Volira GP

Volira GP is the basic Volira product. The key features of Volira GP are a secure file system, PIN protection of data, External Authentication, and Secure Messaging. Additionally, 4 logical channels are supported, providing the possibility of multiple simultaneous card sessions. Using logical channels, multiple applications on the terminal can access data on the card independently of each other.

The card holder can gain access to certain data elements on the smart card by verifying the PIN (Personal Identification Number). Volira GP additionally supports other methods of user authentication such as External Authentication and Secure Messaging. With External Authentication the card gives a random number (challenge) to the terminal, which runs a mutually agreed algorithm (DES or 3DES) based on the challenge and a secret key. Receiving the response from the terminal, the card can run the same algorithm using the secret key and compare the results. The advantage of this method, over e.g. PIN based authentication, is that only the result of the computation, and not the key itself, is sent to the card. Because the result of the computation changes with each new challenge, an eavesdropper, monitoring the communication between the card and the terminal, will not subsequently be able to gain access to the card.

The card holder can gain access to certain data elements on the smart card by verifying the PIN (Personal Identification Number). Volira GP additionally supports other methods of user authentication such as External Authentication and Secure Messaging. With External Authentication the card gives a random number (challenge) to the terminal, which runs a mutually agreed algorithm (DES or 3DES) based on the challenge and a secret key. Receiving the response from the terminal, the card can run the same algorithm using the secret key and compare the results. The advantage of this method, over e.g. PIN based authentication, is that only the result of the computation, and not the key itself, is sent to the card. Because the result of the computation changes with each new challenge, an eavesdropper, monitoring the communication between the card and the terminal, will not subsequently be able to gain access to the card.

Our Products