Telecommunication Laboratories Chunghwa Telecom TLHSM1200 Hardware Secure Module User Manual HiPKI SafGuard1200 user guide

Telecommunication Laboratories , Chunghwa Telecom Co., Ltd Hardware Secure Module HiPKI SafGuard1200 user guide

User Manual

Download: Telecommunication Laboratories Chunghwa Telecom TLHSM1200 Hardware Secure Module User Manual HiPKI SafGuard1200 user guide
Mirror Download [FCC.gov]Telecommunication Laboratories Chunghwa Telecom TLHSM1200 Hardware Secure Module User Manual HiPKI SafGuard1200 user guide
Document ID1672685
Application IDk+7e3ZwaapqRtkdaoGea9Q==
Document DescriptionUser Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize82.85kB (1035683 bits)
Date Submitted2012-04-10 00:00:00
Date Available2012-04-10 00:00:00
Creation Date2012-04-03 10:20:52
Producing SoftwareAcrobat Distiller 8.1.0 (Windows)
Document Lastmod2012-04-06 14:28:26
Document TitleMicrosoft Word - HiPKI SafGuard1200 user guide
Document CreatorPScript5.dll Version 5.2.2
Document Author: Sophie

Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
HiPKI SafGuard 1200 Hardware
Security Module User Guide
Ver 1.0
Chunghwa Telecom Research Institute
Chunghwa Telecom Co., Ltd.
March, 2012
Chunghwa Telecom Co., Ltd.
Proprietary
Federal Communication Commission Interference Statement
This device complies with Part 15 of the FCC Rules. Operation is subject to
the following two conditions: (1) This device may not cause harmful
interference, and (2) this device must accept any interference received,
including interference that may cause undesired operation.
This equipment has been tested and found to comply with the limits for a
Class B digital device, pursuant to Part 15 of the FCC Rules. These limits
are designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates, uses and can radiate radio
frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications.
However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one of the
following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that
to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the
party responsible for compliance could void the user's authority to operate this
equipment.
This transmitter must not be co-located or operating in conjunction with any
other antenna or transmitter.
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Table of Contents
1.
INTRODUCTION............................................................................................... 3
2. INSTRUCTIONS FOR HIPKI SAFGUARD 1200 HARDWARE SECURE
MODULE..................................................................................................................... 3
2.1. INITIALIZATION PROCESS ............................................................................... 3
2.1.1
Before left the Factory (before HiPKI SafGuard 1200 handed to
customers) ............................................................................................................. 3
2.1.2
After Left the Factory (Customers obtain HiPKI SafGuard 1200) ....... 4
2.2. KEY USAGE.................................................................................................... 5
2.3. ENVIRONMENTS FOR SMARTCARDS CONTROL ............................................... 6
3.
INSTRUCTIONS FOR KEY MANAGEMENT PROGRAM ........................ 6
3.1. SERVICE TYPES .............................................................................................. 6
3.1.1
Security Officer Services ....................................................................... 6
3.1.2
User Services ........................................................................................ 7
3.1.3
Unauthenticated Services: .................................................................... 7
4.
SETTING UP THE HIPKI SAFGUARD 1200 ................................................ 8
4.1. INITIALIZATION OF HIPKI SAFGUARD 1200 .................................................. 8
4.1.1.
Setting the identification name of HiPKI SafGuard 1200..................... 8
4.1.2.
Setting up the Real Time Clock of HiPKI SafGuard 1200 .................... 9
4.1.3.
Instialitation of Master Key ................................................................ 10
4.1.4.
Installing Security Officer Key............................................................ 12
4.1.5.
Produce the Key-Pair of HiPKI SafGuard 1200................................. 13
4.1.6.
Complete HiPKI SafGuard 1200 initialization ................................... 14
4.2. KEY MANAGEMENT FUNCTIONS................................................................... 15
4.2.1.
Security Officer Logon ........................................................................ 15
4.2.2.
Produce User Key ............................................................................... 18
4.2.3.
Setting up user group .......................................................................... 20
4.2.4
Produce AP Key .................................................................................. 21
4.2.5
Key Recovery and Key Backup ........................................................... 24
4.2.6
Key Destroy ......................................................................................... 26
4.2.7
Enable or Disable Key(WINDOWS) ................................................... 28
5.
