百度知道 - 信息提示
百度首页
商城
注册
登录
网页
资讯
视频
图片
知道
文库
贴吧采购
地图更多
搜索答案
我要提问
百度知道>提示信息
知道宝贝找不到问题了>_
该问题可能已经失效。返回首页
15秒以后自动返回
帮助
| 意见反馈
| 投诉举报
京ICP证030173号-1 京网文【2023】1034-029号 ©2024Baidu 使用百度前必读 | 知道协议
EV代码签名证书安装指南(Globalsign) - 知乎切换模式写文章登录/注册EV代码签名证书安装指南(Globalsign)蛋糖北京天威诚信电子商务服务有限公司 员工安装eToken驱动安装SafeNet 驱动驱动下载地址:http://www.itrus.cn/soft/Globalsign-x32-10.8.msihttp://www.itrus.cn/soft/Globalsign-x64-10.8.msi双击打开下载得到相应的驱动程序,然后点击”Next”选择语言English或Chinese,并点击“Next”点击我接受(I accept the license agreement),并点击“Next”选择程序安装路径,推荐选择默认设置,并点击“Next”选择“Typical”,并点击“Next”点击“Install”后程序进入自动安装,最后安装完成点击“Finish”完成安装。初始化eToken设置完成驱动安装后,插入USBkey。默认会提示让修改密码,选择取消。选择进入高级视图模式。初始化USBkey相关信息,选择EV Code Signing 右键“初始化设备”选择“配置所有初始化设置和策略”,并选择”下一页“。勾选Use factory default administrator 密码和Use factory default digital signature PUK两个选项,然后点击“下一页”。设置设备名称和设备密码,默认要求密码4-16位字符,建议取消勾选“设备密码必须在首次登陆时更改”,Administrator密码留空,然后勾选“Keep the current administrator password”,弹窗点击确定,然后点击“下一页”。注:设备密码请您务必做好记录,一旦忘记会影响您的证书使用。设置“New Digital Signature PIN”默认要求密码6-16位字符,设置“New Digital Signature PUK” 默认要求密码6-16位字符,点击“完成”。弹窗提示:即将初始化设备,点击“确定”。注:如设备中已有证书,请慎重做初始化设备操作。下载安装证书 打开从Globalsign收到的EV代码签名证书的批准邮件。1. 进入下载EV代码的页面点击电子邮件中的EV证书下载链接地址2. 输入提取密码,进入下载界面注意: 如果遗忘了申请证书时填写的密码,那么请联系天诚安信商务人员。输入正确的Password后,勾选”Yes,I agree”,然后点击“Generate Certificate”下载证书。期间会再次弹出网络访问确认提示窗口,请点击“是”然后在Cryptographic Service Provider选项中选择“eToken Base Cryptographic Provider”选项点击Next下一步后,提示输入初始化时设置的eToken密码,输入错误会导致下载失败。跳转到证书下载页面,点击Install My Certificate,再次弹出网络访问确认提示窗口,请点击“是”点击完成后,稍等片刻即可弹出安装成功的提示。打开您的eToken的SafeNet tools工具可以看到下载的证书信息,即表示您的证书已经完成下载安装。*下载地址为一次性链接,下载成功后链接即刻失效无法重复下载。如需重新下载证书请联系商务人员。代码签名及签名验证代码签名证书助手下载:http://www.itrus.cn/soft/iTrusSignTool.exe当您需要同时管理多张代码签名证书,或需要针对不同扩展名的文件添加不同类型的签名信息时(普通模式及交叉模式),可以通过保存多个不同的签名规则方便随时调用。1.新建签名规则在您开始代码签名操作之前,必须首先新建一个签名规则。选择“签名规则”选项,并选择“新建”。自定义一个规则名称,并选择当前规则下调用的证书文件、当前规则支持的文件扩展名。如果采用文件夹拖放格式,还可以设置规则中是否需要对该文件夹下的子目录中的文件进行签名。*注:当您需要使用双签名功能,请在SHA1证书中选择您对应的SHA1算法的代码签名证书,在SHA256证书中选择您的EV代码签名证书。请确保当前PC有可用的网络连接,以便在签名时为文件添加时间戳签名,推荐您使用Digicert、GlobalSign时间戳。保存当前签名规则后,至少需要将其中一条规则设置为默认规则之后,即可开始为代码添加签名。2.代码签名选择“代码签名”,将您需要签名的文件添加到待签名文件列表中。点击“数字签名”,选择签名模式(应用模式 或 驱动模式),证书助手将自动为签名列表中的程序添加签名信息。应用模式应用于普通的控件或桌面程序签名,驱动模式应用于64位操作系统下的驱动程序文件签名。3.验证代码签名数字签名完成之后,证书助手将自动为已签名的文件进行签名的验证。当签名列表中出现签名失败或时间戳签名失败的文件是,可以选择显示“签名失败”列表,并为签名失败的文件重新尝试数字签名。已有数字签名的程序,添加到签名文件列表后,选择“签名验证”,即可执行代码的签名信息验证,自动获取签名列表中的文件的签名信息。发布于 2023-07-19 23:41・IP 属地北京证书赞同添加评论分享喜欢收藏申请
SafeNet eToken 5110 Series
node/1313
Products
Products
Products Overview
Data Security
Data Security
Data Security Overview
Data Discovery & Classification
Data at Rest Encryption
Data at Rest Encryption
Data at Rest Encryption
Data Security Platform
Transparent Encryption
Encryption for Kubernetes
Encryption UserSpace
Application Data Protection
Tokenization
Data Protection Gateway
Database Protection
Batch Data Transformation | Static Data Masking
Intelligent Protection
Selecting the Right Encryption Approach
Ransomware Protection
Key Management
Key Management
Key Management
CipherTrust Manager
Data Security Manager
CipherTrust Cloud Key Manager
Enterprise Key Management
CipherTrust Platform for DevOps
CipherTrust Cloud Key Management Service
Secrets Management
Hardware Security Modules
Hardware Security Modules
Hardware Security Modules
General Purpose HSMs
Payment HSMs
Luna Cloud HSM Services
Data Protection on Demand
Data Protection on Demand
Data Protection on Demand
Services
How it Works
Partners
Pricing
Sign Up Now
Network Encryption
Secure File Sharing
Risk Management Strategies for Digital Processes with HSMs
Security architects are implementing comprehensive information risk management strategies that include integrated Hardware Security Modules (HSMs). Reduce risk and create a competitive advantage.
