Your Security Partner

Build trust in from the start with Professional Services from TrustPoint Innovation

Design in Trust

At TrustPoint Innovation Technologies, We Know Security. …

Continue reading full post

Time to Upgrade from SHA-1


A potential client clicks on a link to your website. They get a warning that your security certificate may not be reliable. What would that do to the …

Continue reading full post

How Smart Cars Will Make Roads Safer

According to the United States Department of Transportation’s National Center for Statistics and Analysis, 2.4 million vehicle-related injuries occurred …

Continue reading full post

How To Get Signatures On Smaller NFC Tags

BlackSeal currently requires NFC tags with about 500 bytes of memory available to be able to fit a URL plus a signature on the tag. But is it possible …

Continue reading full post

Cryptography in Transition: Leaving Behind Human Oversight

Cryptography has primarily existed to send secret messages, often political or military, between people. For the political case I’m reminded of the …

Continue reading full post

Implicit Certificates in V2V

There has been a lot of news recently about vehicle-to-vehicle or “V2V” technology and how it is being adopted by the U.S. Department of Transportation …

Continue reading full post

Implicit Certificates vs. Conventional Certificates

As devices proliferate and become more mobile, managing relationships between them is critical. Devices will move in and out of range of each other and …

Continue reading full post

Machine-to-Machine (M2M) Certificates Versus Traditional Certificates

Conceptually there is little difference between traditional certificates and new M2M certificates; both are intended to authenticate identities via a …

Continue reading full post

Secure Authentication

In the last few years Machine-to-Machine (M2M) has seen widespread use and can be found in a variety of applications within the Internet of Things …

Continue reading full post

Digital Certificates

A digital certificate is an electronic credential used to verify and authenticate the identity of an individual or device. Its primary function is to …

Continue reading full post

About this Blog

The TrustPoint Innovation Blog covers security industry topics relating to Certificates, Elliptic Curve Cryptography (ECC), Machine-to-Machine (M2M) Communication, Near Field Communication (NFC), Vehicle-to-Vehicle (V2V) Communication, and more.

More Categories