HIPKI SAFGUARD 1200 INSTALLATION ................................................. 32
5.1
INSTALLATION OF WINDOWS DRIVER........................................................... 32
5.1.1
Installation .......................................................................................... 32
5.2
ACTIVE_AP_KEY_FILE DIRECTORY............................................................. 33
5.3
THE DIRECTORY PUBKEY_FILE ................................................................... 33
Chunghwa Telecom Co., Ltd.
Proprietary
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
1. Introduction
HiPKI SafGuard 1200 Hardware Security Module and Key management
program transmit data each other via USB. In this way, we are able to transfer
and receive information more efficiently.
There are 3 entities in HiPKI SafGuard 1200 environment; (1) HiPKI
SafGuard 1200 hardware security Module; (2) a CA server which requests
HiPKI SafGuard 1200 for cryptographic operations; (3) Smartcards;
For security consideration, the Initialization process for HiPKI SafGuard
1200 has to meet the following purposes;
1.
There must be a unique relationship between HiPKI SafGuard 1200
and CA server. HiPKI SafGuard 1200 can only provide services to
the CA servers which have participated in the initialization process.
This CA server can only request HiPKI SafGuard 1200 which has
participated in this initialization process to provide cryptographic
operation services。
2.
HiPKI SafGuard 1200 provides the cryptographic service which
depends on the identity of the smartcard; certain identity can only
request certain services from HiPKI SafGuard 1200; this is decided
while an smartcard is generated, HiPKI SafGuard 1200 will store the
services which could be requested by this identity into the hardware.
3.
This CA server requests that HiPKI SafGuard 1200 to insert an
Smartcard while providing some cryptographic services; in such a
way, this HiPKI SafGuard 1200 can ensure that the identity of this
Smartcard having the authorization to execute this cryptographic
service.
2. Instructions for HiPKI SafGuard 1200
Hardware Secure Module
In order to reach the above goals, we set the following HiPKI SafGuard
1200 Initialization process.
2.1. Initialization Process
2.1.1
Before left the Factory (before HiPKI SafGuard
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
1200 handed to customers)
While Customers obtain HiPKI SafGuard 1200, they will obtain several
empty Smartcards and the files used for installing a CA server; at this moment
HiPKI SafGuard 1200 firmware already exists without key stored in it.
2.1.2
After Left the Factory (Customers obtain HiPKI
SafGuard 1200)
When HiPKI SafGuard 1200 is handed to a customer, all services related to
cryptographic modules are disable. HiPKI SafGuard 1200 state is at Initialization
state; customers can return it to the original factory, if it is not at the Initialization
state.
Before initializing any service, customers have to execute initialization
process (Key Management Program). After HiPKI SafGuard 1200 left the
factory, Initialization process can be divided into the following two stages,
customers have to execute these stages by order.
2.1.2.1. Generating Smartcards for different identities
The process is as follows: generating MK (Master Key) and storing it to the
Smartcard marked as “MASTER 1” and “MASTER 2” . The results that HiPKI
SafGuard 1200 generates MK are stored in HiPKI SafGuard 1200 itself and also
Smartcards. Once generating MK, HiPKI SafGuard 1200 will store MK forever,
until SO needs to restore a new MK or this HiPKI SafGuard 1200 is damaged.. If
MK is changed, then all keys related to cryptographic modules have to be
regenerated again by using this new MK.
There are 3 Security Officer Key Pair being generated, HiPKI SafGuard
1200 encrypts Private Key using MK, then stored it to the Smartcard marked as
Security Officer. On the other hand, HiPKI SafGuard 1200 will store its Public
Key in its interior.
While generating HK, Key Pair (RSA key pair with 1024-bit key length) will
be stored in HiPKI SafGuard 1200, and the Public Key is transferred back for key
management program to use.
After completion of the above activities, HiPKI SafGuard 1200 system state
will be configured as Authentication State. Rebooting HiPKI SafGuard 1200 is
necessary for entering the Authentication State for normal operations.
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
2.1.2.2. Generating Application Key
Generating an Application Key (APK) and stored it in HSM and
Smartcards used by differently authorized personnel.
System administrators (Secuity Officer) can generate User key pair by
their needs and store them to the Smartcard marked as “user” (or “operator”).
System administrators then use HiPKI SafGuard 1200 to generate APKs
for different authorized users. The generated APK is a Public-key/Private-key
key pair, 3DES or AES, which is stored in the HiPKI SafGuard 1200 and held
by different Smartcards. Then they configure the ACL of APK. System
administrators may configure system state of HiPKI SafGuard 1200 as
Initialization State; however, this activity will erase any key stored in HiPKI
SafGuard 1200.
