next generation Digital wallet

Enterprise Grade Solution

HSM secured Digital Payments Wallet

(configurable to enable Card Networks / Issuers and Digital Assets )

360° Protection

Your

Logo

Here

Powered By WB Fleming

Our T100X Card is designed to protect against common weaknesses of smart card – insecure entry of data and credentials, and insecure display of security statuses and messages.

 

The T100X also comes with a Key Manager to allow access to a unified Key Management application. This application is used for secure storage, generation, management and use of cryptographic keys and tokens, as well as to provide a simple Credential API for storage and management of application credentials. The Open API access to the ePaper display and buttons provide a ready built display and button input framework, and the rendering of text and images on the ePaper display of the T100X makes it much friendlier to navigate.

 

 

T100X Hardware Features

Cryptographic Algorithms:

• AES (128, 192, 256 bits)

• T/DES (1/2/3 Key DES)

• RSA (512 to 2048 bits)

• ECC (256, 384, 521 bits)

• MD5, SHA1, SHA2 hashes

 

Special Algorithms:

• SECP256K1

• ChaCha20

• Keccak256

• Diffie-Hellman over 2048 bits (non-ECC)

• HOTP/TOTP • PBKDF2

 

Hardware Storage Memory:

• 120 KB

 

Security Certification:

• Common Criteria 5+ security certification

 

Enhanced Features:

• Internal RTC clock

• Re-chargeable battery to power internal RTC clock

• Allows for card use without external power source

• Easily rechargeable over a conventional card reader

• Bluetooth LE interface

• 12 PIN pad buttons + 1 power switch

• 256 x 256 pixels ePaper display

Security Solution

(powered by Utimaco)

We provide the highest level of security for confidential data and cryptographic keys.

 

Our security server solution utilizes tamper-responsive technology to secure cryptographic key material for servers and applications. It is ideal for applications and market segments with high physical security requirements, such as government authorities or banking and financial services.

 

Maximum security

  • Highest security at an attractive price

  • Starter models for applications with low-performance requirements

  • Extensive remote administration

  • Efficient key management and firmware updates via remote access

  • Automation of remote diagnosis via Simple Network Management Protocol (SNMP)

  • Software simulator for evaluation and integration testing

 

Features

  • Secure key storage and processing

  • Extensive key management

  • Secure key storage inside HSM or as external encrypted key files

  • 2-factor authentication with smartcards

  • “m out of n” authentication (e.g. 3 out of 5)

  • Configurable role-based access control and separation of duties

  • Multi-tenancy support

  • Remote management

  • Software simulator for evaluation and integration testing

  • Supported operating systems: Windows and Linux

  • Multiple integrations with PKI applications, database encryption, etc.

  • All features included in the product price

 

 

Cryptographic algorithms

  • RSA, DSA, ECDSA with NIST and Brainpool curves

  • DH, ECDH with NIST and Brainpool curves

  • AES, Triple-DES, DES

  • MAC, CMAC, HMAC

  • SHA-1, SHA2-Family, SHA3, RIPEMD

  • Hash-based deterministic random number generator (DRG.4 acc. AIS 31)

  • True random number generator (PTG.2 acc. AIS 31)

  • Standard APIs supported like PKCS#11, JCE, CNG

CryptoServer Cloud

 

Cloud-based Hardware Security Modules (HSMs) can secure data and high-value assets such as custom code.

  • Multi-cloud scalability and risk mitigation

    • No lock-in to specific Cloud Service Provider key management solution

    • Virtually unlimited scalability

    • Certainty over the allocation and physical location of your HSM

 

  • Maximum security for high-value assets

    • Custom code can be protected and deployed on HSM (separate SDK required)

    • Customer dedicated HSM

    • Only customer has control of content in the secure perimeter of the HSM

    • Two-factor authentication available

    • Full control of encryption key life-cycle and key administration

 

  • Connectivity

    • Private connection to major Cloud Service Providers with multi-cloud support

    • Direct connections from numerous co-locations available via Megaport

 

  • Latency: Short RTD from HSM to cloud-based applications

 

  • Full control of HSM

    • End customer has all administrative rights on HSM

    • Easy-to-use remote management and on-site key ceremony service option

 

  • Maximum level of compliance

    • FIPS 140-2 Level 3 certified HSMs

    • Hosted in ISO/IEC 27001, HIPAA and PCI compliant data centre

 

  • Simplicity: standard APIs supported like PKCS#11, JCE, CNG

© 2018 by W.B. Fleming Global.