We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X
Maximize Your Experience: Reap the Personalized Advantages by Completing Your Profile to Its Fullest. Update Here
Stay in the loop with the latest from Microchip. Update your profile while you are at it. Update Here
Complete your profile to access more resources. Update Here

Trust Platform

Flexible and Easy Provisioning for Trusted Device Security


Secure key provisioning is the foundation of trusted device identity and data protection. We offer key provisioning through the Trust Platform service which includes models for both in-factory provisioning—ideal for high-volume, controlled environments—and in-field provisioning, which enables secure key injection after deployment. Our secure facilities are also capable of custom firmware provisioning for our embedded controllers.

This dual approach ensures manufacturers and solution providers can meet diverse security and logistical requirements without compromising trust or scalability.

Trust&GO

Trust&GO 

Out-of-the-box security solution pre-provisioned with Microchip keys and certificates for TLS use cases. Ideal for quick deployment with no secret exchange required.

  • ATECC608-TNGTLS
TrustMANAGER

TrustMANAGER

Key management system (KMS) with dynamic key and certificate management, supporting in-field provisioning, FOTA and code signing. Designed for scalable, secure IoT deployments.

  • ECC608-TMNGTLS
  • TA101-TMNGTLS
TrustFLEX

TrustFLEX

Versatile platform with pre-configured use cases and broad device support. Requires secret exchange and offers code examples for each supported configuration.

  • Select secure ICs, PRoT Controllers and MCUs
TrustCUSTOM

TrustCUSTOM

Fully customizable security IC platform starting from a blank device. Ideal for tailored use cases with full control over provisioning and configuration.

  • All secure ICs, PRoT Controllers and MCUs

Why Choose Our Provisioning Services?


In manufacturing, without secure key provisioning, sensitive keys face exposure to third-party software, microcontroller (MCU) firmware, contract manufacturers and operators. Given the elevated risks in mass production, it's crucial to securely store credentials using a process aligned with good security practices. Our Trust Platform provisioning service aims to isolate credentials from exposure during and after production, making it possible to handle keys securely.

The image below shows the steps to provision devices for production with each tier of the Trust Platform, which offers varying levels of complexity and customization.

Product Families


ECC608

Secure Authentication ICs

Dedicated hardware security ICs that deliver tamper‑resistant key storage, cryptographic services and strong device authentication to protect systems, identities and data. These devices help prevent counterfeiting, enable secure communications such as TLS, and support secure firmware updates (FOTA), establishing a hardware root of trust for robust, end‑to‑end system protection.

TS1800-TFLX

Platform Root of Trust Controllers

Dedicated controllers that establish a resilient chain of trust from first power‑on. Designed to meet evolving mandates such as CNSA 2.0, CRA, NIST SP 800‑193 and OCP, with PQC‑ready architectures to protect platforms across boot, runtime and firmware updates.

microcontroller

Microcontrollers

Microcontrollers with built‑in security features that combine application processing with hardware‑based protection for secure system operation.

Still Not Sure How To Get Started?


  • To help with your configuration setup and transaction diagram, we handpicked a team of trusted design partners that offer their expertise to guide you along the way. They will also help with your project development from use case definition all the way through to production.
  • If you need more information about our secure elements, please visit our CryptoAuthentication™ ICs page.

Live Chat

Need Help?

Privacy Policy