Capabilities




Cryptographic Security Services

3Si's advanced secure server technology offers hardware- and software-based cryptographic security products and services to secure enterprise servers and gateways. 3Si's Cryptographic Support Server (3SCSS) can be integrated either at the application layer, the network layer, or both, to provide high assurance security solutions.

3Si uses private and publie key cryptography to provide security services. These include encryption, hashing, digital signature, non-repudiation and trusted time-stamping, and verification of signatures, time-stamping, and certificates.

3SCSS provides these services via an extensible set of industry standard APIs. It utilizes Government and commercial algorithms and mechanisms, and works with a variety of tokens--hardware, software, and virtual--as well as smart cards.

3SCSS

3Si's expertise ranges from hardware and software development to turnkey integrated security solutions. 3Si offers a security framework (Figure 1), which serves as a common platform for supporting many different algorithms, tokens, and protocols, each with unique security properties. This integrated framework achieves solutions custom tailored to your needs, yet interoperable among the diverse mix of technologies, products and frameworks that exist today.

The hardware board with multiple cryptoprocessors provides high performance by offloading cryptographic processing from the host server machine. Its flexible and modular design facilitates scalability and redundancy. The number of cryptoprocessors and co-processors is adaptable to match your bandwidth needs at an affordable price.

Hardware algorithms, secured firmware, secure time clock and on-chip randomizers provide high assurance with superior performance- features not typically possible in software-based cryptographic solutions.


3SCSS Framework Components

The Security Manager stores and retrieves users' virtual tokens, which contain the individual users' keys and certificates. These virtual tokens are cryptographically protected. It manages an unlimited number of concurrent sessions or connections, constrained only by the computer hardware resources. The Security Manager also performs security administration.

The Security Manager is the interface (via the CAPI) between the users (or server applications) and security services such as:
  • Strong authentication
  • Certificate management
  • Access control
  • Cryptographic
These services are necessary in building a secure solution for protecting information and data in a diverse, complex, networked environment. As as enabling product, the 3SCSS system can support a mix of server applications such as database, Web, mail, electronic commerce, and many others.