M2M For industrial and automotive

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "M2M For industrial and automotive"

Transcription

1 M2M For industrial and automotive

2 Content ST at a glance... 4 Where to find us... 5 The value chain... 5 Secure MCU... 6 Focus on ST33 secure microcontrollers... 6 M2M fields of application... 7 What is M2M... 7 Industrial... 7 Automotive... 7 Industrial and Automotive requirements... 8 Product qualification... 9 Continuous Improvement Program... 9 Our M2M Solutions...10 ST32 Standard M2M platform ST32 Standard M2M Commercial Derivatives ST32 main features ST33 Secure M2M platform Security and certifications ST33 Secure M2M Commercial Derivatives ST33 main features... 11

3 ST at a glance The value chain STMicroelectronics is a global leader in the semiconductor market serving customers across the spectrum of sense & power, automotive and embedded processing solutions. From energy management, healthcare or data security, ST is in every step of your daily life and its microelectronic devices make a positive and innovative contribution to people s lives. Suppliers Assembly line and final test back-end 4 79sales offices in35 countries We purchase silicon ingot, raw materials, equipment, energy, gas, chemicals and services from many suppliers and subcontractors. R&D conception and design New products are created in a multistep process including architecture conception, electrical layout, electrical and logic simulation, chip layout and generation of the mask that will be used to etch the design in silicon. Manufacturing front-end The manufacturing of chips is a process of around 400 separate stages, starting with a plain silicon wafer, and resulting in the etching of several hundreds to thousands of dice. Electrical wafer sorting We electrically test the dice on the wafer. It is also known as wafer sort or probing. The dice are cut from the silicon wafer before being assembled in a package. The chips are then tested prior to delivery to the customer. Business customers We offer a broad range of products and we serve a wide range of customers across the markets described below. 5 Where to find us A global semiconductor leader The largest European semiconductor company 2014 net revenues of US$ 7.40bn Approximately 43,600 employees worldwide 12 manufacturing sites 79 sales offices in 35 countries Listed on New York Stock Exchange, Euronext Paris and Borsa Italiana, Milano Advanced research and development centers around the globe: ~ 15,000 patents ~ 9,000 patent families More than 500 new filings in 2014 ~ 8,700 people working in Research and Development, and Product Design Our automotive products are making driving safe Our smart power products are allowing our mobile products to operate longer and making more of our energy resources Our digital consumer products are powering the augmented digital lifestyle Our MEMS & Sensors are augmenting the consumer experience Our microcontrollers are everywhere making everything smarter and more secure

4 1996 1st French ITSEC E3-High certificate on ST16601 Secure MCU EAL5+ Common Criteria 1st EAL4+ Common certificate on secure RF Criteria certificate platform with elliptic curve on ST19SF08 cryptographic (ECC) library 2005 EAL5+ Common Criteria certificate on a 32-bit microcontroller 2010 ST33 integrates Flash technology & ARM SecurCore SC300 TM processor st EAL6+ Common Criteria on ST23 contactless platform with RSA/ECC cryptographic library (NesLib) ST31 contact & 250 million ST33 contactless platforms units shipped to date integrate Flash technology EAL5+ Common Criteria Awarded France certificate on ST31 Cybersecurity label 32-bit MCU with ARM SecurCore SC000 processor WHAT IS M2M With the growth of Connected Things, more and more objects, devices, machines and automotive systems are being connected through cellular networks using 2G, 3G and 4G technologies. When connected, the remote device communicates with other machines or computer servers to transfer data and receive instructions ensuring the complete life cycle management of the connected device. To provide such data communication with the cellular network, SIM technology plays a key role in M2M (Machine to Machine) applications. SIM for M2M applications are based on traditional SIM technology which is reinforced to operate in harsh conditions and is enhanced with state-of-the-art security and larger memory capacity to fulfill the latest standards such as the GSMA s Embedded SIM specification for the remote provisioning and management of machine-to-machine connections. Such applications require the use of advanced secure microcontrollers including a comprehensive set of SMD (Surface Mounted Device) packages to operate in various environments and fit in small dimensions. Additionally, M2M refers to applications used to secure communication between subsystems such as electronic components or modules connected with a wire interface. As more and more assets such as private data, sensitive user information, and secret keys are stored in machines, devices and automotive systems need to be protected from malicious attacks; secure microcontrollers play a key role in these kinds of applications. 6 ST s Secure Microcontroller product portfolio covers mobile and secure applications, offering compliance with the latest security standards such as Common Criteria up to EAL6+ and EMVCo or specific standards including ICAO as well as TCG 1.2 and 2.0. Our secure microcontrollers cover a complete range of interfaces for both contact and contactless communication, including ISO/IEC 7816, ISO/IEC Types A & B, ISO/IEC 18092, VHBR, NFC, USB, SPI and I²C. ST s Secure Microcontroller platforms rely on a highly-secure architecture combined with leadingedge CPUs, such as ARM s SC300 TM and SC000, and advanced embedded non- volatile memory technologies such as 80 nm embedded Flash and embedded EEPROM technologies. FOCUS ON ST33 SECURE MICROCONTROLLERS The ST33 secure microcontroller family is designed to meet advanced security and performance requirements for applications including NFC SIM Secure Element, NFC embedded Secure Element, embedded UICC for Consumer, and Machine to Machine Industrial & Automotive segments. With the latest ARM SecurCore SC bit RISC processor and an architecture optimized for high performance, the ST33 platform offers large memory capacity, multiple communication interfaces and certified cryptographic libraries in different form factors including wafers, SIM modules, DFN and WLCSP. The platform addresses the highest security standards including Common Criteria up to EAL5+ and EMVCo. M2M FIELDS OF APPLICATION INDUSTRIAL Monitoring Alarm Utilities Vending machine Remote control Mobile health AUTOMOTIVE Road charging Tracking device Tachograph Navigation ecall M2M applications can be clustered into two segments addressing either Industrial or Automotive systems. Indeed, depending on the field of application, product qualification, compliance with standards or product certification can differ. 7 Secure zone RAM Enhanced HW MPU and 3DES/AES accelerator Flash ST33 ARM SC300 core Timers PKI cryptoprocessor SWP SPI GPIOs ISO7816

