V2X Communication
Applications

V2X Communication

Vehicle to Everything (V2X) - securing transmission of data from Vehicle to any entity

V2X is built on an underlying infrastructure of secure, reliable, two-way authenticated messages among vehicles and its surroundings. Within this V2X environment, vehicles, roadside equipment, and mobile devices cooperatively exchange messages and generate data that allows them to inform users about driving, mobility, and environment conditions around them.

To ensure passenger safety and data privacy at all times, V2X relies on a security infrastructure which guarantees trustworthiness and authenticity of transmitted messages and data.

To enable trustworthy communication, V2X systems rely on an advanced Public Key Infrastructure (PKI)-based approach which requires use of digital signatures and certificates, as well as secure 5G communication necessitating the use of HSMs for this purpose.

Business value

Business value

Icon

V2X Security

  • Provides secure storage of digital certificates within an HSM environment
  • Enables relevant V2X security protocols as a part of a V2X network.
  • Builds on industry-grade encryption, preventing attacks and data interception
  • Secures key storage and processing inside the secure boundary of the HSM
  • Enables and automates extensive key management with key authorization
  • Assures security and compliance with FIPS 140-2 Level 3
  • Allows for extension through additional HSMs, as well as view and manage existing HSMs within the environment.
  • Provides central management and tracking functionality for key imports, exports and translations from any third-party end point.
  • Includes automated backup functions to USB, SFTP or network file share locations, ensuring that the inventory and history of each key is protected and preserved.
  • Provides rapid recovery processes (completion time under five minutes).
Icon

eIDAS Compliant & Common Criteria Certified

  • Supports companies and trust service providers (TSPs) in fulfilling policy and security requirements defined in various ETSI technical standards (ETSI EN 319 401, EN 319 411, EN 319 421).
  • Ideally suited for eIDAS-compliant signature creation and remote signing.
  • Convenient issuing of certificates, OCSP (Online Certificate Status Protocol) and time stamping.
  • Common Criteria (CC) certified based on the eIDAS Protection Profile (PP) EN 419 241-2 & available as a PCIe plug-in card or as a network-attached appliance
Icon

Cryptographic Key Management

  • Provides a simple and intuitive interface for managing and distributing cryptographic keys and keying materials across a broad spectrum of use cases.
  • Provides complete control, and visibility of the full enterprise key inventory. Achieve full lifecycle key management from generation through escrow and termination.
  • Enables organizations to securely manage and store keys and sensitive data for the entire enterprise in a single centralized location.
  • Provides a centralized key management system with seamless integration for any third party device and can be utilised as as the cryptographic key management anchor.
  • Provides support for secure key component and cryptogram handling. Any number of secure mailer formats can be utilized for print capabilities and tracking.
Icon

Remote Access

  • Provides extensive mechanisms for remote administration
  • Enables efficient key management and firmware updates via remote access
  • Automates remote diagnosis via SNMP (Simple Network Management Protocol
Icon

Effective audit logging

  • Enables remote audit management & detailed key inventory
  • Provides Audit Logs including date & timestamp, a unique audit ID, user IDs, POS terminal details, Key Serial Number – KSI & DID portion only (injection only)
  • Communicates Status: Pass or Failure
Icon

Software Simulator included

Included simulator allows for evaluation and integration testing to benchmark the best possible solution for each specific case

Deployment options

Deployment options

Icon

On Premise

  • Useful for centralized use cases without a requirement of scalability or remote accessibility and existing legacy infrastructure
  • Defined total cost of ownership
  • Complete control on hardware and software, including configuration and upgrades
  • Secured uptime in areas with insatiable internet connectivity
  • Preferred choice in industry-segments where regulation imposes restrictions
Icon

In the Cloud

  • Strategic architectural fit & risk management for your high value assets
  • Provides flexibility, scalability and availability of HSM-as-a-service
  • Ideal for a multi-cloud strategy, supporting multi-cloud deployments & allows for migration flexibility
  • Allows you to seamlessly work with any Cloud Service Provider
  • Easy-to-use remote management and on-site key ceremony service option
  • Full control over data through encryption key life-cycle and key administration
  • Secured data privacy through Bring-Your-Own-Key procedures

Contact us

We look forward to answering your questions.

Nehmen Sie Kontakt auf

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Ihnen helfen kann.