Welcome!

News Feed Item

INSIDE Secure Launches an Advanced Dual Interface Secure Microcontroller for E-Government Applications

INSIDE Secure (NYSE Euronext: INSD), a leader in embedded solutions for securing transactions, content and digital identity, today announces the launch of AT90SC28880RCFV2, an advanced dual interface (contact and contactless) secure microcontroller with a cryptographic library. AT90SC28880RCFV2 is designed to provide strong security at high speed for e-Government applications, mainly digital identification. It complies with the ISO 14443 contactless card standard, thus fulfills industry-wide compatibility requirements for transactions between contact or contactless cards and readers.

There are high numbers of readers already deployed; but they are heterogeneous. INSIDE’s applications engineering laboratory carried out extensive testing to ensure AT90SC28880RCFV2’s interoperability. It was tested against a wide selection of readers in the field using ISO14443 test suites, and its interoperability was verified at 100 percent. INSIDE can now provide target users with greater flexibility to carry out strong user authentication using any reader and in accordance with strict security requirements.

AT90SC28880RCFV2 is one of the very few microcontrollers on the market that is able to perform highly secured identification operations at a very high speed, up to 6.8Mbits/sec with contactless readers. Benefits of AT90SC28880RCFV2’s Very High Bit Rate (VHBR) come in the form of faster user authentication for checking passports at control gates or electronic badges at check points, in less than a second.

The Common Criteria EAL5+ (ANSSI-CC-2013/59) and ICAO layer 2 certifications that INSIDE’s new dual interface secure microcontroller has achieved will allow smart card vendors to host the microcontroller onto smart cards used for passports, ID and health insurance cards. With this highly certified level of security, smart card vendors will have an even more robust microcontroller that comes with high-speed operation. INSIDE Secure has already engaged with customers targeting some of the largest products in the world.

“Governments and authorities around the world are looking for ways to more easily and efficiently authenticate users of their services and manage the process. At the same time, they must protect user privacy, as well as reduce fraud and identify theft,” said Bernard Vian, EVP of the Secure Transactions business division at INSIDE Secure. “INSIDE’s AT90SC28880RCFV2 secure microcontroller is a step-up in security. It will accelerate the identity validation process while protecting the document holder’s confidential data, thus adding significant value to e-ID solutions. Our new secure microcontroller, which uses a ROM-EEPROM technology, is very price-competitive compared to other technologies. It meets the price-point for e-Government applications.”

Digital Identification is used to reduce fraud and identity theft. It also eases citizen access to government services and documents. According to Eurosmart, the international association for the Smart Security Industry, the 2014 world market figures for smart secure devices in government applications is forecasted to reach 400 million units, with shipments up 14 percent from the previous year.

INSIDE’s secure microcontroller product family targets e-Government applications that need a high level of security. AT90SC28880RCFV2 features all the cryptographic algorithms required for e-Government applications, including DES/3DES, AES, RSA and ECC. With AT90SC28880RCFV2, INSIDE has broadened its dual interface product offering with 80KB of EEPROM memory to meet the needs of high-end e-Government applications. INSIDE offer now covers 18KB (low end) to 80KB (high end).

About INSIDE Secure

INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure’s mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection. For more information, visit www.insidesecure.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity? Edge Computing reduces possible kilobytes of data collected per second to only a few kilobytes of data transmitted to the public cloud every day. Data is aggregated and analyzed close to sensors so only intelligent results need to be transmitted to the cloud. Non-essential data is recycled to optimize storage.
"I think that everyone recognizes that for IoT to really realize its full potential and value that it is about creating ecosystems and marketplaces and that no single vendor is able to support what is required," explained Esmeralda Swartz, VP, Marketing Enterprise and Cloud at Ericsson, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, will present an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He will expound on the industry issues he frequently came up against as an analyst, and...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
After more than five years of DevOps, definitions are evolving, boundaries are expanding, ‘unicorns’ are no longer rare, enterprises are on board, and pundits are moving on. Can we now look at an evolution of DevOps? Should we? Is the foundation of DevOps ‘done’, or is there still too much left to do? What is mature, and what is still missing? What does the next 5 years of DevOps look like? In this Power Panel at DevOps Summit, moderated by DevOps Summit Conference Chair Andi Mann, panelists l...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, provided the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” used open source attack tools that are free and available for download by anybody. Attendees learned where to find and how to operate these tools for the purpose of testing their own IT infrastructure. The...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services a...
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex softw...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
Interoute has announced the integration of its Global Cloud Infrastructure platform with Rancher Labs’ container management platform, Rancher. This approach enables enterprises to accelerate their digital transformation and infrastructure investments. Matthew Finnie, Interoute CTO commented “Enterprises developing and building apps in the cloud and those on a path to Digital Transformation need Digital ICT Infrastructure that allows them to build, test and deploy faster than ever before. The int...