Cryptographic log on

Cryptographic log on

Cryptographic log-on (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user's identification to a workstation and network. It replaces the username and passwords for identifying and authenticating users. To log-on cryptographically to a CLO-enabled workstation, users simply insert their CAC into their workstation’s CAC reader and provide their Personal Identification Number (PIN).

The Navy/Marine Corps Intranet, among many other secure networks, uses CLO.

References

Mauck, James (January – March 2006). "Cryptographic Logon". CHIPS — The Department of the Navy Information Technology Magazine. United States Department of the Navy. http://www.chips.navy.mil/archives/06_jan/web_pages/logon.htm. Retrieved 2006-06-01. 


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Navy/Marine Corps Intranet — The Navy/Marine Corps Intranet (NMCI) is a United States Department of the Navy outsourcing program, in which an outside contractor provides a vast majority of information technology services for the entire Department, including the United States …   Wikipedia

  • Naor-Reingold Pseudorandom Function — In 1997, Moni Naor and Omer Reingold described efficient constructions for various cryptographic primitives in private key as well as public key cryptography. Their result is the construction of an efficient pseudorandom function. Let p and l be… …   Wikipedia

  • Information theory — Not to be confused with Information science. Information theory is a branch of applied mathematics and electrical engineering involving the quantification of information. Information theory was developed by Claude E. Shannon to find fundamental… …   Wikipedia

  • Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… …   Wikipedia

  • Lattice problem — In computer science, lattice problems are a class of optimization problems on lattices. The conjectured intractability of such problems is central to construction of secure lattice based cryptosystems. For applications in such cryptosystems,… …   Wikipedia

  • CimTrak — Developer(s) Cimcor Stable release 2.0.6.3 / July 18, 2011; 3 months ago (2011 07 18) Written in C, C++, Visual Basic, LUA …   Wikipedia

  • One-way function — Unsolved problems in computer science Do one way functions exist? In computer science, a one way function is a function that is easy to compute on every input, but hard to invert given the image of a random input. Here easy and hard are to be… …   Wikipedia

  • Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… …   Wikipedia

  • Microsoft CryptoAPI — The Cryptographic Application Programming Interface (also known variously as CryptoAPI, Microsoft Cryptography API, MS CAPI or simply CAPI) is an application programming interface included with Microsoft Windows operating systems that provides… …   Wikipedia

  • Алгоритм Полига — Алгоритм Полига  Хеллмана (также называемый алгоритм Сильвера  Полига  Хеллмана)  детерминированный алгоритм дискретного логарифмирования в кольце вычетов по модулю простого числа. Одной из особенностью алгоритма является то,… …   Википедия

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”