Joke Collection Website - Blessing messages - What does ukey mean?

What does ukey mean?

UKey is a small, reliable and high-speed storage device, which is directly connected to the computer through USB (Universal Serial Bus Interface) and has the function of password verification. Ukey is an extremely powerful supplement to the current network security system, and it is a network security product certified by China Information Security Evaluation and Certification Center. Based on trusted computer and smart card technology, it brings ease of use, portability and the highest level of security to users who use Microsoft IE or Netscape Navigator for network access, online transactions (shopping, payment), sending and receiving emails, online chatting and making friends, signing forms and digitally signing documents. To ensure that the user's operation under ukey cannot be tampered with or denied. The biggest characteristics of Ukey are high security, strong consistency of technical specifications, good compatibility of operating systems and flexible portability.

Brief introduction of components in UKey authentication system SecureFile function components provide file-based encryption, decryption and other functions. Encryption is carried out through the operation of Ukey's built-in chip, which ensures the security of files and encryption in the encryption process to the greatest extent:

1, widely used: supports encryption and decryption functions of various files.

2, a variety of encryption algorithms:

Five safe, reliable and efficient encryption algorithms. The system supports five encryption algorithms such as DES, RC5, IDEA, BlowFish and Misty 1:

3. Unique hiding function: the function of hiding files and directories to prevent the operation of illegal users.

4. File security:

Provide my safe, keep the original storage location of files, and you can operate and decrypt all files at once through my safe.

5. Directory encryption function: With the directory encryption function, any file copied to the encrypted directory will be automatically encrypted.

6. Confidential editing function: provides the function of editing files in encrypted state. Users can edit the existing file directly when inserting UKey without decrypting the file, and keep the encrypted state when exiting the save.

Fold and edit the functional components of this paragraph. SecureVia, a component of UKey authentication system, is based on file security distribution. The protection mechanism adopts identity authentication and data encryption, so that your files are foolproof during transmission. Its main function is to realize the safe distribution of files among designated users without worrying about the leakage of files.

File sending: when sending, the file is automatically encrypted by the UKey computing chip, and the ID of the file receiver UKey is specified, and the specified file receiver must hold UKey with the corresponding ID.

Receiving file: The recipient of the file must have a UKey with the corresponding ID, and then you can easily open the encrypted file by clicking "Open File" without any setting. If it is not the legal recipient of the file, there is no way to open the file encrypted by the UKey chip.

Solution:

In order to ensure the security of files to the greatest extent, the UKey authentication system adopts the component combination of SecureLogon)+SecureFile)+SecureVia:

Secure login: ensure the legality and uniqueness of the login system identity.

File encryption: Encryption based on UKey chip ensures the security of files and files in the encryption process to the greatest extent.

Secure file distribution: based on secure login of UKey component, the identity of sender and receiver can be determined, and based on secure file distribution function of UKey, files can be specified and encrypted, which ensures the security of file transmission to the greatest extent.

Folding editing has the advantages of openness: notes /Windows Vista/Windows 7, etc. 2. Security: Hardware-based encryption has incomparable advantages over software encryption, with high security and confidentiality. Based on UKey authentication, the security of the system and files is guaranteed to the greatest extent.

Computer file encryption has always been the main content of computer security management. The security of file storage is closely related to your business information. A good file security solution can not only make you feel that the original file security is so convenient and easy to realize, but also make you worry about the safe storage of your own files. UKey authentication system 2002 is a sharp weapon to ensure computer security.

3. Ease of use.

4. Advantages: high security.

Fold and edit this paragraph to reflect application security:

A. Safety management:

The administrator initializes UKey, writes UKey, and controls users' use of UKEY through Master PIN.

B. secure login:

SecureLogon, a component of the UKey authentication system, can conveniently realize the function of secure login and realize 1. Legal users must have UKey to log in. 2. Other users are not allowed to log in. 3. No user is allowed to shut down when locking. 4. Only the current user is allowed to log in. 5. Lock the computer when unplugging UKey. , all-round protection of computer login security, effectively prevent illegal login.

C. password administrator:

SecureEntry component of UKey authentication system can automatically remember and store passwords according to WEB pages and programs, such as OUTLOOK mail system, OA login page, Web-based mail login system and OICQ login number. , no manual input is required. Password input function adopts self-learning function. No matter which password dialog box pops up, password input can always fill in the user name and password for you automatically, without memory. The password is stored in UKey hardware, so there is no need to worry about the password and user name being stolen, which greatly protects the maximum rights and interests of legitimate users.

