IoT Device major Security Issues | Requirements | Solutions |
• Illegal Device • Unusual access | Blocking device duplication and illegal access | Certification |
• Device F/W falsification & Malicious code injection | Device F/W security enhanced | Secure Boot / Secure Update |
• Data tampering | Strengthen network security | Communication data security (Data Integrity, Data Encryption) |
• Data breach | Reliable Root of Trust | Secure Storage |
Dataless | Inborn ID |
IoT Device major Security Issues | Requirements | Solutions |
• Illegal Device • Unusual access • Device F/W falsification & Malicious code injection • Data tampering & breach | Use of secure cryptographic algorithms | ECC 256 AES 128 SHA 256 |
• Physical attack | Micro-probing, Protection from physical attacks such as side-channel attacks | Equipped with PUF-based physical protection and defense solution |
IoT Device 주요 보안 문제점 | 요구 사항 | 해결 방안 |
• 불법 Device • 비정상적 접근 • Device F/W 변조 및 악성코드 삽입 • 데이터 변조 및 유출 | 안전한 암호 알고리즘 사용 | ECC 256 AES 128 SHA 256 |
• 물리적 공격 | Micro-probing, 부채널 공격 등 물리적공격으로 부터의 보호 방안 | PUF 기반 물리적 보호 및 방어 솔루션 탑재 |
![]() |
Keys, Certificates, Crypto AcceleratorsKey and certificate generation by H/W block in Cloneproof Secure ID-based security chip Crypto algorithm supported by H/W |
![]() |
Secure Inborn IDProvides a service platform using UUID Secure Inborn ID such as non-replicable fingerprints based on Chip's unique HW characteristics |
![]() |
Secure StorageSecure data storage through secure storage encrypted based on physical security key(key, certificate, user data) |
About us | PUF Technology | Product | Resource | Contact Us | Investment | Careers |
What is Hardware Root of Trust (HRoT)? |