While innovations in speed, safety, and comfort have defined the automobile industry in the past, automakers of the future will be defined by smart technology and autonomous capabilities. The Futurex Hardened Enterprise Security platform secures the critical operating data of automobiles and helps protect the physical safety of those behind the wheel.
Modern vehicles contain hundreds of different electrical control units, including
Object Signing and Mutual Authentication
Object signing can also be used for parts verification. Car
A vehicle does not inherently know it's owner, it responds to the physical key. Multi-factor authentication adds an additional protective layer when verifying end-users and, once implemented, gives smart vehicles the capacity to reject commands from fraudulent, inauthentic key holders.
There are three ways of identifying users: with
Secure Communication: V2I, V2V, and V2D
Current Advanced Driver Assistance Systems and upcoming vehicles, with SAE levels 3 and above, require data sharing to function properly. As such, vehicle cyber security is essential, making it a major safety concern and focus of government organizations and regulators.
Vehicle-to-Infrastructure (V2I) communication gathers necessary global or local information, such as traffic or road conditions, to intelligently and efficiently lead a driver to a predetermined location. This information is gathered remotely, typically through a Wi-Fi connection, and from a substantial distance. With secured V2I communication, malicious individuals seeking to engage in passive eavesdropping and active interfering are directly denied.
Meanwhile, Vehicle-to-Vehicle (V2V) communication occurs when vehicles are in close range and are able to establish an ad-hoc network. They can then share speed, position, and directional data, necessary for autonomous driving. Open networks as such these require encryption so that malicious software cannot be shared or unknowingly applied to among drivers.
Vehicle-to-Device (V2D) communication describes the connection between unsecured mobile devices and vehicles for driver functionality and pedestrian safety. With V2D in place, drivers can remotely access their vehicles from smart phones, using certificate-based mutual authentication.
Embeddable, Form-Factor Hardware Security Modules
With an embedded cryptographic module inside deployed vehicles, your organization can leverage advanced key lifecycle management for over-the-air key rotation. With effective key management in place, your organization is secured and able to produce revenue-generating services such as tracking vehicle rentals and facilitating remote purchase upgrades.
Hardware Security Modules
Guardian Series 3
Empower your administrators with centralized management, redundancy, device status monitoring, and more
- Central management for Futurex devices
- Comprehensive load distribution and automated failover
- User-defined grouping for devices
- Intuitive visual and logical user interface
- Customized notifications, alerts, and status reports
KMES Series 3
Hardened, enterprise-class key and certificate lifecycle management solutions
- Full symmetric and asymmetric key and certificate management
- Robust, versatile API for programmatic automation of repetitive tasks
- Easy, convenient generation of certificate trees
- Permission-based user management system with dual control
- Customized monitoring and alerting