SOLUTIONS

Payments Encryption

SecureKey Group provide hardware security modules (HSMs) that integrate with major payment authorisation and switching applications, and are used by issuers and acquirers, switching companies and payment processors. Our HSMs are used in the securing of all payment related transactions, user credential authentication and issuing, and the protection of sensitive data and processes.

Purpose fit Integration to suit your needs

With HSM speeds ranging from very low to enterprise level speeds and an ability to build redundancy to achieve high availability, we assist our customers to meet the most demanding requirements. Add-on tools allow our customers to perform centralised configuration and monitoring functions, configuration, load balancing, HSM scaling and many other functions.

Our customers have multiple business requirements for which we offer purpose fit solutions.
Areas of application of our solutions include the following:

  • Key, certificate, and token lifecycle management
  • Mobile payments
  • High availability solutions for centralized configuration, management, monitoring, load balancing, and disaster recovery
  • Secure storage and access of sensitive data
  • P2PE & tokenization
  • Customizable data encryption solutions that meet users’ specific needs
  • EMV issuance & validation
  • Card/PIN issuance & validation
  • ATM remote key loading
  • Segregated key storage through multi LMK configurations each with its own unique identity
  • General purpose encryption (*refer to our General Purpose encryption solution page)

The latest HSM has a comprehensive range of functions that supports the needs of the leading payment brands (American Express, Discover, JCB, Mastercard, UnionPay and Visa) in a number of areas including:

  • Magnetic Stripe and EMV Card Issuance and Verification
  • Magnetic stripe and EMV-based data preparation and personalization including mobile provisioning
  • Mobile payment transaction authorization and key management
  • HCE and Cloud Payments
  • PIN generation, management and printing
  • Remote Key Loading for ATM and POS devices
  • Mobile Payments
  • Contactless/NFC
  • 3-D Secure
  • Regional/National key management (including Australia, Belgium, Germany and Italy)
  • On-behalf key management (OBKM) support
  • PCI Data Protection
  • Custom Functionality

Our HSM solutions support all the main algorithms required for banking level encryption requirements, including:

  • DES and Triple-DES key lengths 112 & 168 bit
  • AES key lengths 128, 192 & 256 bit
  • RSA (up to 4096 bit)
  • ECC as defined in FIPS 186-3 (P-256, P-384 & P-521)
  • HMAC, MD5, SHA-1, SHA-2, SHA-224, SHA-256, SHA-384 & SHA-512
  • ASC X9 TR-31, X9 TR-34, X9 TG-3/TR-39
  • APACS 40 & 70
  • Our devices are equipped with a tamper-resistant design to comply with the most stringent security certifications such as FIPS 140-2 Level 3
  • Any tampering of the device would cause sensitive data to be erased immediately.
  • Less sensitive incidents such as motion, voltage and temperature changes will trigger alarms on the device.
  • Our HSM’s requires security officers to uses two-factor authentication (2FA) for all configuration work done on the HSM and our dual control authorization which consist of physical keys or smart cards ensures safe operations during the setup and management process.
  • Our devices already have the high-level security settings implemented by default to help you plug it into your environment with little on now change required from your side.
  • Our audit logs record all administrator and device activities to ensure you can go back and view any critical events that took place.

SOLUTIONS

General Purpose Encryption

Companies increasingly seek trustworthiness in devices, apps, and solutions to counter modern threats. To establish this trust, they rely on a single source to construct a robust security framework, facilitating secure connections by obtaining a “key” (Root of Trust). This key must be extremely secure and resilient by design to be inherently trusted.

The Root of Trust is critical in Public Key Infrastructure (PKI) for generating and safeguarding Root Certificate Authority keys, essential for tasks like software code signing and IoT device authentication.

Hardware Security Modules (HSMs) play a crucial role in creating a secure Root of Trust by generating, protecting, and storing cryptographic keys within a secure environment. 

Hardware-based Roots of Trust are standard in highly secure sectors like finance and government due to their superior security features:

  • Cryptographic keys are generated using a true random number generator
    and stored in a tamper-protected, hardened environment.
  • Robust automated key management lifecycle is in place.
  • Digital signatures generated via HSMs are trustworthy and tamperresistant.
  • Compliance with security standards like PCI-DSS, GDPR, and PoPI is
    facilitated.


Our hardware-based HSMs come in various throughput options to match your transactional needs. Our expert engineers can assess your requirements and recommend the right device for your company.

Our Hardware Security Modules (HSMs) are ultra-secure devices that safeguard your sensitive data by handling encryption and signing keys within tamper-resistant hardware. They meet the strictest global Security & Compliance standards.

These HSMs are designed for cloud encryption, and their role separation ensures compliance. You can automate HSM management via REST API, saving time and eliminating the need for datacenter visits. HSMs can be partitioned to serve multiple applications or tenants, each with its own Local Master Key.

Our entry-level HSMs provide a cost-effective solution for developing and deploying custom code within a secure environment, making them popular among development teams for testing purposes.

We offer a range of HSMs, from low-speed entry-level devices for less active environments to high-speed enterprise-level devices capable of handling extensive transactions. As the Internet of Things drives demand for device IDs and certificates, our scalable HSM solutions can cluster for exponential processing power.

Our HSMs support a wide array of cryptographic algorithms, including high-speed elliptic-curve cryptography, ideal for compact computing environments. They are compatible with industry-standard operating systems and APIs.

Use cases for our HSM’s

SOLUTIONS

Data Protection & Tokenization

In today’s complex digital landscape, businesses face growing compliance pressures and a heightened awareness of the need to enhance risk management and data protection measures. This urgency arises from the ever-present threat of cyberattacks, which often stem from internal vulnerabilities rather than external breaches. Such attacks can inflict significant costs on companies, including loss of customers, damage to their brand reputation, and regulatory fines.

Traditional perimeter defences and access controls, though widely used, often fall short in preventing these internal threats. They fail to safeguard data effectively, regardless of whether it’s in active use or not. This deficiency underscores the importance of a more robust data protection strategy.

This is where we come in. We prioritize the safeguarding of your most valuable asset—your data. Our innovative format-preserving tokenization solution goes beyond traditional data encryption, which secures data but can hinder its accessibility. Instead, our approach retains data in its original yet obscured format, allowing applications to present it in a user-friendly manner. Importantly, this method ensures that your data remains protected even in its usable format, rendering stolen data useless to unauthorized entities. This not only keeps you out of trouble but also safeguards your reputation, satisfies your shareholders, and pleases your customers.

Another challenge conventional systems face is protecting against manipulation by trusted individuals once they’re installed. We address this issue by setting up the solution initially and then removing the management tool from the environment. This prevents unauthorized manipulation and ensures that the system operates based on pre-configured rules agreed upon with your company. By eliminating the “keys to the castle,” we ensure that access to the system and rule manipulation are kept at bay

Additionally, in the realm of IT environments, encrypted data often requires decryption to remain usable. This occurs multiple times when data is in motion, passing between different security solutions and network layers. During these transitions, data briefly becomes vulnerable as it’s exposed in the open. Our data protection solution, however, prevents data from reverting to its clear form, maintaining its security throughout its journey within the network.

In summary, our comprehensive approach to data protection addresses the evolving challenges of the digital landscape, ensuring your data remains secure, accessible, and free from manipulation throughout its lifecycle.

Data Security Platform

SOLUTIONS

Document Digitization

Companies are seeking cost-effective solutions that boost efficiency, reduce risk, and support remote work. Our document digitization and signing solution streamlines your processes, making them more efficient and secure. We employ digital signatures and bank-level encryption to safeguard your documents, whether it’s for basic tasks like leave approvals or complex, sensitive documents requiring multiple signatures.

In today’s flexible work environment, where both office and remote work are prevalent, we provide a solution that digitizes documentation and facilitates secure remote signing.

