MIPI C-PHY v1.2 D-PHY v2.1 TX 3 trios/4 Lanes in TSMC (16nm, N7, N5A)
Securyzr integrated Security Services Platform (iSSP). Complete end-to-end security solution to supply, deploy and manage a fleet of devices from the cloud.
Secure-IC provides a comprehensive set of solutions to ensure the security of embedded systems such as IoT devices security, automotive ECU security systems or industrial IoT security. The solution is responsible for guaranteeing the security level of the integrated circuit throughout its life and supporting our customer to “Supply, Deploy and Manage” its device fleet.
查看 Securyzr integrated Security Services Platform (iSSP). Complete end-to-end security solution to supply, deploy and manage a fleet of devices from the cloud. 详细介绍:
- 查看 Securyzr integrated Security Services Platform (iSSP). Complete end-to-end security solution to supply, deploy and manage a fleet of devices from the cloud. 完整数据手册
- 联系 Securyzr integrated Security Services Platform (iSSP). Complete end-to-end security solution to supply, deploy and manage a fleet of devices from the cloud. 供应商
Block Diagram of the Securyzr integrated Security Services Platform (iSSP). Complete end-to-end security solution to supply, deploy and manage a fleet of devices from the cloud.
Video Demo of the Securyzr integrated Security Services Platform (iSSP). Complete end-to-end security solution to supply, deploy and manage a fleet of devices from the cloud.
This solution by Secure-IC runs on both public and private clouds and comes with a user-friendly web interface and software bridge for the devices to manage heterogeneous fleets of devices.
The Securyzr Server manages the different services for the platform and the business applications it hosts:
- Key provisioning to securely provision the chip devices with secret key across the supply chain,
- Firmware Update (FOTA/FUOTA) to securely provide chips with their software and then update them physically or over the air, to maintain their security level,
- Devices Monitoring and cyber intelligence to provide a proactive security service, retrieving cyber security logs from the chips, analyzing them and sending instructions back to the chip fleet if necessary,
- Devices Identity to guarantee trust from the chip to the cloud, to the devices, users and data through devices multi-factor authentication that allows resistance against impersonation, replay, and in the event of an initial compromise.
The security of the systems will be easily visualized through a Security Digital Twin.
security IP
- RT-630 Hardware Root of Trust Security Processor for Cloud/AI/ML SoC FIPS-140
- RT-660 DPA & Fault Injection Resistant Hardware Root of Trust Security Processor for Govt/Aero/Defense FIPS-140
- RT-660-FPGA DPA-Resistant Hardware Root-of-Trust Security Processor for Govt/Aero/Defense FIPS-140
- RT-630-FPGA Hardware Root of Trust Security Processor for Cloud/AI/ML SoC FIPS-140
- RT-640 Embedded Hardware Security Module (HSM) for Automotive ASIL-B
- RT-645 Embedded Hardware Security Module (HSM) for Automotive ASIL-D