Security Icon

Security

CryptoManager Device Security

CryptoManager Device Security creates a trusted path from SOC hardware root of trust, to silicon and device provisioning, to downstream cloud-based services, with a complete silicon-to-cloud security solution.
CryptoManager ComponentsProduct BriefApplications
Root of TrustDownload Root of Trust Product BriefConnected Devices
ProvisioningDownload CryptoManager Provisioning Product BriefConnected Devices
Device Key ManagementDownload CryptoManager Device Key Management Product BriefConnected Devices
improved profitability icon

Improve Profitability

Reduce NRE and operating costs

Improve time-to-market

Reduce inventory waste

superior security icon

Superior Security

Provide a robust hardware root-of-trust

Protect valuable secret keys, identity credentials, and other sensitive data

Protect against reverse engineering and counterfeiting

Streamline Operations

Automate provisioning of keys

Enable common platform across product lines

Integrate easily into existing manufacturing flow

CryptoManager Device Security

CryptoManager Device Security is a complete silicon-to-cloud solution, composed of security cores, provisioning infrastructure and cloud-based device key management.

  • The CryptoManager Root of Trust provides strong SoC security anchored in hardware through a family of purpose-built secure co-processor cores.
  • CryptoManager Provisioning performs the distribution of cryptographic keys to SoCs and devices across the manufacturing supply chain.
  • CryptoManager Device Key Management is a cloud-based software platform enabling the deployment of key management services by chipmakers and system OEMs leveraging hardware-provisioned keys and certificates.
CryptoManager Device Security Ecosystem

The elements of CryptoManager Device Security can be deployed separately or as comprehensive end-to-end security solution protecting chips and devices through the entire device lifecycle.

The CryptoManager Root of Trust

The CryptoManager Root of Trust

Built around a custom RISC-V CPU, the Rambus CryptoManager Root of Trust (CMRT) is at the forefront of a new category of programmable hardware-based security cores. Siloed from the primary processor, it is designed to securely run sensitive code, processes and algorithms. More specifically, the CMRT provides the primary processor with a full suite of security services, such as secure boot and runtime integrity, remote attestation and broad crypto acceleration for symmetric and asymmetric algorithms.
Download White Paper

Use Cases

Security Icon

Personalization

Large OEM customers requesting personalization, customer specific data preparation and feature customization of standard parts challenge the chipmakers ability to minimize inventory overhead and improve operating efficiencies.

Security Icon

Secure Key Provisioning

With mobile devices housing more and more sensitive data that is utilized in a wide variety of applications, chip and device companies must meet the complex security requirements for each potential use case or capability.
Security Icon

Debug Access Control

The CryptoManager solution provides a method for chip and device companies to authenticate the device and authorize the provisioning of the debug enable/disable operation for each device.

Related Markets & Applications

FREE Webinar: Understanding Fault Injection Attacks and Their Mitigation