Modules
HSM Dinamo has been entirely developed with a modular architecture, with the aim of providing the client with the set of functionality required for their needs and allowing them to expand this set by adding new modules or new versions of existing modules.
It is possible that some of the functionalities described below are not present in your version of HSM or that the module that implements them has not been purchased. There is no direct relationship between API function and installed module, as different features of the same function can be served by different modules. With the exception of the Core (Core Crypto Engine State Manager) and State Manager modules, all the others are optional. If in doubt, contact your supplier for clarification.
The following table lists the modules(engines) available for this version of the manual. Check with your supplier for an updated list.
Module | Description | Optional |
---|---|---|
Core Crypto | General cryptographic functions. Symmetric, asymmetric and hash algorithms. Object management (cryptographic keys, certificates, certification chains, CRLs and binary files). | No |
State Manager | Monitoring CPU, memory, active sessions, hardware events. | No |
OATH | Two-factor authentication (password + tokencode) Open Authentication standard (OATH). | Yes |
SPB | Encoding and decoding of SPB - Brazilian Payment System - standard messages. | Yes |
XML Sign | XML document signing according to the W3C standard. | Yes |
EFT | Electronic Funds Transfer functions. | Yes |
EFT Direct | Electronic Funds Transfer functions with direct access. | Yes |
Pix | Functions for the Central Bank of Brazil's Instant Payment System. | Yes |
SVault | Functions for tokenization and data encryption with format preservation. | Yes |
TSP | RFC 3161 standard time stamp functions. | Yes |
Blockchain | Cryptographic functions compatible with public and private blockchains. | Yes |
In restricted operating modes, only the Core Crypto Engine and State Manager modules are available for loading, in accordance with the restrictions imposed by the appropriate standards, and only the algorithms of approved functions can be used.