凯发k8国际

Hello, welcome to the official site of Shandong Fisherman Information Technology Co., Ltd.

WeChat
Toll free:
400-6686-188

Storage type USB key

1.Introduction The Fisherman storage type USB key series are new generation of non-driver multi-function commercial cryptographic secure terminal product based on on-chip system with independent intellectual property rights of Shandong Fis
Toll free:400-6686-188
产品详情

 

1.Introduction

The Fisherman storage type USB key series are new generation of non-driver multi-function commercial cryptographic secure terminal product based on on-chip system with independent intellectual property rights of Shandong Fisherman Information Technology Co., Ltd. It innovatively achieves a high degree of integration of USBKEY and secure U disk.

The product adopts the domestic 32-bit security chip approved by the State Cryptography Administration as the core control unit. It not only has the functions of intelligent USB key like authentication and data encryption, but also integrates large-capacity secure data storage space and has high-security storage function.

The products meet the requirements of the information system of Level 3 and above in the Basic Requirements for Information System Security Level Protection. They can be widely used in county and township official document transmission, commerce, taxation, finance, customs, social security, large enterprises, research institutes and other institutions with high security requirements.

2.Function

Disk partition: The storage space is divided in to two parts: tool space and the encrypted space. The tool space stores the management software and documents, and the encrypted space stores the user’s ciphertext data.

hidden the encrypted space securely: the user can access the encryption space only after the identity authentication, so the data in the encrypted space is prevented from being leaked.

Encrypted storage: By using the SM1 algorithm approved by the State Cryptography Administration, all the data in the disk could be encrypted. Even if the malicious user physically interprets the memory chip, it can only obtain the ciphertext and cannot obtain the plaintext.

Storage capacity: support 2G/4G/8G/16G, capacity can be customized

Access control: tool space can be directly accessed, and the encryption space can only be accessed with password authorization.

Anti-brute force cracking: Our product allows the user to set the maximum number of retries for the password. When the continuous attempt exceeds the upper limit of the set value, the security U disk will automatically lock to prevent brute force cracking.

Hierarchical privilege management: Users are divided into two groups: administrators and operators, to achieve hierarchical privilege management.

Log management: Record and audit the operation of the U disk.

Key generation: Supports generating national SM2 key pairs, RSA key pairs, and symmetric keys.

Key storage: The product could store up to 32 pairs of SM2 key pairs and up to 32 pairs of RSA key pairs.

Key destruction: Supports destroying the SM2 key pairs and the RSA key pairs. Keys cannot be recovered by any techniques after the destruction.

Key Update: Our product support symmetric and asymmetric key updates.

True Random Number Generation: Our product can generate true random numbers by using physical noise generator approved by State Cryptography Administration to protect the secret key.

Asymmetric encryption and decryption: Our product support native SM2 elliptic curve cryptography algorithm encryption and decryption, the key length is 256 bits, and RSA encryption/decryption is also supported.

Symmetric encryption and decryption: Our product supports symmetric encryption by using native cipher algorithms like SM1, SM6, and international standard cipher algorithms like DES, 3DES, AES.

Integrity checking: Our product can check the integrity of data by using the native SM3 hash algorithm and SHA1 algorithm.

Signature/Signature Verification: Our product can support using SM2 and RSA algorithm to sign and verify the digital signature.

Identification: Our product can use the public key of the asymmetric algorithm to verify the user’s identity.

3.Superiority

By using the cryptographic algorithm chip approved by the State Cryptography Administration, our product supports SM1, SM2, SM3 national standard cryptographic algorithm, and can make full disk encryption for the data in the storage area.

Adopts on-chip operating system with independent intellectual property certified by the State Cryptography Administration.

Provides Fisherman’s unified application programming interface FM_API, supports PKCS#11, CSP and other standard security middleware interfaces, supports custom interface development.

Supports multi-thread and multi-Process call, supports USB 2.0 high speed and full speed working mode.

support Windows 2003/XP/2008/vista/7 and other operating systems, support plug and play function;

support customization

provide four major functional space;

 


Relevant product recommendation
Contact Us

Toll free:400-6686-188

Marketing department:
Mr.Sun 86-13806311977
Mr.Yan 86-18663192218

Marketing Center:
Mr.Sun 86-13806311977
Mr.Ma 86-18668972622

Company address:Block F, Qilu Software Park, High-tech Zone, Jinan City, Shandong Province