Design security (archived)
Protect your data at rest
Trust and control your device
Anti-cloning detection and rejection
The systematic and automated identification and blocking of clones as identified via the device root of trust.
A security standard that makes certain a device will only boot or run trusted software issued by the original device manufacturer.
Secure communication (D)TLS
Standards‑based cryptographic protocols designed to provide communications security over a network for data in transit.
Production is performed using processes and methods designed with a strong security focus and within a controlled manufacturing environment.
Remotely and securely updating modules using signed firmware that is authenticated in the module via secure boot.
Security root of trust
A unique immutable identity together with the hardware and software cryptographic capabilities necessary to enable trusted functions.
We live in an age when the internet continually connects more and more physical objects, which makes it more important than ever to be able to fully trust and control your IoT device.
First, the module needs to have a unique and immutable identity that is tied with the root of trust. A root of trust is a source for a trusted set of advanced security functionality. The device identity is linked to a secure back-end in order to continuously monitor and detect if it is ever hacked or cloned.
We start with incorporating our root of trust into our controlled manufacturing environment using highly secure processes.
Second, thanks to a secure boot sequence, the module can only authenticate and run authorized firmware as well as any future updates delivered over the air.
Next we utilize our secure libraries and hardware-backed crypto functions, together in the root of trust, to derive an infinite number of trusted keys for each device.
And finally, these trusted keys are used to secure any function, such as securing data at rest locally or data in transit when connecting to cloud platforms.
These foundational principles ultimately protect the integrity, confidentiality and authenticity of your IoT solution.
Foundation security features are included in the module free of charge. Please refer to detailed pricing page for the IoT Security-as-a-Service portfolio pricing.