industry news
Subscribe Now

Trustonic simplifies security for mobile and IoT apps developers

CAMBRIDGE, UK – 8 February 2016:  Trustonic, the leading provider of hardware-enabled security for smart devices announces Trustonic Hybrid Protection (THP). App developers can now more easily utilize the most advanced security capabilities available on a given device. THP makes it easier for developers to design in security from the start, and to deploy these enhanced services across the widest range of mobile and IoT devices.

Trustonic Hybrid Protection (THP) is an adaptable security solution bringing together the best of software and hardware secured solutions into one hybrid product. Trustonic combines its advanced hardware enabled security solutions found in over 500M devices, with software protection technologies licensed from whiteCryption. As a result developers can easily apply this security to their services, bringing simpler, faster and richer user experiences for consumers.

“Trustonic has been a key driver in the evolution of security in the mobile market and more recently the emerging IoT space,” said Ben Cade, CEO, Trustonic. “ Trustonic Hybrid Protection makes it simpler for apps developers to improve app security whilst being able to scale across a wide range of mobile and IoT devices.”

“This is a very positive step forwards in delivering secure apps, that scale and take advantage of hardware security when available”, said David Birch, Director of Innovation, Consult Hyperion.

It is not only Service Providers that are concerned about the security around the data on smartphones and tablets. Consumers are also increasingly focused on the security of their personal data. This will continue to increase as the range of apps using personal data to deliver compelling experiences diversifies, not only in mobile but also in devices linked to the home and car. Built-in device security is vital to giving consumers the ability to control who sees their data when.

“As more financial and personal interactions are done via mobile devices, security becomes even more important,” said Ken Wimberley, VP Product Manager from JP Morgan Chase. “Service providers and apps developers are looking for easier and more comprehensive ways of securing users’ data across all devices in a consistent way.”

 The Trustonic Hybrid Protection defaults to use Trustonic TEE Hardware Protection whenever the hardware is available, bringing the service provider the highest level of security the device can provide.  This not only provides higher security functionality but also offers the best performance for the user experience. Such as strong and easy PIN entry or fingerprint matching for user authentication. When the Trustonic TEE is not available, THP will revert seamlessly to provide best-in-class software enabled security protection. No changes in the application are needed.

While hardware protection will always deliver superior protection, the reality is that not every device includes such capabilities. Trustonic selected software protection and cryptographic technology from whiteCryption based on their proven track record delivering software security solutions to end markets including medical, automotive and mobile. THP unifies the best of all technologies under one API to simplify code development into a single source.

“WhiteCryption working with Trustonic brings improved security features to an even wider range of mobile devices whilst also enabling improved security for IoT products,” said Thorsten Held, Managing Director from whiteCryption. “The combination of technologies accessible through one API simplifies the process for apps developers to offer a range of security levels for their apps across a wide range of end devices.”

Another key aspect of THP is the simplicity of deploying these “trust enhanced” apps. THP utilizes state of the art asymmetric-based cryptography combined with installation and authorization protocols familiar to any mainstream app developer. As a result service providers have both control over where their services are deployed and visibility as to the security capabilities protecting those services across their install base.

About Trustonic

Trustonic integrates hardware-level security and trust directly into the devices through which we access today’s connected world. Trustonic simplifies user experiences in everything from mobile shopping and Internet banking to entertainment to collaborating in the workplace.  

Trustonic technology is embedded in over 400m smart connected devices, and partners with market leaders such as SamsungQualcommSymantec, andGemalto. To learn more about Trustonic and how it’s making your connected world a better place visit us at www.trustonic.com

Leave a Reply

featured blogs
May 8, 2024
Learn how artificial intelligence of things (AIoT) applications at the edge rely on TSMC's N12e manufacturing processes and specialized semiconductor IP.The post How Synopsys IP and TSMC’s N12e Process are Driving AIoT appeared first on Chip Design....
May 2, 2024
I'm envisioning what one of these pieces would look like on the wall of my office. It would look awesome!...

featured video

Why Wiwynn Energy-Optimized Data Center IT Solutions Use Cadence Optimality Explorer

Sponsored by Cadence Design Systems

In the AI era, as the signal-data rate increases, the signal integrity challenges in server designs also increase. Wiwynn provides hyperscale data centers with innovative cloud IT infrastructure, bringing the best total cost of ownership (TCO), energy, and energy-itemized IT solutions from the cloud to the edge.

Learn more about how Wiwynn is developing a new methodology for PCB designs with Cadence’s Optimality Intelligent System Explorer and Clarity 3D Solver.

featured paper

Achieve Greater Design Flexibility and Reduce Costs with Chiplets

Sponsored by Keysight

Chiplets are a new way to build a system-on-chips (SoCs) to improve yields and reduce costs. It partitions the chip into discrete elements and connects them with a standardized interface, enabling designers to meet performance, efficiency, power, size, and cost challenges in the 5 / 6G, artificial intelligence (AI), and virtual reality (VR) era. This white paper will discuss the shift to chiplet adoption and Keysight EDA's implementation of the communication standard (UCIe) into the Keysight Advanced Design System (ADS).

Dive into the technical details – download now.

featured chalk talk

Secure Authentication ICs for Disposable and Accessory Ecosystems
Sponsored by Mouser Electronics and Microchip
Secure authentication for disposable and accessory ecosystems is a critical element for many embedded systems today. In this episode of Chalk Talk, Amelia Dalton and Xavier Bignalet from Microchip discuss the benefits of Microchip’s Trust Platform design suite and how it can provide the security you need for your next embedded design. They investigate the value of symmetric authentication and asymmetric authentication and the roles that parasitic power and package size play in these kinds of designs.
Jul 21, 2023
34,382 views