|By Business Wire||
|May 19, 2014 01:00 AM EDT||
INSIDE Secure (NYSE Euronext: INSD), a leader in embedded solutions for securing transactions, content and digital identity, today announces the launch of AT90SC28880RCFV2, an advanced dual interface (contact and contactless) secure microcontroller with a cryptographic library. AT90SC28880RCFV2 is designed to provide strong security at high speed for e-Government applications, mainly digital identification. It complies with the ISO 14443 contactless card standard, thus fulfills industry-wide compatibility requirements for transactions between contact or contactless cards and readers.
There are high numbers of readers already deployed; but they are heterogeneous. INSIDE’s applications engineering laboratory carried out extensive testing to ensure AT90SC28880RCFV2’s interoperability. It was tested against a wide selection of readers in the field using ISO14443 test suites, and its interoperability was verified at 100 percent. INSIDE can now provide target users with greater flexibility to carry out strong user authentication using any reader and in accordance with strict security requirements.
AT90SC28880RCFV2 is one of the very few microcontrollers on the market that is able to perform highly secured identification operations at a very high speed, up to 6.8Mbits/sec with contactless readers. Benefits of AT90SC28880RCFV2’s Very High Bit Rate (VHBR) come in the form of faster user authentication for checking passports at control gates or electronic badges at check points, in less than a second.
The Common Criteria EAL5+ (ANSSI-CC-2013/59) and ICAO layer 2 certifications that INSIDE’s new dual interface secure microcontroller has achieved will allow smart card vendors to host the microcontroller onto smart cards used for passports, ID and health insurance cards. With this highly certified level of security, smart card vendors will have an even more robust microcontroller that comes with high-speed operation. INSIDE Secure has already engaged with customers targeting some of the largest products in the world.
“Governments and authorities around the world are looking for ways to more easily and efficiently authenticate users of their services and manage the process. At the same time, they must protect user privacy, as well as reduce fraud and identify theft,” said Bernard Vian, EVP of the Secure Transactions business division at INSIDE Secure. “INSIDE’s AT90SC28880RCFV2 secure microcontroller is a step-up in security. It will accelerate the identity validation process while protecting the document holder’s confidential data, thus adding significant value to e-ID solutions. Our new secure microcontroller, which uses a ROM-EEPROM technology, is very price-competitive compared to other technologies. It meets the price-point for e-Government applications.”
Digital Identification is used to reduce fraud and identity theft. It also eases citizen access to government services and documents. According to Eurosmart, the international association for the Smart Security Industry, the 2014 world market figures for smart secure devices in government applications is forecasted to reach 400 million units, with shipments up 14 percent from the previous year.
INSIDE’s secure microcontroller product family targets e-Government applications that need a high level of security. AT90SC28880RCFV2 features all the cryptographic algorithms required for e-Government applications, including DES/3DES, AES, RSA and ECC. With AT90SC28880RCFV2, INSIDE has broadened its dual interface product offering with 80KB of EEPROM memory to meet the needs of high-end e-Government applications. INSIDE offer now covers 18KB (low end) to 80KB (high end).
About INSIDE Secure
INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure’s mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection. For more information, visit www.insidesecure.com.
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Dec. 6, 2016 07:15 AM EST Reads: 706
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Dec. 6, 2016 07:15 AM EST Reads: 1,820
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
Dec. 6, 2016 07:00 AM EST Reads: 799
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Dec. 6, 2016 06:30 AM EST Reads: 1,096
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Dec. 6, 2016 06:15 AM EST Reads: 756
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Dec. 6, 2016 06:00 AM EST Reads: 455
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Dec. 6, 2016 05:45 AM EST Reads: 5,289
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Dec. 6, 2016 05:00 AM EST Reads: 1,645
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 6, 2016 04:45 AM EST Reads: 998
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
Dec. 6, 2016 04:30 AM EST Reads: 1,929
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
Dec. 6, 2016 04:15 AM EST Reads: 1,753
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 6, 2016 03:45 AM EST Reads: 819
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Dec. 6, 2016 01:00 AM EST Reads: 1,848
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 6, 2016 12:45 AM EST Reads: 853
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Dec. 6, 2016 12:30 AM EST Reads: 3,890