Solutions
Providing overall product direction
Assisting product development
Assisting product development
The solution adopts PKI/symmetric key authentication mechanism to provide security authentication for IoT devices. A security IC is used as a trusted root to save sensitive data such as the key and the device certificate. The security IC provides hardware protection for sensitive data, to ensure the data cannot be read and critical data are encryption stored.