SAM Appliance
An all-in-one solution for data encryption, digital signature authentication and mobile identification
SAM Appliance
An all-in-one solution for data encryption, digital signature authentication and mobile identification

SAM Auth Server with Internal HSM
Suitable for: Businesses using a digital signature system for the first time or for testing systems, with reasonable initial investment costs.

SAM Appliance with External Network HSM
Suitable for: Medium to large-scale businesses with significant, complex digital signature needs, requiring a systematic and rigorous process automation.

Full compliance with international standards
- FIPS 140-2 level 2 & level 3 security certifications
- ISO 9001:2015, ISO 14001:2015 and ISO 27701:2022 CSC 1.0, CSC 2.0 compliant and Rest API Service Interface
- SCA PSD2/eIDAS compliance and CC EAL4+ AVA_VAN.5 certification and ALC_FLR.2 certificate for EN 419 221-5 security standard
- Compliance standards: GDPR, SOC 2 Type II, HIPAA & PCI DSS
- Comply with the Payment Services Directive (PSD2/PSD3) for customer authentication
- Comply with Circular 64/2024/TT-NHNN on safety and API security for the provision of Open API banking
- Comply with Circular 50/2024/TT-NHNN on safety and security for the provision of online services in the banking industry

Outstanding advantages of SAM Appliance
- Quick installation and operation
- Seamless integration with existing information systems
- Operates independently, specialized, without reliance on third parties
- Maximizes time and cost savings on investment
- Unlimited expansion according to business scale
- Supports integration through protocols: JAVA (JCE), OpenSSL, PKCS#11 with HSM
-
Supports encryption algorithms and standards:
+ Asymmetric public key algorithms: RSA (Key size: 2048-4096 bits), ECDSA (P256-384 bits)
+ Symmetric public key algorithms: AES, HMAC, SHA-224 HMAC, SHA-256 HMAC, SHA-384 HMAC, SHA-512 HMAC.
+ Keys generated conform to standards such as PKCS#1, JWT/JWS, with algorithms like RSA/ECDSA (key sizes compliant with the above algorithms).
+ Hash/Message Digest algorithms: SHA-2, SHA-3.
Features

Electronic Identification
Verify user identities in applications, ensuring reliability, accuracy, and security for electronic transactions, while complying with state and European eIDAS regulations.

Secure Digital Signatures
Support advanced signature standards such as ISO 17090 standards like CadES, PadES, XadES, as well as LTV and LTANS standards for electronic storage and authentication.

Blockchain/Cryptocurrency
Manage keys and generate digital signatures within the blockchain system, ensuring authentication, safety, and security for all data and digital assets/cryptocurrencies.

Mobile Payment/Digital Wallet
Integrate with electronic transaction systems and e-wallets to ensure secure online payment transactions with authentication, management, and digital signature generation.

PKI In A Box
Deploy a public key infrastructure (PKI) infrastructure, packaged in a hardware device, to meet the need for building a specialized internal public infrastructure.

Data Encryption -
Transaction Encryption
Encrypt data and transactions, ensuring that all information cannot be stolen or tampered with during initiation, storage, and transmission.

Timestamping
Apply timestamping to data and documents to establish evidence and authenticate the existence of data at a specific point in time.

Electronic Storage
Have the ability to integrate with long-term electronic storage systems, allowing high-quality document storage for 10 years, 20 years, 50 years, or indefinitely.

System Authentication and Security
Compute and log all signing operations, system operations, ensuring traceability and control of activity history.

Dynamic Workflow and System Integration
Initiate, review, and digitally sign documents from mobile devices such as laptops, tablets, and mobile phones