Get the White Paper
Application Security
Secure what matters most with Thales and Imperva
Applications help to drive digital transformation but traditional security approaches can’t keep pace with dynamic environments. See how we can help you protection applications and APIs anywhere.
Explore Application Security
Thales and Imperva Join Forces
Together, we are creating the worldwide leader in cybersecurity, protecting more applications, data and identities than any other company and enabling tens of thousands of organizations to deliver trusted digital services to billions of consumers around the world every day.
Learn More
Access Management & Authentication
Access Management & Authentication
Workforce IAM
Workforce IAM
Workforce IAM
SafeNet Trusted Access
SAML Authentication
Gig Workers Identity
Identity-as-a-Service
Cloud SSO
Case Studies
Demo
Free Trial
Customer IAM
Customer IAM
Customer IAM
Capabilities
Resources
Case Studies
Demo
Request a Quote
B2B IAM
Authentication
Authentication
Authentication
Authentication as a Service
Authenticators
Certificate-Based PKI USB Authenticators
Certificate-Based Smart Cards
FIDO Devices
OTP Authenticators
Tokenless Authentication
On-Prem Management Platforms
Security Apps
Smart Card Readers
Passwordless Authentication
Access Management Handbook
Get everything you need to know about Access Management, including the difference between authentication and access management, how to leverage cloud single sign on.
Get the eBook
Software Monetization
Software Monetization
Software Monetization Overview
License Management
Entitlement Management
Rights Management System
Software License & Copy Protection
All Software Monetization Products
How to get SaaS Software Licensing Right the First Time
Explore the software licensing lifecycle, and how to build a cross-functional licensing team.
Get the eBook
How We Can Help
You can rely on Thales to help protect and secure access to your most sensitive data and software wherever it is created, shared or stored.
2023 Data Threat Report
Perspectives and Pathways to Sovereignty and Transformation
What are the top security targets? Discover the answers in our comprehensive annual report.
Get Your Copy Today
Solutions
Solutions
Solutions Overview
By Use Case
By Use Case
5G Security
Access Security
Access Security
Access Security
Secure Remote Access
Secure VPN Access
Secure Cloud Access
VDI Security Solutions
2FA Solutions
Web and Cloud SSO
Physical & Logical Access Control
MFA for Cyber Insurance
Blockchain
Cloud Security
Cloud Security
Cloud Security
Amazon Web Services
Bring Your Own Encryption (BYOE)
Cloud Data Encryption
Cloud SSO
Google Cloud
Luna HSMs – Hybrid, On-Premises and Cloud HSM
Microsoft Azure
Microsoft Double Key Encryption (DKE)
Multi-Cloud Security
Oracle Cloud Infrastructure
Your Data Their Cloud
Data Security & Encryption
Data Security & Encryption
Data Security & Encryption
Advanced Persistent Threats (APTs)
Big Data Security
Database Security and Encryption
Docker Encryption
Encryption for Kubernetes
Encryption UserSpace
MongoDB Encryption
MS SQL Server Encryption
NoSQL Encryption
Oracle Database Encryption
PostgreSQL Database Encryption
SAP Data Security
Securing Unstructured Files
TDE Key Management
Virtual Environment Security
Data Sovereignty
Digital Transformation
IoT Security
IoT Security
IoT Security
Smart Grid Security
IoT Connected Car
IoT Secure Manufacturing
IoT Healthcare
Payment & Transactions
Payment & Transactions
Payment & Transactions
Secure Payments
Point-to-Point Encryption
Document Signing
EMV & Payment Card Issuance
Host Card Emulation
Mobile Card Payments
mPOS
Payment Processing
Secure Credit Card & Pin Management
PKI Credential Management
PKI Credential Management
PKI Credential Management
PKI Middleware
PKI Authentication
PKI Security
PKI Security Solutions
PKI Security Solutions
PKI Security Solutions
TLS/SSL Key Security
Code Signing
Secure Digital Signatures
Electronic Invoicing
DNS Security
Email Encryption
Quantum
Quantum
Quantum
Are You Post-Quantum Ready?
Although post-quantum is projected to be a few years away, an enterprise must start planning today to be post-quantum ready. Take this free risk assessment to learn if your organization is at risk of a post-quantum breach.
TEST YOUR QUANTUM READINESS
Ransomware Solutions
Remote Workforces Challenges
Software Monetization
Software Monetization
Software Monetization
Software License Management
Entitlement Management
Software Packaging & Pricing
Software Usage Tracking & Reporting
Software Protection & Licensing
Capture Revenue Opportunities
Zero Trust Security
Best Practices for Secure Cloud Migration
It's a Multi-Cloud World. Thales can help secure your cloud migration.
GET THE WHITE PAPER
By Industry
By Industry
Automotive
Critical Infrastructure
Education
Government
Government
Government
Federal Government
State and Local Government
Law Enforcement
Financial Services
Healthcare
Insurance Providers
Manufacturing and Industrial
Media and Entertainment
Retail
SaaS Providers and Consumers
Telecommunications
2024 Thales Digital Trust Index
The 2024 Thales Consumer Digital Trust Index Report aims to empower individuals and organizations to own their role in protecting their cyberspace from data breaches.
