M2M For industrial and automotive

Size: px
Start display at page:

Download "M2M For industrial and automotive"

Transcription

1 M2M For industrial and automotive

2 Content ST at a glance... 4 Where to find us... 5 The value chain... 5 Secure MCU... 6 Focus on ST33 secure microcontrollers... 6 M2M fields of application... 7 What is M2M... 7 Industrial... 7 Automotive... 7 Industrial and Automotive requirements... 8 Product qualification... 9 Continuous Improvement Program... 9 Our M2M Solutions...10 ST32 Standard M2M platform ST32 Standard M2M Commercial Derivatives ST32 main features ST33 Secure M2M platform Security and certifications ST33 Secure M2M Commercial Derivatives ST33 main features... 11

3 ST at a glance The value chain STMicroelectronics is a global leader in the semiconductor market serving customers across the spectrum of sense & power, automotive and embedded processing solutions. From energy management, healthcare or data security, ST is in every step of your daily life and its microelectronic devices make a positive and innovative contribution to people s lives. Suppliers Assembly line and final test back-end 4 79sales offices in35 countries We purchase silicon ingot, raw materials, equipment, energy, gas, chemicals and services from many suppliers and subcontractors. R&D conception and design New products are created in a multistep process including architecture conception, electrical layout, electrical and logic simulation, chip layout and generation of the mask that will be used to etch the design in silicon. Manufacturing front-end The manufacturing of chips is a process of around 400 separate stages, starting with a plain silicon wafer, and resulting in the etching of several hundreds to thousands of dice. Electrical wafer sorting We electrically test the dice on the wafer. It is also known as wafer sort or probing. The dice are cut from the silicon wafer before being assembled in a package. The chips are then tested prior to delivery to the customer. Business customers We offer a broad range of products and we serve a wide range of customers across the markets described below. 5 Where to find us A global semiconductor leader The largest European semiconductor company 2014 net revenues of US$ 7.40bn Approximately 43,600 employees worldwide 12 manufacturing sites 79 sales offices in 35 countries Listed on New York Stock Exchange, Euronext Paris and Borsa Italiana, Milano Advanced research and development centers around the globe: ~ 15,000 patents ~ 9,000 patent families More than 500 new filings in 2014 ~ 8,700 people working in Research and Development, and Product Design Our automotive products are making driving safe Our smart power products are allowing our mobile products to operate longer and making more of our energy resources Our digital consumer products are powering the augmented digital lifestyle Our MEMS & Sensors are augmenting the consumer experience Our microcontrollers are everywhere making everything smarter and more secure

