Create and manage your certificates simply.
Authorize your device via a simple process.

MAKE YOUR DEVICES SAFE







SECURITY OF EVERYTHING


The IoT environment has various things connected by the internet, enabling convenient
user experience. Subsequently, businesses in various industries are utilizing Interconnected
devices to increase business efficiency. However, concerns of privacy violation such as
information regarding user location and access records continue to rise, and incidents of
IoT devices being abused are incrementally surfacing. In order to decrease such risk factors,
IoT devices must be safely authenticated and managed, data inside devices and in transit be
encrypted, and message integrity be guaranteed.


Safe User / Device Authentication

Sensitive Data Encryption

Ensuring Message Integrity


FEATURES




Simple Certification


AMO CA is a cloud-based service with no additional infrastructure configuration.
Certificates are created by a simple process, and managed via a user console accessible from all places.










Diverse Application


AMO CA provides certificates (X.509, IEEE 1609.2, ISO 15118) that can be used in various industries such as Smart Home, Smart Energy, Smart Factory, Smart Car and Electronic Vehicle.










Comprehensive Security


Offering comprehensive security against dangerous IoT threats like identity theft, data leakage, and so on, AMO CA provides quality, comprehensive security as well as ease of use.



SERVICE


AMO CA is a Cloud-based Certificate Authority Service

AMO CA is A cloud-based certificate authority service that allows users to easily issue certificates, manage queries, renewals, and revocations. From IoT device manufacturers where high security levels are required, IoT service providers who need safer services, and to developers wishing to strengthen security of existing IoT products – simple certificate issuance and management is available for all the above and anyone else in need.

- Issue certificates optimized for IoT environment.
  X.509 : AMO Data Collector
  ISO 15118 : Electric Vehicle (will be supported on 2019. 1Q)
  IEEE 1609.2 : Smart Car (will be supported on 2019. 3Q)

- Provides certificate management service such as certificate inquiry /
  verification / revocation.
- Supports certificate renewal function.
- Securely manage the certificate key.



RELATED SERVICES


Free SSL Service

We provide free SSL certificates for secure internet access. Visitors to your websites can trust that sensitive information exchanged online remains encrypted and safe from hackers.

Getting HTTPS for your websites typically starts with a verification process to prove your domain ownership. Thereafter, you are required to manually upload the SSL certificate files to your web server and repeat the process for renewal regularly.


However, all these processes like domain validation, certificate installation, and renewal are automated for AMO CA users.



AutoCrypt PKI


Public Key Infrastructure

AutoCrypt PKI server is the webpage which issue a test certificate from SCMS, Security Credentail Management System.

PentaSecurity AutoCrypt PKI (SCMS) follows the CAMPLLC.org supported by the U.S. Department of Transportation.

The purpose of this Webpage is to support RSU(Road Side Unit) and OBU(On Board Unit) that communicate among other with DSRC(Dedicated Short Range Communication) technology to test compatibility with Certificates.
Especially. During coming OmniAir Plugfest on Oct 2018, AutoCrypt PKI(SCMS) Test webservice will issue certificate include Bootstrapping, Application Certificate and Pseudonym Certificate for DSRC DUT(Device Under Test).




FAQ


About Securing the IoT Environment & AMO CA

Why IoT Security Is Required
The IoT environment has various things connected by the internet, enabling convenient user experience. Subsequently, businesses in various industries are utilizing interconnected devices to increase business efficiency. However, concerns of privacy violation such as information regarding user location and access records continue to rise, and incidents of IoT devices being abused are incrementally surfacing. In order to decrease such risk factors, IoT devices must be safely authenticated and managed, data in devices and in transit be encrypted, and message integrity be guaranteed.
Security Threats in IoT Environments
The following list are examples of security threat cases that have already occurred, or are expected to occur in the near future.

