Skip to main content

Irdeto and Conjure promote Keystone vehicle access solution

Irdeto and Conjure are using Intertraffic to present what they claim is the most secure, policy-based vehicle access and safety solution in the connected transport industry. Using a mobile device with a companion application, the solution eliminates the need for physical keys to a car while also providing car and fleet owners with the ability to securely and intuitively provision and manage a host of new car sharing/car riding experiences. Keystone combines secure, tamper-proof policy management that
March 19, 2018 Read time: 2 mins

8672 Irdeto and Conjure are using Intertraffic to present what they claim is the most secure, policy-based vehicle access and safety solution in the connected transport industry.

Using a mobile device with a companion application, the solution eliminates the need for physical keys to a car while also providing car and fleet owners with the ability to securely and intuitively provision and manage a host of new car sharing/car riding experiences.

8673 Keystone combines secure, tamper-proof policy management that prevents a multitude of potential vehicle hacks, including man-in-the-middle and man-at-the-end attacks, remote and in-vehicle tampering, and reverse engineering.

The solution enables OEMs to provide consumers with the convenience, flexibility and customisation they expect to safely manage and operate today’s connected cars and autonomous vehicles.

Keystone provides consumers with the ability to customise their driving experience by enforcing vehicle usage policies by authenticated user, including speed limit, time of use, geolocking and number of passengers in the vehicle. Policies are controlled by the vehicle owner: keys issued to individuals are tied to policies created by the owner.

Stand 08.121

%$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external www.irdeto.com Irdeto website link false https://www.irdeto.com/ false false%>

%$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external www.keystone-security.com Keystone-Security website link false https://www.keystone-security.com/ false false%>

Related Content

  • October 15, 2018
    Irdeto opens C/AV office in Michigan to boost OEM collaboration
    Irdeto has opened an office in Pontiac, Michigan, to encourage collaboration with original equipment manufacturers (OEMs), automotive suppliers and fleet operators on improving security for connected and autonomous vehicles (C/AVs). Niels Haverkorn, general manager, connected transport, Irdeto, says: “The key challenge is to identify a comprehensive security solution that is able to protect the vehicle itself and safely implement innovative business models.” The move follows a previous initiative where
  • July 28, 2017
    US connected vehicle pilot deployment sites launch new websites, videos
    The US Department of Transportation (USDOT) connected vehicle pilot locations, New York City (link https://www.cvp.nyc/), Wyoming (link https://wydotcvp.wyoroad.info/) and Tampa, Florida (link https://www.tampacvpilot.com/), have launched new websites and videos dedicated to their connected vehicle deployments. These three locations are leading the charge to deploy advanced wireless communications technology in their vehicles and on their roads in regions throughout the nation. The web sites provide informa
  • October 30, 2015
    Upcoming Flir traffic webinars
    Flir Traficon Academy is organising several informative webinars for November, to provide participants with more about keeping traffic flowing. The vehicle and bicycle presence detector on 5 November at 7:00am, 1:30pm and 6:30pm will discuss the Flir ThermiCam/TrafiSense integrated thermal camera and detector that can be used for vehicle and bike detection, which uses thermal energy emitted from vehicles and bicyclists to detect their presence
  • February 23, 2018
    Companies depend on automation, AI and machine learning for cyber security
    To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the Cisco 2018 annual report conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs. The study revealed that adversaries are using Malware sophistication