Skip to content
JISA Softech Pvt Ltd
  • Home
  • About Us
  • Products
        • Hardware Security Module
        • Payment HSM
        • Enterprise Key Management
        • Data Security Server
        • Vaultbased Tokenisation
        • Vaultless Tokenisation
        • Aadhaar Data Vault
        • Data Masking
        • Column Level Encryption
        • Application Level Encryption
        • IoT Security Platform
        • Enterprise Code Signing
        • Data Privacy Vault
        • Authentication Solution
        • Aadhaar eKYC Middleware
        • Data Protection and Data Privacy Platform
  • Solutions
    • By Compliance
      • Digital Personal Data Protection act 2023
      • SEBI Cloud Services Adoption Framework
    • HSM-Certificate Authority Use Case
    • HSM-Code Signing Use Case
    • HSM-PKI Use Case
    • HSM-Database Encryption Use Case
    • HSM-Tokenisation Use Case
    • HSM-Digital Signing Solution Use Case
  • Resources
    • Blogs
    • Case Studies
    • Ebooks
    • Whitepapers
    • Latest News
  • Career
  • Contact Us
Get Demo
JISA Softech Pvt Ltd

Payment HSM

Home / Payment HSM
Hardware security module
CryptoBind® Payment HSM offers robust cryptographic support tailored for payment applications, safeguarding the entire lifecycle of cryptographic keys. As secure and tamper-resistant devices, CryptoBind Payment HSMs ensure the confidentiality, integrity, and availability of sensitive data.
India’s First Made In India HSM
PAYMENT HSM

PIN & Card Transaction
Verification

Encyption & Key Management

Supporting POS ATM Network Management
Protocol

Supporting Key/Data Exchange API standards

Generating PVV and CVV Data, Card Keyset

3-D SecureTM Issuance
& Authorization

Key Features

Below listed are some key feature of CryptoBind® Payment HSM (Hardware Security Module)
Clustering

High Availability & Disaster Recovery: CryptoBind Payment HSM supports clustering across multiple regions, ensuring uninterrupted service and robust disaster recovery capabilities.

Multi-Tenancy

Cryptographic Isolation: With up to 42 isolated partitions, each
CryptoBind HSM can securely support multiple customers or
applications simultaneously.

Multi-Mode Operation

Compliance Flexibility: Supports NIST FIPS 140-3 (Level-3) and PCI PTS HSM compliance on the same device. Additionally, non-FIPS mode allows for custom applications and algorithms.

Platform Software Hosting

Flexible Architecture: Through virtual machines, the CryptoBind Payment HSM enables the hosting of custom applications or algorithms within its secure FIPS boundary.

Post-Quantum Readiness

Future-Proof Security: Equipped to support emerging post-quantum algorithms in non-FIPS mode, with plans to incorporate these algorithms into FIPS mode upon NIST ratification.

API-First Design

Rapid Deployment: Accelerate time to market with a comprehensive software development kit and an API-first approach that simplifies integration across multi-cloud, hybrid, and OEM environments.

Cost Efficiency

Unified Solution: Achieve the lowest total cost of ownership (TCO) by reducing capital expenditure (Cap-Ex) and operational expenditure (Op-Ex) with a single HSM solution for both General Purpose and Payments needs.

Performance & Scalability

High Capacity & Speed: Manages millions of cryptographic keys and supports billions of transactions with superior performance and scalability.

Techical Specifications

Comprehensive Cryptographic Algorithms:
Asymmetric Keys:
  • RSA: PKCS#1 v1.5 and v2.2 (2K, 3K, 4K key sizes)
  • ECDH/ECDSA: p-curves, k-curves, Bitcoin curve secp256k1
Symmetric Keys:
  • AES (128, 192, 256-bit keys) with CBC, ECB, GCM, CCM, and CMAC − 3DES CBC/ECB modes
  • Generic secret: <=800 (sign and verify, HMAC multi-call)
Hash/Message digests:
  • SHA1, SHA2 (224, 256, 384, 512)
Key derivation:
  • SP800-108 counter mode, HMAC/ CMAC/HKDF/ECDH
Secure Operations:
Random number generation (SP 800-90).
M of N quorum control for fault tolerance.
Hardware root of trust
Secure boot
Cryptographic agility for future-proof security, including post-quantum cryptography
APIs
Java (JCA/JCE)
PKCS#11
Secure boot
Customer API’s
Physical Characteristics
Operating temperature: +10°C to +50°C (+50°F to +122°F)
Storage temperature: -10°C to +55°C (+14°F to +131°F)
Relative humidity: 10% to 95% non-condensing
RoHS Compliant
Complies with FCC standard for Electromagnetic compatibility (EMC)
Compliant to UL, CE, WEEE *
Dimensions (W x H x D): 17.2″ (437 mm) x 3.5″ (89 mm) x 25.5″ (647 mm)
Gross Weight: 52 lbs (23.59 kg)
Packaging (W x H x L): 26.7″ (678 mm) x 11.4″ (290 mm) x 34.5″ (876 mm)
Security Certifications
FIPS 140-3 Level 3 certified Cryptographic Boundary
PCI PTS-HSM 4.0 certified Cryptographic Boundary
Payment Functions
Integrated HSM: Combines general-purpose and payment HSM functionalities.
Cloud-Ready: Tailored for secure cloud environments, safeguarding issuers, payment switches, gateways, and acquirers.
LSPay API Library
TR-31 key block
TR-34 key transport
PIN translation formats (ISO-0/1/2/3)
Management & Monitoring
Advanced Partitioning: Multiple partitions with flexible resource allocation and role-based access control (RBAC)
Multi-Tenancy: Vendor as root of trust, supporting hybrid cloud deployments.
Secure Channels: TLS-model tunnel with Perfect Forward Secrecy (PFS) for untrusted environments.
Remote Administration: Manage securely with attested audit logs, tamper-evident protections, and zeroization features.
Secure key storage
Certificate storage
SecureMachine (run custom code in HSM boundary)
Mixed-mode (FIPS and non-FIPS) flexible partition
Custom fairshare design to meet cloud SLAs in multi-tenant deployments

Download Payment HSM Brochure

Download

JISA India R&D centre situated in Pune, is a core of a team with excellent technicians and think-tankers with the only objective of delivering simple, efficient and powerful device that meets one’s, particularly routine requirements on technological front. It is our endeavour to provide our consumers, a taste of the technology ahead.

Company
  • Home
  • About Us
  • Blogs
  • Case Studies
  • Whitepapers
  • Career
Products
  • Hardware Security Module
  • Enterprise Key Management
  • Vaultless Tokenisation
  • Vaultbased Tokenisation
  • Aadhaar Data Vault
  • Data Security Server
  • Data Masking
  • Data Privacy Vault
  • Column Level Encryption
  • Application Level Encryption
  • IoT Security Platform
  • Enterprise Code Signing
  • Authentication Solution
  • Aadhaar eKYC Middleware
Facebook Twitter Instagram Linkedin YouTube
  • Privacy Policy

©2024 JISA Softech Pvt. Ltd. All Rights Reserved

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

Scroll to top
  • Homepage
  • About Us
  • Products
    • Hardware Security Module
    • Enterprise Key Management
    • Vaultless Tokenisation
    • Vaultbased Tokenisation
    • Aadhaar Data Vault
    • Data Security Server
    • Data Masking
    • Data Privacy Vault
    • Column Level Encryption
    • Application Level Encryption
    • IoT Identity Platform
    • Enterprise Code Signing
    • Authentication Solution
    • Aadhaar eKYC Middleware
  • Solutions
    • By Compliance
      • Digital Personal Data Protection act 2023
      • SEBI Cloud Services Adoption Framework
    • HSM-PKI Use Case
    • HSM-Digital Signing Solution Use Case
    • HSM-Digital Signing Solution Use Case
    • HSM-Database Encryption Use Case
    • HSM-Certificate Authority Use Case
    • HSM-Tokenisation Use Case
  • Resources
    • Blogs
    • Case Studies
    • Whitepapers
  • Career
  • Contact Us
Privacy Overview
JISA Softech Pvt Ltd

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Powered by  GDPR Cookie Compliance