Focusing on the finance industry, Watchdata provides a wide range of digital solutions and products, including banking cards and tokens, to more than 60 financial institutions, more than 150 million individual and corporate users.
With more than 60 transport operator partners and daily 80 million transportation solutions users, is one of the few total solution of the ETC system in China.
With 50 telecom operator partners worldwide and 10% global SIM cards market share, our solutions benefit more than 4 billion users.
Providing government, public authorities and private entities with customized civil identity and data protection solutions, to ensure information security and support in government network security.
Watchdata Group is provider of data security solutions, covering a total of 7 overseas branches such as Singapore, France, India. We provide full range of products and solutions which are widely applied to more than 70 countries and regions worldwide.
With the rapid development of quantum computing, traditional public-key cryptographic algorithms like RSA and ECC face the risk of being broken. To address this challenge, the National Institute of Standards and Technology (NIST) initiated the Post-Quantum Cryptography (PQC) standardization project in 2016, aiming to find cryptographic algorithms that can ensure information security in the quantum computing era. After years of evaluation and testing, NIST officially announced three post-quantum cryptographic standards on August 13, 2024, including the Dilithium algorithm. This marks the significant role of Dilithium in future data protection and provides a clear direction for upgrading system security. What is the Dilithium Algorithm? Dilithium is a post-quantum digital signature algorithm based on lattice cryptography. It leverages difficult problems within lattice mathematics, such as Modular Lattice Learning with Errors (LWE) and Short Integer Solution (SIS), which remain challenging to solve even with quantum computers. Dilithium excels in both security and performance,…
In today’s digital economy, businesses have unprecedented opportunities to innovate product experiences and enhance operational efficiency through digital means. By leveraging digital tools, companies can build agile, intelligent, and automated operational models, improving customer satisfaction and operational efficiency. IoT service providers often need to offer digital-driven platforms and services to their partners. However, the ‘last mile’ challenge in digital transformation usually arises in connectivity management operations. Traditional Connectivity Management SIM (Subscription Identity Module) and its associated data plans should be integrated into the asset management process for IoT companies. Full lifecycle management is required to track when and on which device a SIM is used. In reality, due to the complexity of production, transportation, installation, and maintenance processes, traditional management methods often fail to provide efficient and convenient management for these assets. Digital connectivity Management In recent years, the increasing adoption of eSIM solutions in the consumer electronics industry has highlighted the…
With the rapid development of quantum computing technology, the field of traditional cryptography is facing unprecedented challenges. The public key cryptographic algorithms that we once thought were impenetrable, such as RSA and ECC, have been shown to be vulnerable to quantum computers. As a result, research into cryptographic algorithms that can withstand quantum attacks(Post-Quantum Cryptography, PQC) has become critical for industries that require extremely high security. In this field, the Kyber algorithm, which is notable for its lattice-theory-based design, has been recommended by the National Institute of Standards and Technology (NIST) as an effective Post-Quantum KEM(Key Encapsulation Mechanism) algorithm designed to withstand attacks by quantum computers. What is NIST’s PQC Competition? The Post-Quantum Cryptography (PQC) competition, initiated by the National Institute of Standards and Technology (NIST), aims to identify cryptographic standards that can withstand quantum computing attacks in the future. This competition began in 2016, and after years of evaluation,…
With the advancement of technology, smart security chip products have evolved from the most common forms like bank cards and telecom cards into various other formats, now integrated into mobile phones, smart home devices, consumer electronics, smart devices, and automobiles. These chips protect the security of identities and transactions through secure encryption algorithms and programs. However, the rapid development of quantum computing technology has introduced new challenges. Some previously considered safe algorithms, such as RSA and ECC, have been proven vulnerable to quantum computers. As a result, industries with high-security demands are paying close attention to research on post-quantum cryptography (PQC). 【Background of the Development of Quantum Technology】 On August 13, the U.S. National Institute of Standards and Technology (NIST) officially released the world’s first three post-quantum cryptography (PQC) standards, with a fourth algorithm standard scheduled for official release by the end of this year. Among the three PQC encryption algorithms published,…