This ensures administrative processes continue seamlessly while maintaining document legality and non-repudiation. Our mobileresponsive platform eases administrative burdens

Our solution adheres to the latest security standards endorsed by governments and banks, making each transaction tamper-evident.

Consider the environmental impact: Sharing digital data is 31 times more cost-effective than physical copies, with documents often copied between 9 and 11 times. Reduce your carbon footprint by cutting paper and ink usage, minimizing waste from redundant cartridges, printers, and storage. Embrace a more eco-friendly approach, replacing numerous emails with a single notification.

 

Enhanced Accessibility

Easily share files with clients and employees, ensuring efficient document sharing.

Sustainability

Embrace eco-friendly practices, appealing to environmentally conscious customers.

Cost Savings

Reduce expenses on printing, equipment, paper, storage, and courier services.

Workplace Flexibility

Enable virtual work within the office, supporting employee flexibility.

Improved Customer Service

Provide timely service with swift electronic document retrieval.

Data Protection

Safeguard documents from fire, theft, and unforeseen disasters, unlike paper records.

Non-Repudiation

Ensure document authenticity with security features like OTP, Twofactor authentication, Geolocation, and Electronic certificates.

Complete Audit Trail

Maintain a comprehensive history of document-related events.

Enhanced Data Security

Store digital documents on secure off-site servers

Increased Productivity

Save time by reducing paper document handling and travel for signing.

Integration Capabilities

Seamlessly connect with ERP or SharePoint environments via our service-oriented architecture (SOA) and APIs..

Enhanced Accessibility

Replace physical storage with virtual storage for regulatory records and documents

Mobile Functionality

Access and sign documents on mobile devices from anywhere, at any time.

Effortless Storage and Retrieval

Store documents in a regional cloud server or behind your company firewall for easy retrieval.

Dedicated Support

Access 24/7 support, 365 days a year, from accredited agents via our international call centre.

Solutions to help your business along

We don’t just do signing of documents, we also provide other solutions

SigniFlow

Digital Signatures
Send, sign, track and manage documents.

GLOBALSIGN DSS

Digital Signing Service
The highest levels of global digital compliance.

APPFLOW

Onboarding Systems Automated
onboarding forms & contracts.

SigniFlow

Digital KYC
No-touch digital KYC and AML verification

DOCFLOW

Document Automation
Automate the flow of your documents

DOCFUSION

Contract Generation
Dynamic document generation with powerful
templates.

LIVENESS DETECTION

FaceTec 2D/3D FaceScans
proves the correct user is physically present by
matching them to their ID photo or 2D/3D FaceMap.

SOLUTIONS

Identity & Access Management

With mobile and cloud adoption on the rise, the traditional security perimeter has vanished, giving way to decentralized identities and the need for Zero Trust environments.

Securing the identities of workers, consumers, and citizens is paramount to prevent unauthorized access, data breaches, and fraud. Companies now demand that trust and security be ingrained in their infrastructure to ensure that only trusted users, systems, applications, and solutions gain access. This shift necessitates trust establishment before access, secure transactions, and ongoing trust maintenance.

Our Identity and Access Management solution forms a strong foundation for implementing a Zero Trust framework.

Trusted by Banking, Government, Healthcare, Insurance, Retail, and Education sectors globally, it’s tailored and highly secure for your environment.

We establish trust by providing secure user identities and credentials for enterprise applications, controlling access both on-premises and in the cloud. User and device authentication is mandatory for trust. We continuously monitor user behaviour and usage patterns to maintain trust throughout sessions.

Our Identity and Access Management solution relies on a trusted platform that underpins our actions, allowing sensitive operations and device checks. This includes device reputation assessment based on factors like Geolocation, ISP, mobile carrier detection, historical device fraud records, jailbreaking history, and account access velocity. Meeting these criteria grants access as a trusted device.

Credential issuance also involves stringent measures that users must pass before accessing the environment. User details are collected using a patented image capture process. Facial recognition and liveness testing undergo validation through over 50 forensic tests within seconds. Only upon passing these tests can a user and device access the trusted environment.

