Skip to main content

Please note that u‑blox no longer supports Internet Explorer.

We recommend using the latest version of Google Chrome or Firefox.


Foundation security

Trust and control your device

A unique and immutable device identity and robust root of trust provides the foundation for a trusted set of advanced security functionality

  • Production is performed using processes & methods designed with a strong security focus
  • Only trusted software issued by the authorized manufacturer will run on the device
  • Authenticated firmware updates are delivered remotely via u‑blox uFOTA client/server solution
  • Clones are automatically identified and blocked
remote camera

    Discover how to access u‑blox Thingstream and leverage IoT Security-as-a-Service with this getting started guide.


    u‑blox services are delivered by the Thingstream IoT service delivery platform.

    Contact Thingstream support

    Included features

    Security root of trust

    A unique immutable identity together with the hardware and software cryptographic capabilities necessary to enable trusted functions.

    Secure boot

    A security standard that makes certain a device will only boot or run trusted software issued by the original device manufacturer.

    Secure production

    Production is performed using processes and methods designed with a strong security focus and within a controlled manufacturing environment.

    Secure updates

    Remotely and securely updating modules using signed firmware that is authenticated in the module via secure boot.

    Anti-cloning detection and rejection

    The systematic and automated identification and blocking of clones as identified via the device root of trust.

    Secure communication (D)TLS

    Standards‑based cryptographic protocols designed to provide communications security over a network for data in transit.

    Services description and price

    • Unique device Identity
    • Secure boot sequence and updates
    • Hardware-backend crypto functions
    • Root of trust based authentication

    We live in an age when the internet continually connects more and more physical objects, which makes it more important than ever to be able to fully trust and control your IoT device. 

    First, the module needs to have a unique and immutable identity that is tied with the root of trust. A root of trust is a source for a trusted set of advanced security functionality. The device identity is linked to a secure back-end in order to continuously monitor and detect if it is ever hacked or cloned. 

    We start with incorporating our root of trust into our controlled manufacturing environment using highly secure processes. 

    Second, thanks to a secure boot sequence, the module can only authenticate and run authorized firmware as well as any future updates delivered over the air. 

    Next we utilize our secure libraries and hardware-backed crypto functions, together in the root of trust, to derive an infinite number of trusted keys for each device. 

    And finally, these trusted keys are used to secure any function, such as securing data at rest locally or data in transit when connecting to cloud platforms. 

    These foundational principles ultimately protect the integrity, confidentiality and authenticity of your IoT solution.


    Foundation security features are included in the module free of charge. Please refer to detailed pricing page for the IoT Security-as-a-Service  portfolio pricing.

    u‑blox IoT Security-as-a-Service is supported by a variety of advanced u‑blox modules, all designed to protect your data and your business.

    FoundationSecurity Table

    Foundation security features are available globally as part of the product. Please check product specification.