5 Industrial and Automotive requirements M2M applications can be addressed either with the ST32 Standard M2M platform or the ST33 Secure M2M platform, depending on the level of security required by the application. The ST32 Standard M2M platform fulfills the requirements of an embedded SIM for cellular applications. The ST33 Secure M2M platform is designed to be used as an embedded SIM compliant with the GSMA s specification for the remote provisioning and management of machine to machine connections allowing the management of several Mobile Network Operator profiles on the same device. Additionally, the security features available on the ST33 secure M2M platform enable authentication between subsystems, data encryption and key generation, while data such as secure keys, certificates, or other sensitive data can be stored securely and can only be modified by authorized people. These devices are designed to perform services like platform integrity such as Secure Boot ensuring that both the subsystem s hardware and software have not been compromised. PRODUCT QUALIFICATION The product qualification performed in the industrial field follows industrial grade JEDEC Standards applicable to the microelectronics industry. The product qualification performed in the automotive field complies with AEC-Q100 Standards. Those standards are defined and managed by the Automotive Electronics Council (AEC) and are required in the Automotive electronics industry. PPAP level 3 documentation (Product Part Approval Process) can be delivered on customer request by ST. This document provides all the evidences that the ST Automotive products have been developed, qualified and produced to meet the Automotive Customer requirements. CONTINUOUS IMPROVEMENT PROGRAM ST s Continuous Improvement Program implements a very innovative solution for failure analysis on the ST33 Secure Platform. The ST process flow integrates a reinforced control plan that ensures a test coverage above 98% and includes statistical tools for protecting our customers from any quality or reliability issues in the field. 8 9 Key industrial applications: Vending machines Remote control Remote monitoring Alarms and security Energy and utilities Mobile health (mhealth) Industry 4.0 Platform integrity Key automotive applications: ecall Connected cars In-car infotainment Intelligent transport systems (ITS) Fleet management Vehicle tracking Pay-as-you-drive insurance Java Card applications Platform integrity

