Global technical body EMVCo has confirmed its security evaluation methodologies and processes support IoT payment use cases, enabling emerging solutions and devices to be evaluated quickly and efficiently.

Device hardware evaluations are playing an increasingly important role in IoT assessments across various IoT payment use cases, security frameworks and emerging compliance models. EMVCo, in collaboration with globally recognised independent laboratories, has worked since 2005 to evaluate the security of various EMV hardware form factors and acts as a security certification entity.

Software security assessments

This function is now extended to IoT products and solutions. In addition to hardware product certification, EMVCo also delivers software security assessments of various interfaces and payment security functional requirements of IoT products.

The IoT is creating new ways to pay, with payment functionality enabled across various industries globally,” comments Bruce Rutherford, Chair of the EMVCo Executive Committee.

This innovation needs to be balanced with functionality, usability and security. By optimising existing processes to support new IoT payment use cases, EMVCo brings efficiencies and confidence to the IoT payment ecosystem, and an established framework of payment expertise.”

Download PDF version Download PDF version

In case you missed it

Security predictions 2025: AI, drones, and retail innovations
Security predictions 2025: AI, drones, and retail innovations

With the year 2025 stretched out before us, there are many techniques one could use to predict what will happen in the new year. You might analyse historical data and analyse futur...

2024 was a big year for M&A in the security market
2024 was a big year for M&A in the security market

Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Ann...

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Quick poll
What is the most significant challenge facing smart building security today?