4 1996 1st French ITSEC E3-High certificate on ST16601 Secure MCU EAL5+ Common Criteria 1st EAL4+ Common certificate on secure RF Criteria certificate platform with elliptic curve on ST19SF08 cryptographic (ECC) library 2005 EAL5+ Common Criteria certificate on a 32-bit microcontroller 2010 ST33 integrates Flash technology & ARM SecurCore SC300 TM processor st EAL6+ Common Criteria on ST23 contactless platform with RSA/ECC cryptographic library (NesLib) ST31 contact & 250 million ST33 contactless platforms units shipped to date integrate Flash technology EAL5+ Common Criteria Awarded France certificate on ST31 Cybersecurity label 32-bit MCU with ARM SecurCore SC000 processor WHAT IS M2M With the growth of Connected Things, more and more objects, devices, machines and automotive systems are being connected through cellular networks using 2G, 3G and 4G technologies. When connected, the remote device communicates with other machines or computer servers to transfer data and receive instructions ensuring the complete life cycle management of the connected device. To provide such data communication with the cellular network, SIM technology plays a key role in M2M (Machine to Machine) applications. SIM for M2M applications are based on traditional SIM technology which is reinforced to operate in harsh conditions and is enhanced with state-of-the-art security and larger memory capacity to fulfill the latest standards such as the GSMA s Embedded SIM specification for the remote provisioning and management of machine-to-machine connections. Such applications require the use of advanced secure microcontrollers including a comprehensive set of SMD (Surface Mounted Device) packages to operate in various environments and fit in small dimensions. Additionally, M2M refers to applications used to secure communication between subsystems such as electronic components or modules connected with a wire interface. As more and more assets such as private data, sensitive user information, and secret keys are stored in machines, devices and automotive systems need to be protected from malicious attacks; secure microcontrollers play a key role in these kinds of applications. 6 ST s Secure Microcontroller product portfolio covers mobile and secure applications, offering compliance with the latest security standards such as Common Criteria up to EAL6+ and EMVCo or specific standards including ICAO as well as TCG 1.2 and 2.0. Our secure microcontrollers cover a complete range of interfaces for both contact and contactless communication, including ISO/IEC 7816, ISO/IEC Types A & B, ISO/IEC 18092, VHBR, NFC, USB, SPI and I²C. ST s Secure Microcontroller platforms rely on a highly-secure architecture combined with leadingedge CPUs, such as ARM s SC300 TM and SC000, and advanced embedded non- volatile memory technologies such as 80 nm embedded Flash and embedded EEPROM technologies. FOCUS ON ST33 SECURE MICROCONTROLLERS The ST33 secure microcontroller family is designed to meet advanced security and performance requirements for applications including NFC SIM Secure Element, NFC embedded Secure Element, embedded UICC for Consumer, and Machine to Machine Industrial & Automotive segments. With the latest ARM SecurCore SC bit RISC processor and an architecture optimized for high performance, the ST33 platform offers large memory capacity, multiple communication interfaces and certified cryptographic libraries in different form factors including wafers, SIM modules, DFN and WLCSP. The platform addresses the highest security standards including Common Criteria up to EAL5+ and EMVCo. M2M FIELDS OF APPLICATION INDUSTRIAL Monitoring Alarm Utilities Vending machine Remote control Mobile health AUTOMOTIVE Road charging Tracking device Tachograph Navigation ecall M2M applications can be clustered into two segments addressing either Industrial or Automotive systems. Indeed, depending on the field of application, product qualification, compliance with standards or product certification can differ. 7 Secure zone RAM Enhanced HW MPU and 3DES/AES accelerator Flash ST33 ARM SC300 core Timers PKI cryptoprocessor SWP SPI GPIOs ISO7816

5 Industrial and Automotive requirements M2M applications can be addressed either with the ST32 Standard M2M platform or the ST33 Secure M2M platform, depending on the level of security required by the application. The ST32 Standard M2M platform fulfills the requirements of an embedded SIM for cellular applications. The ST33 Secure M2M platform is designed to be used as an embedded SIM compliant with the GSMA s specification for the remote provisioning and management of machine to machine connections allowing the management of several Mobile Network Operator profiles on the same device. Additionally, the security features available on the ST33 secure M2M platform enable authentication between subsystems, data encryption and key generation, while data such as secure keys, certificates, or other sensitive data can be stored securely and can only be modified by authorized people. These devices are designed to perform services like platform integrity such as Secure Boot ensuring that both the subsystem s hardware and software have not been compromised. PRODUCT QUALIFICATION The product qualification performed in the industrial field follows industrial grade JEDEC Standards applicable to the microelectronics industry. The product qualification performed in the automotive field complies with AEC-Q100 Standards. Those standards are defined and managed by the Automotive Electronics Council (AEC) and are required in the Automotive electronics industry. PPAP level 3 documentation (Product Part Approval Process) can be delivered on customer request by ST. This document provides all the evidences that the ST Automotive products have been developed, qualified and produced to meet the Automotive Customer requirements. CONTINUOUS IMPROVEMENT PROGRAM ST s Continuous Improvement Program implements a very innovative solution for failure analysis on the ST33 Secure Platform. The ST process flow integrates a reinforced control plan that ensures a test coverage above 98% and includes statistical tools for protecting our customers from any quality or reliability issues in the field. 8 9 Key industrial applications: Vending machines Remote control Remote monitoring Alarms and security Energy and utilities Mobile health (mhealth) Industry 4.0 Platform integrity Key automotive applications: ecall Connected cars In-car infotainment Intelligent transport systems (ITS) Fleet management Vehicle tracking Pay-as-you-drive insurance Java Card applications Platform integrity

