Go to content Phone human-readable description of the message we trying to accomplish. Search human-readable description of the message we trying to accomplish. Map pin human-readable description of the message we trying to accomplish.

Powerful hardware security in today’s smart devices isn’t something new. ARM announced TrustZoneTM in 2003 (http://www.arm.com/about/company-profile/milestones.php), starting the trend for system on chip manufacturers to licence this secure platform.

How do developers make use of this?

With the formation of Trustonic in 2012, the goal has been to provide a simple platform for application developers to make use of these features. We provide the OS and SDK – application developers can protect keys, algorithms and benefit from the additional trust a Trusted Execution Environment (TEE) brings.

Simplicity

Developers want a simple API and easy application deployment. We live in a world were software is developed and released at a rapid pace. I’m often asked “How long does it take to change my application to use the Trustonic platform?”  Well every application is of course different, but I often mention KoolSpan’s secure voice product. From receiving the SDK, to having a working demonstration application, the whole process took just two months.

 

“Trustonic’s SDK allows us to access the highest level of security and encryption that the Trustonic TEE offers” said Bill Bill Supernor, KoolSpan CTO. “Hardware specifics, device complexities, secure memory management and secure storage are abstracted away giving us a simple, clean interface to these features. We were able to modify our application to support Trustonic in a matter a weeks.”

Securing voice

In fact Trustonic have been using KoolSpan’s solution since January this year and are proud to be relying on a product secured by the Trustonic TEE, safe in the knowledge that our calls and messaging are strongly protected.

Hackers eavesdropping on the private discussions of executives are a risk to the enterprise. There’s frequent reports in the press about this happening – German researchers have discovered security flaws that could let hackers, spies and criminals listen to private phone calls and intercept text messages  –https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/german-researchers-discover-a-flaw-that-could-let-anyone-listen-to-your-cell-calls-and-read-your-texts/

Use cases for TEE are many. If your application needs to protect a cryptographic key, secure data or your back end systems need to know devices are trusted, then consider the TEE.

Secure voice requires two end points to communicate securely. To achieve this you need to protect the encryption keys used, and encrypt the data on device. By doing so, a potentially compromised mobile tower (http://news.sky.com/story/1499258/fake-mobile-phone-towers-operating-in-the-uk) cannot intercept your data.

KoolSpan provides secure communications solutions enabling business and home users to make phone calls and send messages securely.

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, vital information and proprietary assets. Customers include government organizations and enterprises in over 60 countries worldwide in industries that span government, financial services, industrial/manufacturing, energy, transportation, healthcare and others. KoolSpan is FIPS 140-2 certified and has 21 issued patents with dozens more pending.

KoolSpan is offering a promotion for a free 30-day trial of the TrustCall Service, KoolSpan’s encrypted wireless calling and messaging application, on qualified Samsung Galaxy devices. To sign-up for the trial promotion, visit:https://koolspan.com/free-trial.

Related content

The Benefits of Trusted User Interface (TUI)

Trusted User Interfaces (TUIs) are the next big thing for securing critical mobile apps. The Trusted User Interface feature allows a Trusted Application to interact directly with the user via a common display and touch screen, completely isolated from the main device OS.


Time for Hardware Backed Mobile Application Security

There’s much written about the need to secure mobile applications and the consequences of failing to do this well. At the same time, many claim this to be an impossible task, with numerous and varied ways for the ‘bad guys’ to win. Security is never easy – but good security can transform the way users interact with systems, enabling new ways of living and working. Done right, security makes systems simpler and easier to interact with. The days of passwords and dongles are long gone.



Trustonic Security to be Implemented in LG Mobile Smartphones

Bringing greater security to LG smartphones, responding to mobile network operator device lifecycle protection needs and helping 3rd party developers protect their apps.

22nd April 2020 – Mobile device and app security leader Trustonic has extended its partnership with LG Electronics Mobile Communications Company, which will see Trustonic Secured Platform (TSP™) deployed on LG’s smartphones. This includes the introduction of Trusted User Interface (TUI) functionality that is vital to unlocking the next generation of strong app protection in mobile banking, mobile payments and mPOS, digital car key and mobile identity-based apps.


Korea’s KB Bank Uses Trustonic In-App Protection to Enhance Mobile Banking Experience

Using Trustonic Application Protection enables KB Bank to dramatically improve the authentication experience for users of its mobile banking app and allow secure high value transactions

2nd April, 2020 – Mobile cybersecurity leader, Trustonic, today announces the successful implementation by KB Kookmin Bank (KB Bank) of Trustonic Application Protection (TAP) to enable a simpler authentication experience for users of its KB Star Banking app.

All Trustonic Application Protection (TAP) posts
Back to top