{"id":4148,"date":"2010-11-12T03:58:00","date_gmt":"2010-11-12T02:58:00","guid":{"rendered":"http:\/\/10.0.1.197\/?p=4148"},"modified":"2024-08-13T04:00:56","modified_gmt":"2024-08-13T02:00:56","slug":"atsec-pierson-miikoo-cavp-2010","status":"publish","type":"post","link":"http:\/\/192.168.0.78\/atsec-pierson-miikoo-cavp-2010\/","title":{"rendered":"atsec\u5b8c\u6210\u76ae\u5c14\u68ee\uff08PIERSON\uff09MIIKOO\u7684\u5bc6\u7801\u7b97\u6cd5\u6d4b\u8bd5"},"content":{"rendered":"\n

\u4e2d\u56fd\uff0c\u5317\u4eac –<\/strong> \u6700\u8fd1\uff0catsec\u4fe1\u606f\u5b89\u5168\u5bf9\u76ae\u5c14\u68ee\u79d1\u6280\uff08Pierson Capital Technology LLC\uff0cPCT\uff09\u63d0\u4f9b\u7684MIIKOO\u5bc6\u7801\u6a21\u5757\u4e2d\u7684\u5bc6\u7801\u7b97\u6cd5\u8fdb\u884c\u4e86\u6d4b\u8bd5\u3002\u6a21\u5757\u5b9e\u73b0\u4e865\u9879FIPS\u8ba4\u53ef\u7684\u5bc6\u7801\u7b97\u6cd5\uff0c\u5728\u7f8e\u56fd\u56fd\u5bb6\u6807\u51c6\u4e0e\u6280\u672f\u7814\u7a76\u6240\uff08National Institute of Standards and Technology\uff0cNIST\uff09\u7ef4\u62a4\u7684\u5bc6\u7801\u7b97\u6cd5\u9a8c\u8bc1\u4f53\u7cfb(Cryptographic Algorithm Validation Program\uff0cCAVP)\u4e0b\u5168\u90e8\u9a8c\u8bc1\u901a\u8fc7\u3002\u8fd9\u662f\u5bf9MIIKOO\u8fdb\u884c\u5bc6\u7801\u6a21\u5757\u9a8c\u8bc1\u4f53\u7cfb\uff08Cryptographic Module Validation Program\uff0cCMVP\uff09\u6d4b\u8bd5\u8fc7\u7a0b\u4e2d\u76ae\u5c14\u68ee\u79d1\u6280\u53d6\u5f97\u7684\u4e00\u4e2a\u91cd\u8981\u7684\u91cc\u7a0b\u724c\u3002<\/p>\n\n\n\n

NIST\u8bc1\u4e66\u9a8c\u8bc1\u4e86MIIKOO\u4e2d\u7684\u7b97\u6cd5\u662f\u4e25\u683c\u7684\u9075\u5faaCAVP\u51c6\u5219\u5f00\u53d1\u5b9e\u73b0\u7684\u3002Frank Psaila\uff0c\u76ae\u5c14\u68ee\u79d1\u6280\u603b\u7ecf\u7406\u8868\u793a\uff1a\u201c\u6211\u4eec\u5728\u4e3a\u9ad8\u7aef\u5ba2\u6237\u63d0\u4f9b\u5b89\u5168\u73af\u5883\u65b9\u9762\u7684\u627f\u8bfa\u548c\u6280\u672f\u5df2\u7ecf\u6210\u4e3a\u4e86\u63a8\u52a8\u6211\u4eec\u52aa\u529b\u901a\u8fc7\u8fd9\u6b21\u8ba4\u8bc1\u8fc7\u7a0b\u7684\u52a8\u529b\u3002\u6211\u4eec\u76f8\u4fe1\uff0c\u6211\u4eec\u7684\u5c16\u7aef\u6280\u672f\u662f\u5728\u5404\u79cd\u7ea7\u522b\u7684\u5b89\u5168\u94fe\u4e0b\u63d0\u4f9b\u7b80\u5355\u7684\u3001\u53ef\u8d1f\u62c5\u7684\u3001\u4e14\u4f9d\u7136\u7528\u6237\u53cb\u597d\u7684\u89e3\u51b3\u65b9\u6848\u7684\u5148\u950b\u3002\u201d\uff08\u539f\u6587\u5982\u4e0b\uff1a\u201cour commitment and expertise in providing a secure environment for our high profile clients has been the motivation behind all the effort to get us through this certification process. We at PCT believe that our leading edge technology is a pioneer in providing a simple, affordable and yet user-friendly solution at all levels of the security chain.\u201d\uff09<\/p>\n\n\n\n

