Our products are based on Trusted Objects Secure Software Platform designed to meet market requirements for constrained applications like IoT: strong security, low power consumption, easy connectivity, seamless integration and more.
Trusted Objects to-protect are lightweight secure software libraries targeted for IoT devices, running on generic MCU (ARM Cortex, RISC V…) and enabling security functions, secure storage and secure connectivity.
Information about to-protect is available in our video.
to-protect offers many benefits:
-
Easy to integrate on-device Root-of-Trust ,
-
Prevention against logical and physical security attacks on IoT devices exposed to threats,
-
Fully integrated in several IoT chains to achieve a Chain of Trust,
-
Reference design already qualified,
-
Compatible with existing hardware (no redesign / no impact on the BOM),
-
Easy security retrofit for devices already in the field with MCU FUOTA (Firmware-Update-Over-The-Air).
to-protect supports different security functions such as authentication, data transfer integrity and data transfer confidentiality, secure storage, Intellectual Property protection, secure boot and secure firmware update.
It provides a highly secure implementation of cryptographic libraries, security protocols, connectivity features and secure key storage. to-protect includes software security countermeasures, easy-to-integrate connectivity security, reduced code size and fast execution.
to-protect is delivered with reference design and with integration examples in several IoT chains, such as:
-
to-protect LoRaWAN providing augmented security to LoRaWAN end-node device, with a device-to-AWS cloud integration,
-
to-protect TLS/DTLS providing a highly secure implementation of the TLS/DTLS protocols, with a device-to-AWS cloud integration.
All our secure products have a common API, so developers can easily switch from one implementation to another.