There are three main security challenges in IoT

You need to trust your devices

  • Ensure only legitimate devices can connect to services
  • Prevent hackers, counterfeits, ODM overproduction and IP theft

You need to protect the data

  • Protect data both in transit between servers and devices at rest
  • Enable commercial grade security on low end IoT devices

You need to protect your code

  • Develop applications using simple but secure APIs
  • Protect code IP against theft and devices against OSS vulnerabilities

"Frost & Sullivan’s analysis indicates that competing TEE products are limited in functionality and support a smaller number of application use cases. As the only company to offer open, scalable access to hardware device features for multiple value chain participants, Trustonic possesses a unique business model in connected devices security markets."

Vikrant Gandhi, Industry Director with Frost & Sullivan.

To download the Frost and Sullivan analyst report click here.

Solution for Application Class Processors

Trustonic’s Kinibi® Solution addresses the needs of devices running on application class processors. These devices include routers, in-car entertainment solutions, industrial robots etc.

  • Full TEE-OS for A Class Processors
  • Global Platform APIs
  • Flexible cryptography
  • Secure code separation…
  • Deployed on over 1.5 billion devices

Solution for Micro-controllers

Trustonic’s Kinibi-M™ Solution addresses the needs of devices running on micro-controllers. These devices include sensors, wearables and other single-use devices.

  • Micro-TEE for M Class Processors
  • Global Platform inspired APIs
  • Flexible cryptography
  • Secure code separation…
  • Newly released

Trustonic’s solution for constrained micro-controller devices is made up of a number of components.

  • Kinibi-M – a new, modular, hardware-secured operating environment specially designed for size-constrained IoT chipsets. The platform is adapted from Trustonic’s existing technology that is already embedded into more than 1.2 billion connected devices, such as smartphones and wearables.
  • Key provisioning – enabling a ‘Root of Trust’ (RoT) to attest that devices were securely manufactured, determine the device type and identity, ensure applications and secrets can be securely delivered and identify rogue or counterfeit devices.
  • Digital Holograms™ – a new technology for device attestation that leverages blockchain technology. It allows anyone in the device manufacturing chain to attest securely and irreversibly to a stage of manufacture. The holograms are cryptographically superior to digital certificates as they cannot be copied and used across multiple devices (for more info download the Digital Hologram datasheet here).
  • Tools & SDK – enabling developers to create secure IoT devices and applications easily.