Skip to main content

Irdeto and Conjure promote Keystone vehicle access solution

Irdeto and Conjure are using Intertraffic to present what they claim is the most secure, policy-based vehicle access and safety solution in the connected transport industry. Using a mobile device with a companion application, the solution eliminates the need for physical keys to a car while also providing car and fleet owners with the ability to securely and intuitively provision and manage a host of new car sharing/car riding experiences. Keystone combines secure, tamper-proof policy management that
March 19, 2018 Read time: 2 mins

8672 Irdeto and Conjure are using Intertraffic to present what they claim is the most secure, policy-based vehicle access and safety solution in the connected transport industry.

Using a mobile device with a companion application, the solution eliminates the need for physical keys to a car while also providing car and fleet owners with the ability to securely and intuitively provision and manage a host of new car sharing/car riding experiences.

8673 Keystone combines secure, tamper-proof policy management that prevents a multitude of potential vehicle hacks, including man-in-the-middle and man-at-the-end attacks, remote and in-vehicle tampering, and reverse engineering.

The solution enables OEMs to provide consumers with the convenience, flexibility and customisation they expect to safely manage and operate today’s connected cars and autonomous vehicles.

Keystone provides consumers with the ability to customise their driving experience by enforcing vehicle usage policies by authenticated user, including speed limit, time of use, geolocking and number of passengers in the vehicle. Policies are controlled by the vehicle owner: keys issued to individuals are tied to policies created by the owner.

Stand 08.121

%$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external www.irdeto.com Irdeto website link false https://www.irdeto.com/ false false%>

%$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external www.keystone-security.com Keystone-Security website link false https://www.keystone-security.com/ false false%>

For more information on companies in this article

Related Content

  • Used EV batteries to transform stationary storage
    August 26, 2016
    According to a report (link http://about.bnef.com/landing-pages/new-life-used-ev-batteries-stationary-storage/.) by Bloomberg New Energy Finance (BNEF), the electric vehicle market is set to grow quickly, but so far there has been no consensus on a ‘second-life’ for the many used EV batteries. In this report, senior analyst Claire Curry has compiled the first data and shows that low-cost energy storage could be here sooner than previously thought. She projects that there will be 29 GWh of used EV batter
  • Gig launches electric car-share service in Sacramento
    May 3, 2019
    Gig has launched its an electric car-share service in Sacramento, California, and will award one member of its programme a year of free driving. Gig says members can participate in the competition by taking a trip with the service until 31 May. The company says the app allows users to see available cars and book up to 30 minutes in advance or instantly choose any of its vehicles which are display a green windshield light. The car can be unlocked via a smartphone and be driven from using a power butt
  • ITS World Congress – programme highlights webinar and executive sessions
    August 19, 2015
    Ertico-ITS has arranged a programme highlights webinar to give participants an overview of the sessions, speakers, events and activities organised for the ITS World Congress in Bordeaux. On Wednesday 4 September at 1300 CEST, senior Congress Programme advisor Eric Sampson and director of Congresses Didier Gorteman will walk you through this year’s exciting programme by highlighting some of the most engaging sessions and events of the week.
  • Flir certified system engineer: automatic incident detection and traffic data collection
    January 26, 2017
    Flir is offering two-day training course on incident detection and data collection from 22-23 March at the Novotel in Bruges, Belgium. The interactive and hands-on training aims to provide participants with the ability be able to select the right camera for a project (analogue, IP, thermal), configure the detection boards on a fundamental level and manage received events and data from the detectors. More details and registration information are available on the Flir website. (link http://www.flir.eu/