Binding a host device to EdgeLock SE05x
●Internet of Things (IoT) devices have reached a widespread use in many different applications, including industrial and automotive equipment requiring high reliability and robustness. Such IoT devices may have access to sensitive end-user data, critical sensor information and intellectual property in the form of software implementations and algorithms. Specifically in industrial applications, operation continuity and correct functioning is essential. For these reasons, hardening IoT devices against logical and physical attacks becomes more and more important. Applying strong cryptography and security best-practices enables a high level of security for important assets.
●A possible solution to the challenges listed above is the integration of a dedicated Secure Element (SE) such as EdgeLock SE05x into the IoT device. The SE protects mission-critical cryptographic keys and provides cryptographic services to the device. EdgeLock SE05x is security certified to a level of CC EAL 6+ and provides security against physical and logical attacks aimed, for example, at extracting security keys.
●EdgeLock SE05x provides a root of trust and a trusted identity to the device and serves as a secure key vault. Additionally, EdgeLock SE05x provides manufacturers the option to bind the MCU of the IoT device to the secure element, so that security services offered by EdgeLock SE05x can only be used by that particular MCU
●The binding process can be implemented at different stages of the product manufacturing and can be adapted to support incremental security levels depending on the IoT device security requirements and the available MCU security features.
|
|
Application note & Design Guide |
|
|
|
Please see the document for details |
|
|
|
|
|
|
|
English Chinese Chinese and English Japanese |
|
7 December 2020 |
|
Rev. 1.1 |
|
AN12662 |
|
2.3 MB |
- +1 Like
- Add to Favorites
Recommend
All reproduced articles on this site are for the purpose of conveying more information and clearly indicate the source. If media or individuals who do not want to be reproduced can contact us, which will be deleted.