Monday, March 5, 2012

Aconite and Thales deliver fast and secure smart card and mobile application personalisation

CARTES IN NORTH AMERICA, LAS VEGAS, USA: Thales, leader in information systems and communications security, and Aconite, a leading provider of smart application management and EMV transaction processing solutions, announce they have integrated their solutions to support the secure personalisation of smart cards, secure elements on mobile phones and other chip-based tokens, and the processing of smart transactions.

Card and mobile application issuers and transaction processors can now deploy smart card and mobile application personalisation simply, efficiently and securely. Resulting from this extended partnership, Thales and Aconite will jointly present their vision for the secure issuance of NFC applications on mobile phones at Cartes in North America 2012.

Aconite delivers smart product management solutions for payments (including EMV, Chip & PIN and contactless), mobile, loyalty, transit and e-ID. Aconite solutions issue and manage chips on any device and also process its transactions, supporting instant issuance and prepaid payment applications as well as smart applications.

As these chip solutions rely totally on secure cryptographic processes, Aconite solutions integrate with Thales payShield 9000 hardware security modules (HSMs) to provide chip personalisation, transaction processing and the complex key management processes that underlie these essential operations. Together Thales and Aconite provide a world leading smart product capability in a highly secure environment.

Aconite is a member of the Thales Alliance for Solution and Application Providers (ASAP) program. Thales partners with leading technology companies and systems integrators to meet the data security needs of security-conscious organizations around the globe. The ASAP program develops technical partnerships to ensure that Thales solutions integrate seamlessly with leading applications and hardware, making it easy to deploy best practice security solutions.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.