Vendor: Secure-IC Category: Root Of Trust

Integrated Security Services Platform (iSSP)

Secure-IC offers the first worldwide PQC ready Security Lifecycle Management solution.

Overview

Secure-IC offers the first worldwide PQC ready Security Lifecycle Management solution.
The Securyzr™ iSSP (integrated Security Services Platform) enables Secure-IC customers and partners to supply, deploy and manage the embedded security of their devices’ fleet all along their lifecycle. The Securyzr™ iSSP is an easy & trustful end-to-end solution for zero-touch security lifecycle services such as provisioning, firmware update, security monitoring & device identity management.

The preferred version of the platform combines 3 key elements :

  • Securyzr™r iSE (integrated Secure Element) as the Root-of-Trust to protect the overall system from chip level with the higher security coverage.
  • Securyzr™Host SW Framework as a package of robust APIs (Application Programming Interfaces) & connectivity layers to ensure protected communication between the iSE, the host chip & the server.
  • Securyzr™Server as a package of remote security services & protected communication channels.

The solution is completed by a software agent to provide connectivity from Chip-to-Cloud (and vice-versa).

The security of the systems will be easily visualized through a Security Digital Twin.

In addition to these three solutions, Secure-IC provides secure connectivity solutions which are composed of two parts:

  • Secure connectivity protocols which offer implementation of security protocols such as MACSec, IPSec
  • Software security which consists of software implementations of cryptographic algorithms. These implementations can be protected against several kinds of attacks.

Block Diagram

Video

Securyzr Server to manage the security of heterogeneous fleets of IoT devices
This solution by Secure-IC runs on both public and private clouds and comes with a user-friendly web interface and software bridge for the devices to manage heterogeneous fleets of devices. The Securyzr Server manages the different services for the platform and the business applications it hosts: <ul> <li>Key provisioning to securely provision the chip devices with secret key across the supply chain,</li> <li>Firmware Update (FOTA/FUOTA) to securely provide chips with their software and then update them physically or over the air, to maintain their security level,</li> <li>Devices Monitoring and cyber intelligence to provide a proactive security service, retrieving cyber security logs from the chips, analyzing them and sending instructions back to the chip fleet if necessary,</li> <li>Devices Identity to guarantee trust from the chip to the cloud, to the devices, users and data through devices multi-factor authentication that allows resistance against impersonation, replay, and in the event of an initial compromise.</li> </ul> The security of the systems will be easily visualized through a Security Digital Twin.

Files

Note: some files may require an NDA depending on provider policy.

Specifications

Identity

Part Number
Securyzr_iSSP
Vendor
Secure-IC
Type
Silicon IP

Provider

Secure-IC
HQ: France
With presence and customers across 5 continents, Secure-IC is the rising leader and the only global provider of end-to-end cybersecurity solutions for embedded systems and connected objects. Driven by a unique approach called PESC (Protect, Evaluate, Service & Certify), Secure-IC positions itself as a partner to support its clients throughout and beyond the IC design process. Relying on innovation and research activities, Secure-IC provides Silicon-proven and cutting-edge protection technologies, integrated Secure Elements and security evaluation platforms to reach compliance with the highest level of certification for different markets (such as automotive, AIoT, defense, payments & transactions, memory & storage, server & cloud). Discover in preview of Secure-IC new Securyzr Server to manage the security of heterogeneous fleets of IoT devices throughout their lifecycle

Learn more about Root Of Trust IP core

Root of Trust: A Security Essential for Cyber Defense

Imagine a datacenter powering critical cloud services, silently compromised by a tampered chip inserted during manufacturing. In most cases, the malware would be practically impossible to remove and could persist across formats/reinstalls !

Why Hardware Root of Trust Needs Anti-Tampering Design

The hardware root of trust (HRoT) provides the trust base (root key), hardware identifier (UID), hardware unique key (HUK), and entropy required for the secure operation of the entire chip and therefore is often the focus of hacker attacks. If the design can’t effectively resist attacks, hackers can easily obtain the secrets of the entire chip. Attackers can use the secrets to crack identity authentication and data encryption and steal product design know-how, causing application security problems.

Frequently asked questions about Root of Trust IP cores

What is Integrated Security Services Platform (iSSP)?

Integrated Security Services Platform (iSSP) is a Root Of Trust IP core from Secure-IC listed on Semi IP Hub.

How should engineers evaluate this Root Of Trust?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Root Of Trust IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP