The global market for connected cars is forecast to grow significantly over the next few years as innovations in connectivity transform the automotive industry. The benefits to consumers are numerous: connectivity offers drivers everything from high definition streaming media, Wi-Fi access, improved entertainment systems, and the ability to remotely control aspects of the vehicle using mobile phone applications, such as the locking/unlocking and ignition mechanisms.
Automotive Security, the Trustonic way
Our technology provides the highest level of security available by offering:
Hardware isolation of sensitive code execution in the protected world of the Trusted Execution Environment (TEE). The TEE minimizes the attack surface, preventing threats such as reverse-engineering, tampering, malware, and trojans.
Use of the Trusted User Interface (TUI) for smartphone applications that authenticate the user and control the car (for example, digital key apps that can lock and unlock vehicles). During security-sensitive user interactions with the app, the UI is isolated from the normal operating system, so malware in the normal OS cannot spy on, or tamper with, the user interaction.
Protection of sensitive data. Trustonic’s Trusted Application Protection (TAP) platform combines the power of the most advanced hardware and software protection technologies available, something no other solution can offer. On a smartphone, wearable or IVI system equipped with a TEE, sensitive code is encased in this hardware-isolated world. On iOS and Android devices without an accessible TEE, it’s secured with a “Software TEE” which combines the most advanced white-box cryptography and in-app protection technologies, for securing sensitive information, with code protection measures for defending the code as it runs. Sensitive data can only be encrypted and decrypted inside the TEE, ensuring it always remains protected from malicious applications running in the main operating system.
Hardware Root of Trust (RoT). Combining RoT with a hardware-protected Trusted Execution Environment (TEE) brings greater trust to connected devices because it’s virtually impossible to attack and steal the cryptographic keys held in the secure world of the TEE.
Device Authentication. Device legitimacy can be verified to ensure that applications and sensitive data (such as DRM-protected media) are installed or played only on trusted devices.
Built and certified to the highest industry standards, you can be sure Trustonic technology meets the highest security criteria and has been rigorously tested. That’s why we’re trusted by some of the world’s leading institutions, enterprises, governments, auto makers and Tier 1s.
Hyundai’s work with Trustonic
Learn how Hyundai delivered a security-first solution using TAP to store and protect its digital keys and guard against unauthorized use or access. Hyundai chose TAP to provide a flexible way to build its mobile application, without having to consider end-user device capability and compatibility issues. TAP also provides Hyundai with a foundation for delivering and protecting innovative new functionality in the future. For more information about our work with Hyundai, see:
IDC Industry Research Report – Hyundai Announces Its Digital Key Mobile App Secured by Trustonic
IDC views the Digital Key mobile application solution developed by Hyundai, and secured by Trustonic, as an example of an automaker investing and innovating to offer immersive digital services.
“IDC views the Digital Key mobile application solution developed by Hyundai and secured by Trustonic as an example of an automaker investing to continue diversifying by offering immersive digital services. Hyundai incorporated mobile application security best practices to support a rich feature and capability set available at launch but also to enable a foundation for delivering new and enhanced functionality over time. With Digital Key, Hyundai is embracing the central themes of connected services and the sharing economy to allow its customers the freedom to explore the edges of car ownership including peer-to-peer car sharing”. Matt Arcaro, IDC.