GET THE REPORT
By Compliance
By Compliance
Global
Global
Basel Compliance Solutions
Data Breach Notification Laws
Data Sovereignty
GDPR
ISO 27799:2016 Compliance
ISO/IEC 27002:2013 Compliance
PCI DSS
PCI HSM
Swift CSC
Validations and Certifications
Americas
Americas
Brazil - LGPD
CCPA (California Consumer Privacy Act)
CJIS
FDA/DEA - EPCS
FedRamp
FISMA
FIPS 199 and FIPS 200
FIPS 140-2
FIPS 140-3
GLBA
HIPAA
Mexico - Data Protection Law
NAIC Insurance Data Security Model Law Compliance
New York State Cybersecurity Requirements for Financial Services Companies Compliance
NCUA Regulatory Compliance
NIST 800-53, Revision 4
PIPEDA Compliance
SOX
STIR/SHAKEN
EMEA
EMEA
DEFCON 658
DORA
ECC
eIDAS
GDPR
NIS2
PSD2
Schrems II
South Africa POPI Act
APAC
APAC
Australia ASIC Market Integrity Rules
Australia APRA CPS234
Australia Privacy Amendment
Bangladesh ICT Security Guideline
China Personal Information Security Specification
Hong Kong Practice Guide for Cloud Computing Security
Hong Kong Secure Tertiary Data Backup (STDB) Guideline
Hong Kong Virtual Asset Trading Platforms Operators Guideline
India Framework for Adoption of Cloud Services by SEBI
Indonesia Personal Data Protection Law
Japan Act on Protection of Personal Information
Japan My Number Compliance
J-Sox
Korea Personal Information and Information Security Management System (ISMS-P)
Monetary Authority of Singapore
Philippines Data Privacy Act of 2012
Risk Management in Technology (RMiT) Policy
Singapore Public Sector Data Security
Singapore CCoP2.0
South Korea's PIPA
UIDAI's Aadhaar Number Regulation Compliance
Vietnam Personal Data Protection Decree
Protect Your Organization from Data Breach Notification Requirements
Data breach disclosure notification laws vary by jurisdiction, but almost universally include a "safe harbor" clause.
LEARN MORE
Solutions to Secure Your Digital Transformation
Whether it's securing the cloud, meeting compliance mandates or protecting software for the Internet of Things, organizations around the world rely on Thales to accelerate their digital transformation.
Implementing Strong Authentication for Office 365
Mitigate the risk of unauthorized access and data breaches.
Learn More
Partners
Partners
Partners Overview
Find a Partner
Become a Partner
Channel Partners
Managed Service Providers
Technology Partners
OEM Partners
Advisory Partners
Cloud Partners
Partner Portal Login
Thales Accelerate
Partner Network
Thales Partner Ecosystem includes several programs that recognize, rewards, supports and collaborates to help accelerate your revenue and differentiate your business. Provide more value to your customers with Thales's Industry leading solutions. Learn more to determine which one is the best fit for you.
The Thales Accelerate Partner Network provides the skills and expertise needed to accelerate results and secure business with Thales technologies.
Get the Brochure
Developers
Resources
Area of Interest
Data Security
Resource Type
White Papers
eBooks
Case Studies
Infographics
Webinars
Videos
Security Research
Podcasts
TalkingTrust Video Series
Gartner Report: Select the Right Key Management as a Service to Mitigate Data Security and Privacy Risks in the Cloud
Organizations must review their protection and key management provided by each cloud service provider.
Get the Report
Access Management
Resource Type
White Papers
eBooks
Case Studies
Infographics
Webinars
Videos
Security Research
Podcasts
Gartner Authentication Report for IAM and SRMs Explores Authentication Token Insights
Identify the most effective user authentication methods for your security and risk management strategy in this Gartner research.
Get the Report
Software Monetization
Resource Type
Blog
FAQ
White Papers
Case Studies
Infographics
Webinars
Learning Hub
How to get SaaS Software Licensing Right the First Time
Explore the software licensing lifecycle, and how to build a cross-functional licensing team.
Get the eBook
Blog
Explore Thales's comprehensive resources for cloud, protection and licensing best practices.
A Global Leader in Data Security
The largest companies and most respected brands in the world rely on Thales to protect their most sensitive data.
GET THE BROCHURE
Support
Customer Support
Software Monetization
Drivers & Downloads
Product Announcements / Training
Customers
Activate a Product / Support Portal
Data Protection
Product Announcements
Training Services
Technical Training Calendar
Professional Services
Security Updates
About
About Us
Leadership
Newsroom
News Coverage
Events
Customers
Industry Associations & Standards Organizations
Careers
Thales + Imperva
Contact Us
Contact Encryption
Contact Access Management
Contact Software Monetization
EN
English (GB)
Français
Deutsch
Italiano
Español
Português
日本語
한국어
Microsites
Polskie
Nederlands
中文(繁體)
SafeNet eToken 5110 Series Ensure secure access to online and network resources and maintain compliance
Get in Touch
Ultra strong authentication, security in a convenient, portable form factor To protect identities and critical business applications in today’s digital business environment, organizations need to ensure access to online and network resources is always secure, while maintaining compliance with security and privacy regulations.
SafeNet eToken 5110 series offers two-factor authentication for secure remote and network access, as well as certificate-based support for advanced security applications, including digital signature and pre-boot authentication.
SSO + MFA + Access Management
All in one platform
Explore Now
Two-Factor Authentication you can Trust SafeNet eToken 5110 series is a portable two-factor USB authenticator with advanced smart card technology. Certificate-based technology generates and stores credentials-such as private keys, passwords, and digital certificates inside the protected environment of the smart card chip. To authenticate, users must supply both their personal SafeNet eToken authenticator and password, providing a critical second level of security beyond simple passwords to protect valuable digital business resources.
SafeNet eToken 5110 series is supported by SafeNet Authentication Client for full local admin and support for advanced token management, events and deployment.
