Public Key Infrastructure
FEITIAN Public Key Infrastructure
FEITIAN PKI devices are based on a high performance 32bits smart card chip, which supports many high strengths on board algorithms such as AES and 2048-bit RSA. With a mass user space of 64KB, these devices can carry multiple digital certificates to be used in separate applications.
Key Verification Method: Key Authenitcation
Application: Logical Access Control
Interface Type: USB-A
More Details About Product
Secure Digital Identity: FEITIAN PKI (Public Key Infrastructure) solutions can be used to establish and manage digital identities for individuals and organizations. This enables secure authentication, digital signatures, and encryption, ensuring the integrity and confidentiality of digital communications and transactions.
Secure Email Communication: FEITIAN PKI solutions can be used to secure email communication by enabling digital signatures and encryption. Users can digitally sign their emails to prove the authenticity of the sender and ensure the integrity of the content. Encryption ensures that email messages are protected from unauthorized access, providing confidentiality for sensitive information.
Document and File Protection: FEITIAN PKI solutions can be applied to protect sensitive documents and files. Digital signatures can be used to verify the authenticity and integrity of documents, ensuring they have not been tampered with. Encryption can be used to protect the confidentiality of documents, making them accessible only to authorized recipients.
Secure Remote Access: FEITIAN PKI solutions can enable secure remote access to networks and systems. With PKI-based authentication, users can securely access corporate networks, VPNs, and other remote resources, ensuring only authorized individuals can connect and access sensitive information.
Digital Certificates for Web Servers: FEITIAN PKI solutions can provide digital certificates for web servers, enabling secure HTTPS communication. These certificates ensure that websites are authenticated, and the communication between the web server and the client is encrypted, protecting user data and preventing unauthorized access.
Two-Factor Authentication: FEITIAN PKI solutions can enhance security through two-factor authentication. By combining something the user knows (e.g., a password) with something the user possesses (e.g., a smart card or token), strong authentication can be achieved, reducing the risk of unauthorized access to systems and applications.
Secure Code Signing: FEITIAN PKI solutions can be used for secure code signing, ensuring the authenticity and integrity of software and applications. Digital signatures applied to code or software verify the identity of the publisher and protect against tampering, providing assurance to users that the code is trustworthy.
Secure IoT Device Authentication: FEITIAN PKI solutions can be utilized to secure authentication and communication between IoT (Internet of Things) devices. PKI-based certificates can be issued to IoT devices, enabling secure and trusted interactions, preventing unauthorized access or data manipulation in IoT ecosystems.
Product Features:
FEITIAN Public Key Infrastructure Downloads
Product reviews
Other Suggested products
No products available.
Questions? Contact Sales
"*" indicates required fields
Reviews