Embedded systems are becoming ubiquitous. Due to trends such as the Internet of Things (IoT) and machine-to-machine communication (M2M) the number of connected devices and machines are increasing. Many of these - from small household appliances through large communication networks to complex, industrial automation systems - are controlled by special-purpose, embedded computing systems.
While this networking trend continues to gather pace - promising greater convenience and comfort for users and new business and service models for companies - security in this embedded world often lags far behind. Security vulnerabilities are rising dramatically as the attack surface widens and manufacturers struggle to protect sensitive data, IP and process integrity.
Our OPTIGA™ family of security solutions is designed for easy integration into embedded systems. These hardware-based security solutions scale from basic authentication functionality to advanced implementations meeting your individual and changing needs, while maximizing the return on your investment.
Both our OPTIGA™ Trust and OPTIGA™ TPM product families provide proven and reliable embedded security performance.
We understand that security needs are as varied as they are complex. Scaling from basic, single-function authentication solutions to robust certified security controllers for advanced platform integrity checks, we have developed the market's widest portfolio to support individual security needs across a broad market spectrum.
As an entry point to corporate, home or industrial networks, routers and gateways are especially vulnerable to outside attacks. A failure to protect these entry points can result in the loss of confidential information as well as interrupted operations.
Equipped with an OPTIGA™ TPM the network equipment enables the uninterrupted operation of the system as well as protecting sensitive information by relying on the standardized, certified OPTIGA™ TPM solutions. It can do so by performing integrity checks, securely managing the equipment remotely as well as supporting the encryption of information transferred through and stored in the router or gateway. With its extensive functionality it allows to satisfy both basic security needs as well as fulfilling complex requirements as your needs evolve.
Industrial automation, medical equipment, electronic components - plagiarism of capital equipment and consumer products endangers both, user experience and safety as well as companies business models and investments. According to the OECD, counterfeiting and piracy costs add up to around 638 billion US dollars annually.
The new OPTIGA™ Trust E offers an easily implementable solution to protect manufacturers' valuable IP from being attacked, analyzed, copied and modified. Enhanced authentication as well as secured storage of software codes and product data improve network and supply chain management - particularly in the context of Industry 4.0. And help manufacturers of high value goods to safeguard their IP and protect their brand through assured quality and safety of their products.
Our OPTIGA™ Trust family of turnkey, programmable solutions gives you the benefit of easy and convenient integration whilst offering you the most suitable security level to protect your business model, process know-how and IP.
You can rely on OPTIGA™ Trust products to protect your embedded systems against counterfeiting, unauthorized products, intentional attacks and unintentional operator errors.
OPTIGA™ Trust B SLE95250 is a robust cryptographic solution for embedded systems requiring easy-to-integrate, reliable authentication features. This security solution is designed to help system and device manufacturers safeguard the authenticity, integrity and safety of their original products.
As a turnkey solution, it provides enhanced protection against aftermarket counterfeit replacements and unauthorized re-use or re-provisioning of original parts - thus helping to maintain OEM authenticity and safeguard the user experience.
OPTIGA™ Trust E is a high-end turnkey security controller with full system integration support for easy and cost-effective deployment. It supports a broad range of uses cases focused on the protection of services, business models and user experience. One-way authentication mechanisms uniquely identify objects and protect PKI networks.
OPTIGA™ Trust P (SLJ 52ACA) is a high-security, feature-rich solution. As a fully programmable chip, it is a highly flexible and secured solution supporting the full range of functions from authentication and secured updates through key generation and access control. This hardware security microcontroller provides advanced and efficient protection against side-channel, fault-induction, and physical attacks.
The OPTIGA™ Trust X is Infineon’s response to those threats. It is a hardware based security solution optimized to address IoT device’s requirements: premium security, high performance, easy to integrate, supporting non-rich operating systems, low power consumption, and small packages. The product covers a broad range of use cases: authentication, secure communication, data store protection, key provisioning, life-cycle management, power management, secure updates, and also platform integrity protection.
OPTIGA™ TPM (Trusted Platform Module) offers a broad portfolio of standardized security controllers with secured key store and the support for a variety of encryption algorithms.
OPTIGA™ TPM (Trusted Platform Module) is a standardized security controller which protects the integrity and authenticity of devices and systems in embedded networks. Built
on proven technologies and supporting TPM 1.2 and the latest TPM 2.0 standard, OPTIGA™ TPM highlights include secured storage for keys, certificates and passwords as well as dedicated key management. As the established, trusted market and innovation leader in the Trusted Computing space, we offer a broad portfolio of certified OPTIGA™ TPM) security controllers based on the Trusted Computing Group (TCG) standard to suit all needs.
Get started with OPTIGA™ Trust B with the demo kit. The kit includes a host MCU and an OPTIGA™ Trust B SLE95250. It has a JTAG interface as well as an I/O Extension Card with an additional SLE95250.
The demo kit comes with a user manual, and a graphical user interface for evaluation purposes. It also includes a Dave IDE as well as a HiTop Debugger. All in all a this is a full scale demo kit to get you started.
The OPTIGA™ Trust E evaluation kit based on an Infineon XMC4500 showcases all OPTIGA™ Trust E use cases making it easy for you to get started with this product.
With an easy PC plug-in and a PC user interface it allows you a quick start for evaluating the OPTIGA™ Trust E.
Learn more about the OPTIGA™ Trust P with the demo kit. It gets you started by demonstrating the functionalities of the OPTIGA™ Trust P and is expandable to a full development kit with a software download from an Infineon Secure Site.
The kit includes both the host controller board as well as connection cables, demo utility software (for the PC) and a demo system user guide.
The OPTIGA™ Trust X evaluation and demonstration kit is a quick and easy way of getting started with IoT security. The OPTIGA™ Trust X is an authentication device mainly used for IP protection of accessories and spare parts. As a full turnkey solution it comes with a high-end security controller, operating system as well as a library for the main system host controller. The PC plug in board is based on a XMC4500 microcontroller and comes with software providing the user an intuitive graphical user interface. This allows users to try out the applications of the OPTIGA™ Trust X such as a one way authentication, insertion of cryptographic certificates as well as reading and writing data.
Summary of Features:
The OPTIGA™ Trust X evaluation and demonstration kit serves to demonstrate the OPTIGA™ Trust X (SLS 32AIA) functionalities and typical applications such as a one way authentication for counterfeit protection.
Get started for your embedded system with the OPTIGA™ TPM evaluation board today.
The IRIDIUM plug-in board can be used to evaluate the OPTIGA™ TPM for both a Raspberry Pi and Beagle Board. It comes with an extensive application note enhanced by the publicly available Linux setup and drivers, software stacks and so on. Everything you need to get started with TPM for your application is available - start securing your application today.
For further use cases, there are also Xenon evaluation boards available for all of the OPTIGA™ TPM products that allow you to easily test and evaluate the TPM functionalities.
Embedded devices are increasingly connected and as part of this connectivity increasingly at risk to be manipulated or attacked. Attackers can gain access to valuable information such as IP and customer data or can manipulate the system or even introduce counterfeit devices.
To prevent this, strong embedded security measures are needed. Attendees will learn the fundamentals of how embedded systems are at risk and what can be done to protect them.