At Intrinsic ID we are familiar with the challenges that IoT device makers are facing. We offer the best choice to establish a root of trust to protect your systems, while meeting time-to-market needs. A more robust, foundational security can be done at a notably lower TCO, without the need to integrate an additional secure element chip, or requiring special key injection on their chips. Integrating Intrinsic ID’s PUF IP allows you to deliver more secure products with simpler key management requirements. It allows you to accelerate the design of secure embedded products, which can provide them with a competitive edge. Using Intrinsic ID IP will help you deliver your technology in a secure, scalable manner. Our IP protects your assets from being stolen or cloned during manufacturing, and provide authentication and encryption functions for edge-to-cloud applications.
Some of the world’s top companies rely on Intrinsic ID technology to secure connected products. You can find our security technology in mobile devices, Industrial IoT, smart cards and consumer electronics. Below are just a few of the markets where Intrinsic ID technology has been used for real-world applications.
Featured Market Segments
Billions of devices are being connected to the Internet of Things (IoT) through many different connectivity standards, such as LoRa, Sigfox and cellular connections (NB-IoT/LTE-M/4G/5G). One thing these standards have in common is that they were not developed with data security in mind. For example, cellular IoT, with SIM as its standard for security, does not protect data during transmission. SIM protects the interests of the network operators, not those of the users. It authenticates devices to a network and connections are encrypted, but this protection ends as soon as the data arrives at the first cell tower. After that, unprotected IoT data still has a long way to go to its destination.
Device connectivity has an increasing impact on the medical industry. Besides convenience for caretakers, this also leads to risks of cyber attacks, which was evident when the FDA recalled 500 thousand internet-connected pacemakers for fears over hacking. While more equipment is being connected to various networks, consumables like catheters and body sensors are also (wirelessly) connected to medical equipment. Clearly, medical equipment needs to be safe from cyber attacks, guarantee privacy of the patient, and keep costs, liability and risks for the device maker low.