ESAM Multi-function of the most secure embedded module

ESAM  Multi-function of the most secure embedded module
ESAM  Multi-function of the most secure embedded module
ESAM  Multi-function of the most secure embedded module

Product Details:

  • Brand:csm branch
  • Serial Number: Esam
  • Country of Origin:Guangdong
  • Certificate:ISO7816

Payment & Shipping Terms:

  • Price Quote:Negotiable
  • Minimum Order: 10
  • Average Delivery Time:<10k within 10 days
  • Payment Method:T/T,Western Union,Paypal
  • Package Details:50pcs /tube,2000pcs per carton,or demand
  • Ability to Supply:10000 units per day
Contact Us

What is ESAM?
ESAM (Embedded Secure Access Module) is the Embedded security control Module.ESAM hardware has a sensor (voltage, clock, temperature, light, filter (prevent rush/burr), independent of the internal clock (CLK), (SFI) detection mechanism, passive and active shield, glue logic (difficult to reverse engineer circuit), handshaking circuits, high density multi-layer technology, with a metal shield protection layer, to detect internal data self-destruct after external attack, encryption, virtual address bus and the memory chip tamper-proof design, unique serial number and hardware error detection, random number generator, the silicon power analysis and so on security structure,With anti-detection, anti-attack, self-destruct and other hardware security features.ESAM chip operating system has the characteristics of secure file key storage, perfect security mechanism, standard encryption algorithm and so on.
The application of ESAM security module is related to a variety of special or general intelligent devices. For all the products and application systems requiring high data security requirements such as identity authentication, data encryption/decryption, safe storage, communication confidentiality and so on, ESAM embedded security control module can play its unique role in security control.It has two - way identity authentication, data encryption and decryption, decentralized key export, internal decentralized key, digital signature, electronic wallet, transmission line protection, data security storage and other functions.

esam sop

Applications of the ESAM security module include:
1) Smart card meter: smart card electricity meter, water meter, gas meter, heat meter, etc.;
2) Communication equipment: encrypted Modem, encrypted fax machine, encrypted multiplexer;
3) Financial equipment: encryption password keyboard, financial POS machine, payment password, bank password box;
4) Tax-controlled equipment: tax-controlled taxi meter, tax-controlled refueling machine, tax-controlled cash register;
5) Traffic toll: parking meter, bus toll terminal, vehicle-mounted road and bridge toll terminal equipment;
6) Conditional reception: TV set-top box (STB), PC receiving card, add and de-disturb front end/terminal equipment;
7) Network security: LAN management, login, folder encryption, software protection;
8) Other equipment: smart card water dispensers, smart card charging air conditioners, Internet TV and other equipment.
Key feather
· Adopt high-end secure smart card dedicated secure microprocessor as the hardware platform;
· The internal chip operating system COS adopts TIMECOS, which is the first COS with independent intellectual property rights in China, and the cumulative usage is huge
With over 400 million pieces, it enjoys a high security reputation in the domestic smart card industry.
· Comply with ISO7816, EMV, GSM, PBOC and other international standards and industry standards;
· Support multi-level file structure, can establish a three-level directory, suitable for the requirements of one card and multi-purpose, support binary, fixed-length records,
Variable length records, circular records, wallet records and other file types;
· Supports symmetric algorithms DES/3DES, MAC, high-end chips support asymmetric RSA/ECC algorithm, compatible with symmetric algorithms;

ESAM CPU card

Implementation method
(FYI)
1, key installation

● Application software needs to install: authentication key SK (or decentralized key)
The application software should have DES and an algorithm for generating random numbers
● Installation in ESAM: authentication key SK '(or disperse key) or an important parameter for program execution
2. Software certification process
● Apply software to generate random numbers
● Send random number to ESAM for encryption and return the result X '=DES(SK',RND)
● The software calculates the authentication code X=DES(SK,RND) with its own decentralized key
● Software comparison

Security features
· The chip hardware security has obtained ITSECEAL Level 5 certification;
· Chip tamper-proof design, unique serial number, with measures to prevent SEMA/DEMA, SPA/DPA, DFA and timing attacks;
· Various safety detection sensors: high and low voltage sensors, frequency sensors, filters, optical sensors, pulse sensors,
Temperature sensor, with sensor life test function;
· Bus encryption, with active shielding layer, internal data self-destruct after external attack is detected;
· True random number generator: it is generated by electromagnetic white noise inside the chip and will not be repeated;
· Hardware encryption coprocessor: internal hardware logic circuit realizes symmetric algorithm 3DES, asymmetric algorithm RSA or ECC, plus solution
High density speed.

Success cases:
China Gas  
Hikvision
Hunan Expressway Toll Station

ESAM CPU Cards ESAM Access control security module Esam E-wallet security module  SOP package or PVC CR80 Cards package

Contact us now!

Related Products:

Get in Touch with us

Still have Questions

Our Headquarters

Work Time :
9:00-21:00(Beijing time)
Business Phone :
86-0755-23158400(Working time)
Factory Address :
F/5,Hasee computer building,No.2 bei'er Rd,Bantian St.,Longgang district,Shenzhen,518129,China

Send Us an Email

contact us