\u5bc6\u7801\u7b97\u6cd5\u9a8c\u8bc1\u662f\u8fdb\u884c\u7b26\u5408FIPS 140-2\u6807\u51c6\u7684\u5bc6\u7801\u6a21\u5757\u4e00\u81f4\u6027\u6d4b\u8bd5\u7684\u5fc5\u8981\u6761\u4ef6\u3002\u6240\u6709\u6d4b\u8bd5\u90fd\u5fc5\u987b\u7531\u88ab\u7ecf\u8fc7\u8ba4\u53ef\u7684\u7b2c\u4e09\u65b9\u5b9e\u9a8c\u5ba4\uff0c\u4e5f\u5373\u5bc6\u7801\u6a21\u5757\u6d4b\u8bd5\uff08Cryptographic Module Testing\uff0cCMT\uff09\u5b9e\u9a8c\u5ba4\u8fdb\u884c\u3002atsec\u4fe1\u606f\u5b89\u5168\uff0c\u4f5c\u4e3a\u88ab\u8ba4\u53ef\u7684CMT\u5b9e\u9a8c\u5ba4\uff0c\u5728\u4fe1\u606f\u5b89\u5168\u8bc4\u4f30\u548c\u4fe1\u606f\u5b89\u5168\u76f8\u5173\u4ea7\u54c1\u6d4b\u8bd5\u65b9\u9762\u5177\u6709\u5168\u7403\u6027\u7684\u6210\u529f\u7ecf\u9a8c\uff0c\u81ea\u7136\u6210\u4e3a\u4e86\u76ae\u5c14\u68ee\u7684\u9009\u62e9\u3002Steve Weingart\uff0catsec\u8d44\u6df1\u987e\u95ee\uff0c\u6b64\u9879\u76ee\u7684\u6d4b\u8bd5\u4eba\u5458\uff0c\u8868\u793a\uff1a\u201c\u901a\u8fc7\u5bf9\u4ed6\u4eec\u5bc6\u7801\u7b97\u6cd5\u7684\u72ec\u7acb\u6d4b\u8bd5\u548c\u9a8c\u8bc1\u8fc7\u7a0b\uff0c\u76ae\u5c14\u68ee\u5c55\u793a\u4e86\u4ed6\u4eec\u81f4\u529b\u4e8e\u4e3a\u4ed6\u4eec\u7684\u4ea7\u54c1\u6ee1\u8db3\u66f4\u9ad8\u7684\u8d28\u91cf\u548c\u4e92\u64cd\u4f5c\u6027\u6807\u51c6\u3002\u76ee\u524d\u5bc6\u7801\u7b97\u6cd5\u6d4b\u8bd5\u5df2\u7ecf\u5b8c\u6210\uff0c\u6211\u4eec\u5c06\u7ee7\u7eed\u8fdb\u884cFIPS 140-2\u4e00\u81f4\u6027\u6d4b\u8bd5\u5e76\u4e14\u671f\u5f85\u7740\u6210\u529f\u9a8c\u8bc1\u3002\u201d\uff08\u539f\u6587\u5982\u4e0b\uff1a\u201cBy going through the process of independent testing and validation of their cryptographic algorithm implementations, Pierson has shown that they are committed to meeting a higher quality and interoperability standard for their products. Now that the cryptographic algorithm tests are completed, we are continuing to move forward on the FIPS 140-2 conformance testing and looking forward to a successful validation.\u201d\uff09<\/p>\n\n\n\n

