KEY MANAGEMENT SYSTEM AND CRYPTO SERVICE GATEWAY

Streamline Crypto Key Management

Key Management System and Crypto Service Gateway

Top Notch Technology

Across all industries the requirements for managing cryptographic keys are becoming ever-more complex. Ensuring that the right key is in the right place at the right time is mandated by many organisations, i.e. major card payment scheme providers. This is a complicated requirement as most businesses need to manage an ever-increasing number of keys, while reducing the risk of internal and external fraud, as well as keeping costs at a minimum.

The Crypto Key Management System (CKMS) streamlines administration and reduces costs associated with traditional key management. Through its flexible and automated protocols, CKMS gives users the flexibility to manage a very large number of keys – throughout their entire life cycle – without drowning in work. Using Cryptomathic CKMS, administrators can uniformly and centrally manage the life cycle of all cryptographic keys across a range of encryption platforms.

Crypto Key Management System

Key-Management-system
Key Features:
*At your desk key ceremonies
*Automated key distribution and updating
*Centralised life cycle key management
*Compliance
  Authorities: FIPS, Internal audit, PCI, Payment schemes and S/O
  Domains: Physical (e.g. tamper) & logical security (crypto/SW/system design)
*Configurable role-based access
*Flexible key attributes eliminate paperwork
*High availability and scalability
*Searchable tamper evident audit log
*Support for all major HSM brands
*Trusted path using secure PIN pads

-Non-Smart Chip Based

Commonly based on a typical low cost EEPROM where the main protection algorithms rely more on the firmware that are bundle together rather than on the hardware. This type of hardware architecture can easily be duplicated by most Dongle Duplication Experts

-Self Definable Security Algorithms

Up to 128 self definable security algorithms that will be executed on-board when called by protected software which will then be authenticated using the popular Challenge Response Authentication to maximize the security level of the protection.

-Smart Chip Based

Advanced EAL4+ and ITSEC certified microprocessor smart chips enable the algorithm’s execution and on board seed code generation. Microprocessor smart chips also prevent hardware cloning and duplication attacks.

-Multi Levels Access Right Management

Supports multi level access right management to facilitate different access rights for the development team.

-HID Driverless

As HID driverless, SecureDongle requires no external device driver installation, thus minimizing the common technical issue arise from device driver. No driver is required. As long as a USB thumb drive is compatible with

-User-define security password

Supports on-board seed code and random number generation which developer can apply into their protection to strengthen the security and to make the protection more complicated to crack.

-Secure Communication

SecureDongle is built also with advanced encryption/decryption on communication between firmware and hardware to prevent debugging and emulator attacks.

Key Management solution Brochure

Smarter way to protect your software!
1 %
of software installed on PCs around the world in 2015 were not properly licensed (a decrease from 43% in BSA’s previous global study published in 2014)
1 %
worldwide rate of unlicensed use in banking, insurance and securities industries (despite the fact that much tighter control of the digital environment is expected)
1 billion
The commercial value of unlicensed software worldwide plunged (BSA’s 2014 report cited commercial value of $62.7 billion)

Case Studies

Crypto Key Management System Brochure

Across all industries the requirements for managing cryptographic keys are becoming ever-more complex. Ensuring that the right key is in the right place at the right time is mandated by many organisations

Registration

Forgotten Password?