D-Sig Data Security secures data at the source using strong cryptographic algorithms and cryptographic hardware co-processors. Once secured, the data remains protected throughout its lifetime, with access permitted only on a ‘need to know’ basis. Data can persist for just a few milliseconds or for a number of years depending upon the use case.
In order to achieve this protection, D-Sig has implemented a comprehensive data security framework built around a dedicated Certification Authority (CA) module. This is used for issuing cryptographic security tokens, certificates and certificate status. Together these facilitate the control over data access and the lifecycle management of devices.
With the advent of private 5G networks, new opportunities are now presenting themselves for improving product quality and production efficiency, and for maintaining environmental compliance. For instance, remote locations can now be connected in real time using low cost, low power, sensors connected over 5G. This means that an entire production area, such as a chemical works, can be covered with a single 5G mast, enabling vast amounts of data to be collected and processed. Machine learning algorithms can be implemented and acted upon in real-time. Summary data can also be sent to the cloud for further data processing.
The D-Sig IoT module of D-Sig Data Security sits directly within the private 5G network, allowing for real-time data processing, e.g. machine learning, and message forwarding to a secured cloud. D-Sig Cloud provides the secure cloud allowing for remote data access as well as possibilities for connection to data analytics and other business systems.
Sophisticated Use Cases
Monitoring Use Cases
A single 5G mast can cover and entire production area, enabling remote low cost, low-powered sensor measurements.
50-51 Malvern Hills Science Park, Geraldine Rd, Malvern WR14 3SZ
2021 © D-sig