Softlock Smart PKI Token

Softlock Smart PKI Token is the state-of-the-art security system for both individuals and corporates. It is a hardware-based solution provides the maximum protection for both sensitive data and security operations.

Softlock Smart PKI Token

Smart PKI Token is compatible with both RSA standards and Microsoft standards, which are commonly used by most of the applications to perform their secure operations, some applications are listed as following:

Driverless USB Device

  • Softlock Smart PKI Token is an HID device, which means that it doesn’t require any drivers to work. The Plug and Play nature gives ease of use and installation during deployment within any environment.

Two Factor Authentication

  • Softlock Smart PKI Token family is delivered in two models. The Softlock Smart Token PRO provide Two Factor Authentication, which are: Something you know (The Token PIN) and something you have (the Hardware token). 

Hardware Security

  • Softlock Smart PKI Token is a hardware device with 32-bit processor. The strength of hardware security is that all keys and cryptographic functionalities are executed on board, keeping all data safe from compromising in unsecure software environment. The recommendation of security institutes (Example: FIPS140-2) secure data must be generated, stored and processed in a separate environment outside the computer. This will protect sensitive user data from digital attacks. Softlock Smart Token can generate RSA-1024 keys.

Hardware Storage

  • Softlock Smart PKI Token contains secure and encrypted Hardware Storage. This hardware secure storage will keep all users’ keys and certificates secure against any third party attack. Softlock Smart Token can store up to 10 Certificates on board.

International Standards Compliance

  • Softlock Smart PKI Token is built on international standards, keeping it compliant with different tools and third party software. Softlock Smart PKI Token is shipped with libraries compliant with PKCS#11 and Microsoft CSP. International standards cover: PKCS (1, 5, 7, 8, 10, 11, 2.2 and 12), X5.09 Certificates, CSP and FIPS 140-2-L2. Softlock Smart Token is certified from ITIDA and compliant with the Egyptian Digital Signature Law.

Compatibility

  • Softlock Smart PKI Token is compatible with Windows NT and Linux Platforms.

    Softlock Smart PKI Token libraries can be easily integrated with any application compliant with PKCS#11 or CSP standards. Examples for such applications are Microsoft Outlook™, Thunderbird™, Firefox™ and Internet Explorer™.

    Softlock Smart PKI Token can be easily integrated with any certificates issued from international and trusted third party CAs.

Softlock Smart PKI Token

Smart PKI Token is compatible with both RSA standards and Microsoft standards, which are commonly used by most of the applications to perform their secure operations, some applications are listed as following:

 

  • Support Operating System

    Windows (32/64 Bit) 2K, XP, 2003, Vista, 7, 2008 and Linux (32Bit)

  • Compatible Applications

    Microsoft Outlook, Thunderbird, Outlook Web Access (OWA)

  • Hardware Interface

    Plug and Play USB/HID. No driver is required.

  • Software Interface

    PKCS, CSP, SDK library, SDK JNI  and SDK COM

  • Supported Standards

    PKCS (1, 5, 7, 8, 10, 11 2.2 and 12), X5.09, CSP and FIPS 140-2-L2(under evaluation)

  • Certificate

    Entrust Certified

  • Onboard Cryptography

    RSA-1024 key generation, RSA-2048 sign/verify, DES, 3DES, AES, MD2, MD5, SHA1, SHA256, SHA384, SHA512, HMAC and DH

  • Custom Onboard Cryptography

    ECC, DSA, Twofish, Blowfish, Cast, RC4 and RC6

  • Storage

    100 KB, 10 PKI Slots and 40 Symmetric Slots

  • Session Capabilities

    20 Session, 5 PKI Slots, 20 Symmetric Slots

    • Operating Temperature Range

      -25o to 85o C

    • Memory Retention

      10,000 write cycle and 10 years data retentio
      n

 

Softlock Smart PKI Token

Smart PKI Token is compatible with both RSA standards and Microsoft standards, which are commonly used by most of the applications to perform their secure operations, some applications are listed as following: