Skip to main content

Please note that u‑blox no longer supports Internet Explorer.

We recommend using the latest version of Google Chrome or Firefox.

Ok

End-to-end security

End-to-end protection of your data in transit

Ensure the end-to-end privacy, integrity and authenticity of your data in transit, powered by a proven scalable key management system

  • Vastly increase the security level by generating an infinite number of keys per device, per session and per message
  • Entirely remove the need for keys (PKI or PSK) management and delivery.  No certificates creation, delivery, renewal and revocation
  • Simplify with out-of-the-box ability to encrypt and transfer any type of application data securely from device to server/platform in cloud (and vice versa)
  • Save power and cost of your constrained device by reducing data overhead and packet flights
car factory with robots

    Discover how to access u‑blox Thingstream and leverage IoT Security-as-a-Service with this getting started guide.

     

     

    Available services

    CEL-SEC-PSKP

    E2E Symmetric KMS 

    CEL-SEC-E2EE

    E2E Data Protection

    CEL-SEC-INAU

    E2E Data Integrity (available soon)

    Protecting your data in transit means that the privacy of your data is safeguarded all the way from the device to the cloud. The confidentially of your data needs to be ensured. Additionally, you need to be able to establish the integrity and authenticity of your data at all times. In IoT settings, which often involve thousands, if not millions, of devices, this requires highly efficient and scalable cryptographic methods. 

    The u‑blox end-to-end security package provides methods to encrypt and transfer every type of applicable data from the device to its own server/platform in the cloud with a few simple operations. This eliminates the need to implement a complex solution on the device microcontroller in order to establish secure communications. 

    u‑blox end-to-end symmetric key management system provisioning is a disruptive approach for secure key management that replaces the current public key infrastructure (PKI) approach or typical PSK systems. 

    The significant advantage of u‑blox E2E Symmetric KMS is that session unique keys are available out-of-the-box both in the module and in your cloud via REST API, which allows the generation of an infinite number of keys per device. Keys are uniquely tied to the hardware and can be triggered on the module side and on the server/cloud side. This entirely removes the need for creation, delivery, renewal, and revocation of certificates. Development and operations are simplified by delegating the complexity of key management to a proven scalable system. 

    E2E Symmetric KMS is well suited for LPWA constrained devices, optimizing secure communications to achieve up to 8x reduction in the data overhead and up to 2x the packet flights. These optimizations translate to reductions in data usage, power consumption and cost.

    Price

    We believe that you should focus on your business without wasting time checking your bills. That is why we adopt a very simple and transparent pay-per-use method: 

    USD 0.003 / API call 

    Independently of which service is used. 

    An API call to u‑blox server is requested each time you provision a key or encrypt and transfer data to/from your device. Refer to the documentation in the “Document and resources”  to learn how to use the API. 

    Do you prefer a pre-paid solution? ..... Stay tuned. Please refer to this page for the IoT Security-as-a-Service pricing.

    u‑blox IoT Security-as-a-Service is supported by a variety of advanced u‑blox modules, all designed to protect your data and your business.

    End2EndSecurity Table

    u‑blox is committed to make IoT Security-as-a-Service available globally. At this time, the services can be used by businesses located in the regions listed below, and the list will grow quickly. Stay tuned and monitor this page for updates. 

    The list of countries where our solutions are commercially available can be found here. This list is continuously growing… stay tuned. 

    If your business is not located in one of these regions, but you want to evaluate IoT Security-as-a-Service, we welcome you to register to u‑blox Thingstream.

    Product Summary

    Interface Manual

    Application Note

    3.28 MB

    Webinar