\u8bc1\u4e66\u7f16\u53f7\u3001\u4ea7\u54c1\u4fe1\u606f\u548c\u5382\u5546\u5546\u4fe1\u606f\u53ef\u4ee5\u5728CAVP\u5b98\u65b9\u7f51\u7ad9\u7684\u9a8c\u8bc1\u5217\u8868\u4e2d\u67e5\u5230\uff1ahttp:\/\/csrc.nist.gov\/groups\/STM\/cavp\/validation.html<\/a>.<\/p>\n\n\n\n

\u5173\u4e8eatsec\u4fe1\u606f\u5b89\u5168
<\/strong>\u827e\u7279\u8d5b\u514b\u4fe1\u606f\u5b89\u5168\uff08atsec information security\uff09\u662f\u4e00\u5bb6\u72ec\u7acb\u4e14\u57fa\u4e8e\u6807\u51c6\u7684\u4fe1\u606f\u6280\u672f\uff08IT\uff1aInformation Technology\uff09\u5b89\u5168\u670d\u52a1\u516c\u53f8(www.atsec.com)\uff0c\u5b83\u5f88\u597d\u5730\u5c06\u5546\u4e1a\u5bfc\u5411\u7684\u4fe1\u606f\u5b89\u5168\u65b9\u6cd5\u548c\u6df1\u5165\u7684\u6280\u672f\u77e5\u8bc6\u4ee5\u53ca\u5168\u7403\u7684\u7ecf\u9a8c\u76f8\u7ed3\u5408\u3002atsec\u4e8e2000\u5e74\u5728\u5fb7\u56fd\u6155\u5c3c\u9ed1\u6210\u7acb\uff0c\u5e76\u4e14\u901a\u8fc7\u7f8e\u56fd\u3001\u5fb7\u56fd\u3001\u745e\u5178\u548c\u4e2d\u56fd\u7684\u529e\u516c\u5ba4\u5f00\u5c55\u4e86\u5e7f\u6cdb\u7684\u56fd\u9645\u4e1a\u52a1\u3002atsec\u63d0\u4f9b\u7684\u670d\u52a1\u5305\u62ec\u6b63\u5f0f\u7684\u5b9e\u9a8c\u5ba4\u6d4b\u8bd5\u548c\u8bc4\u4f30\u3001\u72ec\u7acb\u7684\u6d4b\u8bd5\u548c\u8bc4\u4f30\u4ee5\u53ca\u4fe1\u606f\u5b89\u5168\u54a8\u8be2\u3002<\/p>\n\n\n\n

atsec\u63d0\u4f9bIT\u5b89\u5168\u6b63\u5f0f\u8ba4\u8bc1\u7684\u8bc4\u4f30\u548c\u6d4b\u8bd5\u670d\u52a1\uff0c\u5305\u62ec\u7f8e\u56fd\uff0c\u5fb7\u56fd\u548c\u745e\u5178\u901a\u7528\u8bc4\u4f30\u51c6\u5219\uff08Common Criteria\uff09\u4f53\u7cfb\u7684\u8bc4\u4f30\uff0c\u7f8e\u56fdNIST\uff08National Institute of Standards and Technology\uff09\u548c\u52a0\u62ff\u5927CSEC\uff08Communications Security Establishment Canada\uff09\u4f53\u7cfb\u7684\u5bc6\u7801\u6a21\u5757\u548c\u5bc6\u7801\u7b97\u6cd5\u8bc4\u6d4b\u3002<\/p>\n\n\n\n

atsec\u4e5f\u63d0\u4f9b\u5b89\u5168\u4ee3\u7801\u5ba1\u6838\u670d\u52a1\uff0cISO\/IEC 27001 ISMS\u54a8\u8be2\u670d\u52a1\u548c\u6e17\u900f\u6d4b\u8bd5\u626b\u63cf\u670d\u52a1\u3002<\/p>\n\n\n\n

atsec\u7684\u5ba2\u6237\u5305\u62ec\u5168\u7403\u9996\u5c48\u4e00\u6307\u7684\u516c\u53f8\u5982IBM,Apple,Cray,Hewlett-Packard,IBM,Microsoft,Oracle,BMW,SGI,Vodafone,Swisscom,RWE\u548cWincor-Nixdorf\u7b49<\/p>\n\n\n\n