6 Our M2M Solutions ST33 32bit ARM SC300 CPU 1.2MB eflash in 80nm DES, AES, ECC, RSA Co-processors 10 Based on a very large experience in secure mobile transactions and automotive applications, ST s M2M platforms provide solutions that enable secure wire and wireless communication between connected devices exploiting the Internet of Things. ST s M2M product families are designed to reach high levels of performance such as more than 500,000 erase/write cycles per page over an extended temperature range from 40 to +105 C under very harsh environmental conditions. Thanks to its native Page Flash robustness, and the increased failure analysis capability, STMicroelectronics can target very low ppm levels in line with the expectations of automotive customers. ST manufacturing plants in Europe have been qualified and certified to improve flexibility, service and ensure the implementation of our Business Continuity Plan (BCP). ST32 32bit ARM Cortex M3 CPU 512KB eflash in 90nm DES Co-processors ISO 7816 No CC Certification DFN8 30 mm 2 DFN8 6x5 (MFF2) remains the standard package for Automotive segment. For Industrial segment, the product can be delivered in wafer, D68 (3FF) or D18 (4FF) micro modules. ISO 7816, SPI M/S Certified CC EAL5+ ST33 SECURE M2M PLATFORM The ST33 Secure M2M platform is based on an ARM SecurCore SC bit RISC which is Common Criteria certified (CC EAL5+). It features up to 1280 Kbytes of embedded Flash memory, symmetric and asymmetric cryptographic engines and a large number of communication interfaces. It is designed to be used as an embedded SIM compliant with the GSMA s specification for the remote provisioning and management of machine-to-machine connections. The ST33 Secure M2M platform can be used as a Secure Element to protect sensitive information or ensure platform integrity.. DFN8 30 mm 2 UFDFPN mm 2 WLCSP Thin 7 mm 2 DFN8 6x5 (MFF2) remains the standard package for Automotive segment. For Industrial segment, the product can be delivered in wafer, D68 (3FF) or D18 (4FF) micro modules ST33 MAIN FEATURES 30 Kbytes of User RAM Up to 1.2 Mbytes of user Flash memory with OTP area 10 year data retention at 105 C, or 17 years at 85 C 500,000 erase/write cycles per page 256 Bytes of OTP for user ISO/IEC 7816, SPI master & slave and 7 GPIO interfaces Hardware security-enhanced DES and AES accelerators RSA and ECC cryptographic algorithms EAL5+ CC certification ST33G1M2M is qualified according to JEDEC specifications for Industrial applications ST33G1M2A is qualified in compliance with AEC-Q100 rev G specifications for Automotive applications 11 ST32 STANDARD M2M PLATFORM The ST32 Standard M2M platform is based on an ARM Cortex -M3 32-bit core. It features up to 512 Kbytes of embedded Flash memory and a standard DES cryptographic engine to enable secure authentication. It is designed to be used as an embedded SIM for cellular applications. ST32 MAIN FEATURES 12 Kbytes of User RAM Up to 512 Kbytes of user Flash memory with OTP area 10 year data retention at 105 C, or 17 years at 85 C 500,000 erase/write cycles per page 128 Bytes of OTP for user Hardware data encryption accelerator (DES) ST32G512M is qualified according to JEDEC specifications for Industrial applications ST32G512A is qualified in compliance with AEC-Q100 rev G specifications for Automotive applications SECURITY AND CERTIFICATIONS Beyond the encryption of data, signing of data, or pure authentication mechanisms, the ST33 secure microcontroller is designed to store secret information and keep it safe while being used. The ST33 M2M platform for Industrial and Automotive applications embeds state-of-the-art hardware security to resist against modern attempts to break its cryptosystems such as side-channel, fault injection and physical attacks. To guarantee a high level of security and ensure that your assets are protected, the ST33 M2M platform has been evaluated according to Common Criteria for Information Technology Security. It is the reference for the international standard (ISO/IEC 15408) of computer security. Under this standard, the ST33 M2M platform is certified according to the high security level of Common Criteria EAL5+. ISO/IEC 7816 interface ST33 SECURE M2M COMMERCIAL DERIVATIVES ST32 STANDARD M2M COMMERCIAL DERIVATIVES Flash memory (Kbytes) Industrial Automotive 512 ST32G512M ST32G512A 416 ST32G416M ST32G416A 320 ST32G320M ST32G320A 256 ST32G256M ST32G256A Flash memory (Kbytes) Industrial Automotive 1280 ST33G1M2M ST33G1M2A 1024 ST33G1M0M ST33G1M0A 896 ST33G896M ST33G896A 768 ST33G768M ST33G768A 640 ST33G640M ST33G640A 512 ST33G512M ST33G512A 384 ST33G384M ST33G384A

