Security Icon

Security

CryptoManager Security Platform

From chip management to device personalization to downstream feature provisioning, the CryptoManager security platform creates a trusted path from the SoC manufacturing supply chain to downstream service providers with a complete silicon-to-cloud security solution.

Contact

Solution Overview

CryptoManager Components Product Brief Application
Security Engine
Connected Devices
Infrastructure
Connected Devices
Trusted Provisioning Services Connected device manufacturers, app developers and service providers

Complete Lifecycle Solutions icon

Complete Lifecycle Solutions

Robust silicon-to-cloud security

Secure provisioning and tracking of keys from manufacturing to in-field

Improved Profitability icon

Improve Profitability

Reduce NRE and operating costs

Improve time-to-market

Reduce inventory waste

Superior Security icon

Superior Security

Provide a robust hardware root-of-trust

Protect valuable secret keys, identity credentials, and other sensitive data

Protect against reverse engineering and counterfeiting

Streamline Operations icon

Streamline Operations

Automate provisioning of keys

Enable common platform across product lines

Integrate easily into existing manufacturing flow

CryptoManager Security Platform

The demand for trusted applications on mobile and IoT devices is on the rise. As the amount of valuable data housed and communicated across mobile and Internet of Things (IoT) devices continues to grow, the need for robust, complete lifecycle device security becomes increasingly important. However, establishing and maintaining trust across an increasingly fragmented ecosystem has proven to be a daunting task.

The CryptoManager security platform is complete silicon-to-cloud solution for the distribution and authentication of cryptographic keys throughout the lifecycle of a device – enabling dynamic SoC management and device personalization in the supply chain, and securing applications and services through in-field key provisioning.

The CryptoManager platform includes a Security Engine, which is a flexible root-of-trust implemented as hardware or software, for secure provisioning, configuration, keying and authentication throughout the lifecycle of a device. A local and cloud-based CryptoManager Infrastructure and Trusted Provisioning Services support the Security Engine, providing chipmakers, device OEMs, secure application developers and service providers a scalable and flexible trust management solution.

By providing a secure foundation for downstream device configuration, chipmakers have the flexibility needed for post-manufacturing inventory management and service providers have a trusted path to consumers for feature enablement and service delivery in applications including secure mobile banking, identity and entertainment, as well as IoT device security.

Mitigating DDoS attacks with secure IoT endpoints thumbnail

Mitigating DDoS Attacks with Secure IoT Endpoints

IoT life-cycle management should be implemented via a hardware root-of-trust to ensure secure updates of firmware and cryptographic keys. A hardware root-of-trust with a cryptographic identifier also allows each IoT device to be uniquely and cryptographically verified to determine if it is authorized to connect to a specific cloud service. Spoofed or unauthorized devices are easily identified by the service and denied access. This secure connectivity paradigm helps mitigate the effectiveness (and damage) of DDoS attacks against the IoT service itself, while ensuring the integrity and protection of collected data.

Download Whitepaper

Use Cases

Personalization

security-icon
Large OEM customers requesting personalization, customer specific data preparation and feature customization of standard parts challenge the chipmakers ability to minimize inventory overhead and improve operating efficiencies.

Secure Key Provisioning

security-icon
With mobile devices housing more and more sensitive data that is utilized in a wide variety of applications, chip and device companies must meet the complex security requirements for each potential use case or capability.

Debug Access Control

security-icon
The CryptoManager solution provides a method for chip and device companies to authenticate the device and authorize the provisioning of the debug enable/disable operation for each device.

Related Markets & Applications

IoT