Every Application Key has its corresponding ACL and Status. While
generating APK, Status is “0x00”; once ACL is set, Status is enabled.
2.2. Key Usage
The keys generated above and their usages are as figure 2-1.
Type of
Key
Security
Officer
Key
MK
User Key
AP Key
Role of Key Methods of
holder
storing to
Smartcard
Security
CA pvk
Officer,
plaintext
System
(signature
Officer
only)
Security
Plaintext, split
Officer,
by 2
System
Administrator
User1,
CA pvk
System
Plaintext
Operators
(signature
only)
User2, Key
Holders
Number of Methods of
Smartcards Storing to
HSM
RSA public
key
Key Splits
RSA public
key
Plaintext
Table 2-1: Key Usage
According to the above analysis, one HiPKI SafGuard 1200 needs at most
twelve Smartcard holders, at least four holders, three combinations are as
follows.
(1) 12 persons
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
(2) 9 person (if Security officer and User1 are in the same group)
(3) 3 persons (if Security officer and User1, User2 are in the same
group)
Two types of Smartcards are as follows.
(1) First type is for Security officer and User1.
(2) Second type is for User2. Because HiPKI SafGuard 1200 may store
more than one key, this type of Smartcard is for saving more memory,
and satisfies the separation principle of operation Smartcards and
backup Smartcards.
2.3. Environments for Smartcards Control
CA is under a 12-person control, and RA is suitable for a 9-person or
3-person control. Standard ID-based control is feasible.
3. Instructions for Key Management Program
This chapter is for more details about the Authentication State for the
hardware HiPKI SafGuard 1200.
3.1. Service Types
When the system is at the Authentication State, there are three types of
Authentication Services, namely, Security Officer Service, User Service and
Normal Service.
3.1.1
Security Officer Services
When executing the Security Officer Service, security officers need to do
Security Officer Logon (SOLogon). Two Smartcards, called SO Smartcards, are
also needed in this activity. This will generate a SessionKey, using this
SessionKey for MAC to ensure that one can execute this service. There is only
one SessionKey for Security Officer at a time.
Change smart card PIN
Export Master Key to smart cards
Generate Module RSA Key
Create User smart card
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Generate Application Keys (AP Key)
Set AP Key ACL
Backup AP Keys to smart cards
Erase AP Key
Erase All AP key
Erase Back up Smart Card
Import AP Keys
Create Security Officers (COs)
Set Real Time Clock
Send self-test command to module
Switch to Initialization state (zeroization of module)
Write Application data
3.1.2
User Services
When executing the User Service, a User needs to do User Logon
(UserLogon). User Logon is mainly for AP Keys; the key management program
needs to transfer APK-keyType and APK-keyID to HiPKI SafGuard 1200. There
are at least n different User Smartcards according to the Limit_auth_num “n” in
ACL of AP Key. HiPKI SafGuard 1200 will also compare User ID in the
Smartcard and that in the ACL.
Every UserLogon generates a SessionKey for MAC to ensure whether this
service is executable. Every AP Key has only one SessionKey at a time.
Change smart card PIN
Use symmetric AP Keys for encryption and decryption
Use asymmetric AP keys for generating and verifying signatures
3.1.3
Unauthenticated Services:
Unauthenticated Services :
•
•
•
•
•
•
•
•
•
View Status
View Serial No. and Version of Firmware
View AP RSA public key
View AP key status
Do Hash function
Generate random number
Get Application data
Verify signature
Send self-test command to module
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
4. Setting Up the HiPKI SafGuard 1200
Fig. 4 -1 HiPKI SafGuard 1200 setting up screen
4.1. Initialization of HiPKI SafGuard 1200
Selecting “Start” buttons to initialize the HiPKI SafGuard 1200
4.1.1.
Setting the identification name of HiPKI
SafGuard 1200
Give an identification name for the HiPKI safGuard 1200.
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-2 Setting the identification name
4.1.2.
Setting up the Real Time Clock of HiPKI
SafGuard 1200
The program will show the time of HiPKI SafGuard 1200 “Real Time Clock” on
screen , Setting up the HiPKI SafGuard 1200 “Real Time Clock”.
Fig. 4-3 Setting upHiPKI SafGuard 1200 Real Time Clock
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
4.1.3.
