Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Trusted Objects Announces a New Release of Its Software Secure Element to Protect IoT Devices

Trusted Objects, an expert in cybersecurity technologies for embedded systems, is proud to announce the delivery of a new version of to-protect, its industry-unique software secure element.

As IoT deployments are accelerating, we are reaching a turning point where security is becoming a priority for developers and users. There are growing expectations to protect IoT devices against security attacks, and to have a Root of Trust (RoT) as the cornerstone of IoT devices security services.

to-protect is an easy to implement software solution that increases the security robustness of IoT devices based on generic microcontrollers (MCU). It facilitates the setting of a chain of trust into the IoT ecosystem and can be used as a RoT to enable security services all along the device life cycle.

Recommended AI News: Crypto Ventures Should Prioritize Security: HashCash CEO, Raj Chowdhury

The new release 2.0 allows both new and existing applications to benefit from further security countermeasure capabilities against the most advanced logical and physical attacks, including side channel attacks and fault injection. A Security Evaluation Standard for IoT Platforms (SESIP) Level 3 certification is underway.

With to-protect, the secure element functionalities are available in software:

  • Enable critical security functions: secure authentication, data transfer integrity and confidentiality, secure boot, onboard key generation, secure storage and more.
  • Include secure implementation of various communication protocols.

to-protect also brings major benefits for IoT device developers:

Related Posts
1 of 40,848
  • Designed for MCU with limited computing and communication capabilities.
  • Easy download into any generic MCU (ARM Cortex, RISC V,…) without having to change the IoT hardware platform design.
  • Quick security integration into devices already in the field (retrofit).

Recommended AI News: VantageScore Appoints Dr. Rikard Bandebo as Executive Vice President and Chief Product Officer

to-protect has already been ported on various platforms, such as STMicroelectronics’ STM32 and Espressif’ ESP32 series, demonstrating the ease of integration and the solution advantages in terms of security.

to-protect is provided in two parts: libTO library and to-protect secure core.

  • libTO library is a source code providing all to-protect APIs , now accessible for evaluation and integration
  • to-protect secure core is a binary file to be flashed at the selected memory location, providing all to-protect features. to-protect secure core is available as an evaluation version downloadable free of charge from our web site and as a production version under a licensing model.

Vincent Dupaquis, Chief Security Architect at Trusted Objects declares: “With this new release of to-protect, the IoT ecosystem is taking a major step toward more embedded security and a wider range of security services at the device level. It is a smart technology to simply and rapidly integrate security into new and existing IoT applications.”

Recommended AI News: Vitria VIA AIOps 3.0 Reaffirms Commitment to Continued Improvement in Customer Assurance

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.