Statements (101)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:standard
gptkb:security gptkb:PBR |
gptkbp:can_be_extended_by |
custom mechanisms
|
gptkbp:defines |
session management
object types for cryptographic tokens |
gptkbp:describes |
Cryptographic token interface
|
gptkbp:developed_by |
gptkb:RSA_Security
|
gptkbp:enables |
secure key storage
encryption and decryption |
gptkbp:facilitates |
digital signatures
|
gptkbp:first_published |
gptkb:1995
|
gptkbp:has_applications_in |
VPNs
Document signing Identity management Code signing Secure email Secure file storage Secure web transactions |
https://www.w3.org/2000/01/rdf-schema#label |
PKCS#11
|
gptkbp:includes |
key management functions
|
gptkbp:is_compatible_with |
gptkb:PKCS#5
gptkb:PKCS#12 gptkb:PKCS#1 multiple operating systems |
gptkbp:is_designed_for |
interoperability
|
gptkbp:is_implemented_in |
gptkb:Bouncy_Castle
gptkb:Open_SSL gptkb:Java_Cryptography_Architecture_(JCA) gptkb:Microsoft_CNG gptkb:Open_SC gptkb:Soft_HSM open-source projects various software libraries commercial products |
gptkbp:is_often_used_in |
gptkb:financial_services
Government applications Enterprise security solutions |
gptkbp:is_part_of |
Public key infrastructure (PKI)
secure software development practices PKCS family of standards |
gptkbp:is_referenced_in |
security standards
cryptographic literature |
gptkbp:is_related_to |
gptkb:PKCS#5
gptkb:PKCS#12 gptkb:PKCS#1 |
gptkbp:is_standardized_by |
gptkb:OASIS
gptkb:ISO/_IEC |
gptkbp:is_supported_by |
Various programming languages
various vendors Multiple operating systems |
gptkbp:is_used_by |
Cloud service providers
Security software vendors Io T device manufacturers Cryptographic service providers (CSPs) |
gptkbp:is_used_for |
authentication
data protection identity management secure messaging secure application development secure web applications secure data exchange secure access control secure cloud applications secure API access secure file storage secure software updates secure network communications secure mobile applications secure email communications |
gptkbp:is_used_in |
gptkb:Telecommunications
gptkb:financial_services cloud security secure communications healthcare applications government applications Io T security |
gptkbp:is_utilized_by |
enterprise applications
|
gptkbp:known_as |
gptkb:Cryptographic_Token_Interface_(CTI)
|
gptkbp:latest_version |
gptkb:3.0
|
gptkbp:part_of |
gptkb:Public_Key_Cryptography_Standards_(PKCS)
|
gptkbp:provides |
API for cryptographic operations
API for accessing cryptographic devices token management functions |
gptkbp:released_in |
gptkb:1995
|
gptkbp:specifies |
Digital signatures
Key management Encryption and decryption Token management mechanisms for cryptographic operations |
gptkbp:supports |
Smart cards
Hardware security modules (HSMs) smart cards multiple cryptographic algorithms hardware security modules (HSMs) USB tokens |
gptkbp:used_for |
cryptographic tokens
Accessing cryptographic tokens |
gptkbp:written_in |
gptkb:C_programming_language
|
gptkbp:bfsParent |
gptkb:Network_Security_Services
|
gptkbp:bfsLayer |
5
|