TrustPoint Blog › machine-to-machine

The New World of Internet of Things (IoT) Devices: The Invisible Threat to Privacy

As technology gets better, our lives are becoming more and more convenient. Eventually, technology won’t be a novelty. Convenience will be expected… what about privacy?

Continue reading full post

Connected Vehicle Technologies and the Coming Personal Mobility Revolution

This is a guest post by Dr. Nady Boules.

Thanks to a broad suite of new technologies, today’s vehicles are quite different than just few years ago. Our children’s vehicles will bear little resemblance to the cars and trucks now on the road. At the center of this personal mobility revolution: connectivity technologies.

Continue reading full post

Machine to Machine (M2M) Certificates Versus Traditional Certificates

Conceptually there is little difference between traditional certificates and new M2M certificates; both are intended to authenticate identities via a trusted third party. However in practice their characteristics lead to dramatically different bandwidth usage, computing performance, and storage requirements.

Continue reading full post

M2M Security

TrustPoint is bringing to the market a solution specifically designed to provide users and devices connected to M2M end points the ability to securely verify the authenticity of the sending device.

Continue reading full post

About this Blog

The TrustPoint Blog covers security industry topics relating to ECC, Certificates, and machine-to-machine communication.

More Categories