D. secure distribution and encryption of files:

SecureVia and SecureFile in UKey authentication system can ensure the security of file transmission, file storage and the indecipherability of encrypted files. The file security distribution function sets the file to be sent (the department and name of the receiver) through the legal holder of UKey. After the file sending function, UKey will automatically run UKey hardware to encrypt files with 1024 bits. If the recipient does not receive it legally by UKey, the file cannot be opened at all. The security of file storage and the indecipherability of encrypted files are encrypted by five internationally popular encryption algorithms built in UKey, and the encryption process is completely carried out on the hardware chip of UKey, which ensures the security of the encryption process and the security of encrypted files. If the encrypted file is not inserted into the authorized UKey login or not inserted into the UKey login, the encrypted file will be automatically hidden, which ensures the indecipherability of the encrypted file to the greatest extent.

E. mail encryption:

Known as "digital ID card", UKey has been a high-tech product carefully studied and recommended by all-electric companies. Among them, iSecurex CSP is an encryption service component for digital certificate management, which can support PKCS #1(password marking interface) and PKCS# 12 (personal information exchange standard), and can also work closely with Microsoft's encryption service provider CSP. Through the digital authentication of e-mail identity, the security performance of e-mail transmission can be guaranteed to the greatest extent.

Several characteristics of using UKey authentication system in OA system;

2. Security:

Secure login solution secure login solution

With the popularization of computers, the safety of computer use has brought more and more problems to people. With the overwhelming safety products, our choice becomes more and more important.

Computer users in the network era constantly demand PC security to make full use of the business opportunities brought by the Internet and e-commerce. If customers want to be confident in using new means such as e-commerce, an easy-to-manage and extremely secure PC will be the key, and secure login technology is the core technology of this easy-to-manage and secure PC.

Login is the main form of personal identity authentication in computer use, and it is the premise of all privacy protection and operation management. However, the dual authentication method of user name and password has proved to have many problems: remembering passwords, entering passwords and changing passwords are all considered annoying things, and easy sharing of passwords may make all security settings a mere formality.

Key problems to be solved in the existing login:

1. User name and password are too long and easy to forget. 2. It is easy to be stolen when stored on the computer. 3. It is easy to be stolen when entering the user name and password.

Security login solution of UKey authentication system;

UKey is a USB interface device that is directly connected to the computer through USB (Universal Serial Bus Interface) and has the function of password verification. UKey works with the power provided by USB port, and no extra power is needed. UKey's own memory can be used to store some personal information or certificates. UKey's internal encryption algorithm can provide a secure channel for data transmission. UKey is an authentication security protection product suitable for stand-alone or network applications.

Brief introduction of SecureLogon functional components:

SecureLogon, a component of UKey authentication system, provides local login and network login functions based on operating system. In design, it makes PC users and system administrators more convenient by providing a highly secure single sign-on. When you log in using UKey, you can log in by inserting UKey login, and you can strengthen security through various options. SecureLogon saves the trouble of repeatedly entering and remembering passwords. More importantly, it makes full use of the encryption characteristics of the hardware itself, strictly protects personal data, and avoids the disclosure of sensitive personal data, causing unnecessary losses. The Secure Login component includes four settings:

1. Secure login settings 2. User settings 3. Making emergency recovery disk 4. Administrator tool

UKey authentication system based on local login;

By setting the security login setting option of the security login component, you can easily realize various functions:

Login settings:

A key must be inserted when logging in: the local user needs to insert UKEY before logging in, and it is not allowed to turn off the machine security settings:

B. Random password generation (one change at a time): Every time you log in, the password will be automatically changed randomly, with high confidentiality, but it is easy to forget the password, so it is generally not recommended.

C. Monitor plugging and unplugging actions (unplugging and locking): log off after selection, log in with UKEY, unplug UKEY, lock and insert the computer, and the computer enters the system.

Network login of UKey authentication system;

Set options by setting the SecureLongon Component Manager tool:

The login of computers in the network is mostly based on domain mode. Administrator tool is a tool based on Windows2000 server version. It can make a batch of keys conveniently, and authorize the keys to log in Windows2000 domain, so as to conveniently realize remote login and domain login of computer terminals.

Several characteristics of secure login in UKey authentication system;

1. Open:

It is fully compatible with and supports existing popular operating systems, such as Windows 98/Windows 2000/WindWooXP/Notes, etc.

