|By Business Wire||
|May 19, 2014 01:00 AM EDT||
INSIDE Secure (NYSE Euronext: INSD), a leader in embedded solutions for securing transactions, content and digital identity, today announces the launch of AT90SC28880RCFV2, an advanced dual interface (contact and contactless) secure microcontroller with a cryptographic library. AT90SC28880RCFV2 is designed to provide strong security at high speed for e-Government applications, mainly digital identification. It complies with the ISO 14443 contactless card standard, thus fulfills industry-wide compatibility requirements for transactions between contact or contactless cards and readers.
There are high numbers of readers already deployed; but they are heterogeneous. INSIDE’s applications engineering laboratory carried out extensive testing to ensure AT90SC28880RCFV2’s interoperability. It was tested against a wide selection of readers in the field using ISO14443 test suites, and its interoperability was verified at 100 percent. INSIDE can now provide target users with greater flexibility to carry out strong user authentication using any reader and in accordance with strict security requirements.
AT90SC28880RCFV2 is one of the very few microcontrollers on the market that is able to perform highly secured identification operations at a very high speed, up to 6.8Mbits/sec with contactless readers. Benefits of AT90SC28880RCFV2’s Very High Bit Rate (VHBR) come in the form of faster user authentication for checking passports at control gates or electronic badges at check points, in less than a second.
The Common Criteria EAL5+ (ANSSI-CC-2013/59) and ICAO layer 2 certifications that INSIDE’s new dual interface secure microcontroller has achieved will allow smart card vendors to host the microcontroller onto smart cards used for passports, ID and health insurance cards. With this highly certified level of security, smart card vendors will have an even more robust microcontroller that comes with high-speed operation. INSIDE Secure has already engaged with customers targeting some of the largest products in the world.
“Governments and authorities around the world are looking for ways to more easily and efficiently authenticate users of their services and manage the process. At the same time, they must protect user privacy, as well as reduce fraud and identify theft,” said Bernard Vian, EVP of the Secure Transactions business division at INSIDE Secure. “INSIDE’s AT90SC28880RCFV2 secure microcontroller is a step-up in security. It will accelerate the identity validation process while protecting the document holder’s confidential data, thus adding significant value to e-ID solutions. Our new secure microcontroller, which uses a ROM-EEPROM technology, is very price-competitive compared to other technologies. It meets the price-point for e-Government applications.”
Digital Identification is used to reduce fraud and identity theft. It also eases citizen access to government services and documents. According to Eurosmart, the international association for the Smart Security Industry, the 2014 world market figures for smart secure devices in government applications is forecasted to reach 400 million units, with shipments up 14 percent from the previous year.
INSIDE’s secure microcontroller product family targets e-Government applications that need a high level of security. AT90SC28880RCFV2 features all the cryptographic algorithms required for e-Government applications, including DES/3DES, AES, RSA and ECC. With AT90SC28880RCFV2, INSIDE has broadened its dual interface product offering with 80KB of EEPROM memory to meet the needs of high-end e-Government applications. INSIDE offer now covers 18KB (low end) to 80KB (high end).
About INSIDE Secure
INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure’s mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection. For more information, visit www.insidesecure.com.
Consumer IoT applications provide data about the user that just doesn’t exist in traditional PC or mobile web applications. This rich data, or “context,” enables the highly personalized consumer experiences that characterize many consumer IoT apps. This same data is also providing brands with unprecedented insight into how their connected products are being used, while, at the same time, powering highly targeted engagement and marketing opportunities. In his session at @ThingsExpo, Nathan Trel...
Aug. 30, 2015 10:15 AM EDT Reads: 205
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
Aug. 30, 2015 10:00 AM EDT Reads: 325
IBM’s Blue Box Cloud, powered by OpenStack, is now available in any of IBM’s globally integrated cloud data centers running SoftLayer infrastructure. Less than 90 days after its acquisition of Blue Box, IBM has integrated its Blue Box Cloud Dedicated private-cloud-as-a-service into its broader portfolio of OpenStack® based solutions. The announcement, made today at the OpenStack Silicon Valley event, further highlights IBM’s continued support to deliver OpenStack solutions across all cloud depl...
Aug. 30, 2015 10:00 AM EDT Reads: 208
Everyone talks about continuous integration and continuous delivery but those are just two ends of the pipeline. In the middle of DevOps is continuous testing (CT), and many organizations are struggling to implement continuous testing effectively. After all, without continuous testing there is no delivery. And Lab-As-A-Service (LaaS) enhances the CT with dynamic on-demand self-serve test topologies. CT together with LAAS make a powerful combination that perfectly serves complex software developm...
Aug. 30, 2015 09:45 AM EDT Reads: 177
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
Aug. 30, 2015 09:15 AM EDT Reads: 430
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
Aug. 30, 2015 09:15 AM EDT Reads: 596
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
Aug. 30, 2015 08:45 AM EDT Reads: 333
WSM International, the pioneer and leader in server migration services, has announced an agreement with WHOA.com, a leader in providing secure public, private and hybrid cloud computing services. Under terms of the agreement, WSM will provide migration services to WHOA.com customers to relocate some or all of their applications, digital assets, and other computing workloads to WHOA.com enterprise-class, secure cloud infrastructure. The migration services include detailed evaluation and planning...
Aug. 30, 2015 08:45 AM EDT Reads: 155
In today's digital world, change is the one constant. Disruptive innovations like cloud, mobility, social media, and the Internet of Things have reshaped the market and set new standards in customer expectations. To remain competitive, businesses must tap the potential of emerging technologies and markets through the rapid release of new products and services. However, the rigid and siloed structures of traditional IT platforms and processes are slowing them down – resulting in lengthy delivery ...
Aug. 30, 2015 08:45 AM EDT Reads: 564
The Internet of Things (IoT) is about the digitization of physical assets including sensors, devices, machines, gateways, and the network. It creates possibilities for significant value creation and new revenue generating business models via data democratization and ubiquitous analytics across IoT networks. The explosion of data in all forms in IoT requires a more robust and broader lens in order to enable smarter timely actions and better outcomes. Business operations become the key driver of I...
Aug. 30, 2015 08:30 AM EDT Reads: 383
Puppet Labs has announced the next major update to its flagship product: Puppet Enterprise 2015.2. This release includes new features providing DevOps teams with clarity, simplicity and additional management capabilities, including an all-new user interface, an interactive graph for visualizing infrastructure code, a new unified agent and broader infrastructure support.
Aug. 30, 2015 07:15 AM EDT Reads: 490
A producer of the first smartphones and tablets, presenter Lee M. Williams will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ETwater. In his session at @ThingsExpo, Lee Williams, COO of ETwater, will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ET...
Aug. 30, 2015 07:00 AM EDT Reads: 116
U.S. companies are desperately trying to recruit and hire skilled software engineers and developers, but there is simply not enough quality talent to go around. Tiempo Development is a nearshore software development company. Our headquarters are in AZ, but we are a pioneer and leader in outsourcing to Mexico, based on our three software development centers there. We have a proven process and we are experts at providing our customers with powerful solutions. We transform ideas into reality.
Aug. 30, 2015 06:45 AM EDT Reads: 519
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
Aug. 30, 2015 06:00 AM EDT Reads: 384
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
Aug. 30, 2015 02:00 AM EDT Reads: 392