Integrated Security Services Platform (iSSP)

Overview

Secure-IC’s integrated Security Services Platform (iSSP) provides a complete end-to-end security solution to supply, deploy and manage a fleet of devices from the cloud.

Secure-IC provides a comprehensive set of solutions to ensure the security of embedded systems such as IoT devices security, automotive ECU security systems or industrial IoT security. The solution is responsible for guaranteeing the security level of the integrated circuit throughout its life and supporting our customer to “Supply, Deploy and Manage” its device fleet.

Key Features

  • Secure connectivity protocols which offers implementation of security protocols such as MACSec, IPSec
  • Software security which consists of software implementations of cryptographic algorithms. These implementations can be protected against several kinds of attacks.

Benefits

  • The complete solution offers a best of breed end-to-end security during the complete device lifecycle.

Block Diagram

Integrated Security Services Platform (iSSP) Block Diagram

Video

Securyzr Server to manage the security of heterogeneous fleets of IoT devices

This solution by Secure-IC runs on both public and private clouds and comes with a user-friendly web interface and software bridge for the devices to manage heterogeneous fleets of devices. The Securyzr Server manages the different services for the platform and the business applications it hosts: <ul> <li>Key provisioning to securely provision the chip devices with secret key across the supply chain,</li> <li>Firmware Update (FOTA/FUOTA) to securely provide chips with their software and then update them physically or over the air, to maintain their security level,</li> <li>Devices Monitoring and cyber intelligence to provide a proactive security service, retrieving cyber security logs from the chips, analyzing them and sending instructions back to the chip fleet if necessary,</li> <li>Devices Identity to guarantee trust from the chip to the cloud, to the devices, users and data through devices multi-factor authentication that allows resistance against impersonation, replay, and in the event of an initial compromise.</li> </ul> The security of the systems will be easily visualized through a Security Digital Twin.

Deliverables

  • Securyzr<sup>TM</sup> iSE, which is Secure-IC’s Root of Trust. Embedded in the main SoC, it will offer multiple services to its host system: secure boot, key isolation, anti-tampering protection, etc. Thanks to its dual computation and strong isolation, SecuryzrTM iSE (integrated Secure Element) offers an additional layer of security compared to trusted execution environments. Implemented in your SoC, Securyzr<sup>TM</sup> iSE provides security from the design stage and is the starting point of the security by design methodology.
  • Securyzr<sup>TM</sup> Server, which is the server platform with its user interface. It is responsible for managing the different services offered by the solution for the platform and the business applications it hosts:
  • Key provisioning to securely provision the chip devices with secret key across the supply chain,
  • Firmware Update (FOTA/FUOTA) to securely provide chips with their software and then update them physically or over the air, to maintain their security level,
  • Devices Monitoring and cyber intelligence to provide a proactive security service, retrieving cyber security logs from the chips, analyzing them and sending instructions back to the chip fleet if necessary,
  • Devices Identity to guarantee trust from the chip to the cloud, to the devices, users and data through devices multi-factor authentication that allows resistance against impersonation, replay, and in the event of an initial compromise.
  • The solution is completed by a software agent to provide connectivity from chip to cloud (and respectively).
  • The security of the systems will be easily visualized through a Security Digital Twin.

Technical Specifications

×
Semiconductor IP