Contact a specialist about SafeNet eToken 5110 series
Contact Us
Benefits & Features
Improves productivity by allowing employees and partners to securely access corporate resources
Enables advanced certificate-based applications, such as digital signature and pre-boot authentication
Common Criteria and FIPS certified versions available
Portable USB token: no special reader needed
Simple and easy to use: no training or technical knowhow needed
Enhance marketing and branding initiatives with private labeling and color options
Specifications
SafeNet eToken 5110+ FIPS
SafeNet eToken 5110+ CC
SafeNet eToken 5110+ CC (940C)
SafeNet eToken 5110+
API & standards support
• BaseCSP minidriver (SafeNet minidriver)
• Global Platform 2.2.1
• Java Card 3.05
• ISO 7816
• Option of tokens manufactured in Cambodia TAA compliant*
• BaseCSP minidriver (SafeNet minidriver)
• Global Platform 2.2.1
• Java Card 3.04
• ISO 7816
• BaseCSP minidriver (SafeNet minidriver)
• Global Platform 2.2.1
• Java Card 3.04
• ISO 7816
• BaseCSP minidriver (SafeNet minidriver)
• Global Platform 2.2.1
• Java Card 3.04
• ISO 7816
Memory size
78KB
At least 73KB
At least 73KB
80KB
Supported operating systems
Windows, MAC, Linux
Dimensions
5110–16.4mm*8.5mm*40.2mm
ISO specification support
Support for ISO 7816-1 to 4 specifications
Operating temperature
0º C to 70º C (32º F to 158º F)
Storage temperature
-40º C to 85º C (-40º F to 185º F)
Humidity rating
0-100% without condensation
Water resistance certification
IP X7 – IEC 60529
USB connector
USB type A; Supports USB 1.1 and 2.0 (full speed and high speed)
Casing
Hard molded plastic, tamper evident
Memory data retention
At least 10 years
Memory cell rewrites
At least 500,000
On-board security algorithms
• Symmetric: AES—For secure messaging and 3DES for Microsoft Challenge/Response only
• Hash: SHA-1, SHA-256, SHA- 384, SHA-512
• RSA: up to RSA 4096 bits
• RSA OAEP & RSA PSS
• P-256 bits ECDSA, ECDH. P-384 & P-521bits ECDSA, ECDH
• On-card asymmetric key pair generation (RSA up to 4096 bits & Elliptic curves up to 521 bits)
• Symmetric: AES—For secure messaging and 3DES for Microsoft Challenge/Response only
• Hash: SHA-1, SHA-256, SHA- 384, SHA-512
• RSA: up to RSA 4096 bits
• RSA OAEP & RSA PSS
• P-256 bits ECDSA, ECDH. P-384 & P-521bits ECDSA, ECDH are available via a custom configuration
• On-card asymmetric key pair generation (RSA up to 4096 bits & Elliptic curves up to 521 bits)
• Symmetric: AES—For secure messaging and 3DES for Microsoft Challenge/Response only
• Hash: SHA-1, SHA-256, SHA- 384, SHA-512
• RSA: up to RSA 4096 bits
• RSA OAEP & RSA PSS
• P-256 bits ECDSA, ECDH. P-384 & P-521bits ECDSA, ECDH are available via a custom configuration
• On-card asymmetric key pair generation (RSA up to 4096 bits & Elliptic curves up to 521 bits)
• Symmetric: 3DES (Triple DES), AES 128/192/256 bit
• Hash: SHA1, SHA256
• RSA: up to RSA 2048 bits
• Elliptic curves: P-256, P-384, ECDH
Security certifications
FIPS 140-2
CC EAL5+ / PP QSCD
eIDAS qualified for both eSignature and eSeal. The French “Qualification Renforcée” required by the French government, administration and military is also available if necessary.
CC EAL5+ / PP QSCD
eIDAS qualified for both eSignature and eSeal. The French “Qualification Renforcée” required by the French government, administration and military is also available if necessary.
CC EAL6+ SC Chip certified
Smart Card Platform
SafeNet IDPrime 930
SafeNet IDPrime 940B
SafeNet IDPrime 940C
Thales IDCore 30 and eToken applet
* Trade Agreement Act
Supported Applications
Strong two-factor authentication (phishing - resistant)
Secure remote access to VPNs and Web portals
Secure network logon
Email encryption
Digital signing
Pre-boot authentication
SafeNet eToken 5110 Series - Product Brief
To protect identities and critical business applications in today’s digital business environment, organizations need to ensure access to online and network resources is always secure, while maintaining compliance with security and privacy regulations. SafeNet eToken 5110...
Read More
Access Management Handbook – eBook
Identity and access management key concepts, technologies and standards compiled for you in this Access Management ebook .
You will learn:
• Authentication and access management differences
• How to leverage cloud single sign on (SSO)
• Key concepts in Access Management...
Read More
Get in contact with an Access Management Specialist
Contact Sales
Scale your authentication with KuppingerCole's recognized market leader
Get the Analyst Review
Access Management Subnav
Access Management & Authentication
Workforce IAM
SafeNet Trusted Access
SAML Authentication
Gig Workers Identity
Identity-as-a-Service
Cloud SSO
SSO Application Catalog
Case Studies
Demo
Free Trial
Customer IAM
Capabilities
Resources
Case Studies
Demo
Request a Quote
B2B IAM
Authentication
Authentication as a Service
Authenticators
Certificate-Based PKI USB Authentication Tokens
eToken 5300 Series
eToken 5110 Series
Certificate-Based Smart Cards
SafeNet IDPrime Smart Cards
SafeNet IDCore Java Cards
SafeNet IDPrime PIV Card
FIDO Devices
SafeNet IDPrime FIDO Biometric Smart Card
OTP Authenticators
eToken Pass
OATH Authentication Tokens
SafeNet OTP 110
SafeNet OTP Display Card
Tokenless Authenticators
Out of Band Authentication
Software Authentication
SafeNet IDPrime Virtual
Mobilepass OTP Authenticator
MobilePass OTP Downloads
Mobilepass Plus Push Authentication
Grid Authentication
Context Based Authentication
On-Prem Management Platforms
VSec Badging Smart Card Management
SAS PCE
Security Apps
SafeNet Authentication Client
SafeNet MiniDriver
Smart Card Readers
Passwordless Authentication
Resources
Zero Trust Security
Access Management Use Cases
Secure Remote Access
Secure VPN Access
VDI Security Solutions
Secure Cloud Access
2FA Solutions
Web and Cloud SSO
Physical & Logical Access Control
MFA for Cyber Insurance
Email Encryption
Access Management FAQ
Strong Authentication Best Practices
Support
Service Status
STA All Service Zones
SAS PCE
Sign Up Now
STA Free Trial
STA Demo
Pricing
cpl.thalesgroup.com
Visit our parent site at
www.thalesgroup.com
Products
Data Protection
Application Security
Access Management & Authentication
Software Monetization
Solutions
By Use Case
By Industry
By Compliance
Partners
Find a Partner
Become a Partner
Partner Portal Login
Resources
Resources Library
Blog
Podcasts
Support
Customer Support
Training Services
About
Contact Us
India E-Waste Program
Newsroom
Careers
SUBSCRIBEGet the latest data protection and access management resources and insights delivered right to your inbox.
