On-demand webinars drill down on topics within the realm of device identities, authentication and IoT security. Speakers include professionals from the Intrinsic ID team and our technology partners.
How to Secure IoT Devices with Root-of-Trust Authentication
Secure connectivity is becoming one of the most important challenges for IoT applications. This webinar will help you learn how innovative security measures—Intrinsic ID’s patented SRAM PUF technology coupled with Trusted Secure IP from Renesas—can help you quickly and easily create device and board-level authentication to safely secure a connected IoT system.
During this webinar, you’ll learn:
- Why creating a Root of Trust is critical for securing connected embedded systems
- Benefits of SRAM PUF-based secure key provisioning compared to traditional key generation methods
- How to establish foundational security at any stage of the product lifecycle
- How to address today’s anti-counterfeiting challenge
Strong Device Identities through SRAM PUF-based Certificates
IoT device manufacturers are under immense pressure to provide device personalization, strong protection of sensitive assets and in-field application services to help their products stand out from the crowd. All these features come at a high cost imposed by key delivery methods that don’t allow for the scalability of device-appropriate security.
Intrinsic ID’s key provisioning system, based on SRAM PUF, enables the creation of unique unspoofable device fingerprints rooted in hardware. GlobalSign certifies these fingerprints and adds highly scalable PKI capabilities, creating Strong Device Identities that can be trusted in IoT ecosystems.
Physical Security of IoT Design
SoC designers building IoT devices need security exceeding that found in continuously monitored consumer devices, and which makes their devices more “hacker proof.” Andes and Intrinsic ID are teaming up to provide just such a solution. The combination of Intrinsic ID technology with the Andes S801 CPU core enables designers to incorporate security for their IoT designs that is superior to that on mobile phones and PCs.