²ÝÁñÉçÇø tRoot? Secure Hardware Root of Trust is ²ÝÁñÉçÇø¡¯ highly secure hardware root of trust that enables connected devices to securely and uniquely identify and authenticate themselves to create secure channels for remote device management and service deployment. tRoot¡¯s advanced design addresses complex threats by protecting the device and its data at boot time, run time and during the communication with other devices or the cloud. tRoot consistently addresses security throughout the device¡¯s lifecycle, offering SoC designers the most efficient combination of power, size and performance.
²ÝÁñÉçÇø¡¯ tRoot can be implemented in a system without the need to lock memory resources as it can share memory resource already available in the system. Its unique architecture can effectively adjust to future security requirements and standards, and enable personalization of features, services and environments to create business growth and monetization in many markets, including the exploding IoT market. tRoot supports a whole range of additional features, from remote device and feature activation, secure key provisioning and management to secure communication, and secure in-field firmware updates.