TPU Inference Servers for Efficient Edge Data Centers - DOWNLOAD

Intrinsic ID introduces Zign software to protect IoT sensor devices from cyberattacks

Intrinsic ID introduces Zign software to protect IoT sensor devices from cyberattacks

Intrinsic ID, a company that provides security IP for embedded systems, has introduced Zign, a software-only tool for keeping edge computing and IoT sensor devices secure.

According to Intrinsic ID, Zign allows connected devices to operate in compliance with the highest security standards of both the US and EU governments. The security software uses the company’s proprietary SRAM Physical Unclonable Function (PUF) technology. With SRAM PUF technology, device-unique keys are obtained from minute discrepancies in a chip’s silicon structure. This eliminates the requirement for programming keys or specialized security hardware.

Intrinsic ID Zign provides security to IoT devices deployed in various sectors, including the manufacturing, banking, medical and automotive industries. To ensure secure communications and data protection, the company designed an encryption tool to safeguard IoT information as it is transmitted.

Intrinsic ID states the Zign security software is cost-effective as it patches security loopholes without requiring expensive device reconfiguration. The company says the solution is future-proof, offering security functions to protect IoT devices throughout their lifecycle.

“Governments around the world are waking up and realizing additional security standards for consumer devices are needed to address the growing and important role the billions of connected devices we rely on everyday play. The EU Cyber Resilience Act and the IoT Cybersecurity Improvement Act in the United States are driving improved security practices as well as an increased sense of urgency,” says Dr. Pim Tuyls, the CEO and co-founder of Intrinsic ID.

Recommended reading: Five principles for maintaining edge security

What is PUF hardware security?

A Physical Unclonable Function is a hardware security feature that generates a unique and unpredictable identifier based on the physical characteristics of a hardware platform. This distinctive identifier can be used for security and authentication in embedded systems and IoT applications. The technology exploits variations, such as threshold voltages and other physical properties, to generate an almost impossible identifier to replicate.

A Physical Unclonable Function can be advantageous over a traditional security solution, such as encryption keys because the latter can be reverse-engineered and tampered with. The PUF hardware security resists these actions as it doesn’t rely on a fixed secret key. PUF, for example, can be used for smart IoT devices to prevent unauthorized access.

“With the immense diversity of IoT devices supplied by various vendors, a device-agnostic security solution is key. Zign enables a more trustworthy and reliable IoT by providing every device with a security anchor based on the unique hardware properties of the device,” Tuyls adds.

Article Topics

 |   |   |   | 

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Featured Edge Computing Company

Edge Ecosystem Videos

Latest News