Secure Environment

A determined hacker with physical access to a device can do many things to gain root access and compromise security.

It’s challenging enough to secure cloud software from attacks over the internet. But securing a device is orders of magnitude harder when it is deployed into the hands of a hacker. A determined hacker with physical access to a device can do many things to gain root access and compromise system security: extract firmware images, reverse-engineer software, reactivate debug software and so on. History is littered with examples of successfully hacked devices – from network routers through medical devices to credit card systems and automobiles.

That’s why we’ve created Irdeto Secure Environment with the assumption that a hacker already has root access — the highest of all system privileges.



Secure your connected car: Exterior Features

Explore the security features of this connected car

Click here to view
interior features

Interior features

Access Control

Policy-based access

  • Lower overhead costs with lost or damaged physical keys
  • Multi-user control for families
  • Employee usage management for companies
  • Inventory operations and management for stores and fleets

New business models

Keyless entry and remote management allow for a variety of new business models like:

  • Car Sharing
  • Vehicle-as-a-Service (VaaS)
  • Remote Rentals

Enhanced anti-theft

  • Secured access from the ground up
  • No internet access required – works in underground parking garages or remote locations
  • Built into the car’s system
  • Zero-Day exploit safe

Telematics

Renewable security drastically reduces attack surface

Cloakware uses multiple layers of code transformation, whitebox cryptography, integrity validation and other anti-hacking technologies to protect your telematics gateway and ECUs from hackers.

Completely secure OTA

By continuously monitoring hacking attempts and supporting a variety of OEM responses – like swapping code on the fly – all OTA hacking attempts will be fruitless and only the OEM's codes and application will run.

Zero false positives

  • Removes debugging capability and memory examination
  • Encrypts binaries and file content
  • Hides decryption keys
  • Makes reverse engineering virtually impossible
  • Collects security incident data for post-mortem analysis
  • Disables execution of anything except OEM authorized software

Multi-Purpose

Selective trunk access

  • Limits or grants access to valuable items
  • Enables novel applications like secure package delivery

Convenience and security

  • Configure doors and/or trunk to open when approaching the car
  • Two-factor authentication ensures the highest security
  • Enforce timed restrictions

Secure your connected car: Interior Features

Explore the security features of this connected car

Click here to view
exterior features

Exterior features

In-Vehicle Infotainment

Secured environment

  • Security built into all applications and updates
  • Only OEM authorized software can run
  • Secured personal information
  • Complete protection for the ECU and other connected sub-systems

Encrypted communications

  • Prevent malicious code insertion
  • Completely secured cloud services
  • Reliable fleet management
  • Support insurance claims

Performance Restrictions

Example: Valet mode

  • Limits speed to 50Km/h
  • Revokes trunk, glovebox and fuel cap access
  • Limits range to 5Km

Example: Teenager mode

  • Limits radio volume to 50%
  • Weekend use only
  • Limits speed to 80Km/h
  • Geo-fence to 25Km from home

Example: Borrow mode

  • Access expires automatically after 2 days
  • Limits speed to 100Km/h

Convenience Features

Personalization

  • Full control of car settings, geo-fencing, speed limits and more
  • Simply walk up to the car and it will unlock and load your preferences
  • Associate preferences to each user
  • Seat position, steering wheel distance, radio station and volume, mirrors and much more can be adjusted

Want to learn more about Secure Environment?

Unique to the industry, Secure Environment forces hackers to expend an improbable amount of effort to break into devices, making them move on to softer targets that aren’t as well protected. Its mutually reinforcing technologies offer unparalleled protection:

  • Disables execution of anything except OEM authorized software.
  • Removes debugging capability and memory examination.
  • Encrypts binaries and file content.
  • Hides decryption keys.
  • Makes reverse engineering virtually impossible.
  • Monitors hacking attempts and supports a range of OEM responses.
  • Collects security incident data for post-mortem analysis.

It safeguards critical files and application data, and prevents hackers from adding malicious code, modifying executables and scripts, and reverse engineering.

From the Inside Out

Secure Environment uniquely assumes perimeter security has been compromised and focuses instead on protecting everything else. It safeguards critical files, protects application data, and prevents hackers from adding malicious code, modifying executables and scripts, and reverse engineering. What’s more, it uses renewable security to frustrate hacking attempts by continually resetting hacker knowledge to ground zero. And, while a full cybersecurity audit is recommended, Secure Environment can be dropped into a system still under development.

Read more about Secure Environment