Welcome!

News Feed Item

INSIDE Secure Launches an Advanced Dual Interface Secure Microcontroller for E-Government Applications

INSIDE Secure (NYSE Euronext: INSD), a leader in embedded solutions for securing transactions, content and digital identity, today announces the launch of AT90SC28880RCFV2, an advanced dual interface (contact and contactless) secure microcontroller with a cryptographic library. AT90SC28880RCFV2 is designed to provide strong security at high speed for e-Government applications, mainly digital identification. It complies with the ISO 14443 contactless card standard, thus fulfills industry-wide compatibility requirements for transactions between contact or contactless cards and readers.

There are high numbers of readers already deployed; but they are heterogeneous. INSIDE’s applications engineering laboratory carried out extensive testing to ensure AT90SC28880RCFV2’s interoperability. It was tested against a wide selection of readers in the field using ISO14443 test suites, and its interoperability was verified at 100 percent. INSIDE can now provide target users with greater flexibility to carry out strong user authentication using any reader and in accordance with strict security requirements.

AT90SC28880RCFV2 is one of the very few microcontrollers on the market that is able to perform highly secured identification operations at a very high speed, up to 6.8Mbits/sec with contactless readers. Benefits of AT90SC28880RCFV2’s Very High Bit Rate (VHBR) come in the form of faster user authentication for checking passports at control gates or electronic badges at check points, in less than a second.

The Common Criteria EAL5+ (ANSSI-CC-2013/59) and ICAO layer 2 certifications that INSIDE’s new dual interface secure microcontroller has achieved will allow smart card vendors to host the microcontroller onto smart cards used for passports, ID and health insurance cards. With this highly certified level of security, smart card vendors will have an even more robust microcontroller that comes with high-speed operation. INSIDE Secure has already engaged with customers targeting some of the largest products in the world.

“Governments and authorities around the world are looking for ways to more easily and efficiently authenticate users of their services and manage the process. At the same time, they must protect user privacy, as well as reduce fraud and identify theft,” said Bernard Vian, EVP of the Secure Transactions business division at INSIDE Secure. “INSIDE’s AT90SC28880RCFV2 secure microcontroller is a step-up in security. It will accelerate the identity validation process while protecting the document holder’s confidential data, thus adding significant value to e-ID solutions. Our new secure microcontroller, which uses a ROM-EEPROM technology, is very price-competitive compared to other technologies. It meets the price-point for e-Government applications.”

Digital Identification is used to reduce fraud and identity theft. It also eases citizen access to government services and documents. According to Eurosmart, the international association for the Smart Security Industry, the 2014 world market figures for smart secure devices in government applications is forecasted to reach 400 million units, with shipments up 14 percent from the previous year.

INSIDE’s secure microcontroller product family targets e-Government applications that need a high level of security. AT90SC28880RCFV2 features all the cryptographic algorithms required for e-Government applications, including DES/3DES, AES, RSA and ECC. With AT90SC28880RCFV2, INSIDE has broadened its dual interface product offering with 80KB of EEPROM memory to meet the needs of high-end e-Government applications. INSIDE offer now covers 18KB (low end) to 80KB (high end).

About INSIDE Secure

INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure’s mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection. For more information, visit www.insidesecure.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
For better or worse, DevOps has gone mainstream. All doubt was removed when IBM and HP threw up their respective DevOps microsites. Where are we on the hype cycle? It's hard to say for sure but there's a feeling we're heading for the "Peak of Inflated Expectations." What does this mean for the enterprise? Should they avoid DevOps? Definitely not. Should they be cautious though? Absolutely. The truth is that DevOps and the enterprise are at best strange bedfellows. The movement has its roots in t...
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo at the Javits Center in New York City, NY.
Vulnerability management is vital for large companies that need to secure containers across thousands of hosts, but many struggle to understand how exposed they are when they discover a new high security vulnerability. In his session at 21st Cloud Expo, John Morello, CTO of Twistlock, addressed this pressing concern by introducing the concept of the “Vulnerability Risk Tree API,” which brings all the data together in a simple REST endpoint, allowing companies to easily grasp the severity of the ...
Historically, some banking activities such as trading have been relying heavily on analytics and cutting edge algorithmic tools. The coming of age of powerful data analytics solutions combined with the development of intelligent algorithms have created new opportunities for financial institutions. In his session at 20th Cloud Expo, Sebastien Meunier, Head of Digital for North America at Chappuis Halder & Co., discussed how these tools can be leveraged to develop a lasting competitive advantage ...
In his session at @ThingsExpo, Arvind Radhakrishnen discussed how IoT offers new business models in banking and financial services organizations with the capability to revolutionize products, payments, channels, business processes and asset management built on strong architectural foundation. The following topics were covered: How IoT stands to impact various business parameters including customer experience, cost and risk management within BFS organizations.
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
Here are the Top 20 Twitter Influencers of the month as determined by the Kcore algorithm, in a range of current topics of interest from #IoT to #DeepLearning. To run a real-time search of a given term in our website and see the current top influencers, click on the topic name. Among the top 20 IoT influencers, ThingsEXPO ranked #14 and CloudEXPO ranked #17.
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
Given the popularity of the containers, further investment in the telco/cable industry is needed to transition existing VM-based solutions to containerized cloud native deployments. The networking architecture of the solution isolates the network traffic into different network planes (e.g., management, control, and media). This naturally makes support for multiple interfaces in container orchestration engines an indispensable requirement.
Containers are rapidly finding their way into enterprise data centers, but change is difficult. How do enterprises transform their architecture with technologies like containers without losing the reliable components of their current solutions? In his session at @DevOpsSummit at 21st Cloud Expo, Tony Campbell, Director, Educational Services at CoreOS, will explore the challenges organizations are facing today as they move to containers and go over how Kubernetes applications can deploy with lega...
In their session at @DevOpsSummit at 21st Cloud Expo, Michael Berman, VP Engineering at TidalScale, and Ivo Jimenez, Engineer at TidalScale, will describe how automating tests in TidalScale is easy thanks to WaveRunner. They will show how they use WaveRunner, Jenkins, and Docker to have agile delivery of TidalScale. Michael Berman is VP Engineering at TidalScale. TidalScale is developing a scale up compute and resource architecture for customers to perform big data exploration and real time anal...
Your homes and cars can be automated and self-serviced. Why can't your storage? From simply asking questions to analyze and troubleshoot your infrastructure, to provisioning storage with snapshots, recovery and replication, your wildest sci-fi dream has come true. In his session at @DevOpsSummit at 20th Cloud Expo, Dan Florea, Director of Product Management at Tintri, provided a ChatOps demo where you can talk to your storage and manage it from anywhere, through Slack and similar services with...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...