industry news
Subscribe Now

Elliptic Technologies Unveils Future-Proof Secure Hardware Root of Trust Technology for IoT Applications

November 19, 2014 – Ottawa, Canada: Elliptic Technologies, a leading provider of embedded security solutions for the connected world, today unveiled tRoot™, its future-proof secure hardware root of trust technology targeting the increasing security challenges in the Internet of Things (IoT). Elliptic’s tRoot is a highly-secure foundation of trust that enables connected devices to securely and uniquely identify and authenticate themselves to create secure channels for remote device management and service deployment for further revenue opportunities.

The significance of the IoT is immeasurable as millions of everyday devices or ‘things’ connect to the internet and identify, communicate and automate themselves to other devices and the cloud. The IoT promises to change the way we conduct our lives creating boundless opportunities, but with these opportunities come enormous threats.  Devices and machines with sensors, actuators and other data sources transfer information into aggregation points and gateways that can funnel through limitless paths with varied levels of complexity. Addressing security concerns in this challenging environment with a robust and flexible solution is essential for widespread IoT service deployments.

Elliptic’s tRoot has a unique architecture with the ability to effectively adjust to future security requirements and standards, and enable personalization of features, services and environments to create business growth and monetization in the exploding IoT market. For example, device manufacturers or operators can enable tRoot’s additional security features without additional cost, making it easier to confront complex and ever-changing IoT threats – ranging from theft and tampering to physical threats like side-channel attacks and malware. With a robust and scalable hardware root of trust that includessecure key provisioning and management; firmware integrity assurance; secure updates, renewability, in-the-field provisioning, tRoot can enable cloud-based services that extends into multiple markets.

“The Internet of Things amplifies the number of connected sensors, modules and network nodes, and subsequently the number of points of vulnerability.  This vulnerability represents a major challenge that device manufacturers, network operators, and the entire wireless industry must address,” said John Byrne, Directing Analyst, M2M & IoT, for Infonetics Research.  “Elliptic is taking a sound approach, locking down security at the hardware level to ensure connected devices are protected from hackers, malware, and any other potential vulnerability.”

“IHS predicts that the number of connected devices in the IoT will reach 52.9 billion by 2020 with a strong focus on the industrial and consumer markets,” said Bill Morelli, IHS Director, Internet of Things and M2M.  ”As the number of IoT devices continues to increase, the need for strong device identification and authentication as part of an overall security solution is a pivotal component to the successful growth of the IoT.”

“Our tRoot is a deeply embedded hardware security solution that ensures the integrity and trust of data through unique identification, yet its distinctive design is not limited to a finite feature set,” said Vijay Dube, CEO of Elliptic Technologies. “We wanted to provide our customers with a highly flexible and power efficient technology that keeps risks and costs low, and builds incremental revenue for different market segments while adjusting to the growing threats and security standards of the future.”

Elliptic’s tRoot field-proven hardware root of trust is part of a full IoT solution portfolio that includes a combination of software and hardware solutions to address many different industries and markets such as: industrial, automotive, digital home, banking and payments, content protection, wearables and healthcare. For a complete list of IoT products and solutions, visit:  http://www.elliptictech.com/markets/internet-of-things. 

About tRoot™

Elliptic tRoot™ is a highly-secure foundation of trust that enables connected devices to securely and uniquely identify and authenticate themselves to create secure channels for remote device management and service deployment for further revenue opportunities. tRoot’s advanced design addresses the complex IoT threats, by protecting the device and its data at boot time, run time and during the communication with other devices or the cloud. tRoot consistently addresses security throughout the device’s lifecycle. Embedded right into the SoC, this skillful design has been built with the best combination of size, performance and power.  tRoot is a simple, flexible and scalable hardware root of trust providing exceptional security that can turn the future security requirements of the IoT into monetization through personalization of features, services, and environments.

About Elliptic Technologies

Elliptic Technologies is a leading provider of embedded security hardware cores and software to chipset vendors, device manufacturers, service and content providers. Elliptic’s highly integrated solutions enable the most efficient silicon design and highest levels of security for some of the world’s most popular products in markets such as mobile, networking, home entertainment, automotive, and the Internet of Things (IoT). Elliptic’s hardware security cores enable designers to efficiently balance power, performance and cover a wide variety of cryptographic cores, public key accelerators, true random generators and protocol processors. Elliptic is leading the world in DRM and link protection solutions with flagship technology tVaultTM for downloading and sharing premium content between multiple devices, including Microsoft® PlayReady®, DTCP-IP and  HDCP SDKs built for “trusted execution environments” used in consumer electronics. The company has a global customer base and sales channels. To learn more about how Elliptic’s security solutions enable the most efficient silicon design and highest levels of security for some of the world’s most popular products, please visit www.elliptictech.com.

 

Leave a Reply

featured blogs
Apr 26, 2024
LEGO ® is the world's most famous toy brand. The experience of playing with these toys has endured over the years because of the innumerable possibilities they allow us: from simple textbook models to wherever our imagination might take us. We have always been driven by ...
Apr 26, 2024
Biological-inspired developments result in LEDs that are 55% brighter, but 55% brighter than what?...
Apr 25, 2024
See how the UCIe protocol creates multi-die chips by connecting chiplets from different vendors and nodes, and learn about the role of IP and specifications.The post Want to Mix and Match Dies in a Single Package? UCIe Can Get You There appeared first on Chip Design....

featured video

MaxLinear Integrates Analog & Digital Design in One Chip with Cadence 3D Solvers

Sponsored by Cadence Design Systems

MaxLinear has the unique capability of integrating analog and digital design on the same chip. Because of this, the team developed some interesting technology in the communication space. In the optical infrastructure domain, they created the first fully integrated 5nm CMOS PAM4 DSP. All their products solve critical communication and high-frequency analysis challenges.

Learn more about how MaxLinear is using Cadence’s Clarity 3D Solver and EMX Planar 3D Solver in their design process.

featured paper

Designing Robust 5G Power Amplifiers for the Real World

Sponsored by Keysight

Simulating 5G power amplifier (PA) designs at the component and system levels with authentic modulation and high-fidelity behavioral models increases predictability, lowers risk, and shrinks schedules. Simulation software enables multi-technology layout and multi-domain analysis, evaluating the impacts of 5G PA design choices while delivering accurate results in a single virtual workspace. This application note delves into how authentic modulation enhances predictability and performance in 5G millimeter-wave systems.

Download now to revolutionize your design process.

featured chalk talk

Improving Chip to Chip Communication with I3C
Sponsored by Mouser Electronics and Microchip
In this episode of Chalk Talk, Amelia Dalton and Toby Sinkinson from Microchip explore the benefits of I3C. They also examine how I3C helps simplify sensor networks, provides standardization for commonly performed functions, and how you can get started using Microchips I3C modules in your next design.
Feb 19, 2024
9,430 views