Trusted Objects has developed a set of security solutions to protect OEM’s software and IP at every stage of the product lifecycle
-
Copy and theft during manufacturing operations
-
Copy and theft during OTA operations
-
Reverse engineering
Trusted Objects tops technology enables software and IP protection at manufacturing stage.
tops handles three critical functions:
1- Software and IP secure transfer from the OEM to the production location
2- Secure storage during manufacturing
3- Secure programming inside the MCU
Once the devices are in the field, Trusted Objects software RoT to-protect implements robust security mechanisms to establish a secure channel between IoT device and server, to secure OTA software update and to protect software and IP against reverse engineering.
IP protection