Intel Spreadtrum ARM SoCs
In June of 2013 Edward Snowden copied and leaked classified information from the National Security Agency (NSA). His actions exposed numerous surveillance programs that many governments around the world reacted to, including China. In September of 2013 China Vice Premier Ma Kai declared semiconductors a key sector for the security of China. As a result Chinese mobile carriers replaced American made networking equipment (Cisco) and the Chinese givernment has pledged more than $100B to internal semiconductor development including SoCs. A modern SoC has billions of gates and it only takes a handful to create a back door, right?
To secure smartphones the Chinese government tapped Spreadtrum Communications CEO Leo Li to make special-order “safe” SoCs to foil foreign spies. At the end of 2013 the publicly held Spreadtrum was acquired by Tsinghua Unigroup (backed by the Chinese government) for $1.78B. As a result, Spreadtrum has grown rapidly and now has R&D facilities in Shanghai, Beijing Tianjin, Suzhou, Hangzhou, Chengdu, Xiamen, San Diego, San Jose, Finland, and India. Spreadtrum is privately held now so revenues are not reported but from what I understand they will come very close to $2B in 2016 making them one of the top ten fabless semiconductor companies.
To read the full article, click here
Related Semiconductor IP
- LPDDR6/5X/5 PHY V2 - Intel 18A-P
- ML-KEM Key Encapsulation & ML-DSA Digital Signature Engine
- MIPI SoundWire I3S Peripheral IP
- ML-DSA Digital Signature Engine
- P1619 / 802.1ae (MACSec) GCM/XTS/CBC-AES Core
Related Blogs
- Qualcomm LTE Modem Competitors? Samsung, Intel, Mediatek, Spreadtrum, Leadcore... or simply CEVA!
- System Verification of Arm Neoverse V2-Based SoCs
- Using Synopsys Smart Monitors to Improve System Performance of Your Arm SoCs
- Arm and Arteris Drive Innovation in Automotive SoCs
Latest Blogs
- Why What Where DIFI and the new version 1.3
- ML-DSA explained: Quantum-Safe digital Signatures for secure embedded Systems
- Efficiency Defines The Future Of Data Movement
- Why Standard-Cell Architecture Matters for Adaptable ASIC Designs
- ML-KEM explained: Quantum-safe Key Exchange for secure embedded Hardware