Skip to main content

Irdeto and Conjure promote Keystone vehicle access solution

Irdeto and Conjure are using Intertraffic to present what they claim is the most secure, policy-based vehicle access and safety solution in the connected transport industry. Using a mobile device with a companion application, the solution eliminates the need for physical keys to a car while also providing car and fleet owners with the ability to securely and intuitively provision and manage a host of new car sharing/car riding experiences. Keystone combines secure, tamper-proof policy management that
March 19, 2018 Read time: 2 mins

8672 Irdeto and Conjure are using Intertraffic to present what they claim is the most secure, policy-based vehicle access and safety solution in the connected transport industry.

Using a mobile device with a companion application, the solution eliminates the need for physical keys to a car while also providing car and fleet owners with the ability to securely and intuitively provision and manage a host of new car sharing/car riding experiences.

8673 Keystone combines secure, tamper-proof policy management that prevents a multitude of potential vehicle hacks, including man-in-the-middle and man-at-the-end attacks, remote and in-vehicle tampering, and reverse engineering.

The solution enables OEMs to provide consumers with the convenience, flexibility and customisation they expect to safely manage and operate today’s connected cars and autonomous vehicles.

Keystone provides consumers with the ability to customise their driving experience by enforcing vehicle usage policies by authenticated user, including speed limit, time of use, geolocking and number of passengers in the vehicle. Policies are controlled by the vehicle owner: keys issued to individuals are tied to policies created by the owner.

Stand 08.121

%$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external www.irdeto.com Irdeto website link false https://www.irdeto.com/ false false%>

%$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external www.keystone-security.com Keystone-Security website link false https://www.keystone-security.com/ false false%>

For more information on companies in this article

Related Content

  • Workshop: Self-Driving Cars: Strategic Implications for the Auto Industry
    March 6, 2017
    Autelligence is hosting a one-day workshop on self-driving cars and the associated strategic implications for the auto industry, led by renowned expert Dr Alexander Hars. The workshop begins in Frankfurt, Germany on 23 March and arrives in Auburn Hills, Michigan on 16 May. The event aims to improve understanding of the strategic implications for the auto industry, its suppliers and related industries, as well as the potential impact on automobile design, model mix and volumes, brands and customer re
  • Ola brings ride-sharing service to three cities in New Zealand
    November 9, 2018
    Indian ride-sharing firm Ola has expanded its service to three cities in New Zealand and is offering passengers 50% discounts off journeys for the first month. The company says its app comes with safety features which will allow riders in Auckland, Wellington and Christchurch to share location coordinates with friends, family and emergency services. Passengers can also be picked up from Auckland and Wellington airports. Ola says it intends to improve the app based on customer feedback. It can be downl
  • Comark showcases Raser 4001 detector
    March 19, 2018
    Italy-headquartered Comark, an international player in traffic detection and parking solutions, is featuring a range of products, including new devices with laser technology and the new Lora IoT vehicle detector for parking applications. The company is also showcasing its Raser 4001 detector, based on the combination of two technologies (microwave doppler radar and laser scanner) to get the best results in the detection and classification of vehicles. Also being featured is the USMI9601 sensor that uses
  • Smart Insights: ‘TEE will increasingly displace other security solutions’
    October 28, 2014
    Software- or hardware-only mobile security solutions will increasingly be displaced by TEE (Trusted Execution Environment), according to new research. TEE is essentially a secure area that resides in a mobile device baseband processor and provides security against software attacks.