View

Sorting

Products found: 1

logo
Offer a reference bonus
0.00

Trillium Secure Platform

Trillium Secure provides a platform for end-to-end protection of connected vehicles through vSEC (in-vehicle network (IVN) intrusion detection and prevention system (IDPS) and vehicle to everything (V2X) protection) & SKYE (multi-layer IDPS and CyberHealth monitoring). Trillium’s end-to-end 100% cryptography-based IDPS solution generates zero false-positives and false-negatives because it is not based on behavioral models that are highly subject to human error, i.e., it is a deterministic architecture. The marketplace is void of this today, despite the growing need as indicated by OEMs. Our focus is on providing IDPS technology to connected vehicles based on authentication-encryption and firmware authentication and augmented by cloud-based CyberHealth monitoring. vSEC IVN Message Authentication Encryption Ensures valid and confidential IVN messages between all safety and mission-critical IVN nodes with Trillium’s industry-leading authentication-encryption functionality. Designed for optimal performance over resource-constrained IVN it operates on all vehicle hardware, operating systems and network topologies. Using a unique patented approach, it provides foundational data trust and vehicle security with deterministic features without rules. This translates into a failsafe IDPS solution without the worries of false-positives or false-negatives. Firmware Authentication Provides firmware authentication via a hardware root of trust for all firmware and software layers of the domain controller, gateway, electronic control unit (ECU), in-vehicle infotainment (IVI) and telematics control unit (TCU) architectures. This includes another layer of IDPS functionality against malicious software with the detection of any changes to the code image being protected and multiple intrusion prevention handling options. Establishes fundamental secure boot feature support as well as on-the-fly integrity checking for all additional critical firmware/software features. V2X Authentication Establishing a trusted enclave for vehicle-to-everything (V2X) authentication on the TCU gateway. It is based on public key infrastructure and ideally suited for a variety of V2X applications, including electric vehicle charging environments utilizing the International Organization for Standardization (ISO) 15118. Security is essential to V2X technology, and privacy is an integral element of V2X security, so it facilitates both through privacy-preserving anonymous authentication. Trusted V2C Data Transport Provides a trusted vehicle-to-cloud (V2C) bi-directional data communication link. Features include over-the-air delivery of vehicle firmware, software and application data updates, as well as a trusted full lifecycle data transport for vehicle data to the cloud. Specific to updates to the vehicle, Trillium’s patent-pending embedded dynamic link library (DLL) technology does not require updating of the full binary software stack in the ECU. Instead, only changes to Trillium’s embedded DLL are updated. SKYE Provides an end-to-end and full lifecycle trusted mobility services solution which supports Amazon Web Services and Microsoft Azure Connected Vehicle Platform. Highly flexible and configurable APIs provide a method for assuring the delivery of trusted data from the vehicle to cloud-based applications and services. Critically, trust is assured via a permission engine that prevents data from being accessed by anyone other than the intended recipient. The delivery mechanism may be optimized for either cost or timing-critical requirements. General Data Protection Regulation (GDPR)-compliant data anonymization techniques also guarantee the highest level of personal and fleet data protection.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
8
15

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.