2. Security:

Traditional login mode of one screen user name+password, and only key login is allowed;

B. Choose to use the personal password PIN, and you need to enter the PIN at the same time in any verification occasion;

C. Choose to create a random internal password, one at a time;

D. Select to lock the PC when pulling out the key, so as to ensure that the user will not lose safety when he leaves the PC temporarily;

E Select only allow the current user to log in to prevent other users from trying to log in.

3. Ease of use:

After using the UKey authentication system, I used to think that all those tedious things became very simple, and all I had to do was insert UKey.

4. Advantages:

All reading, writing and summing are done inside the chip.

Erp&CRM solution

The rise and development of ERP&CRM (hereinafter referred to as ERP) is not only the need of enterprise expansion, but also the market for discerning software manufacturers to seize business opportunities. From a technical point of view, ERP is an application-oriented system based on database, which mainly adopts C/S and B/S modes for human-computer interaction, and various network connection forms provide users with convenient and effective application programs. Making full use of ERP ultimately means that you can visit business partners-customers, partners and suppliers. This means that advanced security functions, such as public key infrastructure (PKI) and digital certificates, need to be added to the Web interface of ERP. This scheme aims to solve the problem of safe transmission of internal and external information in ERP system.

Characteristics and security of ERP

Because ERP is a highly concentrated data set, enterprises must be cautious in the process of selecting and implementing ERP. The ability to prevent security vulnerabilities and ensure the normal operation of ERP systems has naturally become a very important criterion for enterprises to choose ERP systems. As a result, the operation efficiency becomes low, and there is a deviation of paying attention to the security of external information while ignoring the security of internal information transmission ... An excellent ERP system will not refer to PKI technology, and it can ensure security through digital certificates issued by authoritative CA institutions. UKEY advocates the security awareness of active defense from the inside out to cooperate with passive defense such as firewall.

UKey features and safety features

UKey is a small, reliable and high-speed storage device, which is directly connected to the computer through USB (Universal Serial Bus Interface) and has the function of password verification. UKey is exquisitely designed and easy to carry. UKey's own memory can be used to store some personal information or certificates. UKey's internal encryption algorithm can provide a secure channel for data transmission. UKey is a security product suitable for stand-alone or network applications.

Advantages: UKey's hardware is a chip-level operating system realized by CPU and EPROM. All reading, writing and encryption operations are completed inside the chip, which has high security.

Compared with ordinary disk media, it has a built-in chip-level operating system to prevent illegal copying and ensure the uniqueness of data. The data in UKey is only stored in UKey, which is beneficial to use in public places. Compared with floppy disk, the durability is greatly improved; Compared with IC card, it has irreplaceable advantages in e-commerce and various PC-based security applications because it does not need special card reading equipment.

Security: Compared with traditional password authentication, UKey provides a more secure and easy-to-use network user authentication mechanism. UKey uses shared secret to realize the authentication between network client and server, and can realize the authentication of user identity without exposing any key information. Moreover, the built-in user access control of UKey can further enhance the security of the verification process.

Implant UKey security function

ERP system is a systematic computing environment integrated by developers, and it is difficult to achieve the unification of all standards. How to enhance the function of ERP system and improve its application to increase the highlights of the system is a system integration problem that developers should consider.

Developers of ERP system need to use the secondary development interface provided to embed the corresponding security functions into all security links of ERP system.

ActiveX controls that use UKey for authentication are embedded in the login page. By obtaining the user's authentication mode (UKey) and correct authentication information (login information), it communicates with the system in secret, and then returns whether the user has passed the authentication.

Data operation link: user identity confirmation is required when performing key data operations. The security authentication can be strengthened in the function trigger link of the program, and the compulsory UKey authentication code can be embedded. Without UKey, this key function cannot be used because it cannot be verified.

Account management: In account management, you can add user login attributes, whether to use UKey to log in forcibly, to control the use of key accounts, and use the uniqueness of UKey account information to prevent the possibility of fraudulent use of key accounts.

System authentication: You can use the server component of compulsory UKey authentication to transplant UKey's compulsory authentication to the server, so as to ensure that only UKey users of this system can log in to the system and use system resources.

An ERP system using common standards and common system modules can reduce a lot of extra work. Some systems use digital certificates for authentication. In order to ensure data security during data transmission, common standards such as CSP, PKCS# 1 1 are adopted. UKey fully supports these common standards and has independent intellectual property rights.

application area

1. Enterprises adopting ERP system.

2. System integrators who need to increase ERP system functions to enhance their competitiveness.