User's Manual
5
S
ERVER
.........................................................................................................................................................................27
R
ESPONSE
C
OMPUTATION
.............................................................................................................................................27
R
EAD
P
IN
........................................................................................................................................................................27
C
OMPUTATION OF RESPONSE BY USING THE
W
EB
I
DENTITY TOKEN
...............................................................................27
C
LIENT
..........................................................................................................................................................................27
R
ESPONSE
V
ERIFICATION
.............................................................................................................................................. 27
D
ECRYPT
P
IN
..................................................................................................................................................................27
R
E
-
COMPUTATION OF THE RESPONSE FOR COMPARISON WITH THE CLIENT
-
SENT RESPONSE AND EXTRACTION OF THE
U
SER
-I
D
. .......................................................................................................................................................................27
S
ERVER
.........................................................................................................................................................................27
5.5
C
RYPTOGRAPHY
................................................................................................................................................28
5.5.1
Example – cryptography from server to client..........................................................................................30
F
UNCTION
......................................................................................................................................................................31
M
ETHOD
........................................................................................................................................................................31
D
ESCRIPTION
.................................................................................................................................................................31
C
OMPONENT
..................................................................................................................................................................31
S
ERVER SIDE ENCRYPTION
.............................................................................................................................................31
C
RYPT
............................................................................................................................................................................31
E
NCRYPTION WITH THE USE OF
R
ANDOM
S
ESSION
S
TRING
,
OF
S
ERVER
S
ECRET AND
U
SER
-I
D WHICH THE
CONFIDENTIAL DATA IS TO BE SENT
...............................................................................................................................31
S
ERVER
.........................................................................................................................................................................31
S
ERVER SIDE DECRYPTION
.............................................................................................................................................31
D
ECRYPT
........................................................................................................................................................................31
D
ECRYPTION WITH THE USE OF
R
ANDOM
S
ESSION
S
TRING
,
OF
S
ERVER
S
ECRET AND
U
SER
-I
D WHICH THE
CONFIDENTIAL DATA HAS BEEN RECEIVED FROM
...........................................................................................................31
S
ERVER
.........................................................................................................................................................................31
C
LIENT SIDE ENCRYPTION
.............................................................................................................................................. 31
C
RYPT
............................................................................................................................................................................31
E
NCRYPTION WITH USE OF
R
ANDOM
S
ESSION
S
TRING
...................................................................................................31
C
LIENT
..........................................................................................................................................................................31
C
LIENT SIDE DECRYPTION
.............................................................................................................................................. 31
D
ECRYPT
........................................................................................................................................................................31
D
ECRYPTION WITH USE OF
R
ANDOM
S
ESSION
S
TRING
. .................................................................................................31
C
LIENT
..........................................................................................................................................................................31
5.6
R
EMOTE CONTROL
.............................................................................................................................................32
5.6.1
Synchronize Command..............................................................................................................................32
5.6.2
Read Command.........................................................................................................................................32
5.6.3
Write Command........................................................................................................................................32
5.6.4
Example – writing on the remote token.....................................................................................................34
F
UNCTION
......................................................................................................................................................................37
M
ETHOD
........................................................................................................................................................................37
D
ESCRIPTION
.................................................................................................................................................................37
C
OMPONENT
..................................................................................................................................................................37
R
EAD COMMAND
...........................................................................................................................................................37
C
OMMIT
R
EAD
..................................................................................................................................................................37
I
T ENABLES GENERATING THE READ COMMAND BY STATING THE START POSITION AND THE READABLE DATA LENGTH
.37
S
ERVER
.........................................................................................................................................................................37
W
RITE COMMAND
..........................................................................................................................................................37
C
OMMIT
W
RITE
................................................................................................................................................................37
I
T ENABLES GENERATING THE WRITE COMMAND BY STATING THE START POSITION
,
THE DATA LENGTH AND THE
WRITABLE DATA
............................................................................................................................................................37
S
ERVER
.........................................................................................................................................................................37
S
YNCHRONIZATION COMMAND
.....................................................................................................................................37
S
YNCHONIZE
...................................................................................................................................................................37
I
T ENABLES GENERATING THE SUYNCHRONIZATION COMMAND FOR ALIGNING THE COUNTER OF THE WRITING NUMBER
.
......................................................................................................................................................................................37
S
ERVER
.........................................................................................................................................................................37
C
OMMAND EXECUTION
..................................................................................................................................................37
C
MD
E
XECUTE
..................................................................................................................................................................37
I
T ENABLES THE ACTUAL EXECUTION OF THE COMMAND GENERATED BY THE SERVER ON THE TOKEN
..........................37
C
LIENT
..........................................................................................................................................................................37