Secure mobile payment crypto currencies
Telecommunications

Secure mobile payment and cryptocurrencies

Protecting payment data when it is processed, transferred, and stored

Mobile, contactless payments are used more and more frequently in today’s society, which creates new security and compliance risks. In addition, cryptocurrencies – although still volatile - have gained official currency status and also have an impact on the mobile payment market.

It is not only the responsibility of the payment vendor to offer a secure app and process, but also the telecommunications industry to provide secure networks, since data – and indeed payment - transactions are processed via mobile networks. If the network is insecure, “Man in the middle attacks” can be possible where a malicious attacker tries to intercept the data which is being transferred from the payment app and the server.

Utimaco provides specialized cybersecurity solutions which comply with payment security standards such as PCI-DSS. We offer a variety of Hardware Security Modules that secure payment use cases and which support blockchain-specific algorithms to secure blockchain-based solutions such as cryptocurrencies. Our tokenization solutions also ensure secure payment data transmission.

Applications

Applications for secure mobile payment and cryptocurrencies

Icon

Subscriber Privacy

Ensures the privacy and protection of the subscriber’s identity, location, and shared information in mobile networks.

Icon

3GPP TS 33.501 compliance

Provides a secure architecture and security processes for 5G mobile networks that fulfill all requirements defined in 3GPP TS 33.501.

Icon

Payment HSMs

Tamper-proof, hardware-based, available, redundant, secure, reliant, and complaint – is how a payment HSM should be.

Icon

Converged HSM

Enables true multi-tenancy on a single platform. Deployed as HSMaaS supporting general purpose, payment, and all other use cases and compliance requirements.

Icon

Blockchain security

Specific generation of private and public keys used for blockchain transactions and secure storage of all related digital assets in a blockchain.

Icon

Tokenization

Replacing sensitive data with non-sensitive tokens enables secure business operations without sharing sensitive information.

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.