Seacert Features
- Industry standard security protocols
Seacert employs multiple-custody security protocols to protect sensitive keys. The protocols rely on the K-of-N threshold smart card technology and delegating access control technology of nCipher’s FIPS-140 certified hardware security modules. Seacert has integrated the nCipher technology into its Java-based operational mechanisms.
- Configurable development Tools
The Seacert team has developed three sets of tools to provide its cryptographic services: - Certification Authority (CA) Tools
Handle the issuance of root and subordinate certificates; the CRL and other remediation lists; and remediation report acceptance and archiving. - Cryptographic Provisioning Tool (CPT)
Generates packets (i.e. logical set of key, certificates and assertions to be associated with a single device or service) for multiple types of devices or services. This tool enables efficient and error-free online order and fulfillment. Further, the tool is neutral to the type of content protection system employed. - Order Processing Tools
Include an order unwrap/decrypt tool and include certificate signing request tool for services. - Comprehensive and reliable Operational Framework
Seacert’s procedures, online protocols, and human processes are well-documented for internal purposes. Customized for end customers using business-friendly PDF forms and industry-standard formats such as ZIP and PGP.
Read more about Seacert Benefits.
