Welcome!

News Feed Item

ChinaPnR and V-Key Strategic Alliance -- Securing over 1 Million Merchants

SHANGHAI, April 1, 2014 /PRNewswire/ -- Leading financial payment provider China Payment and Remittance Service Co., Ltd. ("ChinaPnR") formed a strategic partnership with mobile security and cryptographic technology pioneer, V-Key Inc ("V-Key"). At the same time, the latest version of the "ChinaPnR POS Acquirer" Android mobile client, integrated with V-Key's security technology, has officially gone live. This collaboration will provide trustworthy security assurance to over a million merchants.

HK95134LOGO-a

ChinaPnR launched the Point of Sale (POS) payment acquisition query platform "ChinaPnR POS Acquirer" on mobile platforms in June 2013, the first of its kind in China dedicated to providing professional, convenient payment acquisition and management services to small and medium-sized merchants.

In early 2014, the "ChinaPnR POS Acquirer" mobile client went through an overhaul to provide merchants with a new financial service, "ChinaPnR Interest Generator." With the upgraded version, merchants would not only be able to view daily transaction balances, conduct real-time settlements, and communicate with customer service, but also carry out idle fund investment and management. As a result, merchants are provided with a more holistic financial management experience.

A few days ago an upgraded version of "ChinaPnR POS Acquirer" mobile client was released. Among other changes, the new application is integrated with V-Key's world leading mobile security technology, providing reliable security assurance to end-users. "It leverages on V-Key's unique virtual secure element coupled with the latest mobile intrusion detection and protection mechanisms based on combinational heuristic algorithms. With independent control component and trustworthy cryptographic processing, mobile malwares such as Trojan or keyloggers will not be able to intercept or tamper with sensitive user input; at the same time sensitive data would be encrypted, rendering it immune to information leakage or data theft, thus ensuring a 360-degree comprehensive security protection for end-users' information," Patrick Lin, CIO of ChinaPnR further commented that with the use of V-Track, part of the V-Key Mobile Application Security Management suite, all malicious threats would be monitored and collated, based on which the detection and protection mechanisms of V-Guard could be continuously optimized and updated so as to achieve robust and thorough security capabilities continuously.

Mr. Benjamin Mah, CEO of V-Key, says, "After a stringent evaluation by ChinaPnR on various solutions in the market, we are very pleased to be selected to protect their mobile applications. As described by ChinaPnR, V-Key technology leverages on our unique virtual secure element and cryptographic engine to provide comprehensive protection mechanisms safeguarding mobile applications' runtime environment, program logic and important data. With this partnership between V-Key and ChinaPnR, leaders in their respective fields, I believe ChinaPnR would soar to even greater heights as the leader in the mobile economy, we shall define the next-generation mobile security standards together."

For any enterprise and user, sensitive information such as critical transactions and data handled by mobile applications are of paramount importance. Among various recent attacks reported globally, customized malicious applications and automated attack agents targeting mobile devices showed the fastest growth. In particular for the over one million small and medium sized merchants using ChinaPnR's services, it is crucial to be able to defend against external cyber threats while enjoying the convenience to manage their wealth. Through the strategic partnership with V-Key, ChinaPnR managed to turn the "ChinaPnR POS Acquirer" mobile client into a threat-aware and tamper resistant intelligent application, effectively helping these merchants achieve both objectives.

About CHINAPNR CO., LTD.

ChinaPnR was founded in July 2006 by senior management personnel from the China financial industry. Headquartered in Shanghai, it has branches in more than 30 cities across China, and in 2013 achieved more than 1 trillion yuan as the third largest third party payment provider in China. ChinaPnR is a founding member of the Payment & Clearing Association of China, with Payment Business License issued by the People's Bank of China, Online Fund Sales Payment and Settlement Permit approved by the China Securities Regulatory Commission, as well as Cross-border Payment Business License awarded by the State Administration of Foreign Exchange.

At present, ChinaPnR provides comprehensive financial payment services to more than one million medium and small enterprises, 95% of domestic commercial banks, and hundreds of leading P2P companies; as well as one-stop financial platform for 2 million investors and financial advisers. Its industry partners cover the airline, hotel, logistics, education and many others.

For more information, please visit www.chinapnr.com.

About V-KEY INC

V-Key Inc, a pioneer and inventor of mobile security solution suite. V-Key researches into the latest mobile threats and delivers advanced protections to meet the evolving mobile application threat landscape, powered by its patent pending V-OS virtual secure element and V-Guard suite of products. V-Key has offices in the USA, Singapore, and the Philippines.

For more information, please visit www.v-key.com or contact us at [email protected], +65-64712524.

HK95134LOGO-b

Logo - http://photos.prnewswire.com/prnh/20140401/HK95134LOGO-a
Logo - http://photos.prnewswire.com/prnh/20140401/HK95134LOGO-b

SOURCE V-Key Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
Zerto exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016. Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform™, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company’s flagship product, Zerto Virtual...
Some people worry that OpenStack is more flash then substance; however, for many customers this could not be farther from the truth. No other technology equalizes the playing field between vendors while giving your internal teams better access than ever to infrastructure when they need it. In his session at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, will talk through some real-world OpenStack deployments and look into the ways this can benefit customers of all sizes....
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...