although the USB key device is small, it is highly technical. This product adopts the international leading information security technology, the core hardware module is smart card CPU chip, and the internal structure is composed of CPU and encryption logic, RAM, ROM, EEPROM and I/O. It is a small computer with security system.
in addition to hardware, the realization of security depends entirely on the high-tech smart card chip operating system (COS), which, like DOS, WINDOWS and other operating systems, manages all kinds of data, keys and files closely related to information security and controls all kinds of security services.
USBKey has a hardware true random number generator, and the key is completely generated and stored in the hardware, which can ensure that the key does not leave the hardware, and the encryption and decryption algorithm provided by the hardware runs completely in the encryption hardware. The integration of software and hardware constitutes a solid fortress of information security. The use of UsbKey adopts the mechanism of security state machine, which has multiple levels of password verification and protection, and can form mutually authenticated applications together with other authentication devices.
for the public key version of the chip operating system with PKI architecture, the keys with symmetric and asymmetric keys can provide two-factor or even multi-factor authentication, and can also provide more secure digital certificates and digital signatures than pure software. Because the built-in chip has a 64-bit global unique serial number, all kinds of certification bodies (CA) use this encryption hardware or equipment to authenticate the identity of authorized users.
application and development of UsbKey
in fact, USB key products were formerly in the form of smart cards, and smart cards have played a very important role in various gold card projects being started by the country, such as labor and social security, public utilities, tax control, mobile communication, finance, public security and other fields, which almost constitute an important security system of the national economy. Although the chip operating system provides the ability to use one card for multiple purposes, the particularity of the dedicated system makes individuals only passive users of various cards, and cannot actively control them to serve their own security needs.
now, UsbKey has broken the barrier of this kind of security service, so that ordinary individuals can also get professional security services quickly. It is precisely because of its strong security and convenience of use that it has become the first choice equipment for national industry certification (CA) centers at all levels and institutions such as banks CFCA. This means that while the second-generation ID card based on card in China is still in the process of legal examination and approval, UsbKey has taken the lead in becoming the electronic identity in the fields of government, commerce and banking, which is an important part of the core security system of e-government and e-commerce.
Now, with the technology content of smart card becoming more and more mature, and the profit space left for manufacturers and system vendors becoming more and more limited, how to open up the huge domestic individual user market has become the inevitable trend of high-end products and derivative products of smart cards.
at present, there are not many domestic enterprises and research institutions that have developed chip operating systems with independent intellectual property rights, mature technology and reliable products, and there are only a handful of enterprises that have developed UsbKey devices with mature technology. This requires not only years of hardware and software design experience, but also long-term accumulation of information security theory and technology, and the most accurate understanding of various complex and diverse standards and technical interface specifications in this field.
for a long time, the application of professional security systems has always been the patent of hexadecimal technicians, and it is difficult for ordinary applications to use these obscure professional-level security technologies. Therefore, the appearance of UsbKey has shown its charm in a people-friendly style.
by providing rich application interfaces and various middleware products, such as CSP and PKCS#11, various applications can quickly meet their own professional-level security service requirements under different platforms. Recently, the design of application system and related products based on UsbKey are in a tepid state. With the development of related research and the popularization of applications, these systems and products will appear in front of people in a state of volcanic eruption, and will blow up a whirlwind of security demand market.
At present, the most typical product here is the first PC security desktop product. The pure software form of this product has existed for a long time technically, but it has always been popular and difficult for ordinary individuals to accept. In addition, the safety of pure software form has been questioned, and it is inconvenient to use and the information compatibility is poor, so it has long been a bottleneck for people to obtain security services.
Now, with the appearance of hardware-based security carriers, the key information in them is well protected, and the material characteristics can become the image representative of security services and be accepted by ordinary people. The professional product design around UsbKey will make the safety products closer to the people and provide a full range of safety services for the public. Imagine the development process of computer, and it is not difficult to realize the important prospect of UsbKey.
while people are still complaining about the speed of reading and writing floppy disks, optical disks have become the characteristics of the dynamic era of data storage; When CD-ROM still needs computer with CD-ROM drive, USB mobile hard disk has become a new development power of IT industry. Now, people's potential safety awareness is awakening, a national safety system is being built, and personal safety needs are imminent. UsbKey will obviously become a surfer of the new IT tide.
in the current increasingly global economic situation, how to protect personal data security, personal privacy and enterprise information security, business secrets and other security needs are increasingly prominent.
the appearance of USB key products is attracting the attention of many system integrators, information service enterprises and investors. Facing such a huge market cake, we are more and more optimistic about the safety and value-added function of this product in the huge information market. I believe everyone hopes that they can seize this very important link in the new industrial chain.