6 Our M2M Solutions ST33 32bit ARM SC300 CPU 1.2MB eflash in 80nm DES, AES, ECC, RSA Co-processors 10 Based on a very large experience in secure mobile transactions and automotive applications, ST s M2M platforms provide solutions that enable secure wire and wireless communication between connected devices exploiting the Internet of Things. ST s M2M product families are designed to reach high levels of performance such as more than 500,000 erase/write cycles per page over an extended temperature range from 40 to +105 C under very harsh environmental conditions. Thanks to its native Page Flash robustness, and the increased failure analysis capability, STMicroelectronics can target very low ppm levels in line with the expectations of automotive customers. ST manufacturing plants in Europe have been qualified and certified to improve flexibility, service and ensure the implementation of our Business Continuity Plan (BCP). ST32 32bit ARM Cortex M3 CPU 512KB eflash in 90nm DES Co-processors ISO 7816 No CC Certification DFN8 30 mm 2 DFN8 6x5 (MFF2) remains the standard package for Automotive segment. For Industrial segment, the product can be delivered in wafer, D68 (3FF) or D18 (4FF) micro modules. ISO 7816, SPI M/S Certified CC EAL5+ ST33 SECURE M2M PLATFORM The ST33 Secure M2M platform is based on an ARM SecurCore SC bit RISC which is Common Criteria certified (CC EAL5+). It features up to 1280 Kbytes of embedded Flash memory, symmetric and asymmetric cryptographic engines and a large number of communication interfaces. It is designed to be used as an embedded SIM compliant with the GSMA s specification for the remote provisioning and management of machine-to-machine connections. The ST33 Secure M2M platform can be used as a Secure Element to protect sensitive information or ensure platform integrity.. DFN8 30 mm 2 UFDFPN mm 2 WLCSP Thin 7 mm 2 DFN8 6x5 (MFF2) remains the standard package for Automotive segment. For Industrial segment, the product can be delivered in wafer, D68 (3FF) or D18 (4FF) micro modules ST33 MAIN FEATURES 30 Kbytes of User RAM Up to 1.2 Mbytes of user Flash memory with OTP area 10 year data retention at 105 C, or 17 years at 85 C 500,000 erase/write cycles per page 256 Bytes of OTP for user ISO/IEC 7816, SPI master & slave and 7 GPIO interfaces Hardware security-enhanced DES and AES accelerators RSA and ECC cryptographic algorithms EAL5+ CC certification ST33G1M2M is qualified according to JEDEC specifications for Industrial applications ST33G1M2A is qualified in compliance with AEC-Q100 rev G specifications for Automotive applications 11 ST32 STANDARD M2M PLATFORM The ST32 Standard M2M platform is based on an ARM Cortex -M3 32-bit core. It features up to 512 Kbytes of embedded Flash memory and a standard DES cryptographic engine to enable secure authentication. It is designed to be used as an embedded SIM for cellular applications. ST32 MAIN FEATURES 12 Kbytes of User RAM Up to 512 Kbytes of user Flash memory with OTP area 10 year data retention at 105 C, or 17 years at 85 C 500,000 erase/write cycles per page 128 Bytes of OTP for user Hardware data encryption accelerator (DES) ST32G512M is qualified according to JEDEC specifications for Industrial applications ST32G512A is qualified in compliance with AEC-Q100 rev G specifications for Automotive applications SECURITY AND CERTIFICATIONS Beyond the encryption of data, signing of data, or pure authentication mechanisms, the ST33 secure microcontroller is designed to store secret information and keep it safe while being used. The ST33 M2M platform for Industrial and Automotive applications embeds state-of-the-art hardware security to resist against modern attempts to break its cryptosystems such as side-channel, fault injection and physical attacks. To guarantee a high level of security and ensure that your assets are protected, the ST33 M2M platform has been evaluated according to Common Criteria for Information Technology Security. It is the reference for the international standard (ISO/IEC 15408) of computer security. Under this standard, the ST33 M2M platform is certified according to the high security level of Common Criteria EAL5+. ISO/IEC 7816 interface ST33 SECURE M2M COMMERCIAL DERIVATIVES ST32 STANDARD M2M COMMERCIAL DERIVATIVES Flash memory (Kbytes) Industrial Automotive 512 ST32G512M ST32G512A 416 ST32G416M ST32G416A 320 ST32G320M ST32G320A 256 ST32G256M ST32G256A Flash memory (Kbytes) Industrial Automotive 1280 ST33G1M2M ST33G1M2A 1024 ST33G1M0M ST33G1M0A 896 ST33G896M ST33G896A 768 ST33G768M ST33G768A 640 ST33G640M ST33G640A 512 ST33G512M ST33G512A 384 ST33G384M ST33G384A

7 STMicroelectronics - September Printed in United Kingdom - All rights reserved The STMicroelectronics corporate logo is a registered trademark of the STMicroelectronics group of companies All other names are the property of their respective owners Order code: BRM2MSMCU0815 For more information on ST products and solutions, visit

Payment and Identification Secure solutions

Payment and Identification Secure solutions Payment and Identification Secure solutions ST at a glance STMicroelectronics is a global leader in the semiconductor market serving customers across the spectrum of sense & power, automotive and embedded

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

GSMA Embedded SIM Specification Remote SIM Provisioning for M2M. A single, common and global specification to accelerate growth in M2M