You can now authenticate your users and protect their transactions at the same time with the latest OTP and Certificate-based authentication mechanisms. Our mechanisms include:

Invest in a single solution that supports unparalleled number of use cases and deployment options
  • End-to-end user journey using Identity Proofing and workflow orchestration
  • High assurance credential-based access for enterprise and government workforces
  • High assurance credential-based passwordless access for workers
    Passwordless access for consumers using phone biometrics or FIDO tokens
  • Single sign-on (SSO)
  • Best-in-class high availability and large-scale capability multi-factor authentication (MFA)
  • Adaptive risk-based access and authentication
  • Email signing and encryption, file encryption, and document signing
  • High assurance authentication for large consumer-and citizen-facing portals
  • Transaction confirmation and non-repudiation
  • Quick deployment and ease of use
  • Deployment models for small workforces to large-scale consumer environments with 10 million+ identities
  • Flexible deployment options: cloud, managed service, on-premises, virtual appliance

SOLUTIONS

Other Supported Solutions

Companies increasingly seek trustworthiness in devices, apps, and solutions to counter modern threats. To establish this trust, they rely on a single source to construct a robust security framework, facilitating secure connections by obtaining a “key” (Root of Trust). This key must be extremely secure and resilient by design to be inherently trusted.

SecureKey Group’s mission is to deliver top-tier security solutions that not only safeguard your environment but also streamline the deployment of data protection solutions for faster results.

In addition to our core services, we offer a comprehensive suite of other supported solutions to ensure compliance with regulations like PCI DSS, SOX, and various privacy standards. Our commitment to excellence and technical expertise makes us a global leader in:

  • Network protection with high-speed data encryption devices
  • Data protection
  • Identity and biometric solutions
  • Mobile security
  • Token hardware
  • PKI & digital certificate authority
  • DNSSEC
  • Secure IoT solutions
  • Application encryption

As a provider of cryptographic and data protection solutions, we collaborate with other industry leaders to offer solutions that complement our product line.

While our primary focus is in our core business, we recognize the importance of supporting our customers in related areas through trusted relationships. Our partners specialise in the following:

  • Used for instant issuance in Banking (Chip and Pin smartcard), Secure ID and Badge issuing.
  • Artificial Intelligence, Machine Learning and Neural Network, with more than 550 pre-created algorithms, that detect and combat illicit financial flow across the entire fraud value chain for inter alia.
    • Fraud management
    • Waste and Abuse management (Healthcare)
    • Quality assurance
    • Full management dashboards and reporting
    • Anti money laundering
    • Anti-terrorism funding
    • Syndication
    • Ponzi Schemes
    • Internal Collusion
  • Wide range of IoT offerings through business process augmentation across all industries from small business owners to large multinationals to deliver new levels of efficiency and automation across the entire value chain.
  • Providing Mobile, Browser and MNO Authentication points to customers of financial institutions through a single, state-of-the-art platform built on market-leading risk intelligence to orchestrate frictionless user experiences with smart step-up authentication based on the context of the customers’ connection.

Chip & Pin Card Preparation Solutions

We provide a powerful and mature set of tools, enabling card issuers to prepare data for personalisation of smart cards for use in a wide range of applications, both financial and non-financial. The principal components of our issuance solution can be combined in several ways to satisfy the needs of both complete in-house card issuance and in-house data preparation only services. The components also integrate readily with card issuers legacy card management systems (CMS) and with personalisation systems that drive the printing (or loading) of such information onto smart cards.

Providing Magnetic Stripe encoding and Chip & Pin Test tools

Providing and Support of turnkey data preparation solution P3 Advanced and P3 Server

Providing an EMV (Eurocard, Mastercard, Visa) insurance solution

OUR SOLUTIONS

The P3 System

P3 supports all of the standard and proprietary card types, as well as the major card scheme application standards and multiple easy configurable input (embossing) and output (EMV enriched) file formats.

There are two typical configurations an end-to-end solution (for in-house issuing, batch and instant issuing) and an in-house data preparation solution with outsource card production (for external personalisation by a Bureau).