7 STMicroelectronics - September Printed in United Kingdom - All rights reserved The STMicroelectronics corporate logo is a registered trademark of the STMicroelectronics group of companies All other names are the property of their respective owners Order code: BRM2MSMCU0815 For more information on ST products and solutions, visit

Payment and Identification Secure solutions

Payment and Identification Secure solutions Payment and Identification Secure solutions ST at a glance STMicroelectronics is a global leader in the semiconductor market serving customers across the spectrum of sense & power, automotive and embedded

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

Security in ST : From Company to Products

Security in ST : From Company to Products Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately

More information

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009 Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer October 2009 Jennic highlights Jennic is a fabless semiconductor company providing Wireless Microcontrollers to high-growth

More information

Entrust Smartcard & USB Authentication

Entrust Smartcard & USB Authentication Entrust Smartcard & USB Authentication Technical Specifications Entrust IdentityGuard smartcard- and USB-based devices allow organizations to leverage strong certificate-based authentication of user identities

More information

Flash Memory. For Automotive Applications. White Paper F-WP001

Flash Memory. For Automotive Applications. White Paper F-WP001 Flash Memory For Automotive Applications White Paper F-WP001 Corporate Headquarters: 39870 Eureka Dr., Newark, CA 94560, USA Tel: (510) 623-1231 Fax: (510) 623-1434 E-mail: info@smartm.com Customer Service:

More information

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M Anvay Lonkar, Marketing Manager M2M Solutions & Services Gemalto M2M FORUM, MILAN, 15 May 2013 Gemalto delivers trusted and convenient digital services to billions

More information

ST19NP18-TPM-I2C. Trusted Platform Module (TPM) with I²C Interface. Features

ST19NP18-TPM-I2C. Trusted Platform Module (TPM) with I²C Interface. Features Trusted Platform Module (TPM) with I²C Interface Data brief Features Single-chip Trusted Platform Module (TPM) Embedded TPM 1.2 firmware I²C communication interface (Slave mode) Architecture based on ST19N

More information

Smart Card Technology Capabilities

Smart Card Technology Capabilities Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards

More information

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,

More information

Understand Electronic-Meter Design to Better Craft Intelligent and Secure Systems

Understand Electronic-Meter Design to Better Craft Intelligent and Secure Systems Understand Electronic-Meter Design to Better Craft Intelligent and Secure Systems driving trust Author, INSIDE Secure As more utility companies install smart electric and other types of utility meters

More information

Java Embedded Applications

Java Embedded Applications TM a One-Stop Shop for Java Embedded Applications GeeseWare offer brings Java in your constrained embedded systems. You develop and simulate your Java application on PC, and enjoy a seamless hardware validation.

More information

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn

More information

STM32 F-2 series High-performance Cortex-M3 MCUs

STM32 F-2 series High-performance Cortex-M3 MCUs STM32 F-2 series High-performance Cortex-M3 MCUs STMicroelectronics 32-bit microcontrollers, 120 MHz/150 DMIPS with ART Accelerator TM and advanced peripherals www.st.com/mcu STM32 F-2 series The STM32

More information

Secure egovernment Where convenience meets security. www.infineon.com/ccs

Secure egovernment Where convenience meets security. www.infineon.com/ccs Secure egovernment Where convenience meets security www.infineon.com/ccs Gaining transparency Electronic ID documents replace and enhance conventional ID documents that governments have been issuing for

More information

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded

More information

SHE Secure Hardware Extension

SHE Secure Hardware Extension SHE Secure Hardware Extension Data Security for Automotive Embedded Systems Workshop on Cryptography and Embedded Security Embedded World @ Nuremberg, February 2012 Content Data Security - What does it

More information

NXP s Solution to ecall Brussels, October 19 th, 2010

NXP s Solution to ecall Brussels, October 19 th, 2010 NXP s Solution to ecall Brussels, October 19 th, 2010 Agenda The Mission of NXP and its Partners NXP s ecall platform Awareness the Next Step Conclusions NXP leads innovation in Telematics Breakthrough

