Securing the Internet of Things
Root of Trust and Technology platform for IoT
The Internet of Things has the potential to change the way we work and even our daily lives. The ability to monitor and manage objects makes possible to enable a full spectrum of new solutions—to optimize systems and processes, save time for people and businesses, and improve quality of life… But such a enormous benefit brings also security risks which can’t be ignored. Fake objects interacting in networks, injection of misleading data in industrial setups, eavesdropping of confidential information… The inclusion of security techniques in the IoT is critical to enable such benefits while controlling the risks.
Root of Trust for IoT
Our unique Trust Model
The Root of Trust (RoT) serves as a common trust anchor, which is recognized by the operating system (OS) and applications, to ensure the authenticity, confidentiality and integrity of on-line transactions. With the Cryptographic Root of Trust embedded on the device, together with it’s own unique identity, can secure the interactions among objects and between objects and other entities.
At the heart of this strategy is the OISTE-WISeKey Cryptographic Root of Trust which has been actively used since 1999 by over 2.6 billion desktop, browsers, mobile devices, SSL certificates and Internet of Things’ devices. The OISTE WISeKey Cryptographic Root of Trust is ubiquitous and universal, and a pioneer in the identification of objects.
- IoT platform can be “on premises” or offered as a Cloud Service
- Full flexibility for the chosen Trust Model: from private PKI to SubCA of publicly trusted Root