Copyright © Thales. All Rights Reserved
Privacy Policy
Disclaimer
EU Commitments
Sitemap
Cookie Policy
Terms & Conditions
Do Not Sell My Personal Information
Search
Partners
Resources
Blogs
Sentinel Drivers
eToken 5100(Pro72K)usbkey电子身份认证令牌-强大的USB令牌用户身份验证 - 知乎切换模式写文章登录/注册eToken 5100(Pro72K)usbkey电子身份认证令牌-强大的USB令牌用户身份验证武汉金雅特加密狗加密狗销售和技术支持圣天诺 eeToken 5100(Pro72K)usbkey电子身份认证令牌使用高级智能卡技术的便携式USB双因素验证令牌 强大的USB令牌用户身份验证--eToken PRO eToken PRO是基于USB的令牌,提供强大的用户验证和高性价比的密码管理。使用这一双因素验证解决方案,企业可以提供安全的网络访问从而轻松有效地扩大商机,可以通过改进的保护和数字签名提高数据安全,可以通过更好的密码管理降低成本和安全风险。极为便携 eToken 5100(Pro72K)usbkey电子身份认证令牌是一个用户可以随身携带的USB令牌。数字证书安全存储其中,随时可供使用。易于使用 使用eToken 5100(Pro72K)usbkey电子身份认证令牌进行身份验证,用户只需将令牌插入USB端口然后输入自己的eToken密码即可。高度灵活 eToken 5100(Pro72K)usbkey电子身份认证令牌支持所有eToken PKI和密码管理应用程序以及软件开发工具,能与第三方应用程序无缝集成。此外,eToken PRO可以定制,加入RFID,采用客户商标和指定颜色。易于实施 通过支持行业标准安全接口和系统,eToken PRO USB密钥确保能与组织已有构架和安全策略轻易集成。 性价比高 eToken 5100(Pro72K)usbkey电子身份认证令牌 USB 令牌提供强大的用户验证 和多种灵活的安全解决方案,但无需任何专门的读卡器或复杂的后端基础设施。 特点:FIPS 140-2和3级认证 通用标准 EAL4+认证 (智能卡芯片) 防篡改外壳 eToken 5100(Pro72K)usbkey电子身份认证令牌优势:使雇员和合作伙伴能安全地访问公司资源,从而提高工作效率 支持先进的基于证书的应用程序,如数字签名和预启动验证 支持安全和隐私标准(FIPS 140-2,通用标准(CC)) 便携式USB令牌:无需专门的读卡器 简单易用——无需任何培训或技术知识 通过板载Java小程序扩展安全应用程序 提供商标和颜色定制eToken 5100(Pro72K)usbkey电子身份认证令牌支持的操作系统 Windows Server 2003/Windows Server 2008, Windows 2000/XP/2003/Vista Linux, Mac OS X (只限32K和64K的令牌)API 及标准支持: PKCS#11 v2.01, Microsoft CAPI, PC/SC, X.509 v3 certificate storage, SSL v3, IPsec/IKE内存大小 72K(Java 虚拟机) 板载安全算法 RSA 1024-bit / 2048-bit, DES, 3DES, SHA1eToken 5100(Pro72K)usbkey电子身份认证令牌安全认证FIPS 140-2 L2&3 (整个设备) 通用标准EAL4/EAL5(Cardos版本: 智能卡芯片和操作系统) 通用标准 EAL4+ ( Java版本: 智能卡芯片) (不同型号的证书不同;请咨询) 尺寸: 52 x 16 x 8 毫米(2.05 x 0.63 x 0.31 英寸)支持的ISO标准规范: ISO 7816-1 到 4 标准规范工作温度 0°C to 70°C (32°F to 158°F)储存温度 -40°C to 85°C (-40°F to 185°F)环境湿度: 0-100% 无冷凝 防水认证: IP X8 - IEC 529 接头 USB Type A (通用串行总线)外壳: 硬塑料模制,防篡改内存数据保存期限: 至少10年存储单元重写次数:至少 500,000 发布于 2017-08-17 14:39计算机科学赞同1 条评论分享喜欢收藏申请
中国银行的ETOKEN是什么?怎么用? - 百度文库
首页
文档工具
更多
搜索文档
新客立减13元
客户端
看过
登录
中国银行的ETOKEN是什么?怎么用?
中国银行的ETOKEN是什么?怎么用?
1. 动态口令牌 动态口令牌是一种内置电源、密码生成芯片和显示屏、根据专门的算法每隔一定时间自动更新动态口令的专用硬件。
2. 基于该动态密码技术的系统又称一次一密(OTP)系统,即用户的身份验证密码是变化的,密码在使用过一次后就失效,下次登录时的密码是完全不同的新密码。
3. 作为一种重要的双因素认证工具,动态口令牌被广泛地运用于安全认证领域。动态口令牌可以大大提升网上银行的登录和交易安全。 中国银行的ETOKEN是什么意思
网上支付的密保。 中国银行的网银怎么用?
