WISeAI – fully integrates the Root of Trust and IoT embedded devices with problem-solving Artificial Intelligence (“AI”) solution into WISeKey’s Vertical Platform.
WISeKey has developed the WISeAI The first ever Cybersecurity Artificial Intelligence Platform to resolve complicated cybersecurity and IoT environment burdened by exponential volumes of data, threats and exponential IoT growth. WISeAI uses advanced algorithms that learn from data generated by digital identities from WISeKey Ecosystems combined with predictability mathematics algorithms to learn “digital behaviors and patterns” for every identity (people, object and process) on the Internet to detect anomalies and provide solutions. WISeAI inspires from the human immune system protective force honed by millions of years of evolution to provide a broad, yet thorough opposition to entities that harm the human body . The technology mimics the way the human immune system process attacks, identifies the level of threat and defends itself protecting the vital organs on the body.
WISeAI leverages WISeKey Digital Identity Platform on which users are always in control of their digital identity stored on their mobile, IoT sensor and or computer and is only the user who determines which identification attributes are shared with social media, credit cards, merchant sites etc. never disclosing the Personal Identifiable Information (PII) if not required or necessary.
At the heart of this platform is the OISTE-WISeKey Cryptographic Root of Trust which has been actively used since 1999 by over 2.6 billion desktop, browsers, mobile devices, SSL certificates and Internet of Things’ devices. The OISTE WISeKey Cryptographic Root of Trust is ubiquitous and universal, and a pioneer in the creation of Digital Identities.
Integrates the Root of Trust and IoT embedded devices with problem-solving Artificial Intelligence (“AI”) solution into WISeKey’s Vertical Platform.
While IoT remains wildly insecure, thanks to the integrated solution operated by the WISeKey Vertical Platform, IoT devices would be able to organize themselves into trusted networks based on mutual authentication, identity and integrity. This trusted cybersecurity platform will only enable IoT devices which can provide a recognized identity and a valid integrity report to communicate with peer devices that are part of the trusted community.
Adding AI at the chip level together with the WISeKey RoT it will allow the IoT to provide authenticated sensor data. Current IoT data do not provide value for their manufacturers unless it can be converted into actionable, contextualized information generated by IoT sensors fully identifiable. The majority of IoT devices are not built with embedded secured systems thus are very vulnerable. By integrating AI into the WISeKey RoT and Vertical Platform, objects can develop their own cybersecurity behavior, thus making smarter and safer decisions. IoT objects with this technology will learn from attacks, defend them and transfer this intelligence via the WISekey Vertical Platform to other IoT objects peer to peer using a blockchain.
WISekey will include AI solution at the integrated circuits allowing AI to be hosted on a hardware vault with the highest level of certification able to encrypt communications and authenticate the devices. This will also allow AI to leverage the massive big data generated by the deployment of WISeKey’s RoT now embedded in more than 2.5 billion devices worldwide benefitting from the strong cryptographic capabilities deployed in all sorts of IoT products.
Addressing fast growing IoT market
The ability to authenticate and remotely manage millions of networked, automated devices and equipment is becoming pervasive − from factory floors, to hospital operating rooms, to residential homes – including billions of objects and devices from refrigerators, watches, wearables to wine bottles – everything that can connect and communicate via the Internet.
The IoT security market is expected to grow from $6.89 billion in 2015 to nearly $29 billion by 2020 according to a report published by Markets and Markets, thus growing at an annual rate of 35%. These massively deployed connected objects are facing regular attacks hence generating a large need for trusted end-to-end cybersecurity solutions. This problem is affecting billions of people and IoT devices worldwide, and manufactures of these devices could be forced or incentivized to spend money to make their devices secure, as regulators might impose liabilities on them.
Our computers and smartphones are as secure as they are because there are teams of specialized security experts working in companies like Google, Microsoft, Apple etc. ensuring their customers are protected. These companies spend a lot of time testing their code before it’s released, and quickly patch vulnerabilities when they’re discovered. Those companies can support such teams because those companies make a huge amount of money, either directly or indirectly, from their software—and, in part, compete on its security. This isn’t true for IoT hardware manufacturers putting unprotected IoT on the market sold at a much lower margin, and are often built by offshore third parties. The companies involved simply don’t have the expertise to make them secure.
“The combination of IoT Cybersecurity technologies developed by WISekey with Artificial Intelligence solutions are a game changer in our industry. This new platform opens up many possibilities for improving the overall security functionalities and creating new business processes by taking advantage of the world of digital identification at the object level, which once combined with big-data allows us to gather and process all available information and generate actionable insights,”
What is the Internet of Things and why does it matter?
The Internet of Things is now a reality due to the convergence of several technologies.
By combining IoT data with cognitive computing, businesses can extract valuable insights to improve virtually every aspect of their operations and enable innovative, new business models.
A “thing” is any object with embedded electronics that can transfer data over a network — without any human interaction.
Examples are wearable devices, environmental sensors, machinery in factories, devices in homes and buildings or components in a vehicle.