Microsoft HomeProductsSearchSupportShopWrite Us   Microsoft Home
Internet Explorer 4.0 Technical White Papers

Back to Internet Explorer Home Page
 

Microsoft Internet Explorer 4.0 White Paper Previous Page TOC Next Page Internet Explorer 4.0 Home Page

Security Features


Security Features

The Internet provides a convenient and effective way to communicate and share information with others worldwide. However, many people are increasingly relying on the Web to use new applications such as online banking and shopping. Along with this increased reliance comes a greater need for security on the Internet. With its strong support of standard Internet security protocols, Internet Explorer lets users communicate privately, protect their identity, shield themselves and others from inappropriate content, prevent others from tracking their activities, and have greater control over what software to download. It even enables users to verify the identity of Web servers, and positively identify themselves to those servers when desired. This means conducting transactions and participating in consumer services on the Internet with the same privacy and security as in the real world.

Microsoft actively participates in the Internet Engineering Task Force (IETF), the World Wide Web Consortium (W3C), and other groups to develop Internet security standards. Recent Microsoft security initiatives include the code-signing proposal submitted to the W3C and the Transport Layer Security (TLS) efforts through the IETF, aimed at creating a single, secure, channel standard.

Microsoft Authenticode Technology

Software on the Internet is not labeled or shrink-wrapped like software in retail stores. As a result, users may not know who published a piece of software, what the software will do on their computers, or if the software code has been tampered with.

Microsoft developed Authenticode™ technology to help address these concerns. When users download signed code to their computers, Authenticode verifies both the publisher and the integrity of the code (that it has not been tampered with since the author published it). No software can be guaranteed to be 100% safe under all circumstances, but Authenticode gives the user the opportunity to make an informed decision as to whom they trust and be able to selectively block execution of certain code. Authenticode technology works with all common types of downloadable code including Java applets, ActiveX controls, and plug-ins.

Microsoft is working with VeriSign, a leading certificate authority, who is issuing digital IDs to be used by software publishers to sign their code. Tools for code-signing are available through the ActiveX SDK.

Secure Channel Services

Support for Secure Sockets Layer 2.0/3.0 (SSL), Private Communication Technology 1.0 (PCT) ensures that personal or business communications using the Internet or intranet are private. The SSL and PCT protocols create a secure channel, so that no one can eavesdrop on communications. With secure communications guaranteed, users can buy consumer goods, reserve airplane tickets, or conduct personal banking on the Internet.

Transport Layer Security (TLS)

In the near future, Microsoft will add support for TLS, a new secure channel protocol under development by the Internet Engineering Task Force (IETF), which builds upon existing protocols to create an improved Internet secure channel protocol.

Personal Information Exchange (PFX)

This set of public key-based security technologies, which is part of the Microsoft Internet security framework, supports Internet standards such as X.509 and PKCS#7 certificate formats. Microsoft has submitted PFX for consideration as a new PKCS standard.

Cookie Privacy

Some Web sites use cookie technology to store information on a client computer. These cookies are usually used to provide Web site personalization features. With Internet Explorer 4.0, users can choose whether or not to store a cookie.

SOCKS Firewall Support

Many corporations provide their employees with access to the Internet through firewalls that protect the corporation from unwanted access. SOCKS is a standard protocol for traversing firewalls in a secure and controlled manner. Internet Explorer 4.0 is compatible with firewalls that use the SOCKS protocol. This support was provided by Hummingbird Communications Ltd., a leading provider of firewalls.

NTLM Challenge/Response

Corporations can take advantage of the Windows NT Server challenge/response authentication that may already be in use on their Windows NT Server network. This enables users to have increased password protection and security while remaining interoperable with their existing Internet information servers.

CryptoAPI 2.0

CryptoAPI provides the underlying security services for secure channels and code signing. Through CryptoAPI, developers can easily integrate strong cryptography into their applications. Cryptographic Service Provider (CSP) modules interface with CryptoAPI and perform functions including key generation and exchange, data encryption and decryption, hashing, digital signatures, and signature verification.

