Menu

M2M FEATURE NEWS

It's Not Anthropomorphic: It's Automotive

By Carl Ford November 17, 2014

“Let me introduce you to your new car. She came to be at the plant and has been waiting to be part of your life.  Sounds weird right?  Sort of like the OS in the movie “Her.”

The question of identity is being discussed by Intercede, Mira and Plextek as it relates to the vehicle cybersecurity. Mira has the expertise in automotive engineering and Plextek Consulting has the skills in systems design.  Intercede, has a long history of making identity secure and enabling enterprises to manage the life cycle of employees’ access to systems.

The question of whether the vehicle should have an identity of its own becomes interesting when you consider how often a car is used by multiple people. It also becomes important as the connected car becomes autonomous. Obviously intrusion and security are paramount in making sure the car is not being hijacked either physically or remotely.

This is where Intercede’s history comes into play. Intercede’s MyID is a cloud service they have created to enable that same level of security and policy management to be used by individuals and SMBs.

Intercede’s MyTAM is a solution they built for Android that creates a virtual machine that creates a trusted execution environment.  This goes beyond the MDM strategies of managing phones.

Enabling a safe execution environment is probably going to be further complicated by people’s use of the entertainment system. While it would be perfectly reasonable for a phone app to be involved with your entertainment, few of us would like a vehicle that allows it to drain the oil or allows enabling of remote drivers.

Determining the policy roles and responsibilities in the vehicle will then expand the concept of identity, which is what this consortium intends to demonstrate and publish in the future.

   




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Partner, Crossfire Media

SHARE THIS ARTICLE
Related Articles

Beyond the Closet, Connecting to IoT

By: Gary Audin    11/11/2020

Two challenges arise when considering cable based IoT.

Read More

Banyan Security Enhances Secure Remote Access for Engineering Resources

By: Ken Briodagh    10/27/2020

Banyan's Continuous Authorization Can Grant or Revoke Access to Sensitive Engineering Environments and Applications in Real-time Based on TrustScore

Read More

Senet Eyes RAN Partnerships as Key to Delivering Network Services for Massive IoT

By: Arti Loftus    10/21/2020

To meet the challenges that come with providing network connectivity for IoT solutions, Senet is executing a strategy for massive IoT that will be bui…

Read More

mimik Selected by 5G Open Innovation Lab to Drive Early Adoption of 5G

By: Ken Briodagh    10/15/2020

mimik's patented Hybrid Edge Cloud platform will boost the performance and reduce the cost of 5G Networks

Read More

5G Sets New Standards for Vertical Industries' IoT Connectivity

By: Special Guest    10/13/2020

As 5G rolls out across the world, vertical industries across IoT are working on additional standards to make the technology suitable for their industr…

Read More