Shopping Cart

No products in the cart.

IEEE 1667-2006

$80.71

IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices

Published By Publication Date Number of Pages
IEEE 2006
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

New IEEE Standard – Superseded. This project defines a standard protocol for secure authentication and creation of trust between a secure host and a directly attached Transient Storage Device (TSD), such as a USB flash drive, portable hard drive, or cellular phone. The protocol has only an indirect relationship with data integrity/security, and does not directly address issues of authorization and enforcement. The protocol also does not address devices that are attached using a network connection. However, a device that uses a point-to-point wireless connection such as WUSB may comply with this protocol.

PDF Catalog

PDF Pages PDF Title
1 IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices
3 Title page
6 Introduction
Notice to users
7 Participants
9 CONTENTS
11 1. Overview
1.1 Scope
1.2 Purpose
12 2. Normative references
3. Definitions and acronyms
3.1 Definitions
13 3.2 Acronyms
3.3 Certificate names
14 4. Authentication layer
4.1 Stack
5. Host requirements
15 5.1 PKI algorithm
5.2 Random number generator
5.3 Certificate store
5.4 XCh Host Certificate
6. Channel
7. TSD requirements
8. ACT requirements
8.1 Probe silo requirements
16 8.2 Authentication silo requirements
8.3 Certificate store
8.4 Globally Unique Identifier
8.5 Authentication Silo Key Pair
8.6 Authentication Silo Certificates
17 8.7 PKI algorithm
8.8 Random number generator
8.9 Silo Type Identifier (STID)
9. Certificate Store
9.1 Required features
9.2 Authentication Silo Certificate Store
19 9.3 Host Certificate Store
9.4 User Certificate Storage
10. Authentication Silo state machine
20 10.1 Initialized
21 10.2 Not Provisioned
22 10.3 Not Authenticated
10.4 Authenticated
23 10.5 Non-IEEE 1667 host support
11. Probe Silo actions
11.1 Process of probing
24 11.2 Probe command
12. Authentication Silo actions
12.1 Initialize (reset to manufacturing state)
12.2 Create Certificate Request
12.3 Admin Authenticate
26 12.4 Authenticate Host
28 12.5 Challenge Authentication Silo
29 12.6 Verify Challenge
30 12.7 Get Certificate
12.8 Get State
12.9 Set Certificate
31 12.10 Get Certificate count
12.11 Get Silo capabilities
32 13. Authentication of ACTs
14. Authentication Command sequences
14.1 Provisioning
34 14.2 Host Authentication by the Authentication Silo
14.3 Authentication Silo Authentication by the host
35 14.4 Authentication Silo Authentication using ASCh
37 Annex A (informative) SCSI Command Set
IEEE 1667-2006
$80.71