Skip to main content

Irdeto and Conjure promote Keystone vehicle access solution

Irdeto and Conjure are using Intertraffic to present what they claim is the most secure, policy-based vehicle access and safety solution in the connected transport industry. Using a mobile device with a companion application, the solution eliminates the need for physical keys to a car while also providing car and fleet owners with the ability to securely and intuitively provision and manage a host of new car sharing/car riding experiences. Keystone combines secure, tamper-proof policy management that
March 19, 2018 Read time: 2 mins

8672 Irdeto and Conjure are using Intertraffic to present what they claim is the most secure, policy-based vehicle access and safety solution in the connected transport industry.

Using a mobile device with a companion application, the solution eliminates the need for physical keys to a car while also providing car and fleet owners with the ability to securely and intuitively provision and manage a host of new car sharing/car riding experiences.

8673 Keystone combines secure, tamper-proof policy management that prevents a multitude of potential vehicle hacks, including man-in-the-middle and man-at-the-end attacks, remote and in-vehicle tampering, and reverse engineering.

The solution enables OEMs to provide consumers with the convenience, flexibility and customisation they expect to safely manage and operate today’s connected cars and autonomous vehicles.

Keystone provides consumers with the ability to customise their driving experience by enforcing vehicle usage policies by authenticated user, including speed limit, time of use, geolocking and number of passengers in the vehicle. Policies are controlled by the vehicle owner: keys issued to individuals are tied to policies created by the owner.

Stand 08.121

%$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external www.irdeto.com Irdeto website link false https://www.irdeto.com/ false false%>

%$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external www.keystone-security.com Keystone-Security website link false https://www.keystone-security.com/ false false%>

For more information on companies in this article

Related Content

  • Sensys launches Vehicle Detection System 2.0
    September 9, 2014
    Sensys Networks launched a new version of its Vehicle Detection System in Detroit, improving the solution’s wireless range and coverage, extending battery life and enhancing security features. VDS 2.0 hardware upgrades include an enhanced flex repeater, access point controller card, grind resistant sensor and vehicle identification and matching system. Sensys Networks is also touting its partnership with Acyclica to combine travel time information and vehicle volume data in a single system. The joint soluti
  • Webinar - Smart Decisions, Smarter Cities
    July 27, 2016
    Vidsys is delivering a webinar on Thursday, 4 August at 1000 Pacific time/1300 eastern time, to discuss how data and increased connectivity will enable cities to transform the way we will live, work, and interact with one another. The challenge for cities is to not just gather the data, but to make better use of the data to make more informed decisions, creating actionable intelligence. Smart Cities will need to combine and correlate multiple data streams to provide a more holistic evaluation of the city’s
  • MDTA solicits interested parties for third generation electronic toll-collection systems
    March 31, 2016
    The Maryland Transportation Authority (MDTA) has announced that it is seeking comments on two Requests for Proposals (RFPs) to develop and operate the third generation of its electronic toll-collection systems. It has now issued a Request for Comments via eMaryland Marketplace to solicit feedback on the procurement of its toll system and its Customer Service Centre system. The new toll system will include replacement of the existing toll-lane terminals and all associated hardware and software, while the
  • Oberthur looks at data and privacy at CARTES
    November 3, 2014
    Until recently, criminals were the main concern of customers using the internet to make electronic payments. The public believed that malware and hacking were the domain of people on the wrong side of the law. The revelation that many governments and their secret services – the ‘good guys’ – were also gaining access to millions of computers and other electronic devices was a huge shock.