skip to Main Content

Some of the world’s top companies rely on Intrinsic ID technology to secure connected products. You can find our security technology in mobile devices, Industrial IoT, smart cards and consumer electronics. Below are just a few of the markets where Intrinsic ID technology has been used for real-world applications.

Drone Item Image Website

As threats from adversaries increase, security countermeasures must be frequently updated to protect against the latest physical attacks such as side channel attacks and fault injection attacks, to prevent exposure of sensitive information, theft of IP, counterfeiting and cloning of devices. Intrinsic ID’s Physical Unclonable Function or PUF technology has been deployed by its aerospace and defense electronics customers for over a decade. It has been operational in the harshest of mission critical environments – both terrestrial and space based – without breach or failure.

[Read more]

SiP 16x9 1024x576

As device scaling becomes unfeasible and too expensive for most applications, the popularity of using multiple small chiplets, each with a dedicated function, within a system-in-package (SiP) grows. Future complex designs could easily include 100 chiplets sourced from a variety of vendors, making the already complex an increasingly untrustworthy SoC supply chain even more so. Spreading functionality over multiple chiplets from different vendors increases the attack surface of electronic systems in many ways. Chiplets from untrusted sources can be malicious, vulnerable to attacks, or unreliable. Third parties can overproduce chiplets or steal IP.

[Read more]

Industrial IoT With Display

With the rise of the Internet of Things (IoT) and “Industry 4.0,” factories and critical national infrastructures are becoming connected networks. Processes are remotely monitored through sensing and connectivity solutions, allowing for greater control, powering predictive analytics and optimizing throughput, leading to a higher return on investment. But when processes rely on the integrity of connected sensors and their data, strong security becomes indispensable. Sensitive data is transported on connected networks, which must be kept safe from eavesdropping and alteration. Herein we discuss how data should be protected from IoT device to cloud services.

[Read more]

Medical Market Segment 365

Device connectivity has an increasing impact on the medical industry. Besides convenience for caretakers, this also leads to risks of cyber attacks, which was evident when the FDA recalled 500 thousand internet-connected pacemakers for fears over hacking. While more equipment is being connected to various networks, consumables like catheters and body sensors are also (wirelessly) connected to medical equipment. Clearly, medical equipment needs to be safe from cyber attacks, guarantee privacy of the patient, and keep costs, liability and risks for the device maker low.

[Read more]

Image Market Segment MCU

Billions of devices are being connected to the Internet of Things (IoT), while the number of attacks on these devices is increasing rapidly. In 2017 Altman Vilandrie & Company showed that half the U.S. firms in the IoT market were attacked, and the liability in some cases was more than $20 million. If data is considered the currency of the IoT, that currency has value only if the data comes from a trustworthy source and is untampered. Data integrity has a direct impact on business and infrastructure. To reduce the number of attacks, we need to look at embedded microcontrollers (MCU), the orchestrating components in all these devices. MCUs need to …

[Read more]

Sensor ICs Fingerprint

The time when a sensor needed only to sense is behind us. With the rise of the Internet of Things (IoT), sensors are part of a connected network. As sensor data is transported from its source to where decisions are made, it must be secured – not a trivial task, given that IoT devices are in the field and are rarely physically protected. Using SRAM PUF technology to create a unique and unclonable identity for every sensor provides the basis for strong authentication and encryption.

[Read more]

Back To Top