
UpdatedMar 17, 2026
PublishedNov 4, 2020
Packagecom.hanafn.secure
MD56413a8b19d8cdba805d6036d6ad56982
SHA1 (signer)80:DC:B8:B8:C7:28:B1:AE:0C:2B:A7:7C:64:B4:8E:82:2A:3A:F2:BB
Signed byCN=Android, OU=Android, O=Google Inc., L=Mountain View, ST=California, C=US
Architecturesarmeabi-v7a, arm64-v8a
Malware scanTRUSTED
Contact[email protected]
Privacy policyView
What's new
1. Added support for 16KB page size.
Description
Secure Mobile App is more strengthened customer authentication than the previous security measure and satisfies SCA(Strong Customer Authentication) requirement within PSD2, being equipped with the following conditions.
Safety: Top security standards are provided with the latest encryption technology through strengthened SCA(SCA: Strong Customer Authentication) process.
Simple: The existing authentication certificates/OTP are replaced by a click after checking transaction details sent through Secure App.
- Fast: When App is on, it can be accessed swiftly through PIN, fingerprint, FACE ID.
Step 1. Customer authentication: Two-step verification
1st verification: customer authentication number, log-in PW
* When log-in PW is forgotten, use PW initialization menu on the bottom of the log-in screen to initialize passwords.
2nd verification:
1) Existing customer: the existing security measure (e.g.: OTP for OTP customers, authentication certificates for authentication certificates customers)
2) New customers or customers who has Secure Mobile App service reissued: authentication through SMS
* Pre-registration of mobile number is necessary for SMS authentication. when it is changed, the office shall register amendment.
Step 2. Register user and put activation code in Secure Mobile App.
Step 3. Registration is completed.
Safety: Top security standards are provided with the latest encryption technology through strengthened SCA(SCA: Strong Customer Authentication) process.
Simple: The existing authentication certificates/OTP are replaced by a click after checking transaction details sent through Secure App.
- Fast: When App is on, it can be accessed swiftly through PIN, fingerprint, FACE ID.
Step 1. Customer authentication: Two-step verification
1st verification: customer authentication number, log-in PW
* When log-in PW is forgotten, use PW initialization menu on the bottom of the log-in screen to initialize passwords.
2nd verification:
1) Existing customer: the existing security measure (e.g.: OTP for OTP customers, authentication certificates for authentication certificates customers)
2) New customers or customers who has Secure Mobile App service reissued: authentication through SMS
* Pre-registration of mobile number is necessary for SMS authentication. when it is changed, the office shall register amendment.
Step 2. Register user and put activation code in Secure Mobile App.
Step 3. Registration is completed.
Required features
- Faketouch android.hardware.faketouch
- Location android.hardware.location
Permissions (22)
Hana Bank Secure for EU requests the following Android permissions:
- Access Coarse Location android.permission.ACCESS_COARSE_LOCATION
- Access Fine Location android.permission.ACCESS_FINE_LOCATION
- Access Network State android.permission.ACCESS_NETWORK_STATE
- Access Wifi State android.permission.ACCESS_WIFI_STATE
- Camera android.permission.CAMERA
- Change Network State android.permission.CHANGE_NETWORK_STATE
- Change Wifi State android.permission.CHANGE_WIFI_STATE
- Foreground Service android.permission.FOREGROUND_SERVICE
- Internet android.permission.INTERNET
- Post Notifications android.permission.POST_NOTIFICATIONS
- Read External Storage android.permission.READ_EXTERNAL_STORAGE
- Read Phone State android.permission.READ_PHONE_STATE
- Use Biometric android.permission.USE_BIOMETRIC
- Use Fingerprint android.permission.USE_FINGERPRINT
- Vibrate android.permission.VIBRATE
- Wake Lock android.permission.WAKE_LOCK
- Write External Storage android.permission.WRITE_EXTERNAL_STORAGE
- C2dm Permission Receive com.google.android.c2dm.permission.RECEIVE
- Com Hanafn Secure Dynamic Receiver Not Exported Permission com.hanafn.secure.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION
- Com Hanafn Secure Permission Process Push Msg com.hanafn.secure.permission.PROCESS_PUSH_MSG
- Com Hanafn Secure Permission Push Provider com.hanafn.secure.permission.PUSH_PROVIDER
- Com Huawei Permission Access Hw Keystore com.huawei.permission.ACCESS_HW_KEYSTORE