www.design-reuse-embedded.com
10 "IoT Security" Solutions

1
Arm Platform Security Architecture (PSA)
The Platform Security Architecture (PSA) is a holistic set of threat models, security analyses, hardware and firmware architecture specifications, and an open source firmware reference implementation.

2
Mbed TLS
Arm Mbed TLS makes it trivially easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) products, facilitating this functionality with a minimal code footprint. It offers an SSL library with an intuitive API and readable source code, and includes an elaborate test suite. You can build it out of the box on most systems, or manually select and configure features.

3
CryptoManager IoT Device Management
The CryptoManager IoT Device Management is a turnkey security service that provides IoT OEMs and service providers an easy to use security solution from device-to-cloud.

4
eSecure module for SoC security for IoT
Secure Boot | Firmware update in the field | Secure key storage | Cryptography algorithms off-loading

5
Secure True Random Number Generators for IoT
True Random Number Generators (TRNGs) are typically deployed in semiconductors for secure data communications, secure electronic transactions, and secure data storage.

6
BROADKEY - Hardware Root of Trust Software to Create, Wrap and Manage Keys
BROADKEY™ is a secure key management software solution for IoT security, based on SRAM PUF technology.

7
Citadel - SRAM PUF-Based Key Provisioning System
CITADEL is the worlds first SRAM PUF-based key provisioning system designed to keep pace with the growing demand for the generation, distribution, and protection of cryptographic keys for IoT applications.

8
NeoPUF - an ideal security solution for IoT
NeoPUF technology stands out for its features of ideal randomness and an entropy pool of random bits up to 1024 kbits. In addition, the security functions are statistically-tested robust and reliable, unaffected by external influences including temperature and voltage. NeoPUF can be implemented in logic compatible process and does not require additional masks or process adaption. This specialty IP enables upgraded security due to the intrinsic randomness and self-encrypted feature.

9
Cryptographic IP Cores for IoT
The Intrinsix Cryptographic Subsystem IP Cores for IoT provide a complete security solution for your IoT ASICs and SOCs.

10
STSAFE Trusted Platform Modules for Authentication & Secure IoT
ST offers a full ecosystem with ready-to-use turnkey solutions to ensure device identity, systems and network integrity, for customers cautious about their brand, or willing to rely on a safe and secure IoT.

 Back

Partner with us

Visit our new Partnership Portal for more information.

Submit your material

Submit hot news, product or article.

List your Products

Suppliers, list and add your products for free.

© 2018 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted,
reposted, duplicated or otherwise used without the
express written permission of Design And Reuse.