Trusted Objects TO-Protect are lightweight secure software libraries targeted for IoT devices, running on generic MCU (ARM Cortex, RISC V…) and enabling security functions, secure storage and secure connectivity.

Information about TO-Protect is available in our video

TO-Protect offers many benefits:
  • Easy to integrate on-device Root-of-Trust ,
  • Prevention against logical and physical security attacks on IoT devices exposed to threats, 
  • Fully integrated in several IoT chains to achieve a Chain of Trust,
  • Already qualified reference design ,
  • Compatible with existing hardware (no redesign / no impact on the BOM),
  • Easy security retrofit for devices already in the field with MCU FOTA (Firmware-Over-The-Air).
TO-Protect supports different security functions such as authentication, data transfer integrity and data transfer confidentiality, secure storage, Intellectual Property protection, secure boot and secure firmware update.
It provides a highly secure implementation of cryptographic libraries, security protocols, connectivity features and secure key storage. TO-Protect includes software security countermeasures, easy-to-integrate connectivity security, reduced code size and fast execution. 
TO-Protect is delivered with reference design and with integration examples in several IoT chains, such as: 
  • TO-Protect LoRaWAN providing augmented security to LoRaWAN end-node device, with a device-to-AWS cloud integration,
  • TO-Protect TLS/DTLS providing a highly secure implementation of the TLS/DTLS protocols, with a device-to-AWS cloud integration.