TrustNET is a public key-based electronic authentication framework designed to enhance the stability of information systems, such as e-commerce platforms and other internet based service platforms. It provides authentication capabilities for users and messages connected over the network, ensuring secure and reliable interactions.
- Enables PKI-based security services without additional modifications by supporting a wide range of operating systems and development languages.
- Provides tailored client solutions optimized for the customer's environment, improving system efficiency.
- Offers a Non-Plugin client module that eliminates the need for browser plugins like ActiveX, reducing unnecessary installations and minimizing error occurrences.
High Expertise in Authentication Technology | - Provides private certification solutions with diverse functionalities to replace discontinued public certification systems. |
---|---|
Customized Client Solutions | - Delivers tailored clients optimized for the specific needs of each customer, allowing lightweight reconfiguration with only essential features. |
Support for Various Operating Environments | - Compatible with multiple structures and application environments, including web-to-browser, client-to-server, and server-to-server configurations. |
Comprehensive Standard Support | - Fully supports KCMVP (Encryption Module Verification) and domestic standard algorithms, as well as other public key algorithms and cryptographic standards. |
Speed and Stability Assurance | - Ensures high stability and processing speed through designs optimized for multi-threaded environments, achieving approximately 0.003 seconds for 1K electronic signing/verification. |
Trust KMS is a secure cryptographic key management solution that utilizes HSM (Hardware Security Module) for safe key handling. It provides comprehensive management of the cryptographic key lifecycle, ensuring full preparedness for security audits.
- Enhances data protection by providing robust encryption key management.
- Supports lightweight algorithms such as LEA and LSH for IoT environments.
- Compatible with Windows, Linux, Unix, HP, Solaris, Embedded OS, Mobile OS, and Micro Chipsets.
1. Agent Management |
- View the list of registered agents. - Configure accessible cryptographic keys for each agent. |
---|---|
2. Cryptographic Key Management |
- Support for various encryption algorithms (SEED, ARIA, AES, LEA, HMAC). - Options for automatic or manual key generation. |
System Monitoring |
- View audit logs for administrators managing cryptographic keys. - Access service logs related to key requests. |
4. Additional Features |
- Automatic and manual database backup with restoration capabilities. - Download encrypted database backup files. |
Private authentication system for building PKI infrastructure
User authentication, section data encryption/electronic signature system
Medical personnel authentication, medical data encryption/electronic signature system
KMS(Key Management System) Solution
Email Attachment Encryption Solution
PC to SmartDevice Data Transfer Solution
Terminal authentication, section encryption/electronic signature solution based on lightweight environment
National Intelligence Service Cryptographic Module Verification Phil Cryptographic Library