We live in an age when the internet continually connects more and more physical objects, which makes it more important than ever to be able to fully trust and control your IoT device.
First, the module needs to have a unique and immutable identity that is tied with the root of trust. A root of trust is a source for a trusted set of advanced security functionality. The device identity is linked to a secure back-end in order to continuously monitor and detect if it is ever hacked or cloned.
We start with incorporating our root of trust into our controlled manufacturing environment using highly secure processes.
Second, thanks to a secure boot sequence, the module can only authenticate and run authorized firmware as well as any future updates delivered over the air.
Next we utilize our secure libraries and hardware-backed crypto functions, together in the root of trust, to derive an infinite number of trusted keys for each device.
And finally, these trusted keys are used to secure any function, such as securing data at rest locally or data in transit when connecting to cloud platforms.
These foundational principles ultimately protect the integrity, confidentiality and authenticity of your IoT solution.
Foundation security features are included in the module free of charge. Please refer to this page for the IoT Security-as-a-Service portfolio pricing.
u‑blox IoT Security-as-a-Service is supported by a variety of advanced u‑blox modules, all designed to protect your data and your business.
Foundation security features are available globally as part of the product. Please check product specification.