SAM Auth Server
An all-in-one solution for data encryption, digital signature authentication and mobile identification
SAM Auth Server
An all-in-one solution for data encryption, digital signature authentication and mobile identification

SAM Auth Server with Internal HSM
Suitable for: Businesses using a digital signature system for the first time or for testing systems, with reasonable initial investment costs.

Full compliance with international standards
- FIPS 140-2 level 2 & level 3 security certifications
- ISO 9001:2015, ISO 14001:2015 and ISO 27701:2022 CSC 1.0, CSC 2.0 compliant and Rest API Service Interface
- SCA PSD2/eIDAS compliance and CC EAL4+ AVA_VAN.5 certification and ALC_FLR.2 certificate for EN 419 221-5 security standard
- Compliance standards: GDPR, SOC 2 Type II, HIPAA & PCI DSS
- Comply with the Payment Services Directive (PSD2/PSD3) for customer authentication
- Comply with Circular 64/2024/TT-NHNN on safety and API security for the provision of Open API banking
- Comply with Circular 50/2024/TT-NHNN on safety and security for the provision of online services in the banking industry

Features

Electronic Identification
Verify user identities in applications, ensuring reliability, accuracy, and security for electronic transactions, while complying with state and European eIDAS regulations.

Blockchain/Cryptocurrency
Manage keys and generate digital signatures within the blockchain system, ensuring authentication, safety, and security for all data and digital assets/cryptocurrencies.

Mobile Payment/Digital Wallet
Integrate with electronic transaction systems and e-wallets to ensure secure online payment transactions with authentication, management, and digital signature generation.

PKI In A Box
Deploy a public key infrastructure (PKI) infrastructure, packaged in a hardware device, to meet the need for building a specialized internal public infrastructure.

Data Encryption -
Transaction Encryption
Encrypt data and transactions, ensuring that all information cannot be stolen or tampered with during initiation, storage, and transmission.

Timestamping
Apply timestamping to data and documents to establish evidence and authenticate the existence of data at a specific point in time.

Electronic Storage
Have the ability to integrate with long-term electronic storage systems, allowing high-quality document storage for 10 years, 20 years, 50 years, or indefinitely.

System Authentication and Security
Compute and log all signing operations, system operations, ensuring traceability and control of activity history.

Dynamic Workflow and System Integration
Initiate, review, and digitally sign documents from mobile devices such as laptops, tablets, and mobile phones