More information

Infineon Chip Card & Security ICs Portfolio

Infineon Chip Card & Security ICs Portfolio Infineon Chip Card & Security ICs Portfolio Security for the connected world www.infineon.com/security 2 Security for the connected world In an increasingly connected world securing the interaction and

More information

2014 - Advanced Card Technology All Rights Reserved

2014 - Advanced Card Technology All Rights Reserved M2M (Machine to Machine) AGENDA Agenda 2 About Advance Card Technology 3 Our Customers 6 What is M2M 7 M2M imposes new demands 9 M2M product offering 10 M2M applications 21 M2M use cases 22 Contact us

More information

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015 MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture

More information

NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/ V1A(s)

NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/ V1A(s) NXP Secure Smart Card Controllers Document information Info Content Keywords CC, Security Evaluation,, Functional Requirements, Security Functionality, Assurance Level, P5CC008, P5CC012 V1A/ V1A(s) Abstract

More information

NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1

NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1 NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1 Rev. 1.1 24 October 2011 BSI-DSZ-CC-0707 Evaluation documentation Document information Info Keywords

More information

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution

More information

Field Trip 2008. London, May 27th

Field Trip 2008. London, May 27th Field Trip 2008 London, May 27th Microcontrollers, Memories & Smartcards Claude Dardanne Corporate Vice President Microcontrollers, Memories & Smartcards Focusing on Embedded NVM Technologies Embedded

More information

Infineon Chip Card & Security Security for the connected world

Infineon Chip Card & Security Security for the connected world Infineon Chip Card & Security Security for the connected world www.infineon.com/ccs Infineon Chip Card & Security Security. Convenience. Trust. Have it all! Securing data, affording convenience, mastering

More information

Common Criteria for IT security evaluation

Common Criteria for IT security evaluation STMicroelectronics ST33F1M/1M0/896/768/640/512E, SC33F1M0/896/768/640/512/384E, SM33F1M/1M0/896/768/640/512E, SE33F1M/1M0/896/768/640/512E, SL33F1M/1M0/896/768/640/512E, SP33F1ME, with dedicated software

More information

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007 Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes

More information

What is a Smart Card?

What is a Smart Card? An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes Keith.Mayes@rhul.ac.uk Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types

More information

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Embedded RF ABSTRACT This application report describes

More information

PUF Physical Unclonable Functions

PUF Physical Unclonable Functions Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication

More information

Smart Cards a(s) Safety Critical Systems

Smart Cards a(s) Safety Critical Systems Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas Paradinas@gemplus.com Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business

More information

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in

More information

How To Use Atmel'S Atmel Crypto Device For A Year On A Computer Or Cell Phone

How To Use Atmel'S Atmel Crypto Device For A Year On A Computer Or Cell Phone Atmel Crypto Products Portfolio Family of Secure Authentication Solutions Atmel Crypto Products Portfolio The Atmel Crypto Products Portfolio offers full system security solution options for a wide variety

More information

NVM memory: A Critical Design Consideration for IoT Applications

NVM memory: A Critical Design Consideration for IoT Applications NVM memory: A Critical Design Consideration for IoT Applications Jim Lipman Sidense Corp. Introduction The Internet of Things (IoT), sometimes called the Internet of Everything (IoE), refers to an evolving

More information

Smart Card: The Computer in Your Wallet

Smart Card: The Computer in Your Wallet Smart Card: The Computer in Your Wallet MIPS Technologies, Inc. June 2002 Smart cards, credit-card-size pieces of plastic incorporating a silicon chip, comprise the highest volume computing platform. Roughly

More information

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD TÜV Rheinland Nederland B.V. Version 20101101 Certification Report NXP Secure Smart Card Controller P40C012/040/072 VD Sponsor and developer: NXP Semiconductors Germany GmbH, Business Unit Identification

More information

ZigBee Technology Overview

ZigBee Technology Overview ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification

More information

DesignWare IP for IoT SoC Designs

DesignWare IP for IoT SoC Designs DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to

More information

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD 8 BILLION IDENTITY DOCUMENTS IN CIRCULATION IN 2014 END-USER BENEFITS OT invents products and

More information

Introducing etoken. What is etoken?

