skip to Main Content


If a picture is worth a thousand words, aren’t videos worth a lot more? Here are a few interviews, presentations and other videos featuring the Intrinsic ID team and products. You can also subscribe to the Intrinsic ID YouTube channel to keep up with video updates.

Technology & Products

YouTube Root Of Trust Explainer Thumbnail 10.48.30 AM

IoT Security: Start With a Strong Root of Trust

Any security vulnerability can put your IoT product – and therefore your company, brand, reputation and customer – at risk. How do you protect them? Start with a strong Root of Trust. It creates a unique, immutable and unclonable identity to authorize a device in the IoT network. It establishes the anchor point for the chain of trust, and protects the device against counterfeiting, cloning, and reverse engineering. (2:25)

Geert Jan Schrijen Nxp Lpc5500 Video Homepage Banner

NXP LPC5500 Security and Safety

CTO Geert-Jan Schrijen speaks to Intrinsic ID security in the NXP LPC5500, which leverages Arm Cortex-M33 technology. (2:34)

YouTube Thumbnail RESCURE 1024x576

RESCURE: Security for the IoT Device Lifecycle

The RESCURE consortium, consisting of the companies Technikon and Intrinsic ID, along with the Eindhoven University of Technology (TU/e), was created to address the need for a security solution that spans the lifecycle of devices in the Internet of Things (IoT). (3:22)

Whiteboard Videos

Wbv 06 Protecting A Devices Root Secrets With Sram Puf

Protecting a Device’s Root Secrets with SRAM PUF

Geert-Jan Schrijen, CTO of Intrinsic ID, goes back to basics and looks at how we can protect a device’s most important secret, its cryptographic root key, with SRAM PUF technology. (3:57)

Sm Wbv 05 Protecting Your Companys Crown Jewels 1

Protecting Your Company’s Crown Jewels

If you are an IoT device manufacturer, you have a lot of value to protect, not the least of which is the software you put on your devices. More and more IoT devices contain proprietary, valuable algorithms, such as for machine learning and AI. These are the company’s crown jewels that you want to protect. Vincent van der Leest describes how to use SRAM PUF to protect your development efforts and prevent hackers from copying your software to make counterfeit devices. (4:07)

Wbv 04 Thumbnail Device To Host Counterfeits March In 2019.10.11

When the Counterfeits Come Marching In

An important use case for SRAM PUF technology is Device-to-Host Authentication, a way to combat sales of aftermarket and gray-market counterfeits of components or consumables. Companies can suffer when aftermarket and gray-market suppliers sell compatible components or consumables. Revenue can be lost when counterfeits are available at a lower price, and liability and reputation risk can increase in the case of faulty counterfeit products. This video describes how to combat damage to reputation, cost of liability and loss of revenue. (3:54)

Wbv 03 Thumbnail 2019.10.11

Selecting a Root of Trust with an Unclonable Identity

Tobias Adryan covers how chip makers or IoT OEMs can select a root of trust with an SRAM PUF-based unclonable identity. (2:47)

Youtube Thumbnail Wb Video Securing Sensors Age Of Iot

Securing Sensor ICs in the Age of IoT

The time when a sensor needed only to sense is behind us. In the age of the Internet of Things sensors are part of a connected network. SRAM PUF technology can create a unique and unclonable identity for every sensor, providing the basis for strong authentication and encryption. (4:52)

Youtube Thumbnail Wb Video Building Trust Mcu

Building Trust from the MCU

Billions of devices are being connected to the Internet of Things (IoT) and the number of attacks on these devices is increasing rapidly. To reduce the number of attacks, we need to look at embedded microcontrollers (MCU), the orchestrating components in all these devices. MCUs need to ensure security for IoT data at rest and in motion, and protect the IP that operates the device. But how can an MCU vendor create a scalable security solution in a market under extreme price pressure? Watch as Vincent van der Leest takes just a few minutes to discuss IoT security based on trusting the microcontroller of a device. (3:42)

Back To Top