Live and on-demand webinars drill down on topics within the realm of device identities, authentication and IoT security. Speakers include professionals from the Intrinsic ID team and our technology partners.
Security for Cellular IoT: SIM Will Not Protect You!
Billions of devices are connected to the Internet of Things, through connectivity standards which differ in range and spectrum (e.g., 2G/3G/4G/5G, NB-IoT, CAT-M, LoRa, SigFox, etc). One thing they all have in common: merely upholding a standard does not ensure security. Even when using widely accepted methods, such as the SIM card in cellular IoT, there is no guarantee of true end-to-end security. This leaves data vulnerable to eavesdropping and alteration at different points from edge to cloud, exposing valuable assets in market segments using these cellular connections, like Industrial IoT, critical infrastructures, automotive and wearables.
In this webinar, chip vendors, connectivity module makers and IoT device manufacturers will see how to set their products apart by leveraging Intrinsic ID’s fit-for-purpose IoT security in their product portfolio.
Utilizing Hardware-Protected Keys on Broad Market Microcontrollers
For the IoT Edge device, the cryptographic keys used to perform the services such as encrypted boot, onboarding, and over the air updates are critical components that must be protected. Chip level hardware protected keys are the standard for achieving strong security protection for embedded designs.
This session will define what a hardware protected key is and show several examples of how these keys are realized on NXP processors. The i.MX RT 1050 family of devices will be used as a real world example of how Intrinsic ID Broadkey® SRAM based PUF can advance your IoT Security.
Presented with our partner NXP Semiconductors
IoT Devices Can Kill and What Chip Makers Need to Do Now
IoT devices are at growing risk – smart home appliances, vehicles and medical devices are hacked every day. Connected products are vulnerable to physical probing, network interception, reverse engineering and other attack vectors. As hackers become more clever, security solutions must be a few steps ahead. Robust remediation starts with unclonable identities for the MCU and connectivity chip at the core of an IoT product. Traditional security implementations are burdened with additional components, increased complexity, greater costs and longer time to market. By contrast, Intrinsic ID’s SRAM PUF solutions deliver a hardware root of trust with stronger security at a more attractive ROI. During our webinar we will cover:
- Why a Root of Trust is critical for securing connected devices
- How Intrinsic ID’s patented SRAM PUF powers vital use cases such as key management and device authentication
- How SRAM PUF protects against cloning, counterfeiting and IP theft
How to Easily Implement Security in Your IoT Product
For companies developing products connected to the Internet of Things, ensuring security can be a challenge. Because IoT device manufacturers often lack sufficient security expertise, they look to their chip providers to handle security. But generating, provisioning and securely storing keys on chips while shielding them from other, possibly malicious, processes on an IoT device is not a trivial task for chip manufacturers.
Intrinsic ID and Silex Insight have joined forces to deliver a solution that enables any IoT chip manufacturer – even those for which security is not a core competency – to include hardware-based key storage, key provisioning and cryptographic operations on any microprocessor or other semiconductor device that drives an IoT-connected product.
How to Secure IoT Devices with Root-of-Trust Authentication
Secure connectivity is becoming one of the most important challenges for IoT applications. This webinar will help you learn how innovative security measures—Intrinsic ID’s patented SRAM PUF technology coupled with Trusted Secure IP from Renesas—can help you quickly and easily create device and board-level authentication to safely secure a connected IoT system.
During this webinar, you’ll learn:
- Why creating a Root of Trust is critical for securing connected embedded systems
- Benefits of SRAM PUF-based secure key provisioning compared to traditional key generation methods
- How to establish foundational security at any stage of the product lifecycle
- How to address today’s anti-counterfeiting challenge
Strong Device Identities through SRAM PUF-based Certificates
IoT device manufacturers are under immense pressure to provide device personalization, strong protection of sensitive assets and in-field application services to help their products stand out from the crowd. All these features come at a high cost imposed by key delivery methods that don’t allow for the scalability of device-appropriate security.
Intrinsic ID’s key provisioning system, based on SRAM PUF, enables the creation of unique unspoofable device fingerprints rooted in hardware. GlobalSign certifies these fingerprints and adds highly scalable PKI capabilities, creating Strong Device Identities that can be trusted in IoT ecosystems.
Physical Security of IoT Design
SoC designers building IoT devices need security exceeding that found in continuously monitored consumer devices, and which makes their devices more “hacker proof.” Andes and Intrinsic ID are teaming up to provide just such a solution. The combination of Intrinsic ID technology with the Andes S801 CPU core enables designers to incorporate security for their IoT designs that is superior to that on mobile phones and PCs.