skip to Main Content

Some of the world’s top companies rely on Intrinsic ID technology to secure connected products. You can find our security technology in mobile devices, Industrial IoT, smart cards and consumer electronics. Below are just a few of the markets where Intrinsic ID technology has been used for real-world applications.

Billions of devices are being connected to the Internet of Things (IoT). This incredibly vast network cannot be maintained successfully without strong security solutions for every device. A component all these devices have in common is an embedded microcontroller or MCU. These MCUs need to ensure security for IoT data at rest and in motion, as well as protect the IP that operates the device. This creates security and trust from the edge devices at the moment that IoT data is created. But how can an MCU vendor create a scalable security solution in a market with enormous volumes and under extreme price pressure?

[Read more]

Cellular IoT - City with network

With the rise of the Internet of Things (IoT) and “Industry 4.0,” factories and critical infrastructures are becoming connected networks. Processes are remotely monitored through sensing and connectivity solutions, allowing for greater control, powering predictive analytics and optimizing throughput, leading to a higher return on investment. But when processes rely on the integrity of connected sensors and their data, strong security becomes indispensable. Sensitive data is transported on connected networks, which must be kept safe from eavesdropping and alteration. Herein we discuss how data should be protected from IoT device to the cloud.

[Read more]

Industrial IoT - Man with display

Billions of devices are being connected to the Internet of Things (IoT) through many different connectivity standards, such as LoRa, Sigfox and cellular connections (NB-IoT/LTE-M/4G/5G). One thing these standards have in common is that they were not developed with data security in mind. For example, cellular IoT, with SIM as its standard for security, does not protect data during transmission. SIM protects the interests of the network operators, not those of the users. It authenticates devices to a network and connections are encrypted, but this protection ends as soon as the data arrives at the first cell tower. After that, unprotected IoT data still has a long way to go to its destination.

[Read more]

Sensor ICs - SRAM PUF Fingerprint

The time when a sensor needed only to sense is behind us. With the rise of the Internet of Things (IoT), sensors are part of a connected network. As sensor data is transported from its source to where decisions are made, it must be secured – not a trivial task, given that IoT devices are in the field and are rarely physically protected. Using SRAM PUF technology to create a unique and unclonable identity for every sensor provides the basis for strong authentication and encryption.

[Read more]

Driving Economic Advantage with IoT Security | Get White Paper

Back To Top