In a trusted embedded system, the root of trust is protected in a secure environment. As the critical foundation for securing an application, this concept of trust relies on using key-based authentication to validate transactions in systems. If a key is spoofed, your system’s transactions can be controlled by unauthorized or malicious users. To protect your embedded system and secure authentication keys against this type of threat, it is critical that you correctly implement trust in your embedded system right from the start.
To eliminate creating backdoors that would allow access to keys, both the crypto-primitive functions and keys used for implementing authentication schemes need to be stored in a container that is secure by design. Our secure elements are configurable companion devices that can be used next to any microcontroller or microprocessor. They provide hardware-based crypto-accelerators and secure key storage, plus some anti-tampering and side channel attack protections to make it easy to embed trust in any system. Offering flexibility, advanced features, cost-effective architectures and robust hardware defense mechanisms, our security devices are an excellent choice for adding trust by design and at scale.
In addition to supplying secure containers for authentication keys and credentials, we also offer secure provisioning services for large- to small-scale device deployments. Our Trust Platform for the CryptoAuthentication™ Family is a three-tier service that provides pre-provisioned, pre-configured or fully customizable secure elements to enable you to easily implement secure authentication in projects of all sizes. Our secure manufacturing facilities will safely provision keys in the devices, ensuring that keys are not exposed when being provisioned at the manufacturer, during field deployment of devices, or throughout the lifetime of the device.
Use the Trust Platform with our CryptoAuthentication devices to provide secure authentication in Internet of Things (IoT) nodes, counterfeit protection for consumable systems, accessory authentication and Intellectual Property (IP) protection to validate the firmware of any system.
Use our CryptoAutomotive security ICs for implementing in-vehicle network security in existing as well as future automotive designs.
Use our enterprise-grade Trusted Platform Modules (TPMs) in server and computing applications.