Go to computer terminal for registration
JD Cloud HSM is equipped with the hardware encryption machine verified by the State Encryption Administration. Through the virtualization technology, it helps users meet the regulatory and functional requirements of data security and protect the security and privacy of business data on the cloud.Apply for Beta
Support the relevant standards of the People's Bank of China (PBOC 1.0/2.0/3.0), support GP, TSM, EMV, etc.; support value-added business such as NFC.
Support PIN encryption, encryption conversion, verification and other operations; support CVV/CVN products and verification; support MAC calculation; support data signature and verification.
Support generation of seed keys and support their secure transfer; support dynamic password calculation.
Based on the graded permission management function of intelligent Ukey, the user password and device security are improved.
The cipher machine management is separated from the sensitive information management permission, so even the operation and maintenance personnel of JD Cloud cannot access the user's personal key.
Sensitive instructions support classified authorization control, effectively preventing emergence of unauthorized acts.
Support user name password verification, digital certificate verification and other permission verification methods.
Clustering and functions of Load Balancer between cipher machines are achieved to effectively respond to sudden events, such as Data Center disconnection and device failure.
Support the key backup and recovery functions based on the main key protection to ensure the security and reliability of the user application system.
Inside the cipher machine, the architecture design is achieved with a hardware chip array, and its use isn’t affected even if some hardware chips are damaged.
The unique exception recovery system helps customers effectively cope with various sudden events.