IEEE 1667-2006
$80.71
IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices
Published By | Publication Date | Number of Pages |
IEEE | 2006 |
New IEEE Standard – Superseded. This project defines a standard protocol for secure authentication and creation of trust between a secure host and a directly attached Transient Storage Device (TSD), such as a USB flash drive, portable hard drive, or cellular phone. The protocol has only an indirect relationship with data integrity/security, and does not directly address issues of authorization and enforcement. The protocol also does not address devices that are attached using a network connection. However, a device that uses a point-to-point wireless connection such as WUSB may comply with this protocol.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices |
3 | Title page |
6 | Introduction Notice to users |
7 | Participants |
9 | CONTENTS |
11 | 1. Overview 1.1 Scope 1.2 Purpose |
12 | 2. Normative references 3. Definitions and acronyms 3.1 Definitions |
13 | 3.2 Acronyms 3.3 Certificate names |
14 | 4. Authentication layer 4.1 Stack 5. Host requirements |
15 | 5.1 PKI algorithm 5.2 Random number generator 5.3 Certificate store 5.4 XCh Host Certificate 6. Channel 7. TSD requirements 8. ACT requirements 8.1 Probe silo requirements |
16 | 8.2 Authentication silo requirements 8.3 Certificate store 8.4 Globally Unique Identifier 8.5 Authentication Silo Key Pair 8.6 Authentication Silo Certificates |
17 | 8.7 PKI algorithm 8.8 Random number generator 8.9 Silo Type Identifier (STID) 9. Certificate Store 9.1 Required features 9.2 Authentication Silo Certificate Store |
19 | 9.3 Host Certificate Store 9.4 User Certificate Storage 10. Authentication Silo state machine |
20 | 10.1 Initialized |
21 | 10.2 Not Provisioned |
22 | 10.3 Not Authenticated 10.4 Authenticated |
23 | 10.5 Non-IEEE 1667 host support 11. Probe Silo actions 11.1 Process of probing |
24 | 11.2 Probe command 12. Authentication Silo actions 12.1 Initialize (reset to manufacturing state) 12.2 Create Certificate Request 12.3 Admin Authenticate |
26 | 12.4 Authenticate Host |
28 | 12.5 Challenge Authentication Silo |
29 | 12.6 Verify Challenge |
30 | 12.7 Get Certificate 12.8 Get State 12.9 Set Certificate |
31 | 12.10 Get Certificate count 12.11 Get Silo capabilities |
32 | 13. Authentication of ACTs 14. Authentication Command sequences 14.1 Provisioning |
34 | 14.2 Host Authentication by the Authentication Silo 14.3 Authentication Silo Authentication by the host |
35 | 14.4 Authentication Silo Authentication using ASCh |
37 | Annex A (informative) SCSI Command Set |