GSMA Embedded SIM Specification Remote SIM Provisioning for M2M. A single, common and global specification to accelerate growth in M2M GSMA Embedded SIM Specification Remote SIM Provisioning for M2M Purpose of this Reference Messaging Pack Appropriate slides may be selected to be used for within different presentations for multiple audiences

More information

Security in ST : From Company to Products

Security in ST : From Company to Products Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately

More information

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009 Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer October 2009 Jennic highlights Jennic is a fabless semiconductor company providing Wireless Microcontrollers to high-growth

More information

Connected things in the IoT world challenge your security! Wim van der Steeg

Connected things in the IoT world challenge your security! Wim van der Steeg Connected things in the IoT world challenge your security! Wim van der Steeg What is network security about? 2 November 206 3 November 206 IoT = process loops cross-harvesting data 0 0 0 0 0 0 0 0 0 0

More information

Entrust Smartcard & USB Authentication

Entrust Smartcard & USB Authentication Entrust Smartcard & USB Authentication Technical Specifications Entrust IdentityGuard smartcard- and USB-based devices allow organizations to leverage strong certificate-based authentication of user identities

More information

Flash Memory. For Automotive Applications. White Paper F-WP001

Flash Memory. For Automotive Applications. White Paper F-WP001 Flash Memory For Automotive Applications White Paper F-WP001 Corporate Headquarters: 39870 Eureka Dr., Newark, CA 94560, USA Tel: (510) 623-1231 Fax: (510) 623-1434 E-mail: info@smartm.com Customer Service:

More information

ST19NP18-TPM-I2C. Trusted Platform Module (TPM) with I²C Interface. Features

ST19NP18-TPM-I2C. Trusted Platform Module (TPM) with I²C Interface. Features Trusted Platform Module (TPM) with I²C Interface Data brief Features Single-chip Trusted Platform Module (TPM) Embedded TPM 1.2 firmware I²C communication interface (Slave mode) Architecture based on ST19N

More information

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,

More information

Java Embedded Applications

Java Embedded Applications TM a One-Stop Shop for Java Embedded Applications GeeseWare offer brings Java in your constrained embedded systems. You develop and simulate your Java application on PC, and enjoy a seamless hardware validation.

More information

Smart Card Technology Capabilities

Smart Card Technology Capabilities Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards

More information

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn

More information

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M Anvay Lonkar, Marketing Manager M2M Solutions & Services Gemalto M2M FORUM, MILAN, 15 May 2013 Gemalto delivers trusted and convenient digital services to billions

More information

Secure egovernment Where convenience meets security. www.infineon.com/ccs

Secure egovernment Where convenience meets security. www.infineon.com/ccs Secure egovernment Where convenience meets security www.infineon.com/ccs Gaining transparency Electronic ID documents replace and enhance conventional ID documents that governments have been issuing for

More information

STM32 F-2 series High-performance Cortex-M3 MCUs

STM32 F-2 series High-performance Cortex-M3 MCUs STM32 F-2 series High-performance Cortex-M3 MCUs STMicroelectronics 32-bit microcontrollers, 120 MHz/150 DMIPS with ART Accelerator TM and advanced peripherals www.st.com/mcu STM32 F-2 series The STM32

More information

STMicroelectronics: Open Development Environment (ODE) un sistema di sviluppo per applicazioni IoT

STMicroelectronics: Open Development Environment (ODE) un sistema di sviluppo per applicazioni IoT STMicroelectronics: Open Development Environment (ODE) un sistema di sviluppo per applicazioni IoT Politecnico di Torino ICT Days June 4, 2015 Fabio Osnato, Fabien Castanier, Fulvio Corazzo A global semiconductor

More information

epassauto PKI USB Token

epassauto PKI USB Token epassauto PKI USB Token An easy-to-use "Plug&Play" PKI product OVERVIEW FEITIAN epassauto PKI USB Token is a complete "Plug & Play" solution. The device can hold all necessary software programs, such as

More information

NXP s Solution to ecall Brussels, October 19 th, 2010

NXP s Solution to ecall Brussels, October 19 th, 2010 NXP s Solution to ecall Brussels, October 19 th, 2010 Agenda The Mission of NXP and its Partners NXP s ecall platform Awareness the Next Step Conclusions NXP leads innovation in Telematics Breakthrough

More information

Infineon Chip Card & Security ICs Portfolio

Infineon Chip Card & Security ICs Portfolio Infineon Chip Card & Security ICs Portfolio Security for the connected world www.infineon.com/ccs The Integrity Guard concept marks the dawn of the Digital Security Era. The SLE 78 controller family with

