Skip to main content

Wave goodbye to cyber security concerns

Visitor to Wave Mobile Solutions’ booth can see the latest authentication, encryption and verification system based on the Elliptic Curve Integrated Scheme. Produced by Virgil Security and integrated into Wave’s solutions, the system uses standardsbased cryptography with an open, global key management system to enhance security while protecting privacy. Virgil’s encryption libraries and services, along with the accompanying public key management infrastructure, are said to work seamlessly in the backgrou
June 13, 2016 Read time: 1 min
Visitor to 8436 Wave Mobile Solutions’ booth can see the latest authentication, encryption and verification system based on the Elliptic Curve Integrated Scheme. Produced by Virgil Security and integrated into Wave’s solutions, the system uses standardsbased cryptography with an open, global key management system to enhance security while protecting privacy.

Virgil’s encryption libraries and services, along with the accompanying public key management infrastructure, are said to work seamlessly in the background and be easy to implement.

Related Content

  • Future of tolling: the priorities
    January 14, 2020
    In the final part of his investigation into the future of tolling technology, Josef Czako of Moving Forward Consulting asks what industry figures see as the priorities going forward…
  • Gemalto enables secure access to cloud-based services
    June 6, 2014
    Digital security provider Gemalto has made its Protiva Cloud Confirm strong authentication solution compatible with the HP CloudSystem for Cloud Service Providers (CSPs), under the HP Helion cloud portfolio. The easy-to-deploy solution integrates seamlessly with CSPs' existing or future infrastructures, providing secure, frictionless access to cloud-based services for HP's CSP customers and their end users. Protiva Cloud Confirm features mobile one-time-password (OTP) capabilities coupled with a multi-te
  • Securing V2X communications
    June 6, 2016
    Cybersecurity developments are moving fast in the automotive sector, but they’re a significant hurdle for the roll-out of C-ITS applications. Jon Masters reports. In the wake of the high-profile hacking of the Jeep Cherokee and problems like the flaw in the Nissan Leaf’s companion app that could compromise the security of data about recent journeys, initiatives linked to vehicle cybersecurity seem to be moving rapidly.
  • Commsignia integrates tech with Qualcomm 
    February 25, 2021
    C-V2X solution works on all Qualcomm automotive wireless solutions