Security, Privacy, Reliability, Dependability, Safety
The common sentiment, “who cares about my personal data, why someone should spy on me, hack my smartphone, there is nothing to hide , I am just an individual”, still is largely widespread and demonstrates a deep lack of knowledge of trust-related topics. Trusted connectivity ensures that the collection and exchange of data are reliable, safe, secure, and based on trusted relationships among all communication devices and individuals accessing these data. Identity controls and authorization systems have to be established to build trust between these entities to share data reliably.
CISC Solution Offering
CISC provides solutions for identification, authentication, and authorization, secure end-2-end communication based on existing security protocols and processes, that can be integrated into a trust management system. The design of hard- and software cores, ready-to-use modules and platforms for wired and wireless communication systems is another core competence. We also cover hardware secured end-to-end communication, secure OTA maintenance and management.
At the platform level, CISC offers hardware-based provisioning services for IoT devices, device-reliable authentication mechanisms, certificate-based authentication, encryption and secure password recovery as well as secure fleet management. Take also a look at our COYERO Mobile Platform – an app-based regional marketplace for services and products.