February 2017

Intrinsic ID Introduces CITADEL, the SRAM PUF-based Key Provisioning System that Breaks the Barriers of IoT Security

February 13th, 2017|

PUF-security now possible through software only, says Intrinsic ID

February 9th, 2017|

February 09, 2017 // By Graham Prophet

PUF-security now possible through software only, says Intrinsic ID

Intrinsic ID is a Sunnyvale, California based company that provides security and key management functionality for SoC designs, using the principle of Physically Unclonable Functions (PUFs) that are unique ot each and every chip.

The PUFs are generated from minute, but consistent, […]

Intrinsic ID’s BROADKEY™ Secures IoT with Key Management Software Powered by SRAM PUF

February 9th, 2017|

Provisions unique keys and identities for nearly all microcontrollers without need for security-dedicated silicon

SUNNYVALE, CA–(Marketwired – February 09, 2017) – Intrinsic ID, a leading provider of authentication technology, announced today the availability of BROADKEY, key management software powered by its award-winning SRAM Physical Unclonable Function (PUF) technology. BROADKEY allows device manufacturers and OEMS to secure their […]

James Livingston to Speak at GlobalSign Booth at RSA, Feb 15, 1:00 pm

February 8th, 2017|

Intrinsic ID – Strong Device Identities Through SRAM PUF-based Certificates

Date: Wednesday, February 15 at 1:00p.m.
Presenter: James Livingston, Director of Sales North America, Intrinsic ID
Topic Description: IoT device manufacturers are under immense pressure to provide device personalization, strong protection of sensitive assets, and in-field application services in order to help their products stand out from the crowd. All […]

December 2016

Towards Securing Medical IoT

December 12th, 2016|

By Michael Takamoto
The case for adopting SRAM PUF for medical and other devices 

Personal medical information is definitely something we want kept private. Perhaps no other information besides financial and military can have such profound and direct effect on our lives. Yes, it is bad if your identity is stolen. Yes, it is bad when the […]

November 2016

Securing the Physical Supply Chain: PUF Technology and KSI Blockchain

November 22nd, 2016|

Secure element From NXP employs Intrinsic-ID’s PUF technology

November 17th, 2016|

Intrinsic-ID has disclosed that its SRAM physical unclonable functions technology is being deployed in NXP’s recently-announced SmartMX2 P60 Step-Up! Secure Element, enabling provision of Secure authentication and confidential data exchange; the combination is employed to, for example, protect personal payment data and eGovernment Services against identity theft.
http://www.edn-europe.com/news/secure-element-nxp-employs-intrinsic-ids-puf-technology

 

NXP’s New SmartMX2 P60 Step-Up! Secure Element is Enabled with Intrinsic-ID’s Technology to Provide Secure Authentication and Confidential Data Exchange

November 15th, 2016|

NXP’s New SmartMX2 P60 Step-Up! Secure Element is Enabled with Intrinsic-ID’s Technology to Provide Secure Authentication and Confidential Data Exchange

 

SRAM PUF helps SmartMX2 protect personal payment data and eGovernment Services against identity theft

 

Sunnyvale, November 16, 2016:  Intrinsic-ID announces that it’s SRAM PUF- (Physical Unclonable Functions) technology is embedded within NXP® Semiconductor’s SmartMX2 P60 Step-Up! secure […]

Intrinsic-ID, authenticating everything, safeguarding the connected digital world

November 4th, 2016|

At ICT Proposers’ Day 2016 in Bratislava, Intrinsic-ID was awarded the prestigious EU Innovation Radar Prize 2016.

We are a Dutch SME focusing on securing the Internet of Things. Winning the Innovation RadarPrize 2016 was an important achievement for the team and a clear acknowledgement that our technology provides an important building block for securing the […]

The Birth of Chip-Level Security

November 3rd, 2016|

A little-known technology called physical unclonable functions (PUFs) stands poised to change the fundamental nature of security processes like authentication and cryptographic key generation.

http://electronics360.globalspec.com/article/7572/the-birth-of-chip-level-security