Skip to main content

Who’s connecting to your car?

Development services company Symphony Teleca (STC) and Guardtime, provider of keyless signature infrastructure (KSI) software and solutions are to partner in a deal that will develop security, safety, maintenance, and reliability capabilities to enhance the connected car.
September 17, 2013 Read time: 2 mins
Development services company 7498 Symphony Teleca (STC) and 7499 Guardtime, provider of keyless signature infrastructure (KSI) software and solutions are to partner in a deal that will develop security, safety, maintenance, and reliability capabilities to enhance the connected car.

When combined with an integrated mobile device, GPS data and social profiles, the connected car becomes a powerful collector and broadcaster of information. This data is broadcast over public airwaves and stored in the Cloud. Considering the modern connected car has up to 100 million lines of software code, as data becomes more critical to the operation of the vehicle and the connected car, it is important to verify critical systems in real time and assure privacy, safety, security, legality and insurability.

STC’s InSight Connect vehicle relationship management directly addresses the challenges posed by vehicle-related services ranging from diagnostics and infotainment, to software upgrade and maintenance. Guardtime KSI technology for authenticating electronic data makes any access to that data a documented and verifiable event, using only formal mathematical methods.

STC VP and global head of Products and Platform Strategy, Russ Cavan says: “As we talk with our automotive customers we realise that cyber liability is the elephant in the room. With Guardtime, we can now provide assurance to the data transferring what we design, build and host, as well as the principle of mutual review, to our customers, keeping the process accountable.”

Related Content

  • February 11, 2015
    Report: wireless technologies leave vehicles exposed to hackers
    New standards are needed to plug security and privacy gaps in cars and trucks, according to a report by US Senator Edward J. Markey. The report, Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk and first reported on by CBS News’ 60 Minutes, reveals how sixteen major automobile manufacturers responded to questions from Markey in 2014 about how vehicles may be vulnerable to hackers, and how driver information is collected and protected. The responses from the automobile manufacturer
  • August 8, 2017
    Guidelines on cyber security for connected and automated vehicles ‘doesn’t go far enough’
    David Barzilai, chairman and co-founder of automotive cyber-security firm, Karamba Security, has applauded the UK government for taking pre-emptive action and zeroing in on preventing cyber-attacks as critical for the adoption of self-driving cars on a mass scale. However, he says the guidelines don’t go far enough toward effectively preventing car hacking, saying cars are not servers or mobile phones that can sustain the risk of hidden security bugs. The time it takes to remediate such bugs in production,
  • February 3, 2012
    Connecting people and mobility
    Stéphane Petti, Business Development Manager - Automotive, at Orange Business Services' International M2M Center, says that the ITS industry can no longer afford to ignore the telecommunications industry's role in connecting people and mobility services. To telephone companies (telcos), the Machine-to-Machine (M2M) sector is nothing new. Worldwide, they have been focusing considerable attention on M2M in all its sub-segments for several years now. It is the migration of M2M from fixed to wireless connectivi
  • November 10, 2017
    Keeping cyber criminals from your website
    If a hacker can penetrate your website, they can do business as you. Joe Dysart explains how you and your customers may not discover the fraud for some time. In the latest twist on identity theft, hackers are clandestinely taking over business websites - and then brazenly billing visiting customers as if the sites are their own.