Welcome!

News Feed Item

ChinaPnR and V-Key Strategic Alliance -- Securing over 1 Million Merchants

SHANGHAI, April 1, 2014 /PRNewswire/ -- Leading financial payment provider China Payment and Remittance Service Co., Ltd. ("ChinaPnR") formed a strategic partnership with mobile security and cryptographic technology pioneer, V-Key Inc ("V-Key"). At the same time, the latest version of the "ChinaPnR POS Acquirer" Android mobile client, integrated with V-Key's security technology, has officially gone live. This collaboration will provide trustworthy security assurance to over a million merchants.

HK95134LOGO-a

ChinaPnR launched the Point of Sale (POS) payment acquisition query platform "ChinaPnR POS Acquirer" on mobile platforms in June 2013, the first of its kind in China dedicated to providing professional, convenient payment acquisition and management services to small and medium-sized merchants.

In early 2014, the "ChinaPnR POS Acquirer" mobile client went through an overhaul to provide merchants with a new financial service, "ChinaPnR Interest Generator." With the upgraded version, merchants would not only be able to view daily transaction balances, conduct real-time settlements, and communicate with customer service, but also carry out idle fund investment and management. As a result, merchants are provided with a more holistic financial management experience.

A few days ago an upgraded version of "ChinaPnR POS Acquirer" mobile client was released. Among other changes, the new application is integrated with V-Key's world leading mobile security technology, providing reliable security assurance to end-users. "It leverages on V-Key's unique virtual secure element coupled with the latest mobile intrusion detection and protection mechanisms based on combinational heuristic algorithms. With independent control component and trustworthy cryptographic processing, mobile malwares such as Trojan or keyloggers will not be able to intercept or tamper with sensitive user input; at the same time sensitive data would be encrypted, rendering it immune to information leakage or data theft, thus ensuring a 360-degree comprehensive security protection for end-users' information," Patrick Lin, CIO of ChinaPnR further commented that with the use of V-Track, part of the V-Key Mobile Application Security Management suite, all malicious threats would be monitored and collated, based on which the detection and protection mechanisms of V-Guard could be continuously optimized and updated so as to achieve robust and thorough security capabilities continuously.

Mr. Benjamin Mah, CEO of V-Key, says, "After a stringent evaluation by ChinaPnR on various solutions in the market, we are very pleased to be selected to protect their mobile applications. As described by ChinaPnR, V-Key technology leverages on our unique virtual secure element and cryptographic engine to provide comprehensive protection mechanisms safeguarding mobile applications' runtime environment, program logic and important data. With this partnership between V-Key and ChinaPnR, leaders in their respective fields, I believe ChinaPnR would soar to even greater heights as the leader in the mobile economy, we shall define the next-generation mobile security standards together."

For any enterprise and user, sensitive information such as critical transactions and data handled by mobile applications are of paramount importance. Among various recent attacks reported globally, customized malicious applications and automated attack agents targeting mobile devices showed the fastest growth. In particular for the over one million small and medium sized merchants using ChinaPnR's services, it is crucial to be able to defend against external cyber threats while enjoying the convenience to manage their wealth. Through the strategic partnership with V-Key, ChinaPnR managed to turn the "ChinaPnR POS Acquirer" mobile client into a threat-aware and tamper resistant intelligent application, effectively helping these merchants achieve both objectives.

About CHINAPNR CO., LTD.

ChinaPnR was founded in July 2006 by senior management personnel from the China financial industry. Headquartered in Shanghai, it has branches in more than 30 cities across China, and in 2013 achieved more than 1 trillion yuan as the third largest third party payment provider in China. ChinaPnR is a founding member of the Payment & Clearing Association of China, with Payment Business License issued by the People's Bank of China, Online Fund Sales Payment and Settlement Permit approved by the China Securities Regulatory Commission, as well as Cross-border Payment Business License awarded by the State Administration of Foreign Exchange.

At present, ChinaPnR provides comprehensive financial payment services to more than one million medium and small enterprises, 95% of domestic commercial banks, and hundreds of leading P2P companies; as well as one-stop financial platform for 2 million investors and financial advisers. Its industry partners cover the airline, hotel, logistics, education and many others.

For more information, please visit www.chinapnr.com.

About V-KEY INC

V-Key Inc, a pioneer and inventor of mobile security solution suite. V-Key researches into the latest mobile threats and delivers advanced protections to meet the evolving mobile application threat landscape, powered by its patent pending V-OS virtual secure element and V-Guard suite of products. V-Key has offices in the USA, Singapore, and the Philippines.

For more information, please visit www.v-key.com or contact us at [email protected], +65-64712524.

HK95134LOGO-b

Logo - http://photos.prnewswire.com/prnh/20140401/HK95134LOGO-a
Logo - http://photos.prnewswire.com/prnh/20140401/HK95134LOGO-b

SOURCE V-Key Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
In this presentation, you will learn first hand what works and what doesn't while architecting and deploying OpenStack. Some of the topics will include:- best practices for creating repeatable deployments of OpenStack- multi-site considerations- how to customize OpenStack to integrate with your existing systems and security best practices.
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
You want to start your DevOps journey but where do you begin? Do you say DevOps loudly 5 times while looking in the mirror and it suddenly appears? Do you hire someone? Do you upskill your existing team? Here are some tips to help support your DevOps transformation. Conor Delanbanque has been involved with building & scaling teams in the DevOps space globally. He is the Head of DevOps Practice at MThree Consulting, a global technology consultancy. Conor founded the Future of DevOps Thought Leade...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
Jo Peterson is VP of Cloud Services for Clarify360, a boutique sourcing and benchmarking consultancy focused on transforming technology into business advantage. Clarify360 provides custom, end-to-end solutions from a portfolio of more than 170 suppliers globally. As an engineer, Jo sources net new technology footprints, and is an expert at optimizing and benchmarking existing environments focusing on Cloud Enablement and Optimization. She and her team work with clients on Cloud Discovery, Cloud ...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and G...