top of page
AUTHENTICATED REMOTE ACCESS
WITH BEAME CRYPTO-ID
SITUATION
-
Internet of Things use cases require secure access to devices behind firewalls
-
IoT for home use has high security demands: people are concerned about their privacy and safety online
-
For large industrial applications: Access rights to devices from inside and outside the firewall renders the current network concept unusable: Too much traffic from unauthenticated sources!
COMPLICATION
-
Current solutions: No end-to-end authentication. Neither end of the communication chain is uniquely identifiable.
-
All workarounds, especially tokens and passwords, use symmetric cypher, user logins and passwords stored somewhere in the cloud, hence hackable and insecure
-
Not enough scalability in the underlying security architecture to really enable IoT, especially in an industrial environment
-
All current solutions are expensive and cumbersome to use, plagued with poor user experience
RESOLUTION
-
beame.io Crypto-ID simply uses the existing Public Key Infrastructure to uniquely identify instances on any system
-
Keys used for encryption are solely stored on the device's hardware, and never leave the device. No traffic is therefore readable by anyone in the middle.
BENEFITS OF BEAME.IO CRYPTO-ID
-
Low-cost
-
Highly scalable
-
Access can be delegated with select permissions
-
Best user experience possible: Hardly any interaction is needed to operate full end-to-end authentication and encryption.
-
For industrial IoT, there is no other solution that scalable and with such degree of interoperability.
LEARN MORE & SEE EXAMPLES
Video: Two Mobiles one PI
Video: Light switch and camera
Video: Image data server access
bottom of page