memory, in which user data is stored (passwords, certificates, keys of encoding, etc). Electronic identifiers are usually used in a complex with appropriate soft hardware. uaToken supports the main industry standards, that allows to easily use tokens in the already existing systems of information safety. uaToken is developed taking into account modern requirements to devices of protection of information from unauthorized access.
|
PurposeIn the complex with appropriate soft hardware uaToken can be used for solution of the following tasks: AuthentificationSubstitute of a password protection at access to DataBases, Web-servers, VPN-networks and the security-oriented applications for hardware-software authentification. |
Encoding of connections at access to mail servers, database servers, Webservers, file servers, authentification at a remote administration, etc. Data protection
Corporate usageUsage in application software and systems of electronic trade for storage of housekeeping information, personal users information, passwords, encoding keys, digital certificates and any other confidential information. uaToken can appear as the uniform identification device for access of the user to different elements of corporate system and to provide, for example, necessary differentiation of access, automatic digital signature of created documents, authentification at access to computers and applications of system. Two-factor authentification:
Technical CharacteristicsMain characteristics:
|
uaToken RF identifiersuaToken RF is a usb-token with built-in Radio Frequency Identification tag (RFID tag). It is intended for access of users to informational resources of a computer and for physical access to buildings and premises. |
|
uaToken RF unites possibilities of usb tokens, smart-cards and contactless electronic passes:
uaToken RF is irreplaceable in complex security systems. Contactless pass for exit out from a premise and an instrument for access into a computer network are united in one dongle. A security system can be configured so, that an employee simply physically cannot leave access to the confidential information. For an exit out from a premise it is necessary to have uaToken RF, and at disconnecting of the identifier from a USB-port of a computer user's session is automatically locked. uaToken RF has all possibilities of "usual" electronic identifiers uaToken and is compatible with ready solutions on the basis of uaToken. Three lines of uaToken RF differing by the integrated radio frequency identification tags are produced:
In each line there are three models uaToken RF, differing by a memory size: 8, 16, and 32 Kbytes. Thus, uaToken RF represents a budgetary, simple in maintenance combined identification device. uaToken RF perfectly suits any companies and organizations which wish to increase complex security due to usage of the uniform device of access to premises and to data on computers. |