Key management

Once the “root of trust” has been created and security injected into the IoT devices, it is essential to manage security all along the device life cycle.


On the field, the IoT devices keys and certificates have to be changed, revoked and securely stored whenever it is necessary.


Key management meet these expectations with services operated remotely as Cloud security services.
First, Trusted Objects is developing with partners key management services dedicated to LoRaWAN applications.