More information

Understand Electronic-Meter Design to Better Craft Intelligent and Secure Systems

Understand Electronic-Meter Design to Better Craft Intelligent and Secure Systems Understand Electronic-Meter Design to Better Craft Intelligent and Secure Systems driving trust Author, INSIDE Secure As more utility companies install smart electric and other types of utility meters

More information

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded

More information

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015 MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture

More information

SHE Secure Hardware Extension

SHE Secure Hardware Extension SHE Secure Hardware Extension Data Security for Automotive Embedded Systems Workshop on Cryptography and Embedded Security Embedded World @ Nuremberg, February 2012 Content Data Security - What does it

More information

NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/ V1A(s)

NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/ V1A(s) NXP Secure Smart Card Controllers Document information Info Content Keywords CC, Security Evaluation,, Functional Requirements, Security Functionality, Assurance Level, P5CC008, P5CC012 V1A/ V1A(s) Abstract

More information

2014 - Advanced Card Technology All Rights Reserved

2014 - Advanced Card Technology All Rights Reserved M2M (Machine to Machine) AGENDA Agenda 2 About Advance Card Technology 3 Our Customers 6 What is M2M 7 M2M imposes new demands 9 M2M product offering 10 M2M applications 21 M2M use cases 22 Contact us

More information

Infineon Chip Card & Security ICs Portfolio

Infineon Chip Card & Security ICs Portfolio Infineon Chip Card & Security ICs Portfolio Security for the connected world www.infineon.com/security 2 Security for the connected world In an increasingly connected world securing the interaction and

More information

LEGIC advant transponder chips. For flexible and secure ID systems at MHz

LEGIC advant transponder chips. For flexible and secure ID systems at MHz LEGIC advant transponder chips For flexible and secure ID systems at 13.56 MHz advant the right decision Free choice of medium With advant, you have a free choice of smartcard, key fob, watch, credit card,

More information

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS. State Machine Technology. about our technologies

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS. State Machine Technology. about our technologies WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn more about our technologies OUR LABS Highly

More information

NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1

NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1 NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1 Rev. 1.1 24 October 2011 BSI-DSZ-CC-0707 Evaluation documentation Document information Info Keywords

More information

What is a Smart Card?

What is a Smart Card? An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes Keith.Mayes@rhul.ac.uk Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types

More information

Infineon Chip Card & Security Security for the connected world

Infineon Chip Card & Security Security for the connected world Infineon Chip Card & Security Security for the connected world www.infineon.com/ccs Infineon Chip Card & Security Security. Convenience. Trust. Have it all! Securing data, affording convenience, mastering

More information

Bluegiga WF121 Wi-Fi Module. Embedded Wi-Fi modules. for affordable connectivity

Bluegiga WF121 Wi-Fi Module. Embedded Wi-Fi modules. for affordable connectivity Embedded Wi-Fi modules for affordable connectivity Bluegiga WF121 Wi-Fi Module WF121 is a standalone programmable Wi-Fi module with integrated TCP/IP s tack. It is an ideal product for embedded applications

More information

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution

More information

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Embedded RF ABSTRACT This application report describes

More information

Secure Wireless Application Platform

Secure Wireless Application Platform Texas Instruments SW@P Secure Wireless Application Platform New Challenges for Wireless Handsets Open Environment Multi-application, Interoperability Multiple Access Data Paths GSM/GPRS, EDGE, 802.11,

More information

epass PKI USB Token A stable and secure PKI product OVERVIEW

epass PKI USB Token A stable and secure PKI product OVERVIEW epass PKI USB Token A stable and secure PKI product OVERVIEW epass PKI USB Token is the world's foremost cryptographic identity verification module. epass by FEITIAN provides a host of indispensable protective

More information

Field Trip 2008. London, May 27th

Field Trip 2008. London, May 27th Field Trip 2008 London, May 27th Microcontrollers, Memories & Smartcards Claude Dardanne Corporate Vice President Microcontrollers, Memories & Smartcards Focusing on Embedded NVM Technologies Embedded

More information

RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM

RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM Qi Wenhua, Zhang Qishan, Liu Hailong School of Electronics and Information Engineering BeiHang University, P. R. China 100083 ABSTRACT Security hardware based

More information

Smart Card: The Computer in Your Wallet

Smart Card: The Computer in Your Wallet Smart Card: The Computer in Your Wallet MIPS Technologies, Inc. June 2002 Smart cards, credit-card-size pieces of plastic incorporating a silicon chip, comprise the highest volume computing platform. Roughly

More information

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD 8 BILLION IDENTITY DOCUMENTS IN CIRCULATION IN 2014 END-USER BENEFITS OT invents products and

More information

PUF Physical Unclonable Functions

PUF Physical Unclonable Functions Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication

More information

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in

More information

Network connectivity controllers

Network connectivity controllers Network connectivity controllers High performance connectivity solutions Factory Automation The hostile environment of many factories can have a significant impact on the life expectancy of PCs, and industrially

More information

The future of home automation ZigBee or Z-Wave?

