{"id":6370,"date":"2026-02-03T14:51:57","date_gmt":"2026-02-03T06:51:57","guid":{"rendered":"https:\/\/www.alyadvisory.com\/?p=6370"},"modified":"2026-02-10T15:10:24","modified_gmt":"2026-02-10T07:10:24","slug":"alya-hsm","status":"publish","type":"post","link":"http:\/\/www.alyadvisory.com\/?p=6370","title":{"rendered":"ALYA HSM"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-6406 aligncenter\" src=\"http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-1-3-300x300.png\" alt=\"\" width=\"500\" height=\"500\" srcset=\"http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-1-3-300x300.png 300w, http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-1-3-1024x1024.png 1024w, http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-1-3-150x150.png 150w, http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-1-3-768x768.png 768w, http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-1-3-1536x1536.png 1536w, http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-1-3-12x12.png 12w, http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-1-3.png 2048w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p><strong>PRODUCT OVERVIEW<\/strong><\/p>\n<p>ALYA HSM complies with FIPS 140-2 Level 3 security. It could be adapted to various kinds of cryptographic security systems to ensure the confidentiality, integrity, and effectiveness of the transmitted information through its digital signature and encryption functions. These functions are achieved by high-speed and multi-task parallel processing cryptographic operations.<\/p>\n<p><strong>PRODUCT FEATURES<\/strong><\/p>\n<p><span style=\"color: #00ccff;\">Cryptographic Algorithms<\/span><\/p>\n<p>Asymmetric algorithms: RSA, DSA, ECDSA, and EdDSA<\/p>\n<p>Symmetric algorithms: DES\/3DES<\/p>\n<p>HASH algorithms: SHA1\/SHA2, and MD5<\/p>\n<p><span style=\"color: #00ccff;\">High Availability<\/span><\/p>\n<p>Support cluster load-balancing, which is transparent to the upper applications and simple to deploy<\/p>\n<p>Support redundant power supply<\/p>\n<p>Support network bonding mode<\/p>\n<p><span style=\"color: #00ccff;\">Support Standard Interface<\/span><\/p>\n<p>Support International interface standards such as PKCS#11,JCE, etc.<\/p>\n<p>Support a rich set of command<\/p>\n<p><span style=\"color: #00ccff;\">High Maintainability<\/span><\/p>\n<p>Rich audit logs<\/p>\n<p>Support SNMP, syslog and NTP<\/p>\n<p><span style=\"color: #00ccff;\">Physical Security <\/span><\/p>\n<p>Tamper resistant and responsive design Sensitive data erased immediately in the event of any tamper attack EFP features for voltage and temperature The case design prevents visibility on the internals and probe into the module<\/p>\n<p><span style=\"color: #00ccff;\">Logical Security <\/span><\/p>\n<p>Three-layer key protection All keys and sensitive data are stored in ciphertext Access control methods such as IP white-list, connection password, etc. Supports TLS secure channel Two-factor authentication of crypto officers using USB tokens<\/p>\n<p><strong>COMMON USE CASES<\/strong><\/p>\n<p>\u2022 Card issuing, such as payment cards and other smart card applications<\/p>\n<p>\u2022 Card payment authorization<\/p>\n<p>\u2022 Secure key management<\/p>\n<p>\u2022 PBOC cryptogram validation<\/p>\n<p>\u2022 EMV cryptogram validation<\/p>\n<p>\u2022 PIN Assurance<\/p>\n<p>\u2022 PIN, KEY and Data Transmission Encryption<\/p>\n<p>\u2022 Data encryption and decryption<\/p>\n<p>\u2022 Signature and verification<\/p>\n<p>\u2022 Data integrality protection<\/p>\n<p><strong>SECURITY &amp; SAFETY COMPLIANCES<\/strong><\/p>\n<p>\u2022 FIPS140-2\u00a0Level\u00a03<\/p>\n<p>\u2022 CE,CB,VOC,FCC,\u00a0KC,\u00a0RoHS,IPv6<\/p>\n<p>\u2022 ISO\/IEC\u00a019790:2012<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PRODUCT OVERVIEW ALYA HSM complies with FIPS 140-2 Level 3 security. It could be adapted to various kinds of cryptographic security systems to ensure the confidentiality, integrity, and effectiveness of the transmitted information through its digital signature and encryption functions. These functions are achieved by high-speed and multi-task parallel processing cryptographic operations. PRODUCT FEATURES Cryptographic [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6406,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-6370","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-products"],"_links":{"self":[{"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/posts\/6370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6370"}],"version-history":[{"count":8,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/posts\/6370\/revisions"}],"predecessor-version":[{"id":6407,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/posts\/6370\/revisions\/6407"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/media\/6406"}],"wp:attachment":[{"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6370"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}