Use Of Fewer Data Carriers In The Field And With Public Authorities; Separation Of Data Carrier From Authentication - Digittrade KOBRA STICK User Manual

Encrypted usb-c secure flash drive
Table of Contents

Advertisement

KOBRA Stick are generated anew and the user PIN is redefined. The number of permitted
failed attempts can also be reduced for these purposes to the minimum values of, e.g.
1 to 3. The data can then be stored on the KOBRA Stick and sent by post or courier (see
chapter 7.2).
Complex data deletions and repeated overwriting of the data carrier are no longer
necessary, as the original data is encrypted with the previous crypto keys and all old
crypto keys are deleted after new ones have been created. The memory is automatically
formatted when new crypto keys are created.
The KOBRA Stick therefore reduces the number of data carriers needed, as a personalised
KOBRA Stick is not required for each data recipient.
Note:
It is recommended to delete the data on the data carrier by creating new crypto keys, as
this puts less of a strain on the lifespan of the memory than completely overwriting the
entire memory several times.
7.4 Use of fewer data carriers in the field and with
public authorities
For activities outside the company, an employee receives a KOBRA Stick that was
previously used by another employee, for example, and which was then formatted by
exceeding the permitted number of unsuccessful attempts to enter a PIN.
During this process the user PIN is reset to the factory settings, the two old crypto keys
are deleted, new encryption keys are generated, and the data carrier is formatted. All
these processes run in the background after the employee or administrator has exceeded
the number of permitted failed attempts.
The new employee then changes the user PIN and can use the KOBRA Stick to store his
or her data securely. If presentations have to be made on external PCs or if the saved
files are to remain unchanged for other reasons, write protection can also be activated.
The employee then returns the KOBRA Stick after use. Before returning it, he or she
destroys the current encryption keys and the data stored on the KOBRA Stick by creating
new encryption keys. (Chapter 5.5)
Within a few minutes, the KOBRA Stick is then ready for use by the next colleague, as
described above. This means a separate KOBRA Stick is not required for each employee
and the number of data carriers needed in the company can be reduced.

7.5 Separation of data carrier from authentication

19

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents