• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Electrical Engineering News and Products

Electronics Engineering Resources, Articles, Forums, Tear Down Videos and Technical Electronics How-To's

  • Products / Components
    • Analog ICs
    • Connectors
    • Microcontrollers
    • Power Electronics
    • Sensors
    • Test and Measurement
    • Wire / Cable
  • Applications
    • Automotive/Transportation
    • Industrial
    • IoT
    • Medical
    • Telecommunications
    • Wearables
    • Wireless
  • Resources
    • DesignFast
    • Digital Issues
    • Engineering Week
    • Oscilloscope Product Finder
    • Podcasts
    • Webinars / Digital Events
    • White Papers
    • Women in Engineering
  • Videos
    • Teschler’s Teardown Videos
    • EE Videos and Interviews
  • Learning Center
    • EE Classrooms
    • Design Guides
      • WiFi & the IOT Design Guide
      • Microcontrollers Design Guide
      • State of the Art Inductors Design Guide
    • FAQs
    • Ebooks / Tech Tips
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • 5G

Single-chip security IC securely stores device credentials, speeds cloud connections by 10x

August 21, 2019 By Aimee Kalnoskas Leave a Comment

single-chip security ICHardware-based trust anchors are key for connected applications and smart services, whether for a robotic arm in the smart factory or automated air conditioning in a private home. The new OPTIGA Trust M solution from Infineon Technologies AG helps manufacturers to enhance the security of their devices while at the same time improving overall system performance. The single-chip solution securely stores unique device credentials and enables devices to connect to the cloud up to ten times faster than software-only alternatives. It is ideal for industry and building automation, smart homes and consumer electronics.

As cloud connectivity and AI-based applications continue to grow, zero-touch provisioning of devices to the network or cloud is gaining more and more traction. When deploying OPTIGA Trust M, critical assets such as certificates and key pairs used to identify a device can be injected into the chip at Infineon’s secured factory premises. The turnkey set-up minimizes design, integration and deployment effort of embedded systems by providing a cryptographic toolbox, protected I2C interface and open source code on GitHub. Furthermore, the high-end security controller is certified according to CC EAL6+ (high) and provides advanced asymmetric cryptography. It has a lifetime of 20 years and can be securely updated in the field.

Infineon’s comprehensive OPTIGA family combines hardware security controllers with software in order to increase the overall security of embedded systems, including IoT end nodes, edge gateways and cloud servers. The easy-to-integrate solutions range from basic device authentication to Java card-based programmable components with extensive use case support and trusted platform modules.

The OPTIGA Trust M is available now. Evaluation kits are also provided to simplify integration of the security solutions.

DesignFast Banner version: 03eceadf

Filed Under: Microcontroller Tips Tagged With: infineontechnologies

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

EE Training Center Classrooms

EE Classrooms

Featured Resources

  • EE World Online Learning Center
  • CUI Devices – CUI Insights Blog
  • EE Classroom: Power Delivery
  • EE Classroom: Building Automation
  • EE Classroom: Aerospace & Defense
  • EE Classroom: Grid Infrastructure
Search Millions of Parts from Thousands of Suppliers.

Search Now!
design fast globle

R&D World Podcasts

R&D 100 Episode 7
See More >

Current Digital Issue

April 2022 Special Edition: Internet of Things Handbook

How to turn off a smart meter the hard way Potential cyber attacks have a lot of people worried thanks to the recent conflict in Ukraine. So it might be appropriate to review what happened when cybersecurity fi rm FireEye’s Mandiant team demonstrated how to infiltrate the network of a North American utility. During this…

Digital Edition Back Issues

Sponsored Content

Positioning in 5G NR – A look at the technology and related test aspects

Radar, NFC, UV Sensors, and Weather Kits are Some of the New RAKwireless Products for IoT

5G Connectors: Enabling the global 5G vision

Control EMI with I-PEX ZenShield™ Connectors

Speed-up time-to-tapeout with the Aprisa digital place-and-route system and Solido Characterization Suite

Siemens Analogue IC Design Simulation Flow

More Sponsored Content >>

RSS Current EDABoard.com discussions

  • Smallest header needed to support PCB vertically above main PCB
  • What base emitter resistors are inside Darlington
  • Simulation of resonator in HFSS
  • series connection of power audio amplifier
  • Sampling with MOS transistor and cap

RSS Current Electro-Tech-Online.com Discussions

  • software PWM
  • ASM - Enhanced 16F and long calls - how?
  • Ampro 16mm Stylist projector woes.
  • Will Header and socket hold this PCB OK?
  • Passthrough charging-simple but impossible to achieve?

Oscilloscopes Product Finder

Footer

EE World Online

EE WORLD ONLINE NETWORK

  • 5G Technology World
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Engineer's Garage
  • Microcontroller Tips
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • Wire & Cable Tips

EE WORLD ONLINE

  • Subscribe to our newsletter
  • Lee's teardown videos
  • Advertise with us
  • Contact us
  • About Us
Follow us on TwitterAdd us on FacebookConnect with us on LinkedIn Follow us on YouTube Add us on Instagram

Copyright © 2022 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy