www.design-reuse-embedded.com
Find Top SoC Solutions
for AI, Automotive, IoT, Security, Audio & Video...

Intrinsic ID to Showcase New Embedded Security Solutions at CES 2024

Dec. 19, 2023 – 

Intrinsic ID expanded its hardware- and software security IP portfolio to secure devices used in the IoT, healthcare, smart home, datacenters, automotive, chiplets, and more.

SUNNYVALE, Calif., December 19, 2023Intrinsic ID, the world’s leading provider of Physical Unclonable Function (PUF) technology for security and authentication applications in embedded systems, today announced it will be attending CES 2024. The company’s embedded security experts will be on site to discuss the full range and versatility of its hardware root-of-trust (RoT) solutions. The show follows another record-breaking year with Intrinsic ID technology now being deployed in more than 650 million devices worldwide.

“We are experiencing a paradigm shift in our relationship with technology as reflected in the themes of CES this year. The need for security has become ubiquitous, particularly for internet-connected applications. However, device makers are faced with smaller footprints and limited resources,” said Pim Tuyls, CEO and co-founder of Intrinsic ID. “At Intrinsic ID, our solutions provide a robust hardware-based root of trust, without requiring dedicated silicon, to authenticate and secure all devices.”

At CES 2024, Intrinsic ID is looking forward to briefing customers and partners on the company’s expanded product portfolio, which includes:

Intrinsic ID will be part of the Dutch Pavilion in booth 62100 at The Venetian Convention & Expo Center. Contact the company here to schedule one-on-one briefings with Intrinsic ID at CES 2024.

About Intrinsic ID
Intrinsic ID is the world’s leading provider of security IP for embedded systems based on PUF technology. The technology provides an additional level of hardware security utilizing the inherent uniqueness in each and every silicon chip. The IP can be delivered in hardware or software and can be applied easily to almost any chip – from tiny microcontrollers to high-performance FPGAs – and at any stage of a product’s lifecycle. It is used as a hardware root of trust to protect sensitive military and government data and systems, validate payment systems, secure connectivity, and authenticate sensors.

 Back

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2024 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.