申请成功后银行会给你(动态口令、借记卡、存折和相关单据)你在电脑上初次登陆时需要下载安全控件。成功安装安全控件后就可以输入了,初次登陆时用户名是单据上所给的用户名、密码是666666、在输入动态口令密码。登陆成功后,会提示你修改密码和用户名。然后关闭重新登陆,在其中的选项里面找到开通网上支付功能,确定开通即可。
中国银行的中银e令怎么用?
中银e令每60秒随机更新一次,显示为6位数字。动态口令牌的有效使用时间为出厂后三年(失效日期标示于动态口令牌背面)。超过有效使用时间后,动态口令牌将自动失效。
中银e令如何登陆和使用方法:
1.登录中国银行官网,登陆中行网银,输入用户名(柜台开网银是的一个方形回单上有,柜员会有提示),密码(柜台设置的密码),动态口令(动态口令牌当时显示的六位数字)。
2.第一次登录成功后,会要求修改用户名和密码,按照提示修改好用户名和密码后,就可以使用网银的功能了。以后登录使用修改后的用户名和密码。
中国银行的etoken有什么用? - 知乎首页知乎知学堂发现等你来答切换模式登录/注册银行中国银行中国银行的etoken有什么用?如题,这个etoken是必要的吗?在什么时候需要用到?关注者1被浏览192关注问题写回答邀请回答好问题添加评论分享暂时还没有回答,开始写第一个回答1 个回答被折叠(为什
eToken PASS Portable OTP Authenticator | User Access Management
node/1366
Products
Products
Products Overview
Data Security
Data Security
Data Security Overview
Data Discovery & Classification
Data at Rest Encryption
Data at Rest Encryption
Data at Rest Encryption
Data Security Platform
Transparent Encryption
Encryption for Kubernetes
Encryption UserSpace
Application Data Protection
Tokenization
Data Protection Gateway
Database Protection
Batch Data Transformation | Static Data Masking
Intelligent Protection
Selecting the Right Encryption Approach
Ransomware Protection
Key Management
Key Management
Key Management
CipherTrust Manager
Data Security Manager
CipherTrust Cloud Key Manager
Enterprise Key Management
CipherTrust Platform for DevOps
CipherTrust Cloud Key Management Service
Secrets Management
Hardware Security Modules
Hardware Security Modules
Hardware Security Modules
General Purpose HSMs
Payment HSMs
Luna Cloud HSM Services
Data Protection on Demand
Data Protection on Demand
Data Protection on Demand
Services
How it Works
Partners
Pricing
Sign Up Now
Network Encryption
Secure File Sharing
Risk Management Strategies for Digital Processes with HSMs
Security architects are implementing comprehensive information risk management strategies that include integrated Hardware Security Modules (HSMs). Reduce risk and create a competitive advantage.
Get the White Paper
Application Security
Secure what matters most with Thales and Imperva
Applications help to drive digital transformation but traditional security approaches can’t keep pace with dynamic environments. See how we can help you protection applications and APIs anywhere.
Explore Application Security
Thales and Imperva Join Forces
Together, we are creating the worldwide leader in cybersecurity, protecting more applications, data and identities than any other company and enabling tens of thousands of organizations to deliver trusted digital services to billions of consumers around the world every day.
Learn More
Access Management & Authentication
Access Management & Authentication
Workforce IAM
Workforce IAM
Workforce IAM
SafeNet Trusted Access
SAML Authentication
Gig Workers Identity
Identity-as-a-Service
Cloud SSO
Case Studies
Demo
Free Trial
Customer IAM
Customer IAM
Customer IAM
Capabilities
Resources
Case Studies
Demo
Request a Quote
B2B IAM
Authentication
Authentication
Authentication
Authentication as a Service
Authenticators
Certificate-Based PKI USB Authenticators
Certificate-Based Smart Cards
FIDO Devices
OTP Authenticators
Tokenless Authentication
On-Prem Management Platforms
Security Apps
Smart Card Readers
Passwordless Authentication
Access Management Handbook
Get everything you need to know about Access Management, including the difference between authentication and access management, how to leverage cloud single sign on.
Get the eBook
Software Monetization
Software Monetization
Software Monetization Overview
License Management
Entitlement Management
Rights Management System
Software License & Copy Protection
All Software Monetization Products
How to get SaaS Software Licensing Right the First Time
Explore the software licensing lifecycle, and how to build a cross-functional licensing team.
Get the eBook
How We Can Help
You can rely on Thales to help protect and secure access to your most sensitive data and software wherever it is created, shared or stored.
2023 Data Threat Report
Perspectives and Pathways to Sovereignty and Transformation
What are the top security targets? Discover the answers in our comprehensive annual report.
Get Your Copy Today
Solutions
Solutions
Solutions Overview
By Use Case
By Use Case
5G Security
Access Security
Access Security
Access Security
Secure Remote Access
Secure VPN Access
Secure Cloud Access
VDI Security Solutions
2FA Solutions
Web and Cloud SSO
Physical & Logical Access Control
MFA for Cyber Insurance
Blockchain
Cloud Security
Cloud Security
Cloud Security
Amazon Web Services
Bring Your Own Encryption (BYOE)
Cloud Data Encryption
Cloud SSO
Google Cloud
Luna HSMs – Hybrid, On-Premises and Cloud HSM
Microsoft Azure
Microsoft Double Key Encryption (DKE)
Multi-Cloud Security
Oracle Cloud Infrastructure
Your Data Their Cloud
Data Security & Encryption
Data Security & Encryption
Data Security & Encryption
Advanced Persistent Threats (APTs)
Big Data Security
Database Security and Encryption
Docker Encryption
Encryption for Kubernetes
Encryption UserSpace
MongoDB Encryption
MS SQL Server Encryption
NoSQL Encryption
Oracle Database Encryption
PostgreSQL Database Encryption
SAP Data Security
Securing Unstructured Files
TDE Key Management
Virtual Environment Security
Data Sovereignty
Digital Transformation
IoT Security
IoT Security
IoT Security
Smart Grid Security
IoT Connected Car
IoT Secure Manufacturing
IoT Healthcare
Payment & Transactions
Payment & Transactions
Payment & Transactions
Secure Payments
Point-to-Point Encryption
Document Signing
EMV & Payment Card Issuance
Host Card Emulation
Mobile Card Payments
mPOS
Payment Processing
Secure Credit Card & Pin Management
PKI Credential Management
PKI Credential Management
PKI Credential Management
PKI Middleware
PKI Authentication
PKI Security
PKI Security Solutions
PKI Security Solutions
PKI Security Solutions
TLS/SSL Key Security
Code Signing
Secure Digital Signatures
Electronic Invoicing
DNS Security
Email Encryption
Quantum
Quantum
Quantum
Are You Post-Quantum Ready?
