Device Secure Debug
Giving a full access to the internal system components of the device, the TAP interface can be a backdoor for hackers.
Secure-IC offers a set of tools to secure the access to the device. Thanks to an Hardware Authentication process, only authorized user can access the debug interface of the system and interact with its elements. This solution can be deployed in the Securyzr iSE or as a standalone IP.
Secure Debug can be used for the following activities in an iSE:
- First Programming
- Debug purpose
- Key injection/generation
- On-site Firmware injection/update
- Get life-cycle information from the HSM
- Provide a Hardware Authentication scheme
- Allow only one HOST to be logged at the same time
- Open the HSM debug port only if life cycle mode values allows it
- Receive Maintenance requests (first programming, update, lifecycle ...) from an external user
查看 Device Secure Debug 详细介绍:
- 查看 Device Secure Debug 完整数据手册
- 联系 Device Secure Debug 供应商
security ip IP
- RT-630 Hardware Root of Trust Security Processor for Cloud/AI/ML SoC FIPS-140
- RT-660 DPA & Fault Injection Resistant Hardware Root of Trust Security Processor for Govt/Aero/Defense FIPS-140
- RT-660-FPGA DPA-Resistant Hardware Root-of-Trust Security Processor for Govt/Aero/Defense FIPS-140
- RT-630-FPGA Hardware Root of Trust Security Processor for Cloud/AI/ML SoC FIPS-140
- RT-640 Embedded Hardware Security Module (HSM) for Automotive ASIL-B
- RT-645 Embedded Hardware Security Module (HSM) for Automotive ASIL-D