Sibros’ Certificate Authority (CA) delivers secure, scalable, and resilient digital trust for every vehicle, device, and cloud service. Simple to adopt. Built on modern cryptography. Ready for global fleets.
Device → Provisioner → Sibros PKI → Certificate Issued
Verify authentic devices and vehicles across fleets and partners.
Validate software and firmware with signature‑backed trust.
End‑to‑end encryption for vehicle ↔ cloud communications.
Aligned with ISO 21434 and UNECE WP.29 expectations.
Three independent PKIs in the US, EU, and APAC. Isolated cloud accounts with whitelisted network access. Mutual TLS over HTTPS only.
Offline Root CA. Intermediates protected by Cloud KMS. Signing runs in an isolated enclave accessible only to provisioners.
Provisioner (Pandora) authenticates via mTLS. PKI issues a single‑use token per unique CN, signs the CSR, and returns the full chain.
Validity never exceeds its issuing intermediate. Revocation and rotation supported at any time if compromise is suspected.
Sibros provides and manages a certificate management system that issues certificates, usage policies, and configurations for use with an MQTT broker. Devices use MQTT(s) with mutual TLS to publish/subscribe securely. HTTPS is used for downloading binaries (firmware images), ensuring integrity and confidentiality end‑to‑end.
For securing in‑vehicle communications between Sibros components, Sibros can optionally provide certificates and manage associated keys in partnership with customer‑provided hardware and software capabilities. This is particularly useful when a vehicle hosts multiple high‑performance compute units with networks of varying trust. This configuration is available on request.
Keys stored and used with customer HSM/TEE where available; Sibros integrates with your in‑vehicle security architecture.
Certificates enable authenticated, encrypted comms among Sibros components over potentially insecure in‑vehicle networks.
Usage policies and certificate lifecycles aligned to your partitioning, domains, and safety/security goals.
Keys for Software‑Over‑The‑Air (SOTA) and Firmware‑Over‑The‑Air (FOTA) are handled securely across the vehicle, cloud, and CI/EOL systems as applicable. Multiple private–public key pairs are used: vehicles verify manifest authenticity and integrity and validate the authenticity and validity of update instructions. Ownership aligns with your program’s Uptane key‑ownership model.
Key Set (example) | Held By | Purpose |
---|---|---|
Transport (MQTT client cert) | Device/Vehicle | mTLS to broker, authenticated telemetry and commands |
Firmware/Image Signature | CI/Release (OEM/Supplier) | Sign binaries; vehicle verifies before apply |
Manifest/Instruction Signature | Cloud/Release Service | Sign manifests; vehicle validates authenticity and validity |
In‑Vehicle Component mTLS | Vehicle (with HSM/TEE) | Secure component‑to‑component communication |
Details of keys and certificates can vary by program; an example configuration is available as a slide deck on request.
-----BEGIN CERTIFICATE----- MIIE6TCCBG+gAwIBAgIQP72wyS4BNLOqjHy4E8Ym7zAKBggqhkjOPQQDAzCBnzEL MAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMREwDwYDVQQHEwhTYW4gSm9zZTEhMB8G A1UEChMYU2licm9zIFRlY2hub2xvZ2llcyBJbmMuMREwDwYDVQQLEwhTZWN1cml0 ... ElN/8s2mbz1ZT8+XYg== -----END CERTIFICATE-----
Signature Algorithm: ecdsa-with-SHA384 Issuer: Sibros Technologies Inc. Intermediate Device CA 1 Validity: 2024-04-25 to 2043-01-18 Subject: ... CN=da8f1cc7-8833-46f9-9750-9c1e62856bd4 Key Usage: Digital Signature; EKU: Client Auth OCSP: http://ocsp.dev-sibros.tech CRL : http://pki.security.dev-sibros.tech/crls/issuingcacomponent.crl (Dev endpoints shown for example only.)
Root/Intermediate CA, CRL, OCSP with real‑time status checks.
AWS IoT Core, EMQX, and telematics ecosystems.
OAuth 2.0 / OIDC, JWTs, SOVD for secure authZ/authN.
HSM integration; Cloud KMS (AWS, GCP) for key custody.
TLS 1.2/1.3, MQTT over TLS, HTTPS, AES / RSA / ECC libraries.
Signature‑based validation for firmware and software packages.
Operational logging with dashboards (Prometheus/Grafana).
Zero‑touch enrollment for devices and vehicles using PKI.
From secure onboarding to encrypted communications and trusted OTA.
Horizontally scalable architecture for global fleets.
Practices aligned with ISO 21434 and UNECE WP.29.
Drop‑in integrations for IoT, IAM, OTA, and telemetry pipelines.
Isolated cloud accounts, offline Root CA, KMS‑secured intermediates, strict IAM, and Mutual TLS‑only access to the internal CA service.
Devices authenticate to MQTT brokers with mTLS using per‑device certs; firmware binaries are delivered over HTTPS with TLS 1.2/1.3 and verified by the vehicle.
Yes. Real‑time status via OCSP and CRLs. Rotation supported through CSR re‑issuance when compromise is suspected.
Yes—optionally, with keys managed alongside customer HSM/TEE for secure component‑to‑component comms in multi‑HPC architectures.
Security audits cover PKI controls. The system scales horizontally and supports 60,000+ KMS crypto ops per minute.
From identity to OTA, Sibros PKI gives OEMs the foundation for trusted, compliant connected mobility. Let’s tailor it to your program.