{"id":81405,"date":"2024-10-17T18:54:25","date_gmt":"2024-10-17T18:54:25","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1667-2007\/"},"modified":"2024-10-24T19:46:38","modified_gmt":"2024-10-24T19:46:38","slug":"ieee-1667-2007","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1667-2007\/","title":{"rendered":"IEEE 1667 2007"},"content":{"rendered":"
New IEEE Standard – Inactive – Superseded. This project defines a standard protocol for secure authentication and creation of trust between a secure host and a directly attached Transient Storage Device (TSD), such as a USB flash drive, portable hard drive, or cellular phone. The protocol has only an indirect relationship with data integrity\/security, and does not directly address issues of authorization and enforcement. The protocol also does not address devices that are attached using a network connection. However, a device that uses a point-to-point wireless connection such as WUSB may comply with this protocol.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices <\/td>\n<\/tr>\n | ||||||
3<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Introduction Notice to users <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1. Overview 1.1 Scope 1.2 Purpose <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 2. Normative references 3. Definitions and acronyms 3.1 Definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3.2 Acronyms 3.3 Certificate names <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4. Authentication layer 4.1 Stack 5. Host requirements <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.1 PKI algorithm 5.2 Random number generator 5.3 Certificate store 5.4 XCh Host Certificate 6. Channel 7. TSD requirements 8. ACT requirements 8.1 Probe silo requirements <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 8.2 Authentication silo requirements 8.3 Certificate store 8.4 Globally Unique Identifier 8.5 Authentication Silo Key Pair 8.6 Authentication Silo Certificates <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 8.7 PKI algorithm 8.8 Random number generator 8.9 Silo Type Identifier (STID) 9. Certificate Store 9.1 Required features 9.2 Authentication Silo Certificate Store <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 9.3 Host Certificate Store 9.4 User Certificate Storage 10. Authentication Silo state machine <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 10.1 Initialized <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 10.2 Not Provisioned <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 10.3 Not Authenticated 10.4 Authenticated <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 10.5 Non-IEEE 1667 host support 11. Probe Silo actions 11.1 Process of probing <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 11.2 Probe command 12. Authentication Silo actions 12.1 Initialize (reset to manufacturing state) 12.2 Create Certificate Request 12.3 Admin Authenticate <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 12.4 Authenticate Host <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 12.5 Challenge Authentication Silo <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 12.6 Verify Challenge <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 12.7 Get Certificate 12.8 Get State 12.9 Set Certificate <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 12.10 Get Certificate count 12.11 Get Silo capabilities <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 13. Authentication of ACTs 14. Authentication Command sequences 14.1 Provisioning <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 14.2 Host Authentication by the Authentication Silo 14.3 Authentication Silo Authentication by the host <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 14.4 Authentication Silo Authentication using ASCh <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Annex A (informative) SCSI Command Set <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Standard Protocol for Authentication in Host Attachments of Transient Storage Devices<\/b><\/p>\n |