2
1221
Mobile-networking

SWIM Mobile App makes Card/Token Issuers cool, mobile and secure

SWIM (Software Wireless Identity Modules) mobile apps are proposed to card token issuers in all business sectors (from finance, banking, telecom to transit). Our SWIM apps are capable of performing two main functions: digital signing for non-repudiation and authenticating the user/device to the server. SWIM mobile apps provide Public Key Infrastructure (PKI) security, run on Android and other smartphones, and are managed on end consumer mobile devices via a unique SaaS (Software as a Service) hosted managed service by HCEservice.com. SWIM apps provide PKI secured EMV card tokenisation and associated EMV payment processing based on Visa and MasterCard HCE, host card emulation, standards. Read More...

SWIM MAP Platform turns Smartphones into Payment Cards

SWIM mobile apps provide smartphone users payment tokens functionality based on EMV and HCE standards. Therefore, one key role of the HCEservice.com SWIM MAP (mobile application platform) hosted service is to handle mobile-side PKI and then provide an interface to the existing banking card issuance networks. The SWIM MAP platform acts as an intermediary mapping the PKI/SWIM secured HCE payments transactions to traditional banking transactions. HCEservice.com bridges the gap between secure m-commerce and the existing banking card issuer systems.  This allows the card issuers to get the benefits of PKI. Read More...

SWIM Corporate secures your Organisation Data

The protection of information flowing across networks, public or private, is fundamental to all corporations, large or small. This requirement is often either ignored and data is sent insecurely, or a proprietary solution is implemented to meet the internal requirements of the organisation. This subsequently makes it difficult to extend the security to protect communications with external organisations. HCEservice.com’s SWIM-corporate Public Key Infrastructure security solution is based on established industry standards. It provides an integrated end-to-end security infrastructure designed to deliver end-to-end protection for high-value or sensitive information during transmission across an Intranet, an Extranet or across the Internet. Read More...