tops server

Digital identity provisioning

in production

  • Address identities provisioning needs of manufacturers and integrators
    (OEM, ODM, EMS…) for connected devices
  • Target connected devices based on programmable components (MPU, MCU, FPGA…).

 

 OVERVIEW                                    

  • Digital identity provisioning is an essential first step in production to ensure security throughout the device lifecycle.
  • Currently more and more standards enforce a device identity injection at factory level (Matter, EV-charging…).
  • Assigning each device with an identity means the provisioning of a unique digital certificate per device.
  • Today’s solutions for certificate provisioning in production are time consuming, difficult to scale and lead to human errors.

Trusted Objects provides tops server an innovative solution to overcome such barriers and provide a fully scalable solution.

 

 tops server SERVICES BENEFITS 

Increase security

Reduce complexity and cost

Simplify provisioning process

Remove room for human errors

Ensure trust in the manufacturing operations

Automate and scale

Fully automate the process of assigning an identity per device

Fit with volume increase in production

Easy to scale from your IT infrastructure

Flexibility 

Can be used with any device or chipset

Easily integrated with most of the programming equipment or test benches

 

 Standard integration architecture 

High security and scalability

Keys generated in a controlled environment

On-premise solution – Software appliance in your IT infrastructure

 

 Product features and services 

Secure Software

  • Provided as Virtual Machine
  • Already rugged and secured
  • Require 8GB of RAM per VM
  • Require 128GB of SDD for system 
  • Require 1TB for storage
  • can be linked to HSM for advanced security
  • Advanced management interface for 1-click scaling

Resources

  • Technical support for installation
  • Full set of documentation
 

Services

  • Secure generation of certificates:
    asymmetric key generation (RSA, ECC)
  • Management of PKI tree:
    CA /intermediate CA / unique certificate SN
  • Interface and secure channel
    with any external PKI platform
  • Secure provisioning:
    serial number / certificates and keys injection into the programmable component
  • Secure storage of all certificates and keys in the programming facility
  • Overproduction control:
    production batches signed reports

 

 All inclusive annual license 

Annual licensing based on the number of secure provisioning operations 

 

 

 

Evaluate