Path: EDN Asia >> Product Centre >> IC/Board/Systems Design >> Identification plus authentication equals better IoT security
IC/Board/Systems Design Share print

Identification plus authentication equals better IoT security

21 Nov 2014

Share this page with your friends

Elliptic Technologies released a technology that enables connected devices to securely and uniquely identify and authenticate themselves, targeting the increasing security challenges in the IoT.

tRoot has a unique architecture with the ability to effectively adjust to future security requirements and standards, and enable personalisation of features, services and environments to create business growth and monetisation in the exploding IoT market. For example, device manufacturers or operators can enable tRoot's additional security features without additional cost. This makes it easier to confront complex and ever-changing IoT threats—ranging from theft and tampering to physical threats like side-channel attacks and malware.

The so-called highly-secure foundation of trust can enable cloud-based services that extends into multiple markets, through the included secure key provisioning and management, firmware integrity assurance, secure updates, renewability, and in-the-field provisioning.

tRoot is part of a full IoT solution portfolio that includes a combination of software and hardware solutions to address many different industries and markets such as: industrial, automotive, digital home, banking and payments, content protection, wearables and healthcare.

Want to more of this to be delivered to you for FREE?

Subscribe to EDN Asia alerts and receive the latest design ideas and product news in your inbox.

Got to make sure you're not a robot. Please enter the code displayed on the right.

Time to activate your subscription - it's easy!

We have sent an activate request to your registerd e-email. Simply click on the link to activate your subscription.

We're doing this to protect your privacy and ensure you successfully receive your e-mail alerts.

Add New Comment
Visitor (To avoid code verification, simply login or register with us. It is fast and free!)
*Verify code:
Tech Impact

Regional Roundup
Control this smart glass with the blink of an eye
K-Glass 2 detects users' eye movements to point the cursor to recognise computer icons or objects in the Internet, and uses winks for commands. The researchers call this interface the "i-Mouse."

GlobalFoundries extends grants to Singapore students
ARM, Tencent Games team up to improve mobile gaming

News | Products | Design Features | Regional Roundup | Tech Impact