New Trustonic Platform Provides Mobile and IoT Developers with Device Security

Posted 2/9/2016 2:57:16 PM by RICHARD HARRIS, Executive Editor

New Trustonic Platform Provides Mobile and IoT Developers with Device Security
Trustonic has released its "Trustonic Hybrid Protection" (THP) which offers built-in device security providing mobile and IoT developers with an adaptable security solution bringing together software and hardware secured solutions into one hybrid product. 

Trustonic combines advanced hardware enabled security solutions found in over 500 million devices with software protection technologies licensed from whiteCryption. The Trustonic Hybrid Protection defaults to use Trustonic TEE Hardware Protection whenever the hardware is available, bringing the service provider the highest level of security the device can provide.

THP unifies a number of technologies under one API to simplify code development into a single source. THP uses a combination of protection technologies including: 

- Unique hardware roots of trust
- Hardware based Trusted Execution Environment (TEE)
- Software code protection
- Whitebox software based cryptography

The platform provides the ability for developers to use the same source code to protect the application across all platforms. Developers only have to use a single API to protect their applications and Trustonic Hybrid Protection will select the appropriate security technique depending on the device capabilities.

Developers identify the sensitive parts of their code they would like to protect via the Trustonic API. The Trustonic Hybrid Protection SDK compiles the Trusted Application and creates different binaries for each platform. The developer then packages the Trusted Application and publishes the application on the app stores as usual.

As an additional layer of perimeter security, app developers can choose to utilize the code protection and whitebox cryptography technologies to protect the “normal” world code base. Trustonic Hybrid Protection makes it easy to protect and deploy security-demanding applications using a single tool and single API and is initially available for Android and iOS based devices.

Another aspect of THP is the simplicity of deploying “trust enhanced” apps. THP utilizes asymmetric-based cryptography combined with installation and authorization protocols familiar to any mainstream app developer. As a result service providers have both control over where their services are deployed and visibility as to the security capabilities protecting those services across their install base.

Read More


About the author: RICHARD HARRIS, Executive Editor

As the Publisher and Editor for App Developer Magazine, Richard has several industry recognitions and endorsements from tech companies such as Microsoft, Apple and Google for accomplishments in the mobile market. He was part of the early Google AFMA program, and also involved in the foundation of Google TV. He has been developing for mobile since 2003 and serves as CEO of Moonbeam Development, a mobile app company with 200 published titles in various markets throughout the world. Richard is also the founder of LunarAds, a mobile cross-promotion and self-serv mediation network for developers. He has been a featured presenter at trade-shows and conferences, and stays active with new projects relating to mobile development.

Subscribe to App Developer Daily

Latest headlines delivered to you daily.