Device and application security solutions provider, Trustonic has announced that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities. Healthcare devices have become top targets for cybercriminals due to their critical nature, the valuable intellectual property they employ and the sensitive personal information that they collect and store. Research shows that there were 8.2 attempted cyber-attacks per connected healthcare endpoint in each month of 2018. Smart diagnostic platform OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform To ensure security, privacy and high performance, OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform, which integrates Trustonic’s Trusted Execution Environment (TEE). OPTOLANE’s in vitro diagnostic (IVD) platform, called LOAA (Lab on an Array) Analyser, examines blood and tissue samples for multiple targets, including DNA, RNA, proteins and metabolites, in real-time. It was developed to satisfy market demand for ‘sample to answer’ IVD tools and enables sample extraction through to analysis with a single cartridge. “Investment in connected healthtech is increasing and IVD is an important segment in the global diagnostics industry,” comments Ben Cade, CEO of Trustonic. “These solutions add significant value to diagnosis and treatment, enhancing the well-being of the general public while increasing productivity and reducing costs. But, where personal data this sensitive is being captured, processed, and transmitted, the appropriate steps must be taken to protect it from malicious actors.” Trustonic security platform Trustonic’s hardware-backed security platform, TSP, enables secure and private data extraction, processing, storage and transmission. The technology: Enables a secure image processing channel from the sensor to the application processor; Provides cryptographic tools to protect individuals’ sensitive medical data; Ensures data integrity; Creates a secure environment to run algorithms analysing raw data from the sensor; Encrypts sensitive data when being shared with the cloud. Do Young Lee, CEO of OPTOLANE, says “There is clear demand for innovative new diagnostics solutions that go from ‘sample-to-answer’ in real-time. Importantly, though, we fully understand our responsibility to protect patient data." Enhanced data security To deliver connectivity while protecting the sensitive personal data collected by diagnostic devices, we needed a proven hardware-backed security foundation. Trustonic’s experience protecting smartphones, wearables and IoT hardware, and securing critical mobile applications in the financial and automotive sectors, is assurance that our devices and patient data are secured to the highest standard.” OPTOLANE expects to receive FDA certification for the new device in the first quarter of 2020. Once certification is achieved the product will be available to clinicians in healthcare facilities around the world.
Mobile cybersecurity pioneer, Trustonic, announced that it has joined the PCI Security Standards Council (PCI SSC) as a new Participating Organisation. Trustonic will work with the PCI SSC to help secure payment data worldwide through the ongoing development and adoption of the PCI Security Standards. The PCI SSC leads a global, cross-industry effort to increase payment security by providing flexible, industry-driven and effective data security standards and programs. The keystone is the PCI Data Security Standard (PCI DSS), which provides an actionable framework for developing a robust payment card data security process and preventing, detecting and mitigating criminal attacks and breaches. Improving payment security worldwide As a Participating Organisation, Trustonic adds its voice to the standards development process and will collaborate with a growing community of more than 800 Participating Organisations to improve payment security worldwide. Trustonic will also have the opportunity to recommend new initiatives for consideration to the PCI Security Standards Council and share cross-sector experiences and best practices at the annual PCI Community Meetings. PCI Security Standards and resources help organisations secure payment data and prevent, detect and mitigate attacks"“In an era of increasingly sophisticated attacks on systems, PCI Security Standards and resources help organisations secure payment data and prevent, detect and mitigate attacks that can lead to costly data breaches,” said Mauro Lance, Chief Operating Officer of the PCI Security Standards Council. “By joining as a Participating Organisation, Trustonic demonstrates they are playing an active part in improving payment security globally by helping drive awareness and adoption of PCI Security Standards.” Protecting payment apps, data from hackers “Standards are the foundations for cyber resilience and the delivery of simpler, richer and more secure payment services,” said Ben Cade, CEO of Trustonic. “Our technology has always been built on open standards, making it easier for financial services providers, developers and merchants to protect payment apps, data and IP from hackers and malware. “Using smartphones as contactless mPOS terminals is one of the most exciting and disruptive trends in the payment technology space, but it presents new security challenges that can only be adequately resolved with a Trusted User Interface (TUI) secured by a hardware-based Trusted Execution Environment. As leaders in mobile app protection, we are perfectly placed to support our partner banks and fintechs with insight into challenges like this and how PCI standards are working to address them.”
