SAM Appliance
SAM Appliance is a solution for all-in-one data encryption, digital signature authentication and mobile identification on HSM Cloud platform, ensuring compliance with standards for remote digital signature, blockchain, crypto currency, mobile payment, data encryption, transaction encryption, timestamp, security, system authentication,…
Suitable for all sizes of businesses
SAM Appliance with
Internal HSM - nShield Solo PCIe
Suitable for: Businesses using a digital signature system for the first time or for testing systems, with reasonable initial investment costs.
Components
– FIPS 140-2 Level 2 & Level 3 Protection and eIDAS Common Criteria
– HSM nShield Solo PCIe inside
– SAM Software – using Entrust SAM/HSK
– Signing Software (SAVIS): RAS Service, HSM Signing/Remote Signing, Verification, CA, RA, Digital Signature, Encryption…
– Mobile App/SDK (SCAL1, SCAL2), Server SDK (Java, .Net,,…), RestAPI. Support Timestamp & AdES Signature”
SAM Appliance with
External Network HSM - nShield Network HSM
Suitable for: Medium to large-scale businesses with significant, complex digital signature needs, requiring a systematic and rigorous process automation.
Components
– FIPS 140-2 Level 2 & Level 3 Protection and eIDAS Common Criteria
– HSM nShield Network
– SAM Software – using Entrust SAM/HSK
– Signing Software (SAVIS): RAS Service, Remote Signing, IAM, Verification, CA, RA, Digital Signature, Encryption…
– Mobile App/SDK (SCAL1, SCAL2), Server SDK (Java, .Net,,…), RestAPI. Support Timestamp & AdES Signature
Outstanding advantages of SAM Appliance
- Quick installation and operation
- Seamless integration with existing information systems
- Operates independently, specialized, without reliance on third parties
- Maximizes time and cost savings on investment
Full compliance with international standards
- FIPS 140-2 Level 2 & Level 3 Protection Certification
- Compliance with CSC 1.0, CSC 2.0, API Service Interface
- Adherence to eIDAS (eIDAS) regulations on Electronic Identification and Trust Services
- Compliance with Payment Services Directive (PSD2) on Customer Authentication
- Adherence to General Data Protection Regulation (GDPR) data protection regulations
Features
Electronic Identification
Verify user identities in applications, ensuring reliability, accuracy, and security for electronic transactions, while complying with state and European eIDAS regulations.
Secure Digital Signatures
Support advanced signature standards such as ISO 17090 standards like CadES, PadES, XadES, as well as LTV and LTANS standards for electronic storage and authentication.
Blockchain/Cryptocurrency
Manage keys and generate digital signatures within the blockchain system, ensuring authentication, safety, and security for all data and digital assets/cryptocurrencies.
Mobile Payment/Digital Wallet
Integrate with electronic transaction systems and e-wallets to ensure secure online payment transactions with authentication, management, and digital signature generation.
PKI In A Box
Deploy a public key infrastructure (PKI) infrastructure, packaged in a hardware device, to meet the need for building a specialized internal public infrastructure.
Data Encryption - Transaction Encryption
Encrypt data and transactions, ensuring that all information cannot be stolen or tampered with during initiation, storage, and transmission.
Timestamping
Apply timestamping to data and documents to establish evidence and authenticate the existence of data at a specific point in time.
Electronic Storage
Have the ability to integrate with long-term electronic storage systems, allowing high-quality document storage for 10 years, 20 years, 50 years, or indefinitely.
System Authentication and Security
Compute and log all signing operations, system operations, ensuring traceability and control of activity history.
Dynamic Workflow and System Integration
Initiate, review, and digitally sign documents from mobile devices such as laptops, tablets, and mobile phones.