Securing Plug & Charge Trust for a Global Electric Vehicle Manufacturer

Table of Contents

Enabling Secure Interoperability Across OEM, CPO, and eMSP Networks

A global electric vehicle manufacturer needed to support ISO 15118-compliant Plug & Charge across its growing network of vehicles, charge points, and service providers. As EV adoption accelerated, the company required a unified trust infrastructure that could authenticate vehicles, chargers, and mobility service providers automatically — eliminating user friction while maintaining cryptographic control and compliance with international standards.

ISS Solution

ISS delivered its ChargeAuth platform — a production-grade, vehicle-to-grid (V2G) public key infrastructure built on the same Secure Credential Management System (SCMS) architecture trusted by leading automakers and state transportation agencies.

At the manufacturing level, ISS enabled secure certificate provisioning directly into vehicle controllers, ensuring every EV left the factory with a unique, verifiable identity.

For charging infrastructure, ISS provided CPO-facing interfaces and APIs to automate certificate enrollment, renewal, and revocation across distributed charging networks.

ISS also supported the customer’s e-Mobility Service Provider (eMSP) operations by integrating authentication services for Plug & Charge transactions, ensuring seamless roaming across partner networks.

Behind the scenes, all certificates, signing keys, and revocation lists are managed through FIPS 140-validated hardware security modules (HSMs) and 24/7 enterprise-grade infrastructure operated by ISS.

Results

  • Delivered standards-compliant Plug & Charge capability under ISO 15118-2 and -20
  • Enabled interoperability between OEM, CPO, and eMSP ecosystems
  • Maintained OEM control over cryptographic roots and certificate lifecycles
  • Simplified global compliance through centralized certificate authority services
  • Strengthened customer trust and charging reliability through automated authentication

Lorem ipsum dolor sit amet consectetur. Nulla id nisi pretium potenti dolor eget. In consectetur est sem ac hendrerit. Lobortis et nunc lectus lectus elit. Lacus scelerisque lorem non sagittis eu ipsum. Aliquam diam arcu placerat malesuada. Facilisis consequat eu gravida proin ornare quisque gravida orci. Tellus laoreet ornare sed nunc nascetur vulputate. Ultricies tristique blandit elit quisque vestibulum.

Popular Case Studies

Smart Cities & Infrastructure

Smart infrastructure operators face escalating risks as PLCs, SCADA systems, elevators, building management systems (BMS), and connected city services converge on digital networks. These assets are long-lived, safetycritical, and regulated under IEC 62443, SIL 3/4, and NIST SP 800-82. Challenges include legacy assets with expired credentials, PLC-driven elevators integrated into fire and BMS systems, and emergency phone lines converted to IP/VoIP, creating new attack surfaces. SCADA/DCS controllers managing power, water, and city services are also exposed to cyber and compliance risks, compounded by fragmented visibility across suppliers and infrastructure. To meet safety and regulatory demands, operators require a resilient, audit-ready trust foundation ensuring compliance and uptime.

Power, Energy & Utilities

A leading U.S. power utility needed to secure and modernize its digital trust infrastructure across IT and OT networks. With thousands of certificates, keys, and secrets spread across enterprise applications, SCADA devices, and mobile endpoints, the risk of outage, cyberattack, and compliance gaps was rising sharply. At the same time, the organization faced increasing regulatory pressure and had committed to a full digital transformation by 2030, requiring a more resilient, unified trust foundation.

Digital Trust Services / SaaS (ILM) – Digital Signatures & Signing

ISS helped a Tier-1 auto supplier secure ECU credentialing worldwide with automated key management, real-time validation, and full compliance across the vehicle manufacturing lifecycle.

Resource Library

Post-Quantum Cryptography Implementation Guide

Deep dive into post-quantum crypto deployment strategies for embedded systems

Post-Quantum Cryptography Implementation Guide

Deep dive into post-quantum crypto deployment strategies for embedded systems
Ready to Secure Your Trust Lifecycle?

Let's secure your entire trust lifecycle from the physical edge to the cloud, the sea, and beyond.