The future of home automation ZigBee or Z-Wave? The future of home automation ZigBee or Z-Wave? Mark Grazier - December 14, 2013 Introduction There has been an ongoing debate between which technology is the best overall solution for Home Automation:

More information

SEMICON Europa Stephane Cordova, Director of Embedded Business Unit, Kalray

SEMICON Europa Stephane Cordova, Director of Embedded Business Unit, Kalray SEMICON Europa 2016 Stephane Cordova, Director of Embedded Business Unit, Kalray The real-time extreme computing processor Page 2 A NEW MARKET REQUIRING NEW SOLUTIONS EXPLOSION OF REAL-TIME AND CONNECTED

More information

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007 Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes

More information

ZigBee Technology Overview

ZigBee Technology Overview ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification

More information

NVM memory: A Critical Design Consideration for IoT Applications

NVM memory: A Critical Design Consideration for IoT Applications NVM memory: A Critical Design Consideration for IoT Applications Jim Lipman Sidense Corp. Introduction The Internet of Things (IoT), sometimes called the Internet of Everything (IoE), refers to an evolving

More information

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0 Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International

More information

DesignWare IP for IoT SoC Designs

DesignWare IP for IoT SoC Designs DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to

More information

Common Criteria for IT security evaluation

Common Criteria for IT security evaluation STMicroelectronics ST33F1M/1M0/896/768/640/512E, SC33F1M0/896/768/640/512/384E, SM33F1M/1M0/896/768/640/512E, SE33F1M/1M0/896/768/640/512E, SL33F1M/1M0/896/768/640/512E, SP33F1ME, with dedicated software

More information

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD TÜV Rheinland Nederland B.V. Version 20101101 Certification Report NXP Secure Smart Card Controller P40C012/040/072 VD Sponsor and developer: NXP Semiconductors Germany GmbH, Business Unit Identification

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

Introducing etoken. What is etoken?

Introducing etoken. What is etoken? Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant

More information

The Impact of IoT on Semiconductor Companies

The Impact of IoT on Semiconductor Companies Advisory The Impact of IoT on Semiconductor Companies Rajesh Mani Director, Strategy and Operations April 15, 2015 The Internet of Things (IoT) has been defined in multiple ways here s our take! The collection

More information

90nm e-page Flash for Machine to Machine Applications

90nm e-page Flash for Machine to Machine Applications 90nm e-page Flash for Machine to Machine Applications François Maugain, Jean Devin Microcontrollers, Memories & Secure MCUs Group 90nm e-page Flash for M2M applications Outline M2M Market Cycling Endurance

More information

StorePass PKI USB Token

StorePass PKI USB Token StorePass PKI USB Token A PKI product with an onboard Flash drive OVERVIEW StorePass PKI USB Token by FEITIAN is a hybrid device which combines Flash memory with Public Token Infrastructure technology.

More information

RFID - its Applications and Benefits. Mario Rivas Executive Vice President Communications Businesses Semiconductors Division

RFID - its Applications and Benefits. Mario Rivas Executive Vice President Communications Businesses Semiconductors Division RFID - its Applications and Benefits Mario Rivas Executive Vice President Communications Businesses Semiconductors Division Topics Background RFID fact and benefits Today s applications Semiconductors

More information

MEPTEC. Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015 tonym@semico.

MEPTEC. Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015 tonym@semico. MEPTEC Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015 tonym@semico.com Outline Impact of Sensors Basic Building Blocks for IoT Sensors

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

Smart Cards a(s) Safety Critical Systems

Smart Cards a(s) Safety Critical Systems Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas Paradinas@gemplus.com Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business

More information

The shortest path to cellular communications: Cellular Development Platform

The shortest path to cellular communications: Cellular Development Platform The shortest path to cellular communications: Cellular Development Platform Multi-Tech Overview 40 years focused on Machine-to-Machine (M2M) Communications 80+ patents 20+ million devices, thousands of

More information

Spotlight on embedded security. Keeping up with the Internet of Things.

