English

Beijing Guotai Network Information Technology Co., Ltd
Home>Products>Server Password Machine
Firm Information
  • Transaction Level
    VIP member
  • Contact
  • Phone
  • Address
    303, 3rd Floor, Building B, Four Seasons Science and Technology Innovation Center, Zhongguancun Science City, No. 51 Kunming Hunan Road, Haidian District, Beijing
Contact Now
Server Password Machine
Server Password Machine
Product details

Product Overview

The server password machine is a high-performance password product independently developed using domestic password algorithms (SM1, SM2, SM3, SM4, SM9). Suitable for different application fields, it can provide password encryption and decryption security protection for application systems, databases, storage, network communication, etc. The product has security functions such as encryption and decryption, digital signature, identity authentication, and random number generation. The product has been adapted for compatibility with domestic hardware platforms and operating systems, and can provide a Xinchuang version.

Features

Support multiple password algorithms:Support national encryption algorithms (SM1, SM2, SM3, SM4, SM9) and internationally recognized algorithms (DES, AES, SHA1, SHA256, RSA, ECC, etc.).

Supporting the application of blockchain technology:It can provide basic cryptographic algorithm services for user registration, real name authentication, transaction creation, transaction verification, block consensus, block confirmation and synchronization, block query and other links in blockchain transactions, effectively supporting the safe and reliable operation of the cryptographic operating environment of blockchain systems using PKI cryptographic system or identification cryptographic system.

Supports multiple operating systems:The server system supports operating systems such as Windows series, Linux series, Oracle Solaris, AIX, HP-UX, etc.

Standard interface:The API interface of the password machine complies with the standard requirements of GM/T 0018-2012 "Application Interface Specification for Password Devices" and has good universality.

Three layer key structure:Adopting a three-layer key protection structure of "system protection key user key pair session key" to ensure the security of user keys and application systems.

Secure key storage:Ensure that the key does not appear in plaintext outside the device at any time, and that the key backup file is protected by the master key. When the device chassis is illegally opened, the stored keys are immediately destroyed.

Security Strategy:Adopting IP address based whitelist access control and key to key one-to-one authorization code protection mechanism.

典型部署

Online inquiry
  • Contacts
  • Company
  • Telephone
  • Email
  • WeChat
  • Verification Code
  • Message Content

Successful operation!

Successful operation!

Successful operation!