Risk Assessment
Cost Efficiency
Tailor Made
Silicon IP of Algorithms
Available IPs include
- AES
- SHA2 family
- SHA3 family
- ECC family
- SM2/SM4 (for China)
Key lengths and modes of operation are configurable. We also analyze potential threats in our customers’ scenarios in order to tailor countermeasures against hardware attacks.
DocumentSRAM PUF - KVSoftKey
KVSoftKey uses SRAM PUF technology to generate the hardware root of trust for software-based cryptographic functions. It also serves as the access key to secure elements, ensuring the key inside them are protected by secure channels and accessed only through authorization.
KVSoftKey achieves scalability in security and efficacy in business operation cost for these applications
- IoT & Smart factory
- Automobile ECU & Sensor
- Secure communication
- Hardware security module
- Cryptocurrency hardware wallet
SRAM PUF - KVSoftKey
KVSoftKey uses SRAM PUF technology to generate the hardware root of trust for software-based cryptographic functions. It also serves as the access key to secure elements, ensuring the key inside them are protected by secure channels and extracted through authorization.
KVSoftKey achieves scalability in security and efficacy in business operation cost for these applications
- IoT & Smart factory
- Automobile ECU & Sensor
- Secure communication
- Hardware security module
- Cryptocurrency hardware wallet
Authentication Chip
Authentication chips aim to protect devices, circuit boards and other embedded systems from counterfeiting. It performs strong authentication featuring Elliptic Curve Cryptography (ECC), ensuring the security of application use cases as follows.
- Printer Cartridges
- Accessories
- Earphones, docking stations, game controllers, chargers
- Peripherals (adaptors, etc.)
- Original replacement parts
- Diagnostic & medical equipment
Military-grade Security Chip
Leveraging Infineon’s security chip with CC EAL 5+ certification, we tailor military-grade security solutions for different application use cases, including
- blockchain key management
- game software protection
- encrypted communication
- software IP protection
- firmware protection
Military-grade Security Chip
Leveraging Infineon’s security chip with CC EAL 5+ certification, we tailor military-grade security solutions for different application use cases, including
- blockchain key management
- game software protection
- encrypted communication
- software IP protection
- firmware protection
Fusion FPGA Platform
The spirit of Fusion FPGA lies in security of robustness and eclectic cryptographic functions. Fusion FPGA uses Physically Unclonable Function (PUF) to generate innate keys dwelling not in memory but serving as the hardware root of trust and generated on need-basis only. It allows for the establishment of secure channels protecting data transmission among MCUs and the security chip, greatly mitigating the risk of data breaches.
The Fusion FPGA platform features high-speed cryptographic services, such as digital signing and data encryption, also equipped with security at the highest level. It can be implemented on systems processing large data flows.
iBadge Device Management
iBadge device management platform aims to ensure legitimacy of client-side access to servers. By integrating security chips into devices, each device acquires a unique identification to log into the cloud. The server test devices’ authenticity via Elliptic Curve Cryptography (ECC) strong authentication. It can reduce the risk of counterfeiting, unauthorized access, DDoS and protect IoT systems.
The iBadg device management solution cover a wide range of use case applications, including
- Device management and authentication center for
- AIoT
- Smart factory
- Smart home
- Smart lock
iBadge Device Management
iBadge device management platform aims to ensure legitimacy of client-side access to servers. By integrating security chips into devices, each device acquires a unique identification to log into the cloud. The server test devices’ authenticity via Elliptic Curve Cryptography (ECC) strong authentication. It can reduce the risk of counterfeiting, unauthorized access, DDoS and protect IoT systems.
The iBadge device management solution covers a wide range of use case applications, including
- Device management and authentication center for
- AIoT
- Smart factory
- Smart home
- Smart lock
Cryptocurrency Hardware Wallet
The essentials of securing crypto assets consist in key management, and the aspects of hardware and software should be covered. IKV-Tech has a great command of how transaction and cryptography work in blockchain application, also the notion of implementation on both hardware and software to resist attacks.
Success stories of our customers display some award-winning and top players around the globe, including
- Cool Wallet from CoolBitx
- AT Wallet from AuthenTrend
- SecuX Hardware Wallet.
Password-less Authn
Crypto-based password-less authentication has become the next paradigm shift. In the future, all the world is going to deploy FIDO certified authentication. We provide ODM service including
- FIDO Certified Security Chip
- FIDO Certified USB Security Key
FIDO authentication framework provides enhanced security with easibility. Users do not need to manage any password. Our ODM service enables customers to deploy the authencation method without any R&D investment, saving their cost and fulfilling time-to-market strategy.