We provide total system solutions for creating smart, connected and secure Internet of Things (IoT) designs. This complete product offering simplifies the development of innovative wired and wireless systems, getting you to production faster and speeding up your revenue stream.
Applications that leverage our solutions make use of an ecosystem that encompass smart processors, intelligent analog, certified wired and wireless connectivity and robust security. We also provide comprehensive design assistance through our ready-to-use software and tools, partnerships with the largest cloud computing companies and world-class support, making your journey from idea to cloud fast and easy.
Add intelligence to your IoT design with our vast selection of digital, analog and mixed-signal products that help with sensor node signal conditioning, edge computing, power management and other requirements.
Connect your IoT design quickly and easily with our wired and wireless devices that are designed to be compatible with our MCUs, MPUs and other devices.
Find the security implementations that meet your unique needs with our wide range of hardware- and software-based solutions for applications ranging from secure authentication to trusted execution environments and more.
We are here to support you. Contact our Client Success Team to get assistance with your IoT design.
|AN1861 - Bluetooth Smart Communication Using Microchip RN4020|
See the PIC24 “GB2” family working with the RN4020 Bluetooth LE Module to send basic command and control data to an Android tablet for a low power IoT sensor node application. www.microchip.com/16bit www.microchip.com/security www.microchip.com/pic24fj128gb204 www.microchip.com/xlp
An overview of SAML11 Trusted Execution to implement secure temperature sensor while counteracting malware and physical attacks.
Check out how Google Cloud IoT combined with the ATECC608A strengthen
device to cloud authentication. The implementation is particularly
interesting, offering tremendous flexibility offering an agnostic choice
of the TLS by leveraging the JWT token. In addition, the optimize code
size of the authentication enables connectivity and security for very
For more information, visit:
A quick overview of SAML11 security features, use cases, comprehensive security solution framework and demos to make implementation of security simple.