Although post-quantum is projected to be a few years away, an enterprise must start planning today to be post-quantum ready. Take this free risk assessment to learn if your organization is at risk of a post-quantum breach.
TEST YOUR QUANTUM READINESS
Ransomware Solutions
Remote Workforces Challenges
Software Monetization
Software Monetization
Software Monetization
Software License Management
Entitlement Management
Software Packaging & Pricing
Software Usage Tracking & Reporting
Software Protection & Licensing
Capture Revenue Opportunities
Zero Trust Security
Best Practices for Secure Cloud Migration
It's a Multi-Cloud World. Thales can help secure your cloud migration.
GET THE WHITE PAPER
By Industry
By Industry
Automotive
Critical Infrastructure
Education
Government
Government
Government
Federal Government
State and Local Government
Law Enforcement
Financial Services
Healthcare
Insurance Providers
Manufacturing and Industrial
Media and Entertainment
Retail
SaaS Providers and Consumers
Telecommunications
2024 Thales Digital Trust Index
The 2024 Thales Consumer Digital Trust Index Report aims to empower individuals and organizations to own their role in protecting their cyberspace from data breaches.
GET THE REPORT
By Compliance
By Compliance
Global
Global
Basel Compliance Solutions
Data Breach Notification Laws
Data Sovereignty
GDPR
ISO 27799:2016 Compliance
ISO/IEC 27002:2013 Compliance
PCI DSS
PCI HSM
Swift CSC
Validations and Certifications
Americas
Americas
Brazil - LGPD
CCPA (California Consumer Privacy Act)
CJIS
FDA/DEA - EPCS
FedRamp
FISMA
FIPS 199 and FIPS 200
FIPS 140-2
FIPS 140-3
GLBA
HIPAA
Mexico - Data Protection Law
NAIC Insurance Data Security Model Law Compliance
New York State Cybersecurity Requirements for Financial Services Companies Compliance
NCUA Regulatory Compliance
NIST 800-53, Revision 4
PIPEDA Compliance
SOX
STIR/SHAKEN
EMEA
EMEA
DEFCON 658
DORA
ECC
eIDAS
GDPR
NIS2
PSD2
Schrems II
South Africa POPI Act
APAC
APAC
Australia ASIC Market Integrity Rules
Australia APRA CPS234
Australia Privacy Amendment
Bangladesh ICT Security Guideline
China Personal Information Security Specification
Hong Kong Practice Guide for Cloud Computing Security
Hong Kong Secure Tertiary Data Backup (STDB) Guideline
Hong Kong Virtual Asset Trading Platforms Operators Guideline
India Framework for Adoption of Cloud Services by SEBI
Indonesia Personal Data Protection Law
Japan Act on Protection of Personal Information
Japan My Number Compliance
J-Sox
Korea Personal Information and Information Security Management System (ISMS-P)
Monetary Authority of Singapore
Philippines Data Privacy Act of 2012
Risk Management in Technology (RMiT) Policy
Singapore Public Sector Data Security
Singapore CCoP2.0
South Korea's PIPA
UIDAI's Aadhaar Number Regulation Compliance
Vietnam Personal Data Protection Decree
Protect Your Organization from Data Breach Notification Requirements
Data breach disclosure notification laws vary by jurisdiction, but almost universally include a "safe harbor" clause.
LEARN MORE
Solutions to Secure Your Digital Transformation
Whether it's securing the cloud, meeting compliance mandates or protecting software for the Internet of Things, organizations around the world rely on Thales to accelerate their digital transformation.
Implementing Strong Authentication for Office 365
Mitigate the risk of unauthorized access and data breaches.
Learn More
Partners
Partners
Partners Overview
Find a Partner
Become a Partner
Channel Partners
Managed Service Providers
Technology Partners
OEM Partners
Advisory Partners
Cloud Partners
Partner Portal Login
Thales Accelerate
Partner Network
Thales Partner Ecosystem includes several programs that recognize, rewards, supports and collaborates to help accelerate your revenue and differentiate your business. Provide more value to your customers with Thales's Industry leading solutions. Learn more to determine which one is the best fit for you.
The Thales Accelerate Partner Network provides the skills and expertise needed to accelerate results and secure business with Thales technologies.
Get the Brochure
Developers
Resources
Area of Interest
Data Security
Resource Type
White Papers
eBooks
Case Studies
Infographics
Webinars
Videos
Security Research
Podcasts
TalkingTrust Video Series
Gartner Report: Select the Right Key Management as a Service to Mitigate Data Security and Privacy Risks in the Cloud
Organizations must review their protection and key management provided by each cloud service provider.
Get the Report
Access Management
Resource Type
White Papers
eBooks
Case Studies
Infographics
Webinars
Videos
Security Research
Podcasts
Gartner Authentication Report for IAM and SRMs Explores Authentication Token Insights
Identify the most effective user authentication methods for your security and risk management strategy in this Gartner research.