Mobile security provider Trustonic announces a partnership with Rubean AG, an established mobile security-focused fintech, and CCV, an European payment solution provider, to develop an mPOS solution that accepts higher value transactions by enabling hardware-protected PIN entry on a range of commercial off-the-shelf (COTS) smartphones. Using a smartphone as a mobile point of sale (mPOS) solution enables traders, small retailers and SMBs to save money on costly payment acceptance hardware, improve staff efficiency and increase customer satisfaction. Payment platforms and solution providers also benefit, as they can eliminate the costs associated with procuring and managing traditional POS terminals. The ease of adding new functionalities to smartphone apps will also shorten time to market for innovative new digital marketing and customer loyalty features. Software security technologies The platform includes Trustonic’s Trusted User Interface (TUI), which isolates and protects sensitive input The Trustonic Application Protection (TAP) platform protects mobile applications by securing sensitive code, data and processes in a heavily protected environment. The environment also constantly upgrades over the course of an app’s lifecycle to take advantage of the most advanced hardware and software security technologies available on smartphones. The platform includes Trustonic’s Trusted User Interface (TUI), which isolates and protects sensitive input and display interactions – like PIN entry – in app UIs. The TAP development toolkit enables developers to easily develop and deploy apps, delivering the best protection available whatever the user’s device. Through CCV’s server platform ‘acCEPT’, both payment intelligence and security-critical elements can be mapped to smartphones via an app, as the payment processing takes place predominantly in the secure PCI-DSS cloud. Payment terminal client Rubean protects, personalises and monitors CCV’s payment terminal client on smartphones in compliance with the payment schemes’ security requirements. As an essential part of Rubean’s infrastructure, TAP protects cardholder’ PIN entry, enabling higher-value transactions and increasing convenience for merchants and consumers. Ben Cade, CEO of Trustonic, says: “Using smartphones to make payments instead of your card is already widely adopted by consumers, and using the same devices as contactless mPOS terminals for merchants is one of the most exciting and disruptive trends in the payment technology space.” Multiple card networks The top payment schemes have supported the concept of a ‘smartphone-only’ payment terminal since 2017" “Using a TUI secured by a hardware-based Trusted Execution Environment is widely regarded as best practice for app-based mPOS implementations and, by using TAP, this is exactly what developers can achieve. This is nuanced security delivering simpler, richer and faster user experiences. We are committed to supporting the development of CCV & Rubean’s hardware-protected PhonePOS solution and its rollout on some of the world’s largest smartphone brands.” Hermann Geupel, CEO of Rubean AG, comments: “The top payment schemes have supported the concept of a ‘smartphone-only’ payment terminal since 2017. In response to increasing demand from banks and merchants, Rubean & CCV plan to launch a smartphone-only payment terminal with card PIN entry functionality with multiple card networks and partners throughout Europe. Trustonic’s TAP toolkit provides us with the most advanced and secure user interface for enabling secure PIN entry on COTS smartphones.”
Mobile-device and application-security technology company Trustonic announces that Hyundai Motor America will demonstrate its new Digital Key app, secured by Trustonic Application Protection, at the New York International Auto Show 2019. The Digital Key will launch with the all-new 2020 Hyundai Sonata in the fall. Hyundai’s Digital Key is a downloadable smartphone app that can replace a traditional car key by leveraging Near Field Communication (NFC) to detect an authorised smartphone. An NFC antenna is located in the driver’s door handle for locking and unlocking while a second antenna for starting the engine is located in the wireless charging pad in the centre console. Seamless vehicle sharing The Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication Once authorised, the Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication. A user can lock and unlock the vehicle, activate panic alert and start the engine within a range of about 30 feet of the car. The new Digital Key can be utilised by up to four authorised users, facilitating seamless vehicle sharing. Users’ preferred settings are also stored in the car, meaning that when a user is recognised, the vehicle automatically adjusts settings for side mirrors, radio presets, sound settings, and seat positioning. Hyundai is using Trustonic Application Protection (TAP) to secure the Digital Key. TAP ensures that Digital Key transfer requests are securely displayed to and approved by a real, authenticated user on a trusted device. Cybersecurity approach TAP utilises a multilayered industry-recognised security approach for communication to and from the customer’s phone. “Hyundai has been a leader in connected car technology for a long time now, with new features like Apple CarPlay, Android Auto, Smartwatch and Smart-speaker integration into our vehicles,” said Manish Mehrotra, director of digital business planning and connected operations, Hyundai Motor America. “Digital Key adds convenience for 2020 Sonata owners and allows us to be ready for future shifts in the mobility space, such as car sharing. We chose Trustonic because of their multilayered, industry recognised cybersecurity approach.” Vehicle-function permissions Hyundai’s Digital Key will enable easy car sharing and improved user experiences" Car owners have a deeper level of access than other authenticated users, enabling them to set vehicle-function permissions and the duration of access for each shared user. This enables uses beyond car sharing, such as enabling couriers to access the trunk within a pre-agreed window of time to deliver a package. Future uses that the app could enable include car rentals, triggering an alarm when a vehicle travels outside a designated area and remote control of features, such as autonomous parking. Ben Cade, CEO, Trustonic, adds, “Consumers expect to be able to manage their lives on their smartphones, and this includes their vehicles. Hyundai’s Digital Key will enable easy car sharing and improved user experiences for drivers—and as international leaders in app security, it’s up to us to ensure this can happen in a scalable and secure way.”
