SWIM Mobile App makes Card/Token Issuers cool, mobile and secure.....

SWIM (Software Wireless Identity Modules) apps are proposed for card and token issuers in all business sectors (from finance, banking, telecom to transit).

SWIM mobile apps are capable of performing two main functions: digital signing for non-repudiation, and user and device authentication. SWIM apps provide Public Key Infrastructure (PKI) security, run on Android and other smartphones, and are managed on end consumer mobile devices via a unique SaaS (Software as a Service) hosted managed service by HCEservice.com. These apps provide PKI secured EMV card tokenisation and associated EMV NFC mobile payment processing based on Visa and MasterCard HCE, host card emulation, standards.

What is SWIM?

  • Software Wireless Identity Module.

  • A whitebox crypto that enables a mobile device to use PKI. (I.e. WPKI)

  • Allows Authentication and Digital Signing via separate key pairs.

  • Part of Wireless PKI standards.

SWIM mobile apps can form the foundation of your secure smartphone card/token issuance infrastructure designed to protect high value transactions and messages being transported across multiple untrusted mobile and fixed Internet networks. SWIM can be customised to deliver your complete end-to-end, enterprise-wide secure messaging infrastructure.

SWIM complies with emerging HCE EMV standards as well as PCI and PKI data security standards in order to securely deliver smartphone based NFC payments. At HCEservice.com, we handle sensitive payment cardholder token data within our PCI secured data centres conforming to the latest Industry payments and security standards promoted by Visa and MasterCard card schemes and the PCI Council.

SWIM Mobile App with HCE Payment Functions....

  • My SWIM Profile

    Wallet user personal details and public key pairs

  • Manage SWIM Password

    Changing SWIM wallet password

  • My SWIM/HCE Preferences

    e.g. Delivery Address password

  • HCE Payment Tokens

    Credit / Debit cards managed within SWIM wallet

  • My SWIM Inbox

    Messages received from your SWIM wallet service provider

  • Last 20 HCE Payments

    Last 20 SWIM secured HCE transactions shown on Google Map

The ‘Key’ to Success: SWIM in a PKI Nutshell…

To reduce transactional risks across untrusted networks and remote end users, four security services have evolved over time. Software Wireless Identity Modules (SWIM) provide fast and flexible high-level cryptographic services for integration into any mobile business or consumer app running on Android and other smart phones. These services are summarised below.

  • Confidentiality

    The contents of the message (transactional data) should be available only to authorised parties.

  • Authentication

    Proof that message (transactional data) really has come from the person who claims to have sent it.

  • Integrity

    Detect that the message (transactional data) contents have not been alteredduring transmission.

  • Non-repudiation

    Protection against the sender of the message (transactional data) denying having sent it.

These services are addressed within SWIM through the use of public and private key cryptography and “trusted third parties”, namely Certification Authorities and Registration Authorities.

What does SWIM do?


  • Identifies the device/user to remote servers.  E.g. WTLS Class 3.

Digital Signing

  • Provides non-repudiation by making the user explicitly sign requests and enter the signing PIN each time.

SWIM mobile apps enable distributed business and consumer applications to be secured with minimal development effort and cost, by eliminating the need to develop security services apps from scratch.

  • We aim to provide public key pairs for all mobile users on the Internet, and this poses quite a logistical problem.

  • We aim to deliver SWIM secured mobile HCE EMV payment functions.

  • We provide the ability to sign, verify, encrypt and decrypt HCE and other transactional messages using digital certificates and associated key pairs, which are stored in whitebox ‘secret stores’ somewhere on the user’s mobile smartphone.

  • We enable mobile users to communicate securely with multiple remote Mobile Application Platforms for whom the user has no certificate and who does not know the user.