World’s top MCU makers rely on Intrinsic ID technology to secure their microcontrollers. Our PUF IP allows your customers to deliver a root-of-trust in IoT applications where product authentication and cloning protection is essential. Integrating Intrinsic ID’s SRAM PUF IP in your chips enables easy-to-use provision tools to make security deployment and product management simple for your customers. Our highly secure root-of-trust solution gives you the ability to drive mass market adoption – ensures you can continue to meet the market demand for high secure identification solutions.
- The Intrinsic ID hardware IP is not just a sum of individual hardware cores that link to a PUF but a securely integrated system that generates and manages device-unique high-entropy keys with a layered protection against attack countermeasures.
- The Intrinsic ID software solutions allow your customers to protect their assets from being stolen or cloned during manufacturing, and provide authentication and encryption functions for edge-to-cloud applications. Our software solutions can be retrofitted in existing chips
Featured Market Segments
Billions of devices are being connected to the Internet of Things (IoT), while the number of attacks on these devices is increasing rapidly. In 2017 Altman Vilandrie & Company showed that half the U.S. firms in the IoT market were attacked, and the liability in some cases was more than $20 million. If data is considered the currency of the IoT, that currency has value only if the data comes from a trustworthy source and is untampered. Data integrity has a direct impact on business and infrastructure. To reduce the number of attacks, we need to look at embedded microcontrollers (MCU), the orchestrating components in all these devices. MCUs need to …
The time when a sensor needed only to sense is behind us. With the rise of the Internet of Things (IoT), sensors are part of a connected network. As sensor data is transported from its source to where decisions are made, it must be secured – not a trivial task, given that IoT devices are in the field and are rarely physically protected. Using SRAM PUF technology to create a unique and unclonable identity for every sensor provides the basis for strong authentication and encryption.
As device scaling becomes unfeasible and too expensive for most applications, the popularity of using multiple small chiplets, each with a dedicated function, within a system-in-package (SiP) grows. Future complex designs could easily include 100 chiplets sourced from a variety of vendors, making the already complex an increasingly untrustworthy SoC supply chain even more so. Spreading functionality over multiple chiplets from different vendors increases the attack surface of electronic systems in many ways. Chiplets from untrusted sources can be malicious, vulnerable to attacks, or unreliable. Third parties can overproduce chiplets or steal IP.