Spotlight on embedded security. Keeping up with the Internet of Things. Spotlight on embedded security Keeping up with the Internet of Things www.infineon.com/embedded-security Rising concerns about embedded security Embedded systems are becoming ubiquitous. Trends such as

More information

Using AES 256 bit Encryption

Using AES 256 bit Encryption Using AES 256 bit Encryption April 16 2014 There are many questions on How To Support AES256 bit encryption in an Industrial, Medical or Military Computer System. Programmable Encryption for Solid State

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Content 1.What is the purpose of the IDProve 700 Display Cards? 2.What is an IDProve 700 Display card? 3.How does IDProve 700 work? 4.What is the purpose of the IDPrime.NET 7510

More information

Company Presentation. October 2015

Company Presentation. October 2015 Company Presentation October 2015 A global semiconductor leader 2014 revenues of $7.40B Listed: NYSE, Euronext Paris and Borsa Italiana, Milan Who we are 2 Research & Development Main Sales & Marketing

More information

Key & Data Storage on Mobile Devices

Key & Data Storage on Mobile Devices Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With

More information

Chip Card & Security ICs Mifare NRG SLE 66R35

Chip Card & Security ICs Mifare NRG SLE 66R35 Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information

More information

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator Confidentio Integrated security processing unit Including key management module, encryption engine and random number generator Secure your digital life Confidentio : An integrated security processing unit

More information

advant advanced contactless smart card system

advant advanced contactless smart card system LA-11-001l-en [08.2012] advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant product line ideally supports the design and

More information

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A www.acs.com.hk 1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A 2 3 ACOS5 Series (32KB EEPROM) Cryptographic Smart Card and Token Module

More information

Atmel Crypto Products Portfolio. Family of Secure Authentication Solutions

Atmel Crypto Products Portfolio. Family of Secure Authentication Solutions Atmel Crypto Products Portfolio Family of Secure Authentication Solutions Atmel Crypto Products Portfolio The Atmel Crypto Products Portfolio offers full system security solution options for a wide variety

More information

OT PRODUCTS & SOLUTIONS TRANSPORT

OT PRODUCTS & SOLUTIONS TRANSPORT OT PRODUCTS & SOLUTIONS TRANSPORT TOWARDS TRUE MOBILITY TRANSPORT OPERATORS AND TODAY, CONTACTLESS INTEGRATORS ARE FACING TRANSPORT SYSTEMS STRATEGIC CHALLENGES LACK INTEROPERABILITY, WHILST A FULL RANGE

More information

Infineon at a glance 2015

Infineon at a glance 2015 Infineon at a glance 2015 www.infineon.com We make life easier, safer and greener with technology that achieves more, consumes less and is accessible to everyone. Microelectronics from Infineon is the

More information

Solutions. Machine-to-Machine. Arrow Electronics. Complete, end-to-end solutions over the life of your product.

Solutions. Machine-to-Machine. Arrow Electronics. Complete, end-to-end solutions over the life of your product. AR R OW E L E CTR O N I CS A MERI CA S CO MP ONENTS machine machine-to- CAPABILITIES Arrow Electronics Americas Components m2m@arrow.com Arrow Electronics Machine-to-Machine Solutions Complete, end-to-end

More information

Secure Data Exchange Solution

Secure Data Exchange Solution Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates

More information

Smartcard IC Platform Protection Profile

Smartcard IC Platform Protection Profile Smartcard IC Platform Protection Profile Version 1.0 July 2001 developed by Atmel Smart Card ICs Hitachi Europe Ltd. Infineon Technologies AG Philips Semiconductors Registered and Certified by Bundesamt

More information

Wind River Helix Chassis

Wind River Helix Chassis Wind River Helix Chassis Simplifying the Connected Car Connected, intelligent vehicles hold great promise, but the increasing complexities of developing, integrating, and managing a growing number of software

More information

M-Shield mobile security technology

M-Shield mobile security technology Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a

More information

Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation

Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation CELTIC Day, Berlin, June 25 th 2014 Gemalto at a glance 2.4bn revenue 2013 2bn+ end-users benefit from our solutions

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

NXP Semiconductors. Company Presentation February 2015

NXP Semiconductors. Company Presentation February 2015 NXP Semiconductors Company Presentation February 2015 Accelerating Technology Trends Drive Opportunities for NXP Secure Connections for a Smarter World Everything Connected Everything Smart Everything

