CRYPTOMATHIC BLOG

 

Payment Security

4 min read

How to build a PCI MPoC v1.1 solution based on Cryptomathic’s Mobile Application Security Core (MASC) Software

The primary objective of the PCI MPoC (Mobile Payment on COTS) standard is to ensure that robust security mechanisms are in place for secure mobile...

Read More

1 min read

Unveiling Obsidian: Next-Gen Payment Platform for the Cloud Era

We are delighted to announce the launch of Obsidian payment platform, a cutting-edge digital payments solution for issuers designed to meet the...

Read More

3 min read

7 Top strategies to secure mobile-first consumer-driven banking

North America is catching up fast to the open banking initiatives that are currently thriving across Europe, South America and Asia Pacific. As...

Read More

2 min read

Mobile Point of Sale Compliance – What is it all about?

PCI have recently released the new standard and compliance program for Mobile Payments on Commercial off-the-shelf devices (MPoC). This blog is the...

Read More

4 min read

Using EUDI Wallets for Secure Digital Payments

The European Digital Identity Wallet (EUDI Wallet) is at the forefront of the European Commission's eIDAS initiative to establish a secure and...

Read More
EUDI Wallet for payments

1 min read

Banks Ask EU to Reconsider Payments in EUDIW Legislation

The European Digital Identity Wallet (EUDIW) has the potential to serve as a comprehensive identity gateway, enabling individuals to manage their...

Read More

2 min read

HSM remote key loading using CKMS and PCI-certified KLD

Hardware security modules (HSMs) are physical devices that provide cryptographic functions such as encryption/decryption and digital signing. They...

Read More

4 min read

Exploring The EMV Personalization Process

EMV Personalization of a payment card is the process of writing data to the card in order to make it ready for use. This includes loading the card...

Read More
Cardholder, Merchant, Issuer & Acquirer - The Four Corners Model for Payment Security and Key Management

4 min read

The Four Corners Model for Payment Security & Key Management

The “Four Corners” model, also called the “Four Party Scheme”, is utilized in almost all standard card payment systems across the globe. Here, we...

Read More