1) Violation of privacy
– A user’s privacy being exposed without their knowing via illegal approach to IoT devices with embedded cameras such as Smart TVs
– Vehicle locations externally transmitted from internally installed IoT devices
2) Invasion of Information Communication Networks
– Hacking of IoT devices in homes that have functions of automatic temperature control with absence of people, to check absence prior to trespassing
3) Destructive measures using IoT
– Cause wheel malfunctioning of moving vehicle or stopping of engine
– Induce malfunctioning of intelligent insulin pumps or pacemakers
4) DDoS attacks using IoT devices
– Abuse weakness in IoT protocol to use IoT applied microwaves and driers in DDoS attacks (Using IoT devices in DDoS attacks)
– Exhaust system resources by repeatedly sending fake requests (DDoS attacks on system itself)
5) Spreading of malicious programs
– IoT devices or networks infected with malicious program used in sending out spam email and SMS
6) Threats to information facilities such as smart power grids
– Gain control of primary shut-off valve by hacking power grid to manipulate and destroy devices used in grids
– Attacker poses as sensor and transmits false data to traffic management system, or controls major infrastructures such as traffic lights
What are the important security elements in an IOT environment?
As the number of devices connected to the IoT environment grows, IoT devices, people, and third parties must establish a reliable IoT security environment. IoT security can be roughly divided into 4 categories according to the configuration of IoT system.

-Device security to gather information from user area
-IoT gateway security to gather information and send it to the server
-Server security to protect servers that process collected information
-IoT infrastructure security that underpins all of these systems
Why is PKI suitable for IoT security?
For a safe IoT environment, IoT devices must be safely authenticated and managed, data in devices and in transit be encrypted, and message integrity be guaranteed. Various technologies can be used to meet the security requirements above, among which PKI technology is the most powerful of all.
PKI (Public Key Infrastructure) utilizes Certificates issued from CAs (Certificate Authority) which include a public key and a private key, and allows for private communication within a network. PKI provides the following functions.

-Device Authentication
-Authenticate using certificates within devices
-Possess high safety level and concrete device identification function
-Data Encryption
-Only authorized devices/users can view data using encryption techniques
-Utilize lightweight algorithms optimized for IoT environments
-Guarantee message integrity
-Block access and prevent change of data by unauthorized third parties
What is CA(Certificate Authority)?
CA (Certificate Authority) is an authority that issues and manages certificates. As it verifies user ID, and signs certificates to prevent certificate forgery and manipulation, it plays a similar role as government agencies that check and handle traveller passports.
What is Certificates?
Certificates are electronic files used for unique identification of user or device using the internet. It can be regarded as passports for internet users as it identifies certificate owners and provides important information.
How are certificates used in IoT environments?
Authentication
Certificates for device authentication can be issued prior to connecting devices to the internet. Furthermore, device authentication can be carried out during service and transmission.

Encryption
User privacy can be violated when data is hacked during data transmission from device to server. Accordingly, data encryption with certificates becomes mandatory in order to protect sensitive data.
What environments can AMO CA be used in?
Security environments for Smart Factory, Smart Home, Smart Energy and Data Collector can be created using the X.509 certificate provided by AMO CA. Likewise, Smart Car specific certificates are available for securing Smart Cars. Moreover, SSL/TLS Server certificates can be utilized in securing sessions between server and client.


Tutorials

How to Get Started with AMO CA User Console

Press the LOGIN button. Don’t worry about the prices . Currently, we issue free certificates for 90 days. You’ll receive an e-mail in your inbox asking for confirmation of the account. Don’t forget to click the link!

Press the LOGIN button. Don’t worry about the prices . Currently, we issue free certificates for 90 days. You’ll receive an e-mail in your inbox asking for confirmation of the account. Don’t forget to click the link!

Step 1: Create Domain
A domain is the field of the certificate you want to use. We basically support certificates used by smart factories, and smart homes. You choose the field you want to issue.

Step 2: Enter Domain Name
After selecting the domain, you need to enter the domain name. This name can not be changed later, and the domain name that was used once can not be used again. Be careful when you first create it.

Step 3: Issue certificate for device
If the domain is successfully created, you can check the domain created in the user console. You can issue the domain certificate from the certificate list page.

Step 4 : Download the Domain’s Certificate
To get device certificates, click the device certificate issuance button in the domain.