With four unique tiers of customer support and certified secure factories, our Trust Platform Provisioning Service allows you to leverage our pre-configured and pre-provisioned CryptoAuthentication, CryptoAutomotive and CEC1736/CEC1734 Platform Root of Trust devices with the most common security use cases.
With code examples and tutorials for accelerated development, the Trust Platform Design Suite (TPDS) contains secure IC configurators and use cases to help you accelerate your development.
In a trusted embedded system, the root of trust must be safeguarded within a secure environment. This serves as the essential foundation for securing an application by utilizing key-based authentication to validate system transactions. If a key is spoofed, unauthorized or malicious users can potentially take control of your system's transactions. Therefore, establishing trust from the outset of your embedded system design is crucial to protect authentication keys and prevent such vulnerabilities.
To avoid creating backdoors that could expose keys, both the cryptographic functions and the keys used in authentication must be stored in a container that is secure by design. Our secure elements are configurable companion devices that can integrate seamlessly with any microcontroller (MCU) or microprocessor (MPU). They offer hardware-based crypto-accelerators, secure key storage and protection against tampering and side-channel attacks, making it easy to embed trust into your system. With flexible, advanced features, cost-effective architectures and robust hardware defense mechanisms, our security devices provide a reliable solution for integrating trust at scale and by design.
In addition to secure containers for authentication keys and credentials, we offer secure provisioning services for deployments of all sizes. Our Trust Platform for the CryptoAuthentication and CryptoAutomotive families provides a four-tiered service that offers pre-provisioned, pre-configured or fully customizable secure elements, allowing you to implement secure authentication easily across projects of varying scales. Our secure manufacturing facilities ensure keys are provisioned into devices safely, protecting them from exposure during production, deployment and the entire lifecycle of the device. Our latest provisioning tier, TrustMANAGER, enables in-field provisioning to further eliminate the threat of key exposure.
Each market has distinct requirements and regulations that define device specifications. The table below highlights the appropriate authentication IC for each market. Click on the green checkmarks to read our blog articles about these markets and products.
Because there are many options for adding security to embedded designs, we offer a variety of flexible and complementary solutions in addition to our portfolio of secure elements, such as crypto-enabled microcontrollers and microprocessors.
Live Chat