Get early access to TA101‑TFLX (TrustFLEX) and TA101‑TMNG (TrustMANAGER) beta silicon devices.
TA101‑TFLX is a robust secure key storage device paired with a set of predefined security protocols for teams who want to integrate TA101 into their own public key infrastructure (PKI) systems.
TA101‑TMNG includes the same key storage and protocol capabilities, but adds the keySTREAM cloud platform for remote configuration, PKI creation, key management, and firmware updates —removing the burden of building a managed IoT security infrastructure in‑house.
To streamline your development process with CryptoAuthentication devices like the ATECC608, ATSHA204A, ECC204, ECC206, SHA104, SHA105, SHA106, TA010 (automotive qualified) or ATSHA206A, we offer the CryptoAuthLib library. This software support library, written in C code, is essential for integrating cryptographic services into any application or device driver. It is compatible with a range of platforms, including Arm® Cortex®-M-based microcontrollers, PIC® microcontrollers and PCs that run Windows® or embedded Linux®.
If you need assistance during your design and development process, visit our technical support portal to find helpful resources and get assistance from our security experts. Our approved security design partners also offer expertise with TLS stack providers, cloud platforms, certificate authority companies and the CryptoAuthLib library to help you quickly and cost effectively bring your product to market.
Our CryptoAuthentication ICs provide secure hardware key storage to support encryption, decryption, and sign‑verify operations, enabling strong, scalable protection for IoT nodes across a wide range of applications.
Our CryptoAuthenticaion ICs can be used to implement a controlled accessory ecosystem strategy, a third-party certification program or accessory counterfeit prevention.
Depending on the threat model your company identifies, you can leverage our CryptoAuthentication ICs to implement several secure authentication architectures to defend your single-use products from counterfeiting.
Use the Trust Platform Provisioning Service with four unique tiers of customer support and certified secure factories to leverage our pre-configured and pre-provisioned secure ICs with the most common security use cases.
The Trust Platform Design Suite (TPDS) tool includes secure IC configurators and use cases supported by code examples and tutorials to accelerate your development.
Live Chat