RECENT NEWS FLASH 2000-14 (May 2000)
(Updated on May 8, 2000)
TECHNOLOGY RELATED NEWS
Licenses Certicomís Encryption Technology to Enable Secure M-Commerce
Certicom, a leading
provider of m-commerce security, and Motorola, Inc. announced an alliance
that will enable Motorola to utilize Certicomís Elliptic Curve
Cryptography (ECC) technology throughout its wireless product offerings.
This includes all wireless devices - pagers, mobile handsets, WAP-enabled
phones - as well as wireless network infrastructure components, such as
WAP-based servers and other networking products. The agreement enables
Motorola to use Certicomís security products, such as WTLS Plusô for WAP
implementations and Security Builderô cryptographic toolkit for a broad
range of Motorola product. This will allow Motorola to deploy end-to-end
secure wireless transactions over WAP and emerging technologies such as
GPRS, as well as 3G wireless networks. Motorolaís recently introduced
portfolio of products designed to enable the wireless world includes
WAP-enabled phones, two-way pagers, and WAP servers.
Elliptic Curve Cryptography: Developed for a broad range of computing
platforms and maximum interoperability, Certicom's ECC technology enables
strong, high performance security
for handheld computers, pagers, cell phones and smart cards. Certicom's
patented implementation of ECC technology provides an alternative to
conventional public key cryptographic algorithms in many mobile and wireless
environments, allowing for faster processing speed, reduced bandwidth usage
and decreased battery requirements. These advantages make Certicomís ECC-based
security technology well suited to handheld computing devices,
Internet-enabled phones and two-way pagers.
more information, go to
Advisory and Comment:
Security is a major requirement in mobile commerce and wireless networks. It is good to see a major wireless infrastructure vendor like Motorola standardize on Certicom ECC - that requires less public infrastructure requirements than public key technology. However, is it as secure? We think that it is an acceptable alternative so long as there is still another layer of security at the application level for highly secure financial transactions. Remember, most security problems are due to relaxed security policies and adherence - a security alarm at home is good only if you keep the door locked and security system on.
This news release may
contain forward-looking statements.
Readers should take appropriate caution in developing plans utilizing these
products, services and technology architectures.
Readers should take appropriate caution in developing plans utilizing these products, services and technology architectures.
All trademarks used in this summary are the property of their respective owners.
Do you want to see more news? Go to the News Home Page
(Dedicated to providing comprehensive information to mobile computing community of IT professionals, user organizations, and vendors)