You are safe with ICTK

We Protect Your Values!

2016 PUF Mass-Produce & SaleIoT security leadership

Cho In-haeng, right, vice president of the Internet of Things (IoT) business division at LG CNS, poses with ICTK CEO Kim Dong-hyun, after signing a partnership on IoT security management, at LG CNS headquarters on Yeouido, Seoul, Monday. / Courtesy of LG CNS

By Lee Min-hyung

LG CNS said Monday it has signed a partnership with a local security software provider over establishing a more secure Internet of Things (IoT) platform.

The system integration affiliate of LG Group said in a statement that the company signed a memorandum of understanding (MoU) with ICTK for business collaboration in applying physical unclonable function (PUF) technology into their IoT security management system. The PUF is a technology to detect tampering in IoT devices and is widely used for applications that require high security levels.

Under the partnership, LG CNS and ICTK will develop technologies to equip IoT security management servers and modules with the PUF technology, LG CNS said.

"With the rise of the IoT, security concerns are growing dramatically," Cho In-haeng, vice president of the IoT business division at LG CNS, said.

"Expectations are that LG CNS will benefit from the partnership, as the PUF technology is a hardware-based, strong security system. We are going to lead the IoT market by generating synergy with the security partnership," he said.

LG CNS plans to draw a specific plan to apply the technology to its IoT platform and will finish developing the PUF-converged security technology by the end of this year, the company said.

To read more:

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

We do these things.
PUF Technology

What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.