Instialitation of Master Key
4.1.4.1. Produce Master Key
Two Backup Master IC card are required to produce Master Key.
Fig. 4-4 Generate Master Key
Push the “Start” botton , start
Fig. 4-5 Insert the first Master Key IC card
10
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-6 Insert the second Master Key IC card
4.1.4.2. Impose Master Key
Two Backup Master IC card are required to impose the Master Key。
Fig. 4-7 Import Master Key
11
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-8 Insert the first Master Key IC card
Fig. 4-9 Insert the second Master Key IC card
4.1.4.
Installing Security Officer Key
4.1.5.1. Produce Security Officer Key
Three Security Offices are required to produce Security Officer Keys.
12
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
4.1.5.2. Impose Security Officer Key
If selecting impose Security Officer Keys,the key-pair of SO IC card
needed to be encoded by the HiPKI SafGuard 1200 MK such that the
SOLogon can be used.
Fig. 4-10 Produce、Impose Security Officer Key
4.1.5.
Produce the Key-Pair of HiPKI SafGuard 1200
The Key-Pair of HiPKI SafGuard 1200 are required for the usage of
UserLogon and SOLogon.
13
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-11 Produce HiPKI SafGuard 1200 Key-Pair
4.1.6.
Complete HiPKI SafGuard 1200 initialization
(1) If previous steps all complete without any error, the initialization can
be completed
Fig. 4-12 Initialization complete
14
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
If there is any error or the button “Cancle” was pressed, the initialization will be
stop. If you want to initialiaze HiPKI SafGuard 1200 again, you need to go
step 1 .
4.2. Key Management functions
Two Security Officers are required to generate key pairs.
Selecting Security Officr command on the key management screen.
Fig. 4-13 selecting Security Officer Button
4.2.1.
Security Officer Logon
(1) To Logon Security Officer, Security Office will be required to
insert his/her IC card。
15
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
16
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig.4-14 Message of Security Officer Logon
(2) After SO Logon successfully, the window of selecting will show
up as following
17
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-15. The window of Security Officer function
4.2.2.
Produce User Key
Ther are two ways to produce User Key』
:
4.2.2.1. Produce User Key
【Produce】
,a user(system operator) is required to generate a new
key-pair.
18
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-16 the window of generate User Key
4.2.2.2. Impose User Key
【Impose】 User Key, make sure that the key of IC card is encoded
by the MK of HiPKI SafGuard 1200.
19
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-17 the window of import User Key
4.2.3.
Setting up user group
After the User Key has been generated, please select 『set up Group』
on 【Security Officer function table】。 This function can classify Security
Officer and User which can be used by Application Key(APK).
20
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-18 Setting User-Group
Fig. 4-19 Add User-Group
4.2.4
Produce AP Key
From Security Officer function window, click【Produce AP Key】 and
go to the window of producing AP Key.
21
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-20 the window of producing AP Key
4.2.4.1. Generating Keys
Click 『Generating key』 on 【producing AP Key】window。
22
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-21 the complete of producing AP Key
Then you will be asked to set up the ACL(Access Control Limit) of the
Application Key.
4.2.4.2. Setting up the ACL of Key
Fig. 4-22 Set the ACL of AP Key
23
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
4.2.5 Key Recovery and Key Backup
Fig. 4-23 the screen of AP Key Backup and Recovery
4.2.5.1. Key BackUp
Click on『BackUp』 of 【producing AP Key screen】. Make sure the APK
has been generated and HiPKI SafGuard 1200 already has the key-pair of AP
Key.
24
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-24 the screen of setting up the AP Keybackup information
4.2.5.2. Key Recovery
Click 『import』on 【Producing AP Key screen】
User need to have the backup data in order to excute thekey recovery
operation.The screen of setting up the AP Key
Fig. 4-25
the operation window of Import AP Key
25
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
After Key Recovery, you will be asked to set up the ACL of AP Key.
Please reference 〈Figure 4-22 Setting up the ACL of AP Key〉
。
4.2.6 Key Destroy
4.2.6.1. HiPKI SafGuard 1200 Key Destroy
Selecting 『Delete』or『Delete All』 on the 【AP Keywindow】.
Fig .4-26 The screen of SafGuard Destroy
(1) 『Delete』the selected AP Key .
(2) or『Delete All』to delete all AP Key。
26
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-27 key destroy
4.2.6.2. IC Card Backup Key Destroy
Selecting 【Delete the context of Backup ICcard】 on the Security Officer
selecting window.
