ICTK FOTA Login
Primarily, the FOTA service downloads upgrades directly from the service provider.
The following technologies are mainly applied.
▪ Remote device management via OTA software update
▪ Scheduling, release and reporting of firmware build versions via web server interface solution
▪ Code signing to ensure the authenticity (data integrity and source authentication) of each firmware
image being updated
▪ Manage controlled and customized OTA software releases through logical device groupings based
on project requirements
▪ Ensure minimal device downtime during updates
▪ Ensure that all sessions of FOTA update are complete and clean, so that the firmware update does not
end up in an incomplete/broken state.
▪ | Remote device management via OTA software update |
▪ | Scheduling, release and reporting of firmware build versions via web server interface solution |
▪ | Code signing to ensure the authenticity (data integrity and source authentication) of each firmware image being updated |
▪ | Manage controlled and customized OTA software releases through logical device groupings based on project requirements |
▪ | Ensure minimal device downtime during updates |
▪ | Ensure that all sessions of FOTA update are complete and clean, so that the firmware update does not end up in an incomplete/broken state. |
ICTK ISF Manager (FOTA)
ICTK ISF Manager (FOTA)
It plays the role of a CA that generates a basic key to ensure the integrity of the firmware, and provides various options for OTA. It supports multiple manufacturers and multiple devices in one cloud system, and provides options such as downloading the entire firmware for OTA firmware and only the changed parts. It also supports issuance function for PUF. By supporting ZTP (Zero Touch Provisioning), the device is automatically enrolled. By distributing download tasks, it reduces the load on the server, and provides the ability to download experimentally for each device group and then download as a whole.
Course | AWS manual setup | ISF, easy to use |
system setting | SS3 Bucket Creat | Functions provided in advance by ISF Platform |
OTA update role create | ||
OTA update permission add | ||
OTA policy create – iam policy | ||
OTA policy create -S3 policy | ||
Set signing certificate authority | ||
Create OTA rules and connecting | ||
Basic Setting | Generate keys and certificates | Certificate and model registration |
Signing certificate registration | ||
IOT CA creation and registration | ||
Issue | PUF Issued | PUF Issued |
Device registration | Registration of IOT | ZTP(auto) |
Attach the certificate to the registered thing | ||
FOTA registration | Upload Firmware to Bucket | Firmware registration |
create task | Download task fulfillment | |
실행 | Firmware Download | Firmware Download |
Also, through PUF-based registration and authentication, we are ready to download integrity firmware to IoT devices based on strong authentication and trust between the device and the download server. It supports on-premise and AWS cloud methods, and provides services that can be customized to suit the characteristics of each operator.
About us | PUF Technology | Product | Resource | Contact Us | Investment | Careers |
What is Hardware Root of Trust (HRoT)? |