CryptoAPI also provides developers with high-level APIs for authentication, signing, and encryption and decryption services as well as certificate management functionality. CryptoAPI is included as a core component of the latest versions of Windows operating systems. Internet Explorer 4.0 will automatically provide this support for earlier versions of Windows.

Microsoft Protected Store

Microsoft Protected Store supports securely storing important, private information, such as credit cards, electronic drivers license, ATM cards, and electronic cash. No application or person can view this information without a user’s permission. In addition, a user decides where to store the information (on a computer, smart card, or floppy disk). Users only have to enter password or account information once and thus do not have to remember many different passwords. It also gives users complete control over who can see or use this information. The Protected Store allows information to be securely transferred to any computer and used with any application through the use of PFX technology. Designed for the future, the Protected Store supports additional payment methods (such as Internet cash) as well as other credentials and confidential information.


Setting for the Protected Store


The Protected Store exposes a set of open APIs that are integrated into the operating system. Microsoft will evangelize these APIs to all third parties as the common, open way of storing personal information. The Protected Store will exist first on 32-bit Windows platforms in a future version of Windows (and downloadable from the Web) and later on Macintosh and Windows 3.1.

PICS Standards for Internet Content

Parents want assurances that children cannot visit sites that display inappropriate information. Corporations have similar concerns, wanting to block the use of sites that offer no business value to their employees. Microsoft has been working closely with the Platform for Internet Content Selection (PICS) committee to help define standards for rating Internet content.


PICS Rating Options


Sandbox Security

Support for sandboxing, the Java security model, was built into Internet Explorer 3.0 and will be enriched in Internet Explorer 4.0. Running a Java applet in a sandbox prevents it from accessing a computer or network resources, but also greatly restricts what it can do. Authenticode provides additional protection for the user, in that they can verify the publisher and integrity of software components, such as Java applets or ActiveX controls. Internet Explorer users can review this information and make an informed decision as to whether running such applets is in their best interest.

Internet Explorer 4.0 provides an enhanced capabilities-based sandbox security model, which allows a finer degree of control over access of applets to users’ computer resources, such as their hard disk, network connections, and so on. It presents users with a range of security options, such as allowing a Java applet to access a specific amount of hard disk space on a client computer.

What are the Benefits of Internet Security?

  • Communicate privately. Internet Explorer 4.0 ensures that what users send over the Internet, whether it’s a password or a credit-card number, cannot be read if intercepted.

  • Protect your identity on the Internet. Users who subscribe to a service or have personal information stored on a Web server can get a unique personal certificate that makes it virtually impossible for others to impersonate them when accessing a Web site.

  • Know who you’re talking to. Internet Explorer can make sure users don’t pass private information to the wrong people by enabling users to make sure that the server truly belongs to who it appears to belong to.

  • Protect yourself and others from inappropriate content. By setting ratings using the content advisor, you can control what sites can be viewed on your computer. These ratings are based on PICS industry standards.

  • Prevent others from tracking your activities. Internet Explorer 4.0 lets users prevent Web sites from storing personal information on their computer.

  • Provide information on the source and reliability of online software. Using Microsoft Authenticode technology, Internet Explorer 4.0 tells users who published signed software and whether it has been tampered with. This information helps users decide whether to download software to their computer.

  • Securely store and control private information on the Internet. With Microsoft Protected Store, users can store credit card numbers and electronic cash securely, eliminating the need to memorize passwords and re-enter numbers. For webmasters, it provides a ready-made solution for end-user payment, reducing the cost of developing a Web site.

  • Provides an interface to third-party cryptographic service provider (CSP), eliminating the need for software developers to create their own cryptography. The modular design of the CryptoAPI allows developers to work with a full range of CSPs that provide either software- or hardware-based cryptography, such as software algorithms or smart cards. Plus, replaceable cryptographic modules let developers create applications for worldwide use without worrying about encryption export issues. CryptoAPI frees developers from the financial obligation of licensing cryptographic technologies directly from other vendors.

Previous Page Page Top TOC Next Page


©1997 Microsoft Corporation. All rights reserved. Legal Notices.