More information

System Security Solutions for the connected world. www.infineon.com/ccs

System Security Solutions for the connected world. www.infineon.com/ccs System Security Solutions for the connected world www.infineon.com/ccs Solutions for rising security demands The right balance between hardware-based and software-based security mechanisms allows you to

More information

FLASH-BASED MICROCONTROLLERS

FLASH-BASED MICROCONTROLLERS FLASH-BASED MICROCONTROLLERS STRATEGY Leverage core NVM competency into unique memory and logic products. EPROMS Micro/ Peripherals Telecommunications, Computers Nonvolatile Memories Consumer Automotive

More information

Unleashing the Power of the Internet of Things

Unleashing the Power of the Internet of Things Gemalto M2M Make an M2M wish! Unleashing the Power of the Internet of Things Our M2M portfolio is enabling secure solutions in industries ranging from healthcare, retail services, smart energy, transportation,

More information

The Importance of Secure Elements in M2M Deployments: An Introduction

The Importance of Secure Elements in M2M Deployments: An Introduction The Importance of Secure Elements in M2M Deployments: An Introduction February 2014 Securing the future of mobile services 2 Contents THE IMPORTANCE OF SECURE ELEMENTS IN M2M DEPLOYMENTS... 3 1. INTRODUCTION...

More information

UICC SIM-Card. New functionality New services and New business opportunities. Paradigm: a SIM card = a Smart Card. Tor Hjalmar

UICC SIM-Card. New functionality New services and New business opportunities. Paradigm: a SIM card = a Smart Card. Tor Hjalmar UICC SIM-Card Paradigm: a SIM card = a Smart Card New functionality New services and New business opportunities Tor Hjalmar SIMcard UICC Basic rationale: To comply with 3G networking requirements (USIM)

More information

Security & Chip Card ICs SLE 44R35S / Mifare

Security & Chip Card ICs SLE 44R35S / Mifare Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info

More information

Using Contactless Smart Cards for Secure Applications

Using Contactless Smart Cards for Secure Applications Best Practices Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005e-en Edition: 04.2012 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse

More information

5.4 Microcontrollers I: Introduction

5.4 Microcontrollers I: Introduction 5.4 Microcontrollers I: Introduction Dr. Tarek A. Tutunji Mechatronics Engineering Department Philadelphia University, Jordan Microcontrollers: Introduction Microprocessors were described in the last three

More information

Trusted Boot Loader Steve Johnson, Panasonic Chair Security WG San Jose April 12, 2006

Trusted Boot Loader Steve Johnson, Panasonic Chair Security WG San Jose April 12, 2006 Trusted Boot Loader Steve Johnson, Panasonic Chair Security WG San Jose April 12, 2006 April 12th, 2006 1 Synopsis Background Trusted boot Security enhancements to boot loader Necessary code U-Boot Kernel

More information

CINTERION The global leader in cellular M2M communication. Cinterion Wireless Modules GmbH 2011, All rights reserved

CINTERION The global leader in cellular M2M communication. Cinterion Wireless Modules GmbH 2011, All rights reserved The global leader in cellular M2M communication Cinterion Wireless Modules GmbH 2011, All rights reserved is a Gemalto company Company History Gemalto The company was founded in 1995 as a business unit

More information

SINGLE DEVICE FOR MULTIPLE TASKS

SINGLE DEVICE FOR MULTIPLE TASKS ViZRO s BioMate M043 SINGLE DEVICE FOR MULTIPLE TASKS Datasheet ViZRO S BioPad Vizro Technologies www.vizro.net INDEX 1. Introduction 2. Main Application Area 3.Technical Specifications 4.Product Picture

More information

mifare DESFire Contactless Multi-Application IC with DES and 3DES Security MF3 IC D40 INTEGRATED CIRCUITS

mifare DESFire Contactless Multi-Application IC with DES and 3DES Security MF3 IC D40 INTEGRATED CIRCUITS INTEGRATED CIRCUITS mifare DESFire Contactless Multi-Application IC with DES and 3DES Security MF3 IC D4 Product Revision 3. April 24 PUBLIC Philips Semiconductors CONTENTS 1 FEATURES...3 1.1 RF Interface:

More information

Secure Hardware PV018 Masaryk University Faculty of Informatics

Secure Hardware PV018 Masaryk University Faculty of Informatics Secure Hardware PV018 Masaryk University Faculty of Informatics Jan Krhovják Vašek Matyáš Roadmap Introduction The need of secure HW Basic terminology Architecture Cryptographic coprocessors/accelerators

More information

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices

More information