Skip to main content

Wave goodbye to cyber security concerns

Visitor to Wave Mobile Solutions’ booth can see the latest authentication, encryption and verification system based on the Elliptic Curve Integrated Scheme. Produced by Virgil Security and integrated into Wave’s solutions, the system uses standardsbased cryptography with an open, global key management system to enhance security while protecting privacy. Virgil’s encryption libraries and services, along with the accompanying public key management infrastructure, are said to work seamlessly in the backgrou
June 13, 2016 Read time: 1 min
Visitor to 8436 Wave Mobile Solutions’ booth can see the latest authentication, encryption and verification system based on the Elliptic Curve Integrated Scheme. Produced by Virgil Security and integrated into Wave’s solutions, the system uses standardsbased cryptography with an open, global key management system to enhance security while protecting privacy.

Virgil’s encryption libraries and services, along with the accompanying public key management infrastructure, are said to work seamlessly in the background and be easy to implement.

For more information on companies in this article

Related Content

  • Infineon: Device authentification increasingly important
    November 20, 2013
    Looking at new opportunities beyond chipcards, Infineon Technologies’ Stephan Hofschen focused on mobile device security, especially with moves to mobile ticketing. Device authentication will be increasingly important. Morpho’s Phillipe d’Andrea added that with cloud storage on the move industry has already secured payments – the next step will be securing smart phones and tablets as well as cards.
  • Flir launches dual thermal and visual traffic camera
    June 7, 2018
    Flir launched a new dual-vision traffic camera at ITS America in Detroit, showing how thermal and visual imaging can work together in specific traffic applications. According to Robin Collaert, a business solutions director for Flir, thermal imaging lets traffic operators see in total darkness and inclement weather while visual imaging provides additional visual verification of specific events.
  • Security loopholes found in BMW’s connected drive
    January 30, 2015
    On 30 January, security loopholes in BMW vehicles equipped with connected drive technologies were revealed. Believed to affect 2.2 million BMW vehicles worldwide, these flaws in the software allow thieves to unlock doors and track car data through a mobile phone without leaving a trace. The Federation Internationale de l'Automobile (FIA) has long advocated for secure, open networks for vehicle connectivity. Vehicle manufacturers have argued that only closed networks can be truly secure. In fact, the loop
  • European trends in environmental monitoring and enforcement
    February 2, 2012
    David Crawford surveys European trends in environmental monitoring and enforcement