Enable IoT devices to securely identify and enroll themselves in the field
Companies, factories, utilities and cities deploying IoT systems need to know that data from sensors and devices is trusted and coming from an actual authentic device, not from a cyber-attack or from a hacker.
Consumers buying IoT devices want certainty that the device they have bought is the genuine article – not a fake built from stolen plans or a cheap clone that doesn’t meet functional or safety standards. Equally, manufacturers of those devices who are supporting large back-end systems need to know that only genuine devices can connect to their platforms. This is to ensure both that the data they exchange can be trusted and that their customers don’t associate their brand with a sub-optimal experience.
To achieve all of this, it is essential to be able to trust the device. Trustonic’s IoT security platform injects individual device identities and keys into hardware at silicon manufacture. The associated keys are only accessible in the most secure part of the device – the Kinibi-M Trusted Execution Environment (TEE).
The secure device identity is known as a Root of Trust (think of it as a digital birthmark) providing a unique and provable device identity. The TEE ensures protected keys and data cannot be accessed by either malware or other software-based attacks. It also enables a Trustonic-secured device to securely identify itself as authentic to a cloud service.
Trustonic secured IoT device auto-enrollment for Google Cloud Platform and Amazon Web Services