Both these Configurations reduce risk by allowing the issuer to keep control of its master keys (security in-house) and accommodate business innovation demands, flexibility and speed to market.

For those who need to upgrade from SDA to DDA cards, P3 server supports multiple crypto modules and RSA key generation and caching, enabling issuers to provide the same SLA (service levels) for DDA cards as for SDA cards.

Key benefits of utilising the P3 solutions are:

OUR SOLUTIONS

The Test Tools

EMV Perso Validation - CPT 3000v3CL

EMV Perso Validation - CPT 3000v3CL

Maintain the highest standards in card personalisation quality control. EMV personalisation validation testing enables issuers and card bureaus to validate and pre-certify their cards against the latest payment scheme specifications, as well as the issuer's business requirements. This prevents the costly production of invalid EMV cards and delays inthe formal card certification process.

NFC Mobile Payments - CPT 3000v3ML

NFC Mobile Payments - CPT 3000v3ML

Develop, pre-certify and certify mobile payment applications. An increasing number of banks and mobile operators are now offering mobile contactless payments to their customers. As with EMV contactless cards, the mobile payment application contained on the SIM needs to be certified by the contactless payment schemes, and in some cases by GlobalPlatform.

Contactless Test Tools (CQM) - Q-Factor, RF & Reading Distance

Contactless Test Tools (CQM) - Q-Factor, RF & Reading Distance

Resonance Frequency, Q-Factor and Reading Distance. Financial card producers have to prove to Mastercard that for each issued banking card they have successfully completed a series of tests including those related to chip card quality. Mastercard issues their Card Quality Manufacturing (CQM) requirements to ensure the quality of the product during the manufacturing and personalisation phases.

Magnetic Stripe Analysers - REVO / MT3000

Magnetic Stripe Analysers - REVO / MT3000

Ensure you deliver the highest quality magnetic media, cards and tickets. Companies who aim to deliver the highest quality magnetic media products to their clients choose Barnes Magnetic Stripe Analysers. Magnetic stripe producers, card and ticket manufacturers and bureaus use them for ISO and CQM testing, production quality control, encoding equipment maintenance and development.

Magnetic Stripe - Test Limit Cards

Magnetic Stripe - Test Limit Cards

Validate mag-stripe performance during new product development. Magnetic stripe test cards are used by research and development in developing new products or quality control to check the capability of readers. They help to ensure compliance of devices to the differing global standards or your own proprietary requirement.

Integrated Test Solutions - Inline EMV QC

Integrated Test Solutions - Inline EMV QC

Maintain 100% card personalisation quality control. 100% EMV personalisation validation testing enables issuers and card bureaus to carry out 100% validation of cards and total quality control at the last stage of the personalisation process. Barnes has developed QC validation systems integrated into card the personalisation systems of the major personalisation machine manufacturers. 100% of Cards can be validated without reducing production output.

EMV Perso Validation - CPT 3000v3CL

Maintain the highest standards in card personalisation quality control. EMV personalisation validation testing enables issuers and card bureaus to validate and pre-certify their cards against the latest payment scheme specifications, as well as the issuer's business requirements. This prevents the costly production of invalid EMV cards and delays inthe formal card certification process.

EMV Perso Validation - CPT 3000v3CL

Click Here

NFC Mobile Payments - CPT 3000v3ML

Develop, pre-certify and certify mobile payment applications. An increasing number of banks and mobile operators are now offering mobile contactless payments to their customers. As with EMV contactless cards, the mobile payment application contained on the SIM needs to be certified by the contactless payment schemes, and in some cases by GlobalPlatform.

NFC Mobile Payments - CPT 3000v3ML

Click Here

Contactless Test Tools (CQM) - Q-Factor, RF & Reading Distance

Resonance Frequency, Q-Factor and Reading Distance. Financial card producers have to prove to Mastercard that for each issued banking card they have successfully completed a series of tests including those related to chip card quality. Mastercard issues their Card Quality Manufacturing (CQM) requirements to ensure the quality of the product during the manufacturing and personalisation phases.

