www.design-reuse-china.com
搜索,选择,比较,与提供商进行安全高效的联系
You are here : design-reuse-china.com  > Security Solutions  > Security Platform

Securyzr integrated Security Services Platform (iSSP)

All Silicon IP

Overview

Secure-IC’s integrated Security Services Platform (iSSP) provides a complete end-to-end security solution to supply, deploy and manage a fleet of devices from the cloud.


Secure-IC provides a comprehensive set of solutions to ensure the security of embedded systems such as IoT devices security, automotive ECU security systems or industrial IoT security. The solution is responsible for guaranteeing the security level of the integrated circuit throughout its life and supporting our customer to “Supply, Deploy and Manage” its device fleet.


This solution called integrated Security Services Platform (iSSP) is composed of two parts:


  • SecuryzrTM iSE, which is Secure-IC’s Root of Trust. Embedded in the main SoC, it will offer multiple services to its host system: secure boot, key isolation, anti-tampering protection, etc. Thanks to its dual computation and strong isolation, SecuryzrTM iSE (integrated Secure Element) offers an additional layer of security compared to trusted execution environments. Implemented in your SoC, SecuryzrTM iSE provides security from the design stage and is the starting point of the security by design methodology.

  • SecuryzrTM Server, which is the server platform with its user interface. It is responsible for managing the different services offered by the solution for the platform and the business applications it hosts:

    • Key provisioning to securely provision the chip devices with secret key across the supply chain,

    • Firmware Update (FOTA/FUOTA) to securely provide chips with their software and then update them physically or over the air, to maintain their security level,

    • Devices Monitoring and cyber intelligence to provide a proactive security service, retrieving cyber security logs from the chips, analyzing them and sending instructions back to the chip fleet if necessary,

    • Devices Identity to guarantee trust from the chip to the cloud, to the devices, users and data through devices multi-factor authentication that allows resistance against impersonation, replay, and in the event of an initial compromise.


    The solution is completed by a software agent to provide connectivity from chip to cloud (and respectively).


    The security of the systems will be easily visualized through a Security Digital Twin.



业务合作

广告发布

访问我们的广告选项

添加产品

供应商免费录入产品信息

点击此处了解更多关于D&R的隐私政策

© 2023 Design And Reuse

版权所有

本网站的任何部分未经Design&Reuse许可,
不得复制,重发, 转载或以其他方式使用。