Intrinsic ID’s Integrated Security Solutions
Intrinsic ID’s products are based on Physical Unclonable Functions or PUF. Our secure and robust PUF technology leverages a unique ID intrinsically present in the silicon seamlessly enabling the highest level of security in the most cost-effective way.
Physical Unclonable Function
All our products are based on Physical Unclonable Functions or PUFs. Identifiers extracted from a PUF cannot be cloned, guessed, stolen or shared, and keys don’t remain stored on the system, providing the highest level of protection.
QuiddiKey Hardware IP
The world-leading IP that integrates a PUF with crypto accelerators. QuiddiKey has earned its stripes in the banking and government world and now gained a number one position securing MCUs for the IoT.
Embedded software that makes the deployment and usability of hardware-based security easy. It works on all MCUs /CPUs, lowers the cost of a secure design and improves time to market.
Easy device-device-to cloud security that doesn't require additional hardware. It addresses the need of security for the IoT by lowering BOM cost and improving time to market.
A trust anchor on Xilinx FPGAs that binds sensitive data, such as FPGA bitstream, designs, IP and encryption keys to the hardware of the FPGA.
PUF as a Tracking ID
SRAM PUF allows for tracking components as early as from a die on the wafer. No need to store an identity or key on the device to get a robust, scalable and highly efficient tracking solution. Suitable for low-end devices that have no memory available on chip to program a unique ID, or when programming in the hardware is economically not feasible.
Citadel Infrastructure Tools
This suite of products enable easy setup, management and use of SRAM PUF-based unclonable device identities for securing IoT applications.They accelerate the deployment and improve time to market of any IoT design
The accelerating expansion of the Internet of Things brings with it a comparably expanding threat model. The growing number of endpoints require strong identities as the foundation of trust to establish and scale robust security. QuiddiKey is a secure root key generation and management solution that allows device manufacturers to secure their products with an internally generated, unique identity without the need for adding a costly, security-dedicated silicon. The hardware IP is based on SRAM Physical Unclonable Function (PUF) technology and is the foundation of a device’s hardware-based root of trust. The IP is agnostic to fab and technology choice and has been deployed in 200 million+ devices.
FPGAs are widely used in mission-critical environments with specific processing needs. Motivations for copying or altering sensitive data or valuable IP are abundant. Especially in aerospace and defense, attacks can result in loss of IP, leakage of top-secret information and compromised national security. A way for designers to secure their FPGAs, its sensitive data and communications, is the use of cryptography. Authenticity, integrity and confidentiality can be guaranteed by using strong cryptographic keys, rooted in the hardware of the FPGA.
The accelerating expansion of the Internet of Things brings with it a comparably expanding threat model. The growing number of endpoints require strong identities as the foundation of trust to establish and scale robust security. BK is a secure root key generation and management software solution for IoT security that allows device manufacturers to secure their products with an internally generated, unique identity without the need for adding a costly, security-dedicated silicon. Since BK is a software implementation of SRAM PUF, it is the only hardware entropy source option for securing IoT products that does not need to be loaded at silicon fabrication.
Citadel Infrastructure Tools is a suite of software products which accelerate SRAM PUF deployment of unclonable device identities for securing IoT applications, particularly those targeting wide-scale deployment. They can be used by semiconductor vendors and OEMs to provision their devices, and by OEMs and application developers to create applications that are using SRAM PUF-based security. Available are tools for provisioning and for crypto applications which, along with BK™ and QuiddiKey® key-management products, form the basis of secure device lifecycle management.