Future-proof secure hardware root of trust technology
tRoot is a highly-secure foundation of trust that enables connected devices to securely and uniquely identify and authenticate themselves to create secure channels for remote device management and service deployment for further revenue opportunities.
The IoT aims to connect millions of everyday devices or ‘things’ to the internet. These devices will identify, communicate and automate amongst themselves with respect to other devices and the cloud. However, with these opportunities come enormous threats. Devices and machines with sensors, actuators and other data sources transfer information into aggregation points and gateways that can funnel through limitless paths with varied levels of complexity. Addressing security concerns in this challenging environment with a robust and flexible solution is essential for widespread IoT service deployments.
tRoot has a unique architecture with the ability to effectively adjust to future security requirements and standards, and enable personalization of features, services and environments to create business growth and monetization in the exploding IoT market. For example, device manufacturers or operators can enable tRoot’s additional security features without additional cost, making it easier to confront complex and ever-changing IoT threats — ranging from theft and tampering to physical threats like side-channel attacks and malware. With a robust and scalable hardware root of trust that includes secure key provisioning and management; firmware integrity assurance; secure updates, renewability, in-the-field provisioning, tRoot can enable cloud-based services that extends into multiple markets.