PCIE Hardware Secure Module

The PCIE Hardware Secure Module (HSM) product is a high-speed cryptographic accelerator with PCI Express. It supports symmetric crypto, hashing, asymmetric crypto, and a true random number. Additionally, it offers comprehensive key management and secure storage features. The HSM provide users with a selection of various performance levels for cryptographic algorithms, support multitasking and parallel processing with isolated environment, and enable secure applications to be called both in user mode and kernel mode. They can offer core cryptographic acceleration support for various information security systems.

Product Advantages

·The HSM based on the ultimate performance of its own hardware platform, offers the most cost-effective.


Product Features

·Multitasking Parallelism

   The HSM supports the simultaneous initiation of multiple cryptographic invocation tasks on a single card for secure applications. Users can open multiple sessions concurrently, with each session performing its own cryptographic tasks without interference.


·Session Resource Isolation

   While supporting multiple concurrent sessions, the HSM ensures the isolation of session resources, preventing the cross-use of resources such as session keys, thus safeguarding the security of each session. This is suitable for virtualized and cloud application environments.


·VPN Composite Operations

  Tailored for the cryptographic operation scenarios of VPN devices, the crypto card provides a one-time processing interface for "symmetric operation + HMAC operation" composite VPN operations, reducing the number of communications between the upper layer applications and the HSM, significantly enhancing the overall performance of VPNs.


·Multi-Channel Crypto

  The HSM is designed with an “ multi-channel crypto implementation mechanism." In practical applications, even when multiple cryptos are invoked simultaneously, users can still achieve the highest performance experience without any blocking , offering significant practical value.


·Multiple Authentication

  Methods Users can freely choose the authentication method based on the actual security application scenario: Password - for environments where it's inconvenient to use USBKeys USBKey - for situations where it's inconvenient to enter passwords Password + USBKey - for occasions requiring higher security, with two-factor authentication.


·Configurable Resources

  Each HSM has limited total resources, but depending on the requirements of the application scenario, resources can be dynamically allocated between "number of sessions" and "cryptographic resources within a session."