Secure Library

TO-PROTECT

to-protect is a family of lightweight secure libraries from Trusted Objects designed to protect devices and data against security attacks

Having the same security functionalities as a Secure Element, it can be used as a software Root-of-Trust (RoT) for generic MCU-based devices:

  • Designed for devices with limited computing and communication capabilities
  • Available in several product versions according to communication protocols
  • Enable critical security functions: secure authentication, data transfer integrity and confidentiality, secure boot, secure storage and more
  • Include a TLS/DTLS full stack secure implementation
  • Matter-security compliant (cryptography operations and keys secure storage)
  • Easy download into any generic MCU (ARM Cortex, ESP32 Xtensa, RISC V…) without having to change the design of the IoT hardware platform

to-protect benefits

  • Easy security retrofit for devices already in the field through FUOTA mechanism (Firmware update over the air)
  • Prevention against logical and physical security attacks on IoT devices exposed to threats
  • Reduced code size, no impact on device performances
  • Easy to integrate into security management platforms
  • SESIP certified (Security Evaluation Standard for IoT platforms)
  • to-protect programming qualified at AVNET programming center -Munich (Germany)

 

With Trusted Objects, we are able to more flexibly design secure IoT solutions that match our customers’ needs and, ultimately, their unique business cases. “The real difference in our approach is our ability to accommodate solutions that are both low-power and large-scale. Together with Trusted Objects, Avnet offers customers a complete Industrial IoT solution that’s simple to integrate and unique to the market—one that makes IoT security more scalable and easier to implement.”

Lou Lutostanski, Vice President of Internet of Things, Avnet
Lou Lutostanski

 

Avnet Silica partners with Trusted Objects to bring trust throughout your product lifecycle.

Trusted Objects lifecycle block diagram

 

Related Links