Òâ·¨°ëµ¼ÌåÍÆ³öÁËKERKEY™ÖÇÄܵçÍø°²È«Ä£¿é£¬¸Ã½â¾ö·½°¸¿ÉÒÔ×èÖ¹ºÚ¿Í¶ÔÖÇÄܵçÍøÍø¹Ø¡¢Êý¾Ý¼¯ÖÐÆ÷ºÍÖÇÄܵç±íµÄ¶ñÒâ¹¥»÷¡£ÔÚÂú×㼫¸ßµÄÐÐÒµ°²È«±ê×¼µÄͬʱ£¬KERKEY»¹Ö§³Ö¸öÐÔ»¯ÉèÖã¬Âú×ãÿ¸ö¿Í»§µÄ¸öÐÔ»¯ÐèÇó¡£
ƾ½èÒâ·¨°ëµ¼ÌåÔÚµç×ÓÕþÎñ¡¢½»Í¨¡¢ÒøÐкÍÏû·Ñµç×ÓÊг¡ÉÏÈ¡µÃµÄ¾Þ´ó³É¹¦£¬Òâ·¨°ëµ¼ÌåΪȫÊÀ½çÖÚ¶àǶÈëʽ°²È«ÏîÄ¿Ìṩ°²È«µ¥Ôª£¬³ö»õÁ¿ÏÖÒѳ¬10ÒÚ¼þ¡£KERKEY»ùÓÚÒâ·¨°ëµ¼Ì尲ȫ´¦ÀíÆ÷µÄÎȽ¡¼Ü¹¹£¬·ûºÏCC EAL6+ Penetration TestingÖÇÄÜIC²âÊÔ±ê×¼ºÍFIPS-140 ÉøÍ¸²âÊÔ£¨Penetration Testing£©¶àƬ¼ÓÃÜÄ£¿é±ê×¼£¬KERKEY´øÀ´ÁËʹÓþ¹ýÊг¡¿¼ÑéµÄÓ²¼þ»ù´¡µÄÓÅÊÆ¡£
»ñµÃCommon Criteria (CC[1]) EAL4+ºÍAVA-VAN 5¼¶ÈÏÖ¤[2]£¬ÒÔ¼°Âú×ãBSI[3] Protection ProfileÖÇÄܵçÍø°²È«Ä£¿é±£»¤±ê×¼£¬KERKEYÊÇͬÀà²úÆ·ÖÐÊ׸öÖ§³ÖJava Card²Ù×÷ϵͳ(JC2.2)µÄ°²È«µ¥Ôª£¬ÕâʹµÃʹÓÃJava applet¸ßЧʵÏÖ¼ÓÃÜ·þÎñ£¬²¢ÓÐÖúÓÚÌá¸ßÔÚÓ¦ÓòãʵÏÖÌØÐÔ²îÒ컯µÄÉè¼ÆÁé»îÐÔ¡£KERKEYÒÔ¿ªÏä¼´Óõݲȫģ¿éµÄÐÎʽ½»¸¶¸ø¿Í»§£¬ÔÚͶÈëʹÓÃǰֻÐèºÜÉÙµÄÅäÖòÙ×÷¡£
Òâ·¨°ëµ¼ÌåÊÂÒµ²¿¸±×ܲü氲ȫ΢¿ØÖÆÆ÷²úÆ·²¿×ܾÀíMarie-France Florentin±íʾ£º¡°¸÷¹úÕþ¸®ºÍ¹©µç¹«Ë¾¶¼ÈÏʶµ½£¬Âú×ã¸ü´óµÄÓõçÐèÇóͬʱÌá¸ß·çÄܺÍÌ«ÑôÄܵÈÂÌÉ«ÄÜÔ´µÄÀûÓÃÂÊÐèÒªÒ»¸ö°²È«¿É¿¿µÄÖÇÄܵçÍø£¬KERKEYÊÇÒ»¸ö¸ß³É±¾Ð§ÒæµÄÖÇÄܵçÍø°²È«½â¾ö·½°¸£¬ÔÚÓ¦ÓÃ×Ô¶¨ÒåºÍ²îÒ컯·½Ãæ¾ßÓÐÎÞÓëÂױȵÄÁé»îÐÔ£¬ÈÃÉ豸³§ÉÌֻʹÓÃÒ»¿ÅоƬ¼´¿É´ïµ½×î¸ßµÄ°²È«±ê×¼¡£¡±
Òâ·¨°ëµ¼ÌåµÄÖÇÄܵçÍøÄ£¿éKERKEY°²È«µ¥ÔªÑùƬ¼´ÈÕÉÏÊУ¬²ÉÓÃQFN32·â×°£¬Å䱸ISO-7816ºÍI2C½Ó¿Ú¡£