Hardware-software complex "Podpis"
Purpose
Hardware-software complex "Podpis" is designed for protection of PC data against unauthorized access using a USB-key and cryptographic transformations.
Characteristics
The hardware of the complex consists of a USB-key with a removable portable card reader with a USB-interface and a built-in electronic plastic access card of SIM-PLUGIN format.
The complex is based on on electronic plastic card with OS "Magistra", which allows the use of both software and hardware encryption via algorithm GOST 28147-89 and implement a secure storage of cryptographic keys, user information and authentication data.
Also the hardware-software complex "Signature" allows the use of a full length EPC, dual EPC and stationary EPC reader instead of USB-key.
Main functional capabilities of the hardware-software complex “Podpis:
Hardware-software complex "Podpis" is designed for protection of PC data against unauthorized access using a USB-key and cryptographic transformations.

The hardware of the complex consists of a USB-key with a removable portable card reader with a USB-interface and a built-in electronic plastic access card of SIM-PLUGIN format.
The complex is based on on electronic plastic card with OS "Magistra", which allows the use of both software and hardware encryption via algorithm GOST 28147-89 and implement a secure storage of cryptographic keys, user information and authentication data.
Also the hardware-software complex "Signature" allows the use of a full length EPC, dual EPC and stationary EPC reader instead of USB-key.
Main functional capabilities of the hardware-software complex “Podpis:
- Protection of information processed and stored in the PC using cryptographic transformations;
- PC Protection against unauthorized access;
- Secure storage of cryptographic keys, authentication data and user information in the USB-key;
- Creation of cryptographic keys using a random number sequence generator EPC;
- Authentication in networks running under Active Directory (for servers running under OS Windows 2003 and workstations running under Windows 2000/XP/7);
- Implementation of cryptographic functions: encryption in accordance with GOST 28147-89 (hardware and software implementation), encryption STB P 34.101.31-2007 (software implementation), calculation and verification of electronic digital signature according to STB 1176.2-99 and hash-value according to the STB 1176.1 -99 and STB P 34.101.31-2007 (software implementation);
- Implementation of electronic digital signature, operation under Windows 2000/XP/7 and OS Linux (Ubuntu 9.10 with 2.6 core).
- Development
- Design
- Manufacturing and warranty service (support)
- Final product sale