Virtual smart card is a software implementation of a smart card that allows you to perform the full range of operations available to hardware key carriers ( smart cards , USB tokens ).
A virtual smart card fully emulates the behavior of a physical smart card. For the computer operating system and the applications the user is working with, the virtual smart card is indistinguishable from the physical counterpart.
Virtual smart card technology was introduced in Windows Server 2012, Windows 8, and Windows RT. Depending on the implementation of the technology, the role of the physical medium and the corresponding reader can be performed by a Trusted Platform Module (TPM) chip, a special storage of keys and digital certificates, or even a user's smartphone.
A virtual smart card is attached to the user and the computer. For a user, a virtual smart card is a smart card that constantly resides on a computer. In order for the user to be able to use the smart card on several computers, it is necessary to issue a card on each of them. If several users work with one computer, each of them will be issued with a separate virtual smart card.
Content
- 1 use cases
- 2 Benefits
- 3 See also
- 4 References
Usage Scenarios
A virtual smart card fully emulates the functionality and set of user scripts available to physical key carriers. Just like traditional smart cards, a virtual smart card allows you to:
- digital signature of data
- data encryption and decryption
- two-factor user authentication
- Single Sign-On Access
Benefits
The lack of hardware determines a number of advantages of a virtual smart card compared to a physical smart card:
- virtual smart card does not require the costs associated with the acquisition, maintenance and replacement of plastic smart cards, readers, USB tokens
- no free USB port required to connect a virtual smart card
- virtual smart card cannot be forgotten, lost or transferred to colleagues (for example, in order to mark presence at the workplace)
- receiving a virtual smart card is performed remotely and does not require a personal visit of an employee or administrator
See also
- Authentication
- Public Key Infrastructure
- Single sign-on technology
- Token (authorization)
- Electronic signature