APPLICATIONS


  • Node-to-Node Authentication of connected devices
  • Secure Boot and Authenticated SW Downloads
  • Revenue Protection and Licensing agreement management
  • Prevention of Cloning
  • Data confidentiality, storage and validation

HARDWARE


  • Dedicated ECC, SHA, AES, CCM Cryptographic HW Engines
  • HASH, AES, SHA256
  • True Random Number Generation
  • Secure Data Keys
  • Active HW/Metal Shield
  • Anti Break-in, Short, Emission attacks, Voltage tamper and probing protection
  • No JTAG access to the security engines
  • Microphone Privacy 

SOFTWARE

  • Component Authentication
  • Software Validation & Secure Boot
  • Software IP Protection
  • Secure Communication
  • Data Confidentiality
  • Secure & Authenticated API and Cloud Interfaces
  • IP Licensing Control
  • Symmetric and Asymmetric Authentication