Thomas K. Arnold, the publisher & editorial director of Home Media Magazine, says Vidity is “on a roll” as the Ultra HD industry takes off. “Developed by the Secure Content Storage Association (SCSA), [Vidity] offers consumers the chance to store and move digital content, including Ultra HD files, around from device to device, from the biggest home theater system to the tiniest smartphone,” he explained. “And observers expect demand for the technology to soar, now that Ultra HD is rapidly ramping up.”
Home Media Magazine says Vidity is “on a roll”
Bell ID First to be Certified for Cloud Mobile Payments by Three of the Largest Payment Schemes
Mobile payments specialist, Bell ID, today announces that its host card emulation (HCE) mobile solution has been certified by three of the largest global payments schemes. Bell ID is the first vendor to receive approval from three schemes for its HCE platform, offering its customers the broadest range of options available on the market today.
The HCE specialist’s software manages the lifecycle of virtual cards, keys, certificates and NFC payment credentials in a secure, remote environment rather than in the mobile device, providing banks with the independence and control to manage customer payment assets.
“Bell ID was among the first to market with an HCE solution with Secure Element in the Cloud back in 2013, so we’re delighted to report a repeat performance in achieving compliance with the scheme’s specifications,” comments Pat Curran, Executive Chairman at Bell ID. “Despite the market’s rapid development, cloud-based mobile payments remain in their infancy so, understandably, issuers are seeking quality and interoperability reassurances both from third party vendors and the payment networks. The validation of our cloud-based payment solution in this way provides peace of mind that our application meets the major schemes’ worldwide functional and interoperability requirements.”
Bell ID® Secure Element in the Cloud provides the functionality to complete transactions through a remote secure element using a standard EMV contactless terminal and acceptance infrastructure. When consumers tap their phones to make transactions, card credentials are safely accessed and used securely to perform the transactions with the point-of-sale terminals. The data is presented in the same format as in a standard physical contactless card-present transaction.
In order to achieve these certifications, Bell ID was subjected to a number of stringent security and functionality reviews. The platform is aligned with global requirements supporting, for example, multiple application identifiers (AIDs) in the same funding account, in line with the specific requirements of the US market.
To find out more about mobile cloud payments using HCE, visit the Bell ID website. Bell ID’s full suite of mobile solutions supports cloud-based solutions using HCE, EMVCo tokenization, trusted services management (TSM) for SIM-based projects and for embedded secure element solutions.
Moore’s Law: From 16 kB to 16GB
James Sanders of TechRepublic has confirmed that 16 GB SO-DIMM modules are now starting to become generally available from multiple vendors. “[This] eases RAM constraints in devices that have a limited number of slots for RAM modules,” he explained.
White House eyes sensors for smart cities
Writing for The Verge, Jacob Kastrenakes reports that the White House has allocated $160 million to create smart cities. “[These] cities are wired up with sensors that can relay data back to local organizations, companies and governments so that they can identify issues and more quickly respond to changes,” he explained.
Minding the memory gap
Mark LaPedus of Semiconductor Engineering recently reported that memory chips and storage devices are struggling to keep pace with the growing demands of data processing. “To solve the problem, chipmakers have been working on several next-generation memory types. [However], most technologies have been delayed or fallen short of their promises,” he explained.
Evolving differential power analysis targets SIM cards
Ernest Worthman of Semiconductor Engineering recently noted that differential power analysis (DPA) has been a threat vector on the chip landscape for a number of years.
“[DPA] was discovered around the mid 1990s by the teams at Rambus’ Cryptography Research Division,” he explained. “It turned out to be a very effective tool for compromising the ubiquitous SIM card environment.”

