²ÝÁñÉçÇø

²ÝÁñÉçÇø tRoot Secure Hardware Root of Trust

²ÝÁñÉçÇø tRoot? Secure Hardware Root of Trust is ²ÝÁñÉçÇø¡¯ highly secure hardware root of trust that enables connected devices to securely and uniquely identify and authenticate themselves to create secure channels for remote device management and service deployment. tRoot¡¯s advanced design addresses complex threats by protecting the device and its data at boot time, run time and during the communication with other devices or the cloud. tRoot consistently addresses security throughout the device¡¯s lifecycle, offering SoC designers the most efficient combination of power, size and performance.

²ÝÁñÉçÇø¡¯ tRoot can be implemented in a system without the need to lock memory resources as it can share memory resource already available in the system. Its unique architecture can effectively adjust to future security requirements and standards, and enable personalization of features, services and environments to create business growth and monetization in many markets, including the exploding IoT market. tRoot supports a whole range of additional features, from remote device and feature activation, secure key provisioning and management to secure communication, and secure in-field firmware updates.

 

Highlights
Features
  • Run-time integrity protection
  • Anti-tampering, anti-cloning for IP protection
  • Secure boot
  • Secure storage
  • Secure debug and testing
  • Secure identification and authentication
  • Secure communication
  • Brand integrity protection
  • Secure provisioning, storage and management of keys and other secrets
    • Hardware protected device unique key and platform key ¨C not accessible by trusted software
  • Enables secure services deployment
  • Secure in-field firmware updates
  • Personalization
  • Power management
  • Cryptographic cores and security subsystems with support for AES, SHA, ECC, RSA, TRNG
  • AMBA? AXI?/AHB? interfaces