Introducing etoken. What is etoken? Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant

More information

90nm e-page Flash for Machine to Machine Applications

90nm e-page Flash for Machine to Machine Applications 90nm e-page Flash for Machine to Machine Applications François Maugain, Jean Devin Microcontrollers, Memories & Secure MCUs Group 90nm e-page Flash for M2M applications Outline M2M Market Cycling Endurance

More information

Network connectivity controllers

Network connectivity controllers Network connectivity controllers High performance connectivity solutions Factory Automation The hostile environment of many factories can have a significant impact on the life expectancy of PCs, and industrially

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

Company Presentation. October 2015

Company Presentation. October 2015 Company Presentation October 2015 A global semiconductor leader 2014 revenues of $7.40B Listed: NYSE, Euronext Paris and Borsa Italiana, Milan Who we are 2 Research & Development Main Sales & Marketing

More information

Key & Data Storage on Mobile Devices

Key & Data Storage on Mobile Devices Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

The Impact of IoT on Semiconductor Companies

The Impact of IoT on Semiconductor Companies Advisory The Impact of IoT on Semiconductor Companies Rajesh Mani Director, Strategy and Operations April 15, 2015 The Internet of Things (IoT) has been defined in multiple ways here s our take! The collection

More information

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0 Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International

More information

The shortest path to cellular communications: Cellular Development Platform

The shortest path to cellular communications: Cellular Development Platform The shortest path to cellular communications: Cellular Development Platform Multi-Tech Overview 40 years focused on Machine-to-Machine (M2M) Communications 80+ patents 20+ million devices, thousands of

More information

advant advanced contactless smart card system

advant advanced contactless smart card system LA-11-001l-en [08.2012] advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant product line ideally supports the design and

More information

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A www.acs.com.hk 1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A 2 3 ACOS5 Series (32KB EEPROM) Cryptographic Smart Card and Token Module

More information

Smart Systems: the key enabling technology for future IoT

Smart Systems: the key enabling technology for future IoT Smart Systems: the key enabling technology for future IoT Roberto Zafalon Technology Programmes, Director R&D and Public Affairs, Italy STMicroelectronics IoT Large Scale Pilots Brokerage Workshop London

More information

System Security Solutions for the connected world. www.infineon.com/ccs

System Security Solutions for the connected world. www.infineon.com/ccs System Security Solutions for the connected world www.infineon.com/ccs Solutions for rising security demands The right balance between hardware-based and software-based security mechanisms allows you to

More information

IoT Security Concerns and Renesas Synergy Solutions

IoT Security Concerns and Renesas Synergy Solutions IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

MEPTEC. Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015 tonym@semico.

MEPTEC. Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015 tonym@semico. MEPTEC Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015 tonym@semico.com Outline Impact of Sensors Basic Building Blocks for IoT Sensors

More information

Solutions. Machine-to-Machine. Arrow Electronics. Complete, end-to-end solutions over the life of your product.

Solutions. Machine-to-Machine. Arrow Electronics. Complete, end-to-end solutions over the life of your product. AR R OW E L E CTR O N I CS A MERI CA S CO MP ONENTS machine machine-to- CAPABILITIES Arrow Electronics Americas Components m2m@arrow.com Arrow Electronics Machine-to-Machine Solutions Complete, end-to-end

More information

AN886 APPLICATION NOTE

AN886 APPLICATION NOTE INTRODUCTION AN886 APPLICATION NOTE SELECTING BETWEEN, FAST AND OTP FOR A MICROCONTROLLER by Microcontroller Division Applications A customer who develops an MCU-based application needs various levels

More information

Gemalto Mifare 1K Datasheet

Gemalto Mifare 1K Datasheet Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4

More information

Secure Data Exchange Solution

Secure Data Exchange Solution Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates

More information

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128 SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication

More information

Atmel Power Line Communications. Solutions for the Smart Grid

Atmel Power Line Communications. Solutions for the Smart Grid Atmel Power Line Communications Solutions for the Smart Grid Key Applications Powering the Smart Grid Home and industrial automation Control systems Smart metering Intelligent lighting Smart appliances

More information

Using AES 256 bit Encryption

Using AES 256 bit Encryption Using AES 256 bit Encryption April 16 2014 There are many questions on How To Support AES256 bit encryption in an Industrial, Medical or Military Computer System. Programmable Encryption for Solid State