\u5173\u4e8e\u76ae\u5c14\u68ee\uff08Pierson Capital\uff09
<\/strong>\u76ae\u5c14\u68ee\u79d1\u6280\u662f\u76ae\u5c14\u68ee\u96c6\u56e2\u7684\u4e00\u4e2a\u6280\u672f\u5206\u652f\u673a\u6784\uff0c\u8d1f\u8d23\u76d1\u7763\u548c\u7ba1\u7406\u96c6\u56e2\u7684\u6280\u672f\u9879\u76ee\u3002\u76ae\u5c14\u68ee\u79d1\u6280\u4e5f\u79ef\u6781\u7684\u4ee5\u987e\u95ee\uff0c\u521b\u59cb\u4eba\u548c\u6295\u8d44\u4eba\u7684\u8eab\u4efd\u53c2\u4e0e\u5230\u591a\u79cd\u4ea7\u4e1a\u9886\u57df\uff0c\u5982\u9ad8\u79d1\u6280\u4f01\u4e1a\u521b\u4e1a\u3001\u8eab\u4efd\u5b89\u5168\u548c\u94f6\u884c\u89e3\u51b3\u65b9\u6848\u7b49\u6709\u76ca\u9879\u76ee\u4e2d\u3002MIIKOO\u662f\u76ae\u5c14\u68ee\u79d1\u6280\uff08Pierson Capital Technology\uff09\u7684\u4e3b\u8981\u9879\u76ee\uff0c\u662f\u5728\u516c\u53f8\u7684\u6280\u672f\u56e2\u961f\u7684\u6307\u5bfc\u4e0b\u7ecf\u8fc7\u4e86\u591a\u5e74\u7684\u8c03\u67e5\u7814\u7a76\u548c\u5f00\u53d1\u800c\u6765\u7684\uff0c\u9879\u76ee\u65e8\u5728\u4e3a\u5305\u62ec\u91d1\u878d\u670d\u52a1\u3001\u4fdd\u9669\u548c\u5065\u5eb7\u62a4\u7406\u7b49\u8eab\u4efd\u76d7\u7a83\u4e3a\u4e3b\u8981\u98ce\u9669\u7684\u4ea7\u4e1a\u63d0\u4f9b\u72ec\u4e00\u65e0\u4e8c\u7684\u7a7a\u524d\u7684\u8eab\u4efd\u8bc6\u522b\u670d\u52a1\u3002MIIKOO\u63d0\u4f9b\u4e86\u4e00\u4e2a\u5148\u8fdb\u7684\u3001\u5b8c\u5168\u96c6\u6210\u76844\u56e0\u5b50\u8ba4\u8bc1\u5e73\u53f0\uff0c\u8fd9\u4e2a\u5e73\u53f0\u53ef\u4ee5\u90e8\u7f72\u5728\u73b0\u6709\u7684\u7cfb\u7edf\u4e2d\u800c\u65e0\u9700\u5bf9\u73b0\u6709\u7ed3\u6784\u505a\u51fa\u989d\u5916\u6539\u53d8\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"

\u4e2d\u56fd\uff0c\u5317\u4eac – \u6700\u8fd1\uff0catsec\u4fe1\u606f\u5b89\u5168\u5bf9\u76ae\u5c14\u68ee\u79d1\u6280\uff08Pierson Capital T […]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[11],"tags":[],"_links":{"self":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/4148"}],"collection":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/comments?post=4148"}],"version-history":[{"count":2,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/4148\/revisions"}],"predecessor-version":[{"id":4154,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/4148\/revisions\/4154"}],"wp:attachment":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/media?parent=4148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/categories?post=4148"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/tags?post=4148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}