WireFlow AB, WireFlow Security Suite
© WireFlow AB, 2014 AC0045-002 rev C 1
Contents
Support information ...................................................................................................................2
Technical support and Product information ...........................................................................2
WireFlow headquarters...........................................................................................................2
Introduction................................................................................................................................3
How it works ..........................................................................................................................4
Using asymmetric keys...........................................................................................................6
The components......................................................................................................................7
The dongles.........................................................................................................................7
The Security Suite Programming application.....................................................................7
The LabVIEW drivers.........................................................................................................7
The technology behind the Security Suite..................................................................................8
SHA-256.................................................................................................................................8
Hash functions........................................................................................................................8
The implementation in the Security Suite ..............................................................................8
Symmetric keys...................................................................................................................8
Asymmetric keys ................................................................................................................9
The USB Hardware..................................................................................................................10
Dimensions........................................................................................................................... 10
Electromagnetic Compatibility.............................................................................................11
CE Compliance.....................................................................................................................11
The WF 2007........................................................................................................................11
The WF 2008........................................................................................................................11
Security Suite Programming Application ................................................................................12
Requirements........................................................................................................................12
Installation and licensing......................................................................................................12
Description of the front panel objects...................................................................................13
Using the program ................................................................................................................15
Factory setting...................................................................................................................15
Managing a dongle............................................................................................................15
Configuration files ............................................................................................................16
The WF USB Security dongle driver .......................................................................................16
Requirements........................................................................................................................16
Installation ............................................................................................................................16
Device driver for Windows...............................................................................................17
Installed items...................................................................................................................17
The basic VIs........................................................................................................................17
The intermediate VIs ............................................................................................................19
The WF Authentication module...............................................................................................20
Requirements........................................................................................................................21
Installation ............................................................................................................................21
Installed items...................................................................................................................21
The VIs .................................................................................................................................22