Contactless Test Tools (CQM) - Q-Factor, RF & Reading Distance

Click Here

Magnetic Stripe Analysers - REVO / MT3000

Ensure you deliver the highest quality magnetic media, cards and tickets. Companies who aim to deliver the highest quality magnetic media products to their clients choose Barnes Magnetic Stripe Analysers. Magnetic stripe producers, card and ticket manufacturers and bureaus use them for ISO and CQM testing, production quality control, encoding equipment maintenance and development.

Magnetic Stripe Analysers - REVO / MT3000

Click Here

Magnetic Stripe - Test Limit Cards

Validate mag-stripe performance during new product development. Magnetic stripe test cards are used by research and development in developing new products or quality control to check the capability of readers. They help to ensure compliance of devices to the differing global standards or your own proprietary requirement.

Magnetic Stripe - Test Limit Cards

Click Here

Integrated Test Solutions - Inline EMV QC

Maintain 100% card personalisation quality control. 100% EMV personalisation validation testing enables issuers and card bureaus to carry out 100% validation of cards and total quality control at the last stage of the personalisation process. Barnes has developed QC validation systems integrated into card the personalisation systems of the major personalisation machine manufacturers. 100% of Cards can be validated without reducing production output.

Integrated Test Solutions - Inline EMV QC

Click Here

OUR SOLUTIONS

the EMV Issuing

“Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

If you need to issue EMV tokens (smartcards) to your customers for use in a wide range of applications, both financial and non-financial, or need to migrate from magstripe to Chip and Pin then we can help.

We provide a powerful and mature set of tools enabling card issuers to prepare data for personalisation of smart cards for use in a wide range of applications, both financial and non-financial. The principal components of issuance solution can be combined in several ways to satisfy the needs of both complete in-house card issuance and in-house data preparation only services. The components also integrate readily with card issuers legacy card management systems (CMS) and with personalisation systems that drive the printing (for loading) of such information onto smart cards.

SOLUTIONS

Cryptographic Key Management Solutions

Managing cryptographic keys across multiple applications can become increasingly challenging as the key count rises. Manual and decentralized processes, aside from being costly, are prone to errors. Moreover, proving compliance is time-intensive, diverting attention from essential tasks.

A centralized key management solution automates key updates and distribution across various applications, offering benefits like symmetric and asymmetric key lifecycle management. This enables robust processes that ensure compliance with internal and external audits, fostering confidence in key management practices.

A lack of ownership, skilled personnel, and knowledge in isolated systems poses significant challenges to successful key management.

A well-implemented Cryptographic Key Management System mitigates these risks by assigning clear roles and responsibilities. This system automates manual tasks, allowing staff to focus on policy setting and efficient key delivery across systems. It not only lightens the workload securely but also facilitates compliance with standards like PCI-DSS and GDPR, enhancing competitiveness and business efficiency.

Advantages of our Cryptographic Key Management System

Our Cryptographic Key Management system is capable of providing the following advantages to any organisation that implements the solution:

Provides tamper evident audit and usage logs for proof of compliance

  • Authorities: FIPS, Internal audit, PCI, Payment schemes and S/O
  • Domains: Physical (e.g. tamper) & logical security (crypto/SW/system
    design)

Central management of the cryptographic keys life cycle at large scale

  • High availability and scalability
  • Supports multiple applications
  • Different key types and formats, e.g. Atalla Key Block, BASE24, IBM CCA,
  • MC OBKM, PKCS#8, TR-31 BYOK and Manage Your Own Key (MYOK) in the cloud

Streamlines key management processes to reduce admin and travel costs

  • Key custodians can remotely manage and update keys with asynchronous workflows for at-your-desk key ceremonies
  • Support for all major HSM brands

Automates key management activities and on-line key distribution

  • Automatic key updates and distribution to any end-point

Reduces the risk of key compromise and human errors

  • Flexible key attributes eliminate paperwork
  • Dual-control and configurable role-based access

Talk to us, we have the solution you are looking for