Delete the key on Backup IC Card.
27
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-28 Delete the context of Backup IC Card
4.2.7 Enable or Disable Key(WINDOWS)
Click 『User commands』on the HiPKI SafGuard 1200 setting up
screen
28
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-29 Selecting the button of User commands
4.2.7.1. Enable Key
(1) Selecting the AP Key that you want to be enabledon on the List, than press
【Enable】
。
29
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Fig. 4-30 The screen of key enable(User Logon)
(2) You will be asked to insert at least one User IC Card, according to
Limist_auth_num of the ACL of eack AP Key(Reference Figure 4-20 Setting
up the ACL of AP Key)。
Fig. 4-30 Enable AP Key。The message of inserting User IC Card
(3) After enable the key, set up the information about the AP Key
Fig. 4-31 Enable AP Key complete
30
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
4.2.7.2. Disable a using Key
Selecting the AP key you want to be disabled on the List, then
press【Deactivate】
。
Fig. 4-32 Deactivate an APKey(User Logout)
4.2.7.3. Produce PKCS10 Request File
Selecting the AP Key from the List to produce its PKCS10 request
file, then press【produce PKCS10 request file】
。
31
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
Figure 4-33 Produce PKCS10 Request File
5. HiPKI SafGuard 1200 Installation
5.1 Installation of Windows Driver
5.1.1
Installation
First, install HiPKI SafGuard 1200 driver and key management tool to Win2000:
The program for HiPKI SafGuard 1200 driver
Hsm_Server.exe: Win2000 Service program, HiPKI SafGuard 1200 driver
The program for Key management:
KeyManage.exe: Key Management Tool
Findptrs.avi: pictures for key management program
BfiveUcs.dll 與 Mfc42.dll: Programs used for dynamic linking
Execute the Hsm_Server.exe in the installation directory
32
-TL Proprietary-
Chunghwa Telecom Co., Ltd.
HiPKI SafGuard 1200 HSM
User Guide
5.2 Active_Ap_Key_file Directory
The Active_Ap_Key_file directory is used to store parameters for enabling
key, the file name is assigned as the following
AP_UseKey_ (the type of the Key: RSA_1024o r RSA_4096 )_(store in
HiPKI SafGuard 1200).ini。Therefore, if AP_KEY is RSA4096, and it is stored at
location 1 of HiPKI SafGuard 1200, then its parameter file name is
AP_UseKey_RSA_4096_1.ini. Besides ,this file will be fail whenever the
hardware is reset. So you need to check the parameter file and make sure it is the
latest version. ( Please copy the parameter file to your AP directory.
Note : this directory can be created only after the key management tool has
beenexecuted. About how to enable the keys, please reference to manual
4.2key management tool
5.3 The Directory PubKey_file
PubKey_file:
the directory for storing public key
Pubkey_file\*.inf
sub publickey info
Pubkey_file\*_CertReq.PKCS10
PKCS10 Certification Request
Pubkey_file\*_CertReqSign.b64
B64 encoded PKCS10 Certification
Request file (with digital signature)
Pubkey_file\*_CertReqSign.PKCS10
PKCS10 Certification Request with
digital signature
Pubkey_file\*_dn.hex
The necessary DN hex values to
enable CA
Table 5-1 Filesabout public keys
Note * represents the name of AP_KEY
Note : This directory can be created only when KeyManagerTool has been
executed. About the way to generation please reference to manual 4.2Key
management function。
33
-TL Proprietary-

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Extract
XMP Toolkit                     : 3.1-701
Format                          : application/pdf
Title                           : Microsoft Word - HiPKI SafGuard1200 user guide
Creator                         : Sophie
Create Date                     : 2012:04:03 10:20:52+08:00
Creator Tool                    : PScript5.dll Version 5.2.2
Modify Date                     : 2012:04:06 14:28:26+08:00
Metadata Date                   : 2012:04:06 14:28:26+08:00
Producer                        : Acrobat Distiller 8.1.0 (Windows)
Document ID                     : uuid:53cc09fe-ce69-424c-b346-91a197691613
Instance ID                     : uuid:ade69603-a390-4d1d-b1c5-81b2bd10ffc3
Page Count                      : 34
Author                          : Sophie
EXIF Metadata provided by EXIF.tools
FCC ID Filing: RPXTLHSM1200

Navigation menu