There are three main security challenges in IoT

You need to trust your devices

  • Ensure only legitimate devices can connect to services
  • Prevent hackers, counterfeits, ODM overproduction and IP theft

You need to protect the data

  • Protect data both in transit between servers and in devices at rest
  • Enable commercial grade security on low end IoT devices

You need to protect your code

  • Develop applications using simple but secure APIs
  • Protect code IP against theft and devices against OSS vulnerabilities

"Frost & Sullivan’s analysis indicates that competing TEE products are limited in functionality and support a smaller number of application use cases. As the only company to offer open, scalable access to hardware device features for multiple value chain participants, Trustonic possesses a unique business model in connected devices security markets."

Vikrant Gandhi, Industry Director with Frost & Sullivan.

To download the Frost and Sullivan analyst report click here.

Solution for Application Class Processors

Trustonic’s Kinibi® Solution addresses the needs of devices running on application class processors. These devices include routers, in-car entertainment solutions, industrial robots etc.

  • Full TEE-OS for Application Class Processors
  • Global Platform APIs
  • Flexible cryptography
  • Secure code separation…
  • Deployed on over 1.5 billion devices

Solution for Microcontrollers

Trustonic’s Kinibi-M™ Solution addresses the needs of devices running on microcontrollers. These devices include sensors, wearables and other single-use devices.

  • Micro-TEE for microcontroller class processors
  • Global Platform inspired APIs
  • Flexible cryptography optimised for microcontrollers
  • Modules to ensure device provenance
  • Supply chain protection
  • Software isolation and IP protection
  • Available on Microchip SAM L11 microcontrollers

Trustonic’s solution for constrained microcontroller devices is made up of a number of components.

  • Kinibi-M – a new, modular, hardware-secured operating environment specially designed for size-constrained IoT chipsets. The platform is adapted from Trustonic’s existing technology that is already embedded into more than 1.5 billion connected devices, such as smartphones and wearables.
  • Key provisioning – enabling a ‘Root of Trust’ (RoT) to attest that devices were securely manufactured, determine the device type and identity, ensure applications and secrets can be securely delivered and identify rogue or counterfeit devices.
  • Digital Holograms™ – a technology for device attestation that leverages blockchain technology. It allows anyone in the device manufacturing chain to attest securely and irreversibly to a stage of manufacture. The holograms are cryptographically superior to digital certificates as they cannot be copied and used across multiple devices (for more info download the Digital Hologram datasheet here). They are stored on-device using blockchain technology to prevent tampering.
  • Tools & SDK – enabling developers to create secure IoT devices and applications easily. Trustonic delivers simple-to-use GlobalPlatorm standards-based APIs, so module developers don’t need to be security experts.