Skip to main content

Please note that u‑blox no longer supports Internet Explorer.

We recommend using the latest version of Google Chrome or Firefox.

Ok

Foundation security

Trust and control your device

A unique and immutable device identity and robust root of trust provides the foundation for a trusted set of advanced security functionality

  • Production is performed using processes & methods designed with a strong security focus
  • Only trusted software issued by the authorized manufacturer will run on the device
  • Authenticated firmware updates are delivered remotely via u‑blox uFOTA client/server solution
  • Clones are automatically identified and blocked
remote camera

    Discover how to access u‑blox Thingstream and leverage IoT Security-as-a-Service with this getting started guide.

     

     

    Included features

    CEL-SEC-ROOT

    Security root of trust

    CEL-SEC-BOOT

    Secure boot

    CEL-SEC-PROD

    Secure production

    CEL-SEC-UPDT

    Secure updates

    CEL-SEC-CLRJ

    Anti-cloning detection and rejection

    CEL-SEC-SCOM

    Secure communication (D)TLS

    Services description and price

    We live in an age when the internet continually connects more and more physical objects, which makes it more important than ever to be able to fully trust and control your IoT device. 

    First, the module needs to have a unique and immutable identity that is tied with the root of trust. A root of trust is a source for a trusted set of advanced security functionality. The device identity is linked to a secure back-end in order to continuously monitor and detect if it is ever hacked or cloned. 

    We start with incorporating our root of trust into our controlled manufacturing environment using highly secure processes. 

    Second, thanks to a secure boot sequence, the module can only authenticate and run authorized firmware as well as any future updates delivered over the air. 

    Next we utilize our secure libraries and hardware-backed crypto functions, together in the root of trust, to derive an infinite number of trusted keys for each device. 

    And finally, these trusted keys are used to secure any function, such as securing data at rest locally or data in transit when connecting to cloud platforms. 

    These foundational principles ultimately protect the integrity, confidentiality and authenticity of your IoT solution.

    Price

    Foundation security features are included in the module free of charge. Please refer to this page for the IoT Security-as-a-Service  portfolio pricing.

    u‑blox IoT Security-as-a-Service is supported by a variety of advanced u‑blox modules, all designed to protect your data and your business.

    FoundationSecurity Table

    Foundation security features are available globally as part of the product. Please check product specification.