User Guide
DDOC0108-000-A2
CNS4 CSfC
2 - 8
Overview
Revision 1.0
Figure 2.6
Hardware Layer Account Creation
2.4.1.2
Hardware Layer Account Log In
Any subsequent use of the equipment requires logging in (Figure 2.7) to the hardware layer before
data storage and/or transfer can begin. The user enters their user name and password into the ILE
module. The hardware layer checks the information against its accounts. If the user name and
password are recognized, a random one-time 64-byte key (also referred to as a nonce) is
generated. The nonce is sent to the end-user via the CLI. The user then enters the nonce and their
specific-user token key (generated when the account was created) into a third-party HMAC-
SHA256 generator using the user token as the key. The CLI then sends this data as a user-
generated HMAC to the hardware layer. The layer compares the user HMAC and the hardware
layer HMAC. If they are the same, the user is logged in. If they do not compare, the user is denied
access.
Figure 2.7
Hardware Layer Account Log In
TERMINAL / PC
CNS4
CLI
HARDWARE LAYER
(ILE MODULE)
Internally Generate
32-byte User Token Key
PSK Keywraps User Token
Key (AES256 Keywrap)
PSK
Generate HMAC (User
Token Key and PSK)
Send Encrypted User Token
Key and HMAC
Login / Create
Account on
Hardware
Crypto Layer
Validate HMAC (Use
PSK and Encrypted
User Token Key)
User Token Key is
Now a Specific-User
Token Key Tied to
Account
Decrypt User Token
Key (Use PSK )
DDOC0108-0011
TERMINAL / PC
CNS4
CLI
HARDWARE LAYER (ILE MODULE)
Check / Verify End-User
Name / Password
Against Account Information
Generate Random One-Time
Use 64-byte Key (Nonce)
Send Nonce
Generate HMAC (Nonce
and Specific-User
Token Key)
Compare User HMAC
and Hardware Crypto
Layer HMAC
Log Into
Previously
Created
Account
Send
User-Generated
HMAC
User Generates
HMAC via 3rd-Party
Software (Use Specific
User Token Key
and Nonce)
If Comparison Passes,
User is Logged In
If Comparison Fails,
User is Denied Access
DDOC0108-0012