Applet identification and authentication (PIV)

This application has been developed for people authentication to realize identification and authentication solutions. This applet, which is designed and implemented in full compliance with the mentioned standards, has various capabilities and functions, the most important of which are:
- Biometric authentication (face and fingerprint)
- Identification of people
- Access control (compatible with Microsoft products, including Windows login based on Active Directory)
- Providing security services including encryption, digital signature, and key management (compatible with various efficient software, such as all tools in Microsoft Office, Acrobat Reader, etc., to provide security services without the need for any external software)
- PKI and digital certificate services

Slide 1 - copy - copy
Slide 1 - copy - copy
previous arrow
next arrow

Introducing the identification and authentication applet (PIV)

This application has been developed for personal identity verification (PIV) based on FIPS 201 and NIST SP 800-73-4 standards and in line with the realization of identification and authentication solutions. This applet, which is designed and implemented in full compliance with the mentioned standards, has various capabilities and functions, the most important of which are:

  • Biometric authentication (face and fingerprint)
  • Identification of people
  • Access control (compatible with Microsoft products, including Windows login based on Active Directory)
  • Providing security services including encryption, digital signature, and key management (compatible with various efficient software such as all Microsoft Office tools, Acrobat Reader, etc. to provide security services without the need for any external software)
  • PKI and digital certificate services

Technical specifications of the PIV applet

  • Technology: Java applet
  • Platform:
    • JCDK 2.2.2 and higher
    • Global Platform 2.1.1 and higher
  • Memory size required for loading and installation: 10 KB
  • The amount of memory required to load data: at least 25 KB. The maximum memory required depends on the customer's needs and the amount of optional data coverage.
  • Minimum (important/higher) card requirements:
    • Support for RSA asymmetric encryption algorithm up to 2048 bits long
    • Support for RSA key pair generation mechanism on the card
    • Support for AES encryption algorithm with 128-bit key length
    • Support for 3-DES encryption algorithm
    • Support SHA-256 hashing function
TOP