Samsung Electronics Co., Ltd., a world leader in advanced semiconductor technology, introduced a standalone turnkey security solution comprised of a Secure Element (SE) chip (S3FV9RR) and enhanced security software that offers protection for tasks such as booting, isolated storage, mobile payment, and other applications. The latest security chip is Common Criteria Evaluation Assurance Level (CC EAL) 6+ certified, the highest level acquired by a mobile component.
App Development in PHP, Java, and Ruby Framework Remains Vulnerable, Says a New Report
“In this era of mobility and contact-less interactions, we expect our connected devices, such as smartphones or tablets, to be highly secure so as to protect personal data and enable fintech activities such as mobile banking, stock trading, and cryptocurrency transactions,” said Dongho Shin, senior vice president of System LSI marketing at Samsung Electronics. “With the new standalone security element solution (S3FV9RR), Samsung is mounting a powerful deadbolt on smart devices to safeguard private information.”
Samsung’s new security solution is an enhanced turnkey that follows the first-generation solution (S3K250AF) announced in February. The new security solution is a state-of-the-art component that offers higher assurance levels than its predecessor’s CC EAL 5+ with an industry-leading CC EAL 6+ certified-hardware secure element, S3FV9RR, and powerful security software. CC EAL 6+ is utilized in applications that demand the most stringent security requirements in the market such as flagship smartphones, e-passports, and hardware wallets for cryptocurrency.
Biometric Security Startup BioCatch Secures $145 Million in Series C Funding
With twice the secure storage capacity, the new security solution also supports the hardware-based root of trust (RoT), secure boot, and device authentication that brings mobile security to the next level. Especially for service providers, manufacturers, and organizations, secure device authentication is enhanced with the RoT when running proprietary applications on a mobile device. As a bootloader initiates, a chain of trust is activated through which each and every firmware with approved keys are sequentially validated. This secure booting process is handled by the RoT, guarding the device against any possible malicious attacks or unauthorized software updates.