F
Francesco
if you send me the DLL and a token, I would be happy to experiment for
you.
Eh eh
For the dll no problem, but for the token I can't do this... I've got
it only one...
if you send me the DLL and a token, I would be happy to experiment for
you.
Roedy,
this seems a "typical" authentication problem, and adding decrypting of
content in a symmetric key way (lordy, I hope I'm not messing up in the
terms here, it's been a while I have actually had to man-handle the iKey
and deal with pki )
There is sample code from SafeNet, however, probably not in Java, but C,
VisualBasic and perhaps Delphi. I will ask to see if my boss has
anything he can provide to you by email.
Roedy,
this seems a "typical" authentication problem, and adding decrypting of
content in a symmetric key way (lordy, I hope I'm not messing up in the
terms here, it's been a while I have actually had to man-handle the iKey
and deal with pki )
There is sample code from SafeNet, however, probably not in Java, but C,
VisualBasic and perhaps Delphi. I will ask to see if my boss has
anything he can provide to you by email.
You can of course keep
data encrypted at all times before delivering it to anyone.
You can of course keep
data encrypted at all times before delivering it to anyone.
I would think the server has to control this, in the form of users,
roles and groups. It is not necessary to do that through encryption,
although it seems your customers trusts that more (and they do not trust
their admins).
Still, someone is going to have to have full access.
I would think the server has to control this, in the form of users,
roles and groups. It is not necessary to do that through encryption,
although it seems your customers trusts that more (and they do not trust
their admins).
Still, someone is going to have to have full access.
Not sure what you mean by "set". The set of algorythms?
IIRC, the iKey authentication works through challenges. The private key
will never leave the token. Those computations happen inside the token.
Not sure what you mean by "set". The set of algorythms?
IIRC, the iKey authentication works through challenges. The private key
will never leave the token. Those computations happen inside the token.
The SDK is also the necessary starting place if you want to use their
tokens at all - since you can't get the APIs any other way. So it can be
a good investment. Start with the iKey 2032, it's cheaper than the 4000.
The SDK is also the necessary starting place if you want to use their
tokens at all - since you can't get the APIs any other way. So it can be
a good investment. Start with the iKey 2032, it's cheaper than the 4000.
I hope this helps. Guess it's back to the seller of your area.
I hope this helps. Guess it's back to the seller of your area.
Have you looked at JavaCard?
Other than that, without you posting working code
<http://mindprod.com/jgloss/sscce.html>
and extensive log/error reporting,
we can't guess what you're doing wrong.
Oh? I found 4 distributors for Canada through here
Want to reply to this thread or ask your own question?
You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.