Security Solution with hardware secure IP Ubiquitous Securus Secure data management solution using hardware secure IP

In order to realize the high security which is indispensable for future IoT or M2M (Machine to Machine), the IoT device also needs to be secure. Ubiquitous Securus is a solution that strictly manages confidential data in order to realize the development and manufacture of secure IoT devices. By securely protecting confidential data using hardware's secure IP, we strongly support customers' secure IoT system development, preventing spoofing of devices, data leakage and tampering.

Ubiquitous AI Corporation helps to develop not only security measures for copyright protection technologies such as DTCP-IP and HDCP used for digital home appliances and IVI (In-Vehicle Infotainment) but development of Secure IoT devices that are rapidly spreading .

Features

In addition to software processing, Ubiquitous Securus realizes high security by controlling and using Hardware Secure IP of SoC and MCU.
Comprehensive support from consulting before introduction to maintenance after manufacture enables to significantly reduce the development period and the burden on developers and to commercialize secure network equipment in a short period of time.

Strong confidential data management difficult to realize with software alone

By providing software that uses Hardware Security IP, you can realize strong secret data management that is difficult to achieve with software alone.

Available for various semiconductors

Considering that different Hardware Security IPs are implemented due to generation change of semiconductors, the porting layer is implemented with a design less affecting the upper application.

Provide comprehensive technical cooperation and support

In order to develop secure network equipment, comprehensive technical cooperation from planning, development, manufacturing to maintenance will shorten development period and burden on developers dramatically.

Main functions

Encryption / decryption function

AES Encryption and Decryption functions. If you have the corresponding function on the hardware side, use the hardware function.

Hash function

Hash calculation function and hash-based message authentication function.

Secure Storage function

A function for appropriately encrypting confidential data such as device-specific certificate and encryption key, storing it in the device, and using it.

Content Protection function

Function to securely encrypt content data locally. Even in the unlikely event that data leaks, it is impossible to illegally use data.

Comprehensive technical cooperation and support

In addition to providing security middleware, Ubiquitous Securus comprehensively supports secure network equipment development from consulting before installation to maintenance after shipment of products.

Planning (consulting before introduction)

* Determination of security policy
Confirm the data to be concealed and cooperate in deciding the security policy from the system aspect.

* Selection of hardware
Provision of secret data management utilizing the function of the selected hardware

Design and development (providing library)
* Design and development using hardware
In the case where the hardware has a secure function implemented, design and development taking advantage of the strong hardware security function is implemented.

* Hybrid design and development
Introduction of design of hybrid type with hardware and software and implementation of proprietary cipher unique to software at the design stage.

Production (Providing tools for factory) option

* Unique encryption tool
Provide tools to securely handle confidential data in production line to prevent information leakage at the time of device manufacturing.

Operation (offer support) option

* Secure update
Provide a secure update mechanism to prevent malicious software writing.

* Secure update
Provide a secure update mechanism to prevent malicious software writing.

* Update confidential data
Update the certificate at the appropriate timing according to the expiration date of the certificate written to the device.

Find a Product