We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X
Maximize Your Experience: Reap the Personalized Advantages by Completing Your Profile to Its Fullest. Update Here
Stay in the loop with the latest from Microchip. Update your profile while you are at it. Update Here
Complete your profile to access more resources. Update Here

Trust Platform

Customizing Security for Your Projects


The primary distinctions between the four Trust Platform tiers are the degree of involvement required for selecting or defining a security IC configuration for your specific use case(s), the credentials you intend to provision and the Minimum Orderable Quantity (MOQ) that aligns with your project needs. Utilize our Trust Platform Design Suite tool to support your development process, from initial prototyping through to full-scale production

Trust&GO

Trust&GO

Out-of-the-box security solution pre-provisioned with Microchip keys and certificates for TLS use cases. Ideal for quick deployment with no secret exchange required.

  • ATECC608-TNGTLS
TrustMANAGER

TrustMANAGER

Key management system (KMS) with dynamic key and certificate management, supporting in-field provisioning, FOTA and code signing. Designed for scalable, secure IoT deployments.

  • ECC608-TMNGTLS
TrustFLEX

TrustFLEX

Versatile platform with pre-configured use cases and broad device support. Requires secret exchange and offers code examples for each supported configuration.

  • Select secure ICs, PRoT Controllers and MCUs
TrustCUSTOM

TrustCUSTOM

Fully customizable security IC platform starting from a blank device. Ideal for tailored use cases with full control over provisioning and configuration.

  • All secure ICs, PRoT Controllers and MCUs

Why Choose Our Trust Platform?


In manufacturing, without secure key provisioning, sensitive keys face exposure to third-party software, microcontroller (MCU) firmware, contract manufacturers and operators. Given the elevated risks in mass production, it's crucial to securely store credentials using a process aligned with good security practices. Our Trust Platform provisioning service aims to isolate credentials from exposure during and after production, making it possible to handle keys securely.

The image below shows the steps to provision devices for production with each tier of the Trust Platform, which offers varying levels of complexity and customization.

Security Solutions


Smart Energy

CryptoAuthentication™ Family

Target applications: IoT, industrial, medical, consumer, factory automation, accessories and disposables
cords

Accessory Authentication 

Target applications: medical, consumer
Printer Cartridge

Disposable Authentication

Target applications: medical, consumer
Car

CryptoAutomotive™ Family

Target applications: automotive, industrial, EV charging, battery managment

Still Not Sure How To Get Started?


  • To help with your configuration setup and transaction diagram, we handpicked a team of trusted design partners that offer their expertise to guide you along the way. They will also help with your project development from use case definition all the way through to production.
  • If you need more information about our secure elements, please visit our CryptoAuthentication™ ICs page.

Live Chat

Need Help?

Privacy Policy