Secure-IC offers the first worldwide PQC ready Security Lifecycle Management solution.
The Securyzr™ iSSP (integrated Security Services Platform) enables Secure-IC customers and partners to supply, deploy and manage the embedded security of their devices’ fleet all along their lifecycle. The Securyzr™ iSSP is an easy & trustful end-to-end solution for zero-touch security lifecycle services such as provisioning, firmware update, security monitoring & device identity management.
The preferred version of the platform combines 3 key elements :
Securyzr™r iSE (integrated Secure Element) as the Root-of-Trust to protect the overall system from chip level with the higher security coverage.
Securyzr™Host SW Framework as a package of robust APIs (Application Programming Interfaces) & connectivity layers to ensure protected communication between the iSE, the host chip & the server.
Securyzr™Server as a package of remote security services & protected communication channels.
Key Features
Secure connectivity protocols which offers implementation of security protocols such as MACSec, IPSec
Software security which consists of software implementations of cryptographic algorithms. These implementations can be protected against several kinds of attacks.
Benefits
The complete solution offers a best of breed end-to-end security during the complete device lifecycle.
Block Diagram
Video
Securyzr Server to manage the security of heterogeneous fleets of IoT devices
This solution by Secure-IC runs on both public and private clouds and comes with a user-friendly web interface and software bridge for the devices to manage heterogeneous fleets of devices.
The Securyzr Server manages the different services for the platform and the business applications it hosts:
<ul>
<li>Key provisioning to securely provision the chip devices with secret key across the supply chain,</li>
<li>Firmware Update (FOTA/FUOTA) to securely provide chips with their software and then update them physically or over the air, to maintain their security level,</li>
<li>Devices Monitoring and cyber intelligence to provide a proactive security service, retrieving cyber security logs from the chips, analyzing them and sending instructions back to the chip fleet if necessary,</li>
<li>Devices Identity to guarantee trust from the chip to the cloud, to the devices, users and data through devices multi-factor authentication that allows resistance against impersonation, replay, and in the event of an initial compromise.</li>
</ul>
The security of the systems will be easily visualized through a Security Digital Twin.