No results found. Please try re-entering the product name
Ping An Cloud Digital Signature Service uses the dedicated physical devices certified by the State Cryptography Administration and the virtualization technology to provide flexible, highly available and high-performance data security services such as digital signature and signature verification in accordance with national requirements for regulatory compliance. It is applicable to various business scenarios with high requirements for data integrity and non-repudiation to ensure the security of your business data.
The product uses the dedicated hardware certified by the State Cryptography Administration. Cloud signature instance resources are exclusive to users, meeting compliance requirements.
The dedicated encryption hardware ensures that the cloud platform does not access data in user instances. A tenant is bound to the instance he purchased and isolated from other tenants.
In addition to stand-alone mode, it also supports cluster mode, double live load balancing and performance doubling.
Tenants can purchase on a monthly or annual basis, and do not have to cover the procurement and subsequent maintenance costs incurred when purchasing traditional encryption hardware.
electronic policies
online banking and electronic payment
securities and futures trading systems
electronic medical records
OneConnet
It fully supports domestic algorithms and mainstream international common cryptographic algorithms, including SM1/SM4/DES/3DES/AES (symmetric), SM2/RSA (asymmetric), SM3/SHA1/SHA256 (abstract), to meet users’ various demands related to PKCS#1 and PKCS#7 digital signatures.
It provides the function of the secure and compliant management of users’ keys and certificates. Key management includes key generation, secure storage and destruction. Certificate management supports the generation of users’ requests for signature certificates, certificate import and management, CRL(certificate revocation list) management and so on.
As the authorities of cryptographic machine management and sensitive information management are separated, the operation and maintenance personnel of Ping An Cloud cannot access users’ keys. In addition, each instance supports the separation of responsibilities of system administrators, security and confidentiality administrators, and security auditors.
To ensure high availability of users’ instance, the system provides automatic fail-over switching function by default. The Acitve-Active clusters option is also available for specific instances types to meet user requirements for high availability.
By Month
By Year
Call us
400-151-8800
Email us
cloud@pingan.com