top of page
AUTHENTICATED REMOTE ACCESS
WITH BEAME CRYPTO-ID
SITUATION
  • Internet of Things use cases require secure access to devices behind firewalls
  • IoT for home use has high security demands: people are concerned about their privacy and safety online
  • For large industrial applications: Access rights to devices from inside and outside the firewall renders the current network concept unusable: Too much traffic from unauthenticated sources!
COMPLICATION
  • Current solutions: No end-to-end authentication. Neither end of the communication chain is uniquely identifiable.
  • All workarounds, especially tokens and passwords, use symmetric cypher, user logins and passwords stored somewhere in the cloud, hence hackable and insecure
  • Not enough scalability in the underlying security architecture to really enable IoT, especially in an industrial environment
  • All current solutions are expensive and cumbersome to use, plagued with poor user experience
RESOLUTION
  • beame.io Crypto-ID simply uses the existing Public Key Infrastructure to uniquely identify instances on any system
  • Keys used for encryption are solely stored on the device's hardware, and never leave the device. No traffic is therefore readable by anyone in the middle.
BENEFITS OF BEAME.IO CRYPTO-ID
  • Low-cost
  • Highly scalable
  • Access can be delegated with select permissions
  • Best user experience possible: Hardly any interaction is needed to operate full end-to-end authentication and encryption. 
  • For industrial IoT, there is no other solution that scalable and with such degree of interoperability.
LEARN MORE & SEE EXAMPLES

Video: Two Mobiles one PI

Video: Light switch and camera

Video: Image data server access

bottom of page