SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • High-Security Wedge Barriers By Delta Scientific
    • SCD Wins Major Contract For HD MWIR Detectors
    • ASSA ABLOY And Honeywell Discuss Security Innovation
    • VIVOTEK's Role In Ecological Restoration & Safety
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check out our special report on Artificial Intelligence

Read now!

Trustonic’s Trusted Execution Environment Completes EMVCo Software-Based Evaluation For Secure Cellphone Payments Apps

5 Feb 2020

Trustonic’s Trusted Execution Environment Completes EMVCo Software-Based Evaluation For Secure Cellphone Payments Apps
Contact company
Contact Trustonic
icon Add as a preferred source Download PDF version
Related Links
  • OPTOLANE Installs Trustonic Security Platform To Protect New Connected Medical Diagnostic Devices

Cellphone device and app security provider Trustonic announces that its Trusted Execution Environment (TEE) solution is the first hardware-backed TEE to complete the EMVCo Software-Based Cellphone Payments security evaluation process. EMVCo is the global technical body that facilitates the worldwide interoperability and acceptance of secure payment transactions. As such, this evaluation process confirms that the Trustonic TEE provides a robust security foundation that meets the requirements of software-based cellphone payment (SBMP) and acceptance solutions.

“This technology is already protecting payment apps from small startups through to some of the largest OEMs and cellphone payment providers in the world; all via a simple SDK,” comments Dan Rawlings, CCO, Trustonic.

Trustonic Application Protection

“This certification, and the adoption of Trustonic Application Protection in the financial sector, confirms what many fintechs, banks, payment schemes and mPOS developers already know. Trust, credibility and confidence are built and maintained with high levels of assurance, and combining software and hardware-backed security is the only way to achieve that when the stakes are high.”

The Trustonic Application Protection (TAP) development toolkit enables developers to easily build and deploy a range of secure financial applications including cellphone payment, banking, and acceptance use cases like cellphone point of sale (mPOS), ‘tap on phone’ and software-based PIN entry on COTS (SPoC). This protects cellphone applications by securing sensitive code, data and processes in Trustonic’s heavily protected TEE.

Software security technologies

The environment continuously upgrades over the course of an app’s lifecycle to take advantage of the most advanced hardware and software security technologies available on smartphones. The platform includes Trustonic’s Trusted User Interface (TUI), which isolates and protects sensitive input and display user interactions from the device operating system – like PIN entry – in app user interfaces.

Hardware-backed TEE technology plays a big role in enabling the cellphone financial ecosystem to achieve its potential

“Hardware-backed TEE technology plays a big role in enabling the cellphone financial ecosystem to mature and achieve its potential,” adds Tim Hartog, Director Cellphone Payments at Riscure, the independent security test laboratory that performed the security evaluation. “This is because hardware-backed TEE technology, like Trustonic’s TEE, can protect apps even if attackers have root privileges on the device."

Secure PIN entry

"With Trustonic providing access to the TEE through TAP, solution developers are now able to effectively secure PIN entry on smartphones. This is a key enabler for using smartphones as acceptance devices.”

Dan Rawlings concludes: “The payments and banking ecosystems are leading the way when it comes to securing apps and data. As regulations like PSD2, SCA and GDPR evolve, privacy is pushed into the consumer domain, security is becoming a differentiator. Developers need to know that hardware no longer limits innovation and user experience, the flexibility of TEE security is nuanced and can be used to deliver simpler, richer and faster user experiences.”

Stay ahead in the era of intelligent security systems powered by Artificial Intelligence with our special e-magazine on AI in security.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Security software
  • Mobile surveillance
  • Integration software
  • Mobile communications
  • Data Security
  • Mobile access
  • Related links
  • ELATEC Access control software
  • Related categories
  • Access control systems & kits
  • Access control software
Related white papers
Physical Access Control

Physical Access Control

Download
Machine Operator Authentication

Machine Operator Authentication

Download
RFID For GMP/GLP Environments

RFID For GMP/GLP Environments

Download
Related articles
The Importance Of Machine Authentication In Plant Safety And Security

The Importance Of Machine Authentication In Plant Safety And Security

Universal Readers Create A Frictionless Access Experience For Orion Entrance Control

Universal Readers Create A Frictionless Access Experience For Orion Entrance Control

Security Considerations For RFID And Mobile Access

Security Considerations For RFID And Mobile Access

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Corporate news

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec