default banner

Securyzr™ iSE
Root of Trust solutions

Securyzr™ integrated Secure Element (iSE) is Secure-IC Root of Trust solution. Embedded in the main SoC, it offers multiple services to its host system: provisioning, secure boot, secure firmware update, cryptographic services, multiple protections, etc. 

Thanks to its dual computation and strong isolation, it offers an additional layer of security compared to trusted execution environment. The module is highly flexible and fits all applications of the heterogeneous Internet-of-Things ecosystem, from the ultra-low power sensor to the connected car.

Created to answer all ROOT OF TRUST needs

    Securyzr™ iSE is Secure-IC Root of Trust solution. Embedded in the main SoC, it offers multiple services to its host system: secure boot, key isolation, anti-tampering protection, etc. Thanks to its dual computation and strong isolation, it offers an additional layer of security compared to trusted execution environments.

 

    HARDWARE       SOFTWARE
 

Tunable Crypto
Authentication and confidentiality of the incoming/outcoming data. PQC is supported.

 

 

Secure Provisioning
Using secure communication protocols for the initial setup and configuration of a device or system.

             
 

Key Management
Management of cryptographic keys in a system.

 

 

Secure Boot
Verify the physical and logical integrity of the platform, and guarantee the authenticity of the software and OS running on the device.

             
 

Physical Attack Protection
Protection against side-channel attacks and fault injection attacks.

 

 

Secure Update
New features updates/removal can quickly be implemented

             
 

Anti-Tampering
Protection against fault injection attacks with Active Shield and Digital Sensor

 

 

Secure Monitoring
Ensure that no physical or cyber-attack is being perpetrated on the system and apply the security policy in case of attack.

             
 

Cyber Escort Unit
Solution which increases the security by checking the integrity of executed code on any CPUs.

 

 

Secure Debug
For first programming, debug purpose, key injection/generation, lifecycle management, on-site firmware injection/update, malfunctioning device update authorization in factory.

             
   

ISO, Common Criteria, FIPS 140-3, AUTOSAR, EVITA

       

Secure any markets & applications

The SecuryzrTM iSE is a very efficient solution to enable any secure application on chip. The hardware module shielded from the main processor brings a high level of security. Also the hardware offloading of the cryptographic operations from the main processor to the SecuryzrTM iSE module guarantees a low power operation. The SecuryzrTM iSE module is tuned to the target application in terms of feature and performance.

SecuryzrTM iSE IP module

A wide range of tools for each and every threat.

Architecture

Complete OFF-THE-SHELF products portfolio

Secure-IC offers a wide a range of embedded security options to meet the unique needs of any customer. From chip security hardware solution to Chip-to-Cloud complete security solution, Secure-IC proposes a variant that fits with the level of security required for any application.

 

Discover our SecuryzrTM Hardware Security Modules

 

End-to-end security management platform from chip-to-cloud

With Securyzr™ iSE, Secure-IC is also offering Securyzr™ Server, the combination of the two forming Securyzr™ integrated Security Services Platform (iSSP) solution.

The Securyzr™ iSSP enable Secure-IC customers and partners to securely deploy and remotely manage their fleet of devices from the cloud and be provided with added-value security services, as well as compliance to standards.

 

More information on SecuryzrTM iSSP

A silicon root of trust with software support

Root of trust

The strength and versatility of software are also its weaknesses. Software has the ability to continually adapt, tune and improve but it is also corruptible and vulnerable to malicious software.

Writing secure software can be very expensive and time consuming, whereas hardware security is impervious to software attacks and is cheaper to implement.

Since silicon is physical and considered an immutable function, it cannot be changed as opposed to software, which can be compromised as it is stored in memory. Silicon guarantees that the information received is genuine and has not been altered. Having an immutable function propagates the root of trust throughout the system.

While software security cannot be considered as a standalone solution, it is still necessary to support hardware security. It is important to include both types in your security plan to cover all vulnerabilities.

embedded vs integrated

embedded Secure Elements (eSE) and integrated Secure Elements (iSE) are different. On the one hand, eSE is said to be more complex as it possesses two chips but has limited resources and can be certified for a single application. On the other hand, iSE is customizable for each chip and each industrial application, it has a large amount of resources that can be shared with the host and hardware isolation; since they are integrated in the chip.

eSE iSE

Discuss your needs with our team of experts

Certification Ready

Since security for industry is paramount, several standards exist. General certifications such as FIPS-140, OSCCA or Common Criteria are used in many different industries, including industrial IoT. As a security expert, Secure-IC supports companies in their certification objectives with operational consulting, trainings and services throughout their standardization process.

The first worldwide PQC READY secure solution from chip to cloud

 

  At Secure-IC we are at the forefront of PQC, meaning we are actively working on developing and implementing PQC technologies, and contributing to the advancement of the field. We are conducting research, creating new PQC algorithms, developing PQC-based products, and working with customers to integrate PQC solutions into their systems.

More information on SecuryzrTM PQC


 

We are also offering Cybersecurity Evaluation Tools & Security Evaluation as a Service

ONE DAY, SECURITY
WILL BE WORTH
MORE THAN DEVICES

Contact