Security Icon

Security

CryptoManager Security Platform

From chip management to device personalization, the CryptoManager security platform creates a trusted path for the SoC manufacturing supply chain.

Contact

Solution Overview

CryptoManager Components Product Brief Application
Security Engine
Connected Devices
Infrastructure
Connected Devices

Improved Profitability icon

Improve Profitability

Reduce NRE and operating costs

Improve time-to-market

Reduce inventory waste

Superior Security icon

Superior Security

Provide a robust hardware root-of-trust

Protect valuable secret keys, identity credentials, and other sensitive data

Protect against reverse engineering and counterfeiting

Streamline Operations icon

Streamline Operations

Automate provisioning of keys

Enable common platform across product lines

Integrate easily into existing manufacturing flow

CryptoManager Security Platform

The demand for trusted applications on mobile and IoT devices is on the rise. As the amount of valuable data housed and communicated across mobile and Internet of Things (IoT) devices continues to grow, the need for a robust hardware based security solution becomes increasingly important. However, establishing and maintaining trust across an increasingly fragmented ecosystem has proven to be a daunting task.

The CryptoManager platform includes a Security Engine, which is a flexible root-of-trust implemented as hardware or software, for secure provisioning, configuration, keying and authentication throughout the lifecycle of a device. Additionally, CryptoManager Infrastructure supports the Security Engine, providing chipmakers and device OEMs, a scalable and flexible trust management solution.

By providing a secure foundation for device configuration and personalization, chipmakers have the flexibility needed for post-manufacturing inventory management and streamlining operations to improve overall profitability.

Mitigating DDoS attacks with secure IoT endpoints thumbnail

Mitigating DDoS Attacks with Secure IoT Endpoints

IoT life-cycle management should be implemented via a hardware root-of-trust to ensure secure updates of firmware and cryptographic keys. A hardware root-of-trust with a cryptographic identifier also allows each IoT device to be uniquely and cryptographically verified to determine if it is authorized to connect to a specific cloud service. Spoofed or unauthorized devices are easily identified by the service and denied access. This secure connectivity paradigm helps mitigate the effectiveness (and damage) of DDoS attacks against the IoT service itself, while ensuring the integrity and protection of collected data.

Download Whitepaper

Use Cases

Personalization

security-icon
Large OEM customers requesting personalization, customer specific data preparation and feature customization of standard parts challenge the chipmakers ability to minimize inventory overhead and improve operating efficiencies.

Secure Key Provisioning

security-icon
With mobile devices housing more and more sensitive data that is utilized in a wide variety of applications, chip and device companies must meet the complex security requirements for each potential use case or capability.

Debug Access Control

security-icon
The CryptoManager solution provides a method for chip and device companies to authenticate the device and authorize the provisioning of the debug enable/disable operation for each device.

Related Markets & Applications

Automotive
Mobile Edge
Data Center
IoT