You are safe with ICTK
History



We Protect Your Values!

2018 IoT Security SolutionThe Korea Electronics Engineering Awards..."Kim Dong Hyun, CEO of ICTK," won the Technology Innovation Award.

박성욱 SK하이닉스 부회장이 대한전자공학회가 주관하는 '2018년 대한전자공학대상'을 수상했다.

<박성욱 부회장>

박 부회장은 SK하이닉스에 입사해 34년간 한국 메모리 반도체 발전에 몸담은 엔지니어 출신 경영자다. 연구개발 주요 보직을 두루 거치며 D램과 낸드플래시 등 기술개발을 주도했다. 강력한 기술 리더십으로 SK하이닉스를 세계 3위 반도체 기업으로 성장시키고 지속가능한 성장기반을 다졌다는 평가다.


<김동현 대표>

기술혁신상 수상자로는 김동현 아이씨티케이 대표가 선정됐다. 김 대표는 보안 칩 핵심 기술인 물리 복제 방지 기술(Physical Unclonable Function) 원천·상용화 기술 개발을 통해 스마트 가전, 무인 이동체, 클라우드 등 초연결 사회 보안기술 발전에 기여했다. 


To read more:

https://www.etnews.com/20181123000257








Introduction to vertical business areas 

Go >










Introduction to vertical business areas 

Go >










Introduction to vertical business areas 

Go >



We do these things.
PUF Technology



What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.

Resource
  Product

Resource

Product

News