In general, when many distribution stages are passed, freshness decreases or logistics costs increase, and it is necessary to use a cold chain to secure quality. Also, recently, in relation to Covid-19, delivery from production areas to homes is increasing. In particular, Pfizer's storage conditions are -60°C and Moderna's storage conditions are -20°C. There is a possibility. It requires cryogenic distribution network technology. We call it ‘Super Cold Chain’. This industry is growing at an average annual rate of 15%, and securing this technology is very important.
The need for a cold chain
(1) Collection of temperature and humidity data
(2) Collection of information such as car door billing
(3) Packetization of collected information
(4) Transmission of data without forgery from device gateway to server
(5) Storage of data on the server
(6) Sending an alarm to a mobile phone when a dangerous situation occurs
(7) The administrator checks the collected data in real time
(8) Technology for storage in a block chain to prevent forgery and falsification in the server
It has the above technology, and in particular, it guarantees the confidentiality of data transmitted and
received through TLS encrypted communication from the device gateway to the server through the security chip G3 mounted on the LTE CAT M1 modem.
In addition, it has its own Secure FOTA function for the security of the device's firmware update. It also has a function to manage devices using protocols such as CoAP, LWM2M, and MQTT.
In addition, it supports encrypted communication of apps used by managers and drivers on smartphones equipped with ICTK's secure USIM (PUF USIM). We have secured technological prowess for E2E services from sensors to cloud and mobile.
For device protection, a secure bootloader and firmware protection can be provided as a security chip.
Configuration of cold chain
|Collection of temperature and humidity data|
|Collection of information such as car door billing|
|(3)||Packetization of collected information|
|(4) ||Transmission of data without forgery from device gateway to server|
|(5) ||Storage of data on the server|
|(6) ||Sending an alarm to a mobile phone when a dangerous situation occurs|
|(7) ||The administrator checks the collected data in real time|
|(8) ||Technology for storage in a block chain to prevent forgery and falsification in the server|
What is Hardware Root of Trust (HRoT)?