industry news
Subscribe Now

Trustonic simplifies security for mobile and IoT apps developers

CAMBRIDGE, UK – 8 February 2016:  Trustonic, the leading provider of hardware-enabled security for smart devices announces Trustonic Hybrid Protection (THP). App developers can now more easily utilize the most advanced security capabilities available on a given device. THP makes it easier for developers to design in security from the start, and to deploy these enhanced services across the widest range of mobile and IoT devices.

Trustonic Hybrid Protection (THP) is an adaptable security solution bringing together the best of software and hardware secured solutions into one hybrid product. Trustonic combines its advanced hardware enabled security solutions found in over 500M devices, with software protection technologies licensed from whiteCryption. As a result developers can easily apply this security to their services, bringing simpler, faster and richer user experiences for consumers.

“Trustonic has been a key driver in the evolution of security in the mobile market and more recently the emerging IoT space,” said Ben Cade, CEO, Trustonic. “ Trustonic Hybrid Protection makes it simpler for apps developers to improve app security whilst being able to scale across a wide range of mobile and IoT devices.”

“This is a very positive step forwards in delivering secure apps, that scale and take advantage of hardware security when available”, said David Birch, Director of Innovation, Consult Hyperion.

It is not only Service Providers that are concerned about the security around the data on smartphones and tablets. Consumers are also increasingly focused on the security of their personal data. This will continue to increase as the range of apps using personal data to deliver compelling experiences diversifies, not only in mobile but also in devices linked to the home and car. Built-in device security is vital to giving consumers the ability to control who sees their data when.

“As more financial and personal interactions are done via mobile devices, security becomes even more important,” said Ken Wimberley, VP Product Manager from JP Morgan Chase. “Service providers and apps developers are looking for easier and more comprehensive ways of securing users’ data across all devices in a consistent way.”

 The Trustonic Hybrid Protection defaults to use Trustonic TEE Hardware Protection whenever the hardware is available, bringing the service provider the highest level of security the device can provide.  This not only provides higher security functionality but also offers the best performance for the user experience. Such as strong and easy PIN entry or fingerprint matching for user authentication. When the Trustonic TEE is not available, THP will revert seamlessly to provide best-in-class software enabled security protection. No changes in the application are needed.

While hardware protection will always deliver superior protection, the reality is that not every device includes such capabilities. Trustonic selected software protection and cryptographic technology from whiteCryption based on their proven track record delivering software security solutions to end markets including medical, automotive and mobile. THP unifies the best of all technologies under one API to simplify code development into a single source.

“WhiteCryption working with Trustonic brings improved security features to an even wider range of mobile devices whilst also enabling improved security for IoT products,” said Thorsten Held, Managing Director from whiteCryption. “The combination of technologies accessible through one API simplifies the process for apps developers to offer a range of security levels for their apps across a wide range of end devices.”

Another key aspect of THP is the simplicity of deploying these “trust enhanced” apps. THP utilizes state of the art asymmetric-based cryptography combined with installation and authorization protocols familiar to any mainstream app developer. As a result service providers have both control over where their services are deployed and visibility as to the security capabilities protecting those services across their install base.

About Trustonic

Trustonic integrates hardware-level security and trust directly into the devices through which we access today’s connected world. Trustonic simplifies user experiences in everything from mobile shopping and Internet banking to entertainment to collaborating in the workplace.  

Trustonic technology is embedded in over 400m smart connected devices, and partners with market leaders such as SamsungQualcommSymantec, andGemalto. To learn more about Trustonic and how it’s making your connected world a better place visit us at www.trustonic.com

Leave a Reply

featured blogs
Apr 24, 2024
Diversity, equity, and inclusion (DEI) are not just words but values that are exemplified through our culture at Cadence. In the DEI@Cadence blog series, you'll find a community where employees share their perspectives and experiences. By providing a glimpse of their personal...
Apr 23, 2024
We explore Aerospace and Government (A&G) chip design and explain how Silicon Lifecycle Management (SLM) ensures semiconductor reliability for A&G applications.The post SLM Solutions for Mission-Critical Aerospace and Government Chip Designs appeared first on Chip ...
Apr 18, 2024
Are you ready for a revolution in robotic technology (as opposed to a robotic revolution, of course)?...

featured video

MaxLinear Integrates Analog & Digital Design in One Chip with Cadence 3D Solvers

Sponsored by Cadence Design Systems

MaxLinear has the unique capability of integrating analog and digital design on the same chip. Because of this, the team developed some interesting technology in the communication space. In the optical infrastructure domain, they created the first fully integrated 5nm CMOS PAM4 DSP. All their products solve critical communication and high-frequency analysis challenges.

Learn more about how MaxLinear is using Cadence’s Clarity 3D Solver and EMX Planar 3D Solver in their design process.

featured paper

Designing Robust 5G Power Amplifiers for the Real World

Sponsored by Keysight

Simulating 5G power amplifier (PA) designs at the component and system levels with authentic modulation and high-fidelity behavioral models increases predictability, lowers risk, and shrinks schedules. Simulation software enables multi-technology layout and multi-domain analysis, evaluating the impacts of 5G PA design choices while delivering accurate results in a single virtual workspace. This application note delves into how authentic modulation enhances predictability and performance in 5G millimeter-wave systems.

Download now to revolutionize your design process.

featured chalk talk

Data Connectivity at Phoenix Contact
Single pair ethernet provides a host of benefits that can enable seamless data communication for a variety of different applications. In this episode of Chalk Talk, Amelia Dalton and Guadalupe Chalas from Phoenix Contact explore the role that data connectivity will play for the future of an all electric society, the benefits that single pair ethernet brings to IIoT designs and how Phoenix Contact is furthering innovation in this arena.
Jan 5, 2024
15,288 views