什么是 etoken?

发布于 2024-12-04 06:41:41 字数 291 浏览 4 评论 0原文

我需要编写一个代码来检查 etoken 中存在的数字证书的有效性。 我对 etoken 不熟悉。谁能回答我以下问题,

  1. 如何从etoken访问数字证书内容?
  2. 我们可以访问存储在 etoken 中的私钥吗?
  3. 当我们将etoken插入计算机时,它是否会复制计算机上的数字证书?如果是,那么它在哪里复制它?

我需要为此编写 C++ 程序。我们可以使用 Microsoft 提供的加密 API(如 CrypImportKey() CryptExportKey() )来满足上述要求吗?

I need to write a code to check the validity of the digital certificate present in an etoken.
I am not familiar with etokens. Can anyone please answer my following questions,

  1. How to access the digital certificate content from etoken?
  2. Can we access the private key stored in etoken?
  3. When we plug the etoken to an computer then does it copy the digital certificate on the computer or not? If yes then where does it copy it?

I need to write C++ program for the same. Can we use Cryptographic API's (like CrypImportKey() CryptExportKey() ) provided by Microsoft for the above requirement?

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(2

江湖正好 2024-12-11 06:41:41

“etoken”是 Aladdin 生产的首批 USB 加密令牌之一的名称。您所要求的通常称为安全令牌。这是一个具有自己的内存的硬件设备,其中存储了证书和私钥。

令牌需要安装驱动程序才能正常工作。该驱动程序集包括 CryptoAPI 的 CSP(加密服务提供程序)的实现。 CSP 负责向 CryptoAPI 提供存储在令牌中的证书。回答您的问题:

  1. 通过 CryptoAPI 或 PKCS#11 接口(两者的驱动程序均由供应商提供)。
  2. 您可以通过调用相应的 API 使用私钥执行某些操作。但密钥本身是不可提取的。
  3. 我不能肯定地说,但对我来说,证书似乎被复制到内存中的证书存储中以提高操作速度。

"etoken" was the name of one of first USB cryptotokens produced by Aladdin. What you are asking for is usually referred to as security token. This is a hardware device with it's own memory, in which certificates and private keys are stored.

Tokens need drivers to be installed in order to work properly. The driver set includes implementation of CSP (Cryptographic Service Provider) for CryptoAPI. CSP does the job of presenting certificates, stored in the token, to CryptoAPI. To answer your questions:

  1. Via CryptoAPI or PKCS#11 interface (drivers for both are supplied by the vendor).
  2. You can perform certain operations with the private key by calling the appropriate API. But the key itself is not extractable.
  3. I can't say for sure but for me it looks like certificates are copied to in-memory certificate store for speed of operations.
旧情勿念 2024-12-11 06:41:41

关于你的第二个问题,我相信可以访问安全令牌上的私钥。安全令牌必须预先编程并以某种方式加载私钥。此外,上次更新证书时,我们使用发行者的 Web 界面在线进行更新,该界面安装了 ActiveX 模块,该模块将新证书上传到设备。我不知道此过程是否还上传了新密钥,但可能不会,因为我不认为您需要更改私钥来为自己创建新的公共证书(需要由颁发者签名才能信任)我相信)。

抱歉,我可能没有多大意义,因为我对公钥基础设施的整个概念还很陌生。

如果其他人可以验证/无效我的主张,请分享您的知识。

编辑:我发现了Alladin设备的硬件黑客:http://seclists.org/bugtraq/2000/May/48
基本上,可以读取 eToken 上的日期,但需要与设备板载内存有直接的硬件接口。

In relation to your second question, I believe it is possible to access the private key on the security token. The security token had to be pre-programmed and loaded with a private key somehow. Also, the last time we renewed our certificate, we did it online, using the issuer's web interface which installed an ActiveX module that uploaded the new certificate to the device. I don't know if this procedure also uploaded a new key but possibly not, since I don't believe you need to change your private key to create a new public certificate for yourself (which needs to be signed by the issuer to be trusted I believe).

Sorry I might not make much sense as I am new to the whole idea of Public Key Infrastructure.

If someone else could validate/invalidate my claims, please share your knowledge.

EDIT: I found this hardware hack for Alladin devices: http://seclists.org/bugtraq/2000/May/48
Basically, it is possible to read the date on the eToken but it requires a direct hardware interface to the device's on-board memory.

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文