Support the relevant standards of the People's Bank of China (PBOC 1.0/2.0/3.0), support GP, TSM, EMV, etc.; support value-added business such as NFC.
Support PIN encryption, encryption conversion, verification and other operations; support CVV/CVN products and verification; support MAC calculation; support data signature and verification.
Support generation of seed keys and support their secure transfer; support dynamic password calculation.
Based on the graded permission management function of intelligent Ukey, the user password and device security are improved.
The cipher machine management is separated from the sensitive information management permission, so even the operation and maintenance personnel of JD Cloud cannot access the user's personal key.
Sensitive instructions support classified authorization control, effectively preventing emergence of unauthorized acts.
Support user name password verification, digital certificate verification and other permission verification methods.
Clustering and functions of Load Balancer between cipher machines are achieved to effectively respond to sudden events, such as Data Center disconnection and device failure.
Support the key backup and recovery functions based on the main key protection to ensure the security and reliability of the user application system.
Inside the cipher machine, the architecture design is achieved with a hardware chip array, and its use isn’t affected even if some hardware chips are damaged.
The unique exception recovery system helps customers effectively cope with various sudden events.
Applied to POS receipt, mobile payment, card payment, internet payment and other payment business scenarios, ensuring integrity and confidentiality of payment data in the process of transmission and storage process, payment identity verification, non-repudiation of payment process, which can fully meet the regulatory compliance requirements of financial industry.
Applied to various system applications such as electronic patient records, electronic invoices, electronic contracts, electronic policies and the like, ensuring the integrity and the confidentiality of various electronic bills in the process of production, transmission and storage; guaranteeing the authenticity of the application user identity of the electronic bills, which can guarantee the security of electronization, and promote the sustainable and healthy development of the electronic business.
Applied to various system applications, such as government affairs, enterprise, e-commerce, portal and Web sites which contain a large number of personal sensitive information. It can eliminate the risk of illegal access by unauthorized internal users, disclosure and tampering of plaintext data, so as to improve the robustness and customer value of the system.
Scan, feedback the current page