More information

Atmel s Self-Programming Flash Microcontrollers

Atmel s Self-Programming Flash Microcontrollers Atmel s Self-Programming Flash Microcontrollers By Odd Jostein Svendsli, Marketing Manager Summary The third-generation Flash microcontrollers from Atmel are now available. These microcontrollers offer

More information

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

Vehicular Security Hardware The Security for Vehicular Security Mechanisms escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security

More information

Smartcard IC Platform Protection Profile

Smartcard IC Platform Protection Profile Smartcard IC Platform Protection Profile Version 1.0 July 2001 developed by Atmel Smart Card ICs Hitachi Europe Ltd. Infineon Technologies AG Philips Semiconductors Registered and Certified by Bundesamt

More information

OT PRODUCTS & SOLUTIONS TRANSPORT

OT PRODUCTS & SOLUTIONS TRANSPORT OT PRODUCTS & SOLUTIONS TRANSPORT TOWARDS TRUE MOBILITY TRANSPORT OPERATORS AND TODAY, CONTACTLESS INTEGRATORS ARE FACING TRANSPORT SYSTEMS STRATEGIC CHALLENGES LACK INTEROPERABILITY, WHILST A FULL RANGE

More information

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With

More information

SINGLE DEVICE FOR MULTIPLE TASKS

SINGLE DEVICE FOR MULTIPLE TASKS ViZRO s BioMate M043 SINGLE DEVICE FOR MULTIPLE TASKS Datasheet ViZRO S BioPad Vizro Technologies www.vizro.net INDEX 1. Introduction 2. Main Application Area 3.Technical Specifications 4.Product Picture

More information

BroadSAFE Enhanced IP Phone Networks

BroadSAFE Enhanced IP Phone Networks White Paper BroadSAFE Enhanced IP Phone Networks Secure VoIP Using the Broadcom BCM11xx IP Phone Technology September 2005 Executive Summary Voice over Internet Protocol (VoIP) enables telephone calls

More information

CINTERION The global leader in cellular M2M communication. Cinterion Wireless Modules GmbH 2011, All rights reserved

CINTERION The global leader in cellular M2M communication. Cinterion Wireless Modules GmbH 2011, All rights reserved The global leader in cellular M2M communication Cinterion Wireless Modules GmbH 2011, All rights reserved is a Gemalto company Company History Gemalto The company was founded in 1995 as a business unit

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

TÜ V Rheinland Industrie Service

TÜ V Rheinland Industrie Service TÜ V Rheinland Industrie Service Business Area: Automation / Functional Safety Contact Minsung Lee +82-2-860-9969 mailto : minsung.lee@kor.tuv.com Sales Account Manager for Functional Safety Fax +82-2-860-9862

More information

Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015

Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015 Performance Investigations Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015 1 Motivation In we tried to provide guidance for the use of DTLS (TLS) when used in

More information

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards Converged Smart Card for Identity Assurance Solutions Crescendo Series Smart Cards Crescendo is the proven smart card solution for a combined logical and physical access control solution. Crescendo smart

More information

Lesson-3 CASE STUDY OF AN EMBEDDED SYSTEM FOR SMART CARD

Lesson-3 CASE STUDY OF AN EMBEDDED SYSTEM FOR SMART CARD Design Examples and Case Studies of Program Modeling and Programming with RTOS-2: Lesson-3 CASE STUDY OF AN EMBEDDED SYSTEM FOR SMART CARD 1 1. Smart Card System Requirements 2 Purpose Enabling authentication

More information

The Importance of Secure Elements in M2M Deployments: An Introduction

The Importance of Secure Elements in M2M Deployments: An Introduction The Importance of Secure Elements in M2M Deployments: An Introduction February 2014 Securing the future of mobile services 2 Contents THE IMPORTANCE OF SECURE ELEMENTS IN M2M DEPLOYMENTS... 3 1. INTRODUCTION...