Get the Report
Software Monetization
Resource Type
Blog
FAQ
White Papers
Case Studies
Infographics
Webinars
Learning Hub
How to get SaaS Software Licensing Right the First Time
Explore the software licensing lifecycle, and how to build a cross-functional licensing team.
Get the eBook
Blog
Explore Thales's comprehensive resources for cloud, protection and licensing best practices.
A Global Leader in Data Security
The largest companies and most respected brands in the world rely on Thales to protect their most sensitive data.
GET THE BROCHURE
Support
Customer Support
Software Monetization
Drivers & Downloads
Product Announcements / Training
Customers
Activate a Product / Support Portal
Data Protection
Product Announcements
Training Services
Technical Training Calendar
Professional Services
Security Updates
About
About Us
Leadership
Newsroom
News Coverage
Events
Customers
Industry Associations & Standards Organizations
Careers
Thales + Imperva
Contact Us
Contact Encryption
Contact Access Management
Contact Software Monetization
EN
English (GB)
Français
Deutsch
Italiano
Español
Português
日本語
한국어
Microsites
Polskie
Nederlands
中文(繁體)
eToken PASS
Compact and Portable OTP Authenticator
eToken PASS is a compact and portable one-time password (OTP) strong authentication device that allows organizations to conveniently and effectively establish OTP-based secure access to network resources, cloud-based applications (SaaS) web portals, and other enterprise resources.Providing a Strong Foundation for Your Evolving Business NeedseToken PASS is a versatile OTP generator keyfob designed to meet the diverse needs of users whose requirements may vary significantly across the organization. It provides a strong and scalable framework for implementing user access control, increasing employee productivity and complying with industry privacy and security regulations.eToken PASS is available with SafeNet Trusted Access:SafeNet Trusted Access: SafeNet Trusted Access, or STA, is an access management and authentication service. By helping to prevent data breaches and comply with regulations, STA allows organizations to secure access to all resources and migrate to the cloud.
SSO + MFA + Access Management
All in one platform
Explore Now
Benefits
Features
Specifications
Secure remote access to networks, SaaS applications, and web based servicesExtremely portable - users can easily carry the device wherever business takes themCost effective with effortless back-end configuration, low maintenance, and longlasting battery lifeFlexible management platforms allow you to expand to advanced certificate-based security applications as your needs evolveEnables compliance with privacy regulations
OTP authentication device with LCD display, battery, and OTP generation buttonTime-sync and event-based configuration optionsSupport for OATH TOTP and HOTP protocolsStandard support for RADIUS OTP
FeatureDetailsOTP Security AlgorithmOATH compliant (HOTP and TOTP available in SHA-1 and SHA-256)Battery LifetimeFor event-based OTPs: 7 yearsFor time-synced OTPs: 5 yearsOperating Temperature0 C to 70 C (32 F to 158 F)Storage Temperature-40 C to 85 C (-40 F to 185 F)Humidity Tolerance0-100% without condensationCasingBody: Hard molded plasticSecurity feature: Tamper evidentCustomizable elements: Casing color, logo printing, serial number printingSupported Management PlatformSafeNet Trusted Access
eToken PASS - Product Brief
Learn more about eToken PASS, a compact and portable one-time password (OTP), strong authentication device that allows organizations to conveniently and effectively establish OTP-based secure access to network resources, SaaS cloud applications, and online services.
Read More
Get in contact with an Access Management Specialist
Contact Sales
Access Management Subnav
Access Management & Authentication
Workforce IAM
SafeNet Trusted Access
SAML Authentication
Gig Workers Identity
Identity-as-a-Service
Cloud SSO
SSO Application Catalog
Case Studies
Demo
Free Trial
Customer IAM
Capabilities
Resources
Case Studies
Demo
Request a Quote
B2B IAM
Authentication
Authentication as a Service
Authenticators
Certificate-Based PKI USB Authentication Tokens
eToken 5300 Series
eToken 5110 Series
Certificate-Based Smart Cards
SafeNet IDPrime Smart Cards
SafeNet IDCore Java Cards
SafeNet IDPrime PIV Card
FIDO Devices
SafeNet IDPrime FIDO Biometric Smart Card
OTP Authenticators
eToken Pass
OATH Authentication Tokens
SafeNet OTP 110
SafeNet OTP Display Card
Tokenless Authenticators
Out of Band Authentication
Software Authentication
SafeNet IDPrime Virtual
Mobilepass OTP Authenticator
MobilePass OTP Downloads
Mobilepass Plus Push Authentication
Grid Authentication
Context Based Authentication
On-Prem Management Platforms
VSec Badging Smart Card Management
SAS PCE
Security Apps
SafeNet Authentication Client
SafeNet MiniDriver
Smart Card Readers
Passwordless Authentication
Resources
Zero Trust Security
Access Management Use Cases
Secure Remote Access
Secure VPN Access
VDI Security Solutions
Secure Cloud Access
2FA Solutions
Web and Cloud SSO
Physical & Logical Access Control
MFA for Cyber Insurance
Email Encryption
Access Management FAQ
Strong Authentication Best Practices
Support
Service Status
STA All Service Zones
SAS PCE
Sign Up Now
STA Free Trial
STA Demo
Pricing
cpl.thalesgroup.com
Visit our parent site at
www.thalesgroup.com
Products
Data Protection
Application Security
Access Management & Authentication
Software Monetization
Solutions
By Use Case
By Industry
By Compliance
Partners
Find a Partner
Become a Partner
Partner Portal Login
Resources
Resources Library
Blog
Podcasts
Support
Customer Support
Training Services
About
Contact Us
India E-Waste Program
Newsroom
Careers
SUBSCRIBEGet the latest data protection and access management resources and insights delivered right to your inbox.
Copyright © Thales. All Rights Reserved
Privacy Policy
Disclaimer
EU Commitments
Sitemap
Cookie Policy
Terms & Conditions
Do Not Sell My Personal Information
Search
Partners
Resources
Blogs
Sentinel Drivers