Seacert Features


  • Industry standard security protocols

    Seacert employs multiple-custody security protocols to protect sensitive keys. The protocols rely on the K-of-N threshold smart card technology and delegating access control technology of nCipher’s FIPS-140 certified hardware security modules. Seacert has integrated the nCipher technology into its Java-based operational mechanisms.

  • Configurable development Tools
    The Seacert team has developed three sets of tools to provide its cryptographic services:
  • Certification Authority (CA) Tools
    Handle the issuance of root and subordinate certificates; the CRL and other remediation lists; and remediation report acceptance and archiving.
  • Cryptographic Provisioning Tool (CPT)
    Generates packets (i.e. logical set of key, certificates and assertions to be associated with a single device or service) for multiple types of devices or services. This tool enables efficient and error-free online order and fulfillment. Further, the tool is neutral to the type of content protection system employed.
  • Order Processing Tools
    Include an order unwrap/decrypt tool and include certificate signing request tool for services.
  • Comprehensive and reliable Operational Framework
    Seacert’s procedures, online protocols, and human processes are well-documented for internal purposes. Customized for end customers using business-friendly PDF forms and industry-standard formats such as ZIP and PGP.



Read more about Seacert Benefits.