More information

Measurement and Analysis Introduction of ISO7816 (Smart Card)

Measurement and Analysis Introduction of ISO7816 (Smart Card) Measurement and Analysis Introduction of ISO7816 (Smart Card) ISO 7816 is an international standard related to electronic identification cards with contacts, especially smart cards, managed jointly by

More information

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator Confidentio Integrated security processing unit Including key management module, encryption engine and random number generator Secure your digital life Confidentio : An integrated security processing unit

More information

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Side Channel Analysis and Embedded Systems Impact and Countermeasures Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side

More information

SMARTRAC TECHNOLOGY GROUP ALL RIGHTS RESERVED

SMARTRAC TECHNOLOGY GROUP ALL RIGHTS RESERVED Company Overview Overview Facts, Vision and Mission Portfolio, Markets and Capabilities Quality and Certifications SMART COSMOS Internet of Things SMARTRAC TECHNOLOGY GROUP ALL RIGHTS RESERVED January

More information

A-307. Mobile Data Terminal. Android OS Platform Datasheet

A-307. Mobile Data Terminal. Android OS Platform Datasheet A-307 Mobile Data Terminal Android OS Platform Datasheet Revision 1.1 July, 2013 Introduction A-307 Platform Overview Introduction A-307 Platform Overview The A-307 provides Original Equipment Manufacturers

More information

M-Shield mobile security technology

M-Shield mobile security technology Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a

More information

Chip Card & Security ICs Mifare NRG SLE 66R35

Chip Card & Security ICs Mifare NRG SLE 66R35 Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information

More information

High-Performance, Highly Secure Networking for Industrial and IoT Applications

High-Performance, Highly Secure Networking for Industrial and IoT Applications High-Performance, Highly Secure Networking for Industrial and IoT Applications Table of Contents 2 Introduction 2 Communication Accelerators 3 Enterprise Network Lineage Features 5 Example applications

More information

Secure Hardware PV018 Masaryk University Faculty of Informatics

Secure Hardware PV018 Masaryk University Faculty of Informatics Secure Hardware PV018 Masaryk University Faculty of Informatics Jan Krhovják Vašek Matyáš Roadmap Introduction The need of secure HW Basic terminology Architecture Cryptographic coprocessors/accelerators

More information

Administration Guide. Wireless software upgrades

Administration Guide. Wireless software upgrades Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources

More information

Product Brief. 2.0 microtoled. Intelligent GOLDELOX Display Module. µtoled-20-g2. www.4dsystems.com.au Rev 1.0

Product Brief. 2.0 microtoled. Intelligent GOLDELOX Display Module. µtoled-20-g2. www.4dsystems.com.au Rev 1.0 Product Brief 2.0 microtoled Intelligent GOLDELOX Display Module µtoled-20-g2 www.4dsystems.com.au Rev 1.0 MESSAGE FROM THE CEO To our valued customers, Thank you for your interest in 4D Systems and the

More information

Unleashing the Power of the Internet of Things

Unleashing the Power of the Internet of Things Gemalto M2M Make an M2M wish! Unleashing the Power of the Internet of Things Our M2M portfolio is enabling secure solutions in industries ranging from healthcare, retail services, smart energy, transportation,

More information

Security & Chip Card ICs SLE 44R35S / Mifare

Security & Chip Card ICs SLE 44R35S / Mifare Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info

More information

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices

More information

what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored?

what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored? Inside the CPU how does the CPU work? what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored? some short, boring programs to illustrate the

More information

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Sponsored by Oracle Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Introduction About Survey Respondents The Internet of Things (IoT) and the rise of

More information

Reviving smart card analysis

Reviving smart card analysis Reviving smart card analysis Christopher Tarnovsky Karsten Nohl chris@flylogic.net nohl@srlabs.de Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for

More information

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Introduction Security continues to be a hot topic in all areas of technology, including machine-tomachine (M2M) applications.

More information

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY Introduction OPTIMIZING SSL DEPLOYMENT On-demand business breaks down the traditional network perimeter, creating interconnected systems between

More information

Leti Introduction and Overview

Leti Introduction and Overview Leti Introduction and Overview Leti Day in Tokyo, October 3rd 2012 Laurent Malier 2012 Leti 2012 1 CEA The CEA at a glance Commissariat à l Énergie Atomique et aux Énergies Alternatives is one of the largest

More information

Mobile and Embedded/IoT market Overview and Trends. June 2014

Mobile and Embedded/IoT market Overview and Trends. June 2014 Mobile and Embedded/IoT market Overview and Trends June 2014 2 Ubiquitous Connectivity Quantified Self Ultra HD Media Streaming Global Wireless Broadband Wearables 3 Contactless Payments Wearable Momentum

More information