Analyst forecasts of the number of connected devices deployed over the next decade range into the hundreds of billions. With the vast potential value that IoT brings, also comes a growing concern that those billions of devices and the data they process remain under-protected, posing a serious security threat. Trustonic is pleased to announce that it is enabling the world’s premier microcontroller (MCU) supplier, Microchip Technology Inc., to provide their customers with a secure platform and strong device identity pre-embedded into their MCUs, providing enhanced security capabilities that can be leveraged across the value chain and IoT ecosystem. Product variants of Microchip’s SAM L11 MCUs contain Trustonic’s Kinibi-M security platform and are based on the Arm Cortex-M23 core featuring Arm TrustZone for Armv8-M, a programmable environment that provides hardware isolation between certified libraries, IP and application code. SAM L11 MCUs also include proprietary chip-level tamper resistance, secure boot and secure key storage. Trustonic’s Kinibi-M software is a modular, hardware-secured Trusted Execution Environment (TEE), specially designed for size-constrained IoT chipsets Protects software and IP Built using the expertise already gained from securing over 1.5 billion mobile devices, Trustonic’s Kinibi-M software is a modular, hardware-secured Trusted Execution Environment (TEE), a secure operating system (OS) that has been specially designed for size-constrained IoT chipsets. It is designed to ease development and leverage Trustonic’s implementation resources, saving developers from having to develop expertise in-house. In order to trust data coming from an IoT device, you first need to be able to trust the device itself. To achieve this, Trustonic embeds a unique and distinct identity for every device during silicon manufacture. Kinibi-M technology enables device makers to: - Record and attest to manufacturing steps, preventing opportunities for fraud & counterfeiting in the supply chain - Protect software and IP on devices throughout their entire lifecycle - Ensure that updates, personalization and secrets can be securely delivered - Enable devices to identify themselves in the field – for example to enable automatic cloud enrolment Trustonic’s solution is supplemented by its breakthrough technology, Digital Holograms, which enables manufacturers to prove that devices connecting to their systems are legitimate and have been through the correct and audited manufacturing stages. Trustonic’s device attestation can enable proof of secure manufacture or proof of legitimate deploymen Secure OS and Digital Holograms In addition to the key advantages of enabling data to be trusted and devices to be kept secure, Kinibi-M also offers: - Device Provenance: Manufacturing and lifecycle stages can be securely recorded using Digital Holograms. At any future stage in the device lifecycle, Trustonic’s device attestation can enable proof of secure manufacture or proof of legitimate deployment. For example, cloud services can leverage this capability to automatically onboard attested devices and reject counterfeits. - Supply Chain Protection: Together the secure OS and Digital Holograms prevent individual devices from being cloned, IP or keys from being removed from a device, or devices from being over-produced. Any attempt to create counterfeit devices can be detected in-factory or in-field using Trustonic attestation services and the fraudulent production step can be highlighted. - Software Isolation & IP Protection: Code modules are isolated from each other, reducing both the risks associated with errors elsewhere on the device and the potential for firmware updates to invalidate assumptions made during certification. This enables others further down the device’s production chain to add additional software or customization in a safe and secure way. Additionally, IP protection ensures that sensitive code and data cannot be extracted, copied, removed, modified or tampered with. This is essential, as the IP on a chip is often of greater value than the complete device. Trustonic’s mission is to provide the best security and to remove the cost and complexity that often accompanies strong security" Revolutionary IoT security “IoT end points often require low power and high security,” said Rod Drake, vice president of Microchip’s MCU32 business unit. “However, the growth of IoT nodes is happening so fast that security is not always adequately addressed. The features of the SAM L11 are exactly what customers need to plan for security early in the design cycle and throughout the remainder of the device’s life.” Ben Cade, CEO of Trustonic, concluded: “Trustonic’s mission is to provide the best security and to remove the cost and complexity that often accompanies strong security. Our technology is already embedded in over 1.5 billion mobile devices, and we’ve now applied our expertise to simplifying the process for developing and deploying secure IoT devices. We are enabling Microchip SAM L11 microcontrollers to have a secured trusted identity when they leave the factory, so that subsequent events, additions and developments are built on a truly secure foundation that can be leveraged through the device’s entire lifecycle. We are committed to ensuring that connected devices have the best possible security protections, and we’re delighted to be working with Microchip to deliver revolutionary IoT security to the market.”
3 reasons to migrate to a new access control systemDownload
Schooling the market on education securityDownload
Lawrence, Massachusetts deploys FLIR video system for safetyDownload