Test
Applications

Bank Card Issuing

Securing consumer data and preventing fraud whilst ensuring compliance with government and industry data regulations

During the key issuing process of cards, considerations towards fraud and potential data interception vulnerabilities need to be taken into account - weaknesses within this process can place customers’ sensitive data at risk of interception, leading to exploitation of vulnerabilities resulting in threats and attacks.

Issuing cards requires the collection, exchanging and processing of sensitive and personally identifiable customer financial data, which needs to be shielded in adherence to strict cryptographic processes and in compliance with relevant regulations.

Utimaco HSMs assures protection of cryptographic keys and customer PINs used during the issuance of EMV chip cards.

Business value

Business value

Icon

Root of Trust for Card Issuance

  • Provides market-proven Hardware Security Modules for card schemes, banking-grade data protection, and audits
  • Offers professional services for integrating additional functions and modifications
  • Supports both secure key storage inside the HSM and external encrypted key storage
Icon

Scalable and flexible

  • Provides configurable role-based access control and separation of duties
  • Supports use of Payment APIs and General Purpose APIs like PKCS#11 on the same HSM
Icon

Regulatory Compliance Made Easy

Meets strict compliance requirements with PCI PTS HSM V3 and FIPS 140-2 Level 3

Icon

Remote Management

Provides efficient remote management capabilities

Icon

Automated Key Management

  • Manages the life cycle of all cryptographic keys needed in the issuing process and stores them centrally in dedicated HSMs.
  • Monitors the payment card keys throughout the whole card life cycle through
Icon

Software Development Kit and Simulator included

  • Provides a Software Development Kit (SDK) which allows for self-customisation for the purpose of handling proprietary and secret algorithms for further developments involving sensitive code, IP or algorithms or
  • Includes a simulator allowing for evaluation and integration testing to benchmark the best possible solution for each specific case

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.