Advanced automotive security solutions – Protection for mobile apps, digital keys, vehicle electronics, telematics, in-car entertainment (ICE) & in-vehicle infotainment (IVI)

Connected car technology – Digital car keys & mobile apps

Leading OEMs and Tier 1s are innovating to support new ownership models and ways of interacting with the vehicle. Replacing traditional physical car keys with digital keys via a smartphone, or wearable apps, brings a range of new benefits. Enhanced convenience for all vehicle users (owners, drivers, rental companies, car sharing platforms), combined with ubiquitous connectivity and autonomous technologies will enable much richer levels of customer engagement. As the shift towards smart mobility accelerates it will require a rigorous approach to protection and vehicle cybersecurity. It is Trustonic’s role to provide advanced application protection for the automotive sector that will support this key area of industry innovation.

Automotive cyber security application protection

Automotive cybersecurity protection

Trustonic’s mobile app protection platform secures smart device-based automotive apps and digital keys. Digital keys can be securely stored in the device app using Trustonic Application Protection and Trustonic’s Trusted User Interface (TUI) can be used to protect user authentication.

Digital car keys are the future and deliver a new level of convenience combined with enhanced user experiences. They reduce costs while enabling new and innovative use-cases, including remote key sharing, car club schemes, autonomous parking and geofencing services.

Learn how Hyundai are securing their new digital car apps & introducing new mobility services

Hyundai incorporated mobile application security best practices to support rich features for the new Hyundai Sonata, and to provide a foundation for delivering innovative new functionality in the future.

Video courtesy of Auto Futures.

Trusted by

Trusted by Volkswagen & Hyundai
Automotive IoT Security

Automotive IoT Device Security – Secure In-Vehicle Infotainment (IVI) & In-Car Entertainment (ICE) & Telematics

Trustonic Secured Platform (TSP) protects and secures In-Vehicle Infotainment (IVI) and other embedded systems around the vehicle. It delivers hardware-backed automotive IoT security and enables secure updates of applications, eliminating the risk of malicious code being injected into the vehicle.. Its embedded Root of Trust enables services to be assured that their applications are destined for the correct vehicle and vehicle systems.

Modern vehicles are becoming ever more complex with 10’s of millions of lines of code and up to 100 processors. These critical systems manage all areas of the vehicle, including the engine, safety, telematics, navigation, ADAS and infotainment systems. In the near future, these systems will also manage autonomous and Vehicle to Everything (V2X) as new vehicle architectures are brought to market.

All these diverse systems require a high degree of trust and reliability. In addition, they must be built on a secure foundation that can protect over lengthy product lifecycles; for many years, possibly for decades. Automotive IoT security platforms must be both hardware-backed and upgradeable to enable them to be safe today, but also able to overcome future hacker and malware threats.

775 million consumer vehicles will be connected via telematics or by in-vehicle apps by 2023

An advanced cybersecurity platform for automotive

As the Automotive industry moves towards a fully connected future it also needs to ensure that vehicles, applications and services are fully secure. Trustonic delivers a secure platform, built in at the silicon level, which provides chipset vendors, Tier1s and OEMs with the ability to secure critical systems and the apps running on them. It can be integrated with any automotive operating system, such as Android, Linux or QNX to provide enhanced, state of the art, security and protection. The Trustonic platform utilises a Trusted Execution Environment (TEE*) built into the processor and delivers this secure capability without the need for additional hardware. The additional platform bill of materials cost is zero.

When Trustonic Secured Platform is embedded into a vehicle during manufacture, a unique Root of Trust is also created and embedded at the silicon level. This is a secure identity, tied to that particular component and vehicle and can be used both to prove that parts within the vehicle, such as IVIs and Telematics modules, are genuine and thus enables secure interactions with other vehicle systems.

The Trustonic platform enables a secure trusted app ecosystem, ensuring that all apps are from a trusted source and guarantees that they are isolated from each other. In addition, the TEE architecture also protects and isolates these trusted apps from threats and vulnerabilities of the higher level operating system. As this capability is delivered at the silicon level it ensures that, regardless of whether the app was developed by the OEM itself or by a third party, they are each guaranteed isolation.

Trustonic works with leading Vehicle OEMs, Tier 1 manufacturers and chipset vendors to deliver future-proofed and innovative automotive services.

* What is a Trusted Execution Environment (TEE)

The TEE is a secure area of the main processor in a smart phone (or any connected device) which ensures that sensitive data is stored, processed and protected in an isolated, trusted environment without an extra Bill of Material (BOM) cost. The TEE’s ability to offer isolated safe execution of authorised security software, known as ‘trusted applications’, provides end-to-end security. It achieves this by enforcing protection, confidentiality, integrity and data access rights by providing the means for strong user and device authentication. In particular, the TEE offers a level of protection against software attacks running in the Rich OS environment. It houses business-specific sensitive applications which need to be isolated from the Rich OS.

Connected Cars

Download Automotive Product Information & IDC Industry Research Report

What Security Certification Considerations Should Be Made When Choosing a Secure Product?

What Security Certification Considerations Should Be Made When Choosing a Secure Automotive Solution?

Learn what security certification considerations should be made when choosing a secure automotive solution. Written in collaboration with Riscure an independent testing house.

COVID-19 – Automotive Impact Briefing

COVID-19 – Automotive Impact Briefing

1-page 5-min read – Insights to promote industry collaboration on business continuity, recovery planning and helping our end customers.

OEMs and Tier 1 customers across the industry have been sharing trend data with us on the impact of COVID-19, read the 1-page executive brief.

IDC Industry Research Report - Hyundai Announces Its Digital Key Mobile App Secured by Trustonic

IDC Industry Research Report – Hyundai Announces Its Digital Key Mobile App Secured by Trustonic

IDC views the Digital Key mobile application solution developed by Hyundai, and secured by Trustonic, as an example of an automaker investing and innovating to offer immersive digital services.

Application Protection for Automotive

Automotive Application Protection

Trustonic Application Protection for Automotive. Advanced mobile app protection for digital car key sharing and connected car apps.

Volkswagen Digital Car Key Sharing App

Volkswagen Digital Car Key Sharing App Secured with TAP

Discover how our mobile application protection brings trust to Volkswagen’s virtual car key sharing app and opens up new possibilities for connected cars and end-users.

Talk to our automotive cyber security experts:

  • This field is for validation purposes and should be left unchanged.