search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
INDUSTRIAL MANUFACTURING


factories. The objective of secure manufacturing is to ensure that OEM devices are manufactured per OEM specification of hardware, firmware and data, and without loss of any OEM IP. Secure manufacturing processes also are designed to authenticate ICs for silicon-vendor proof of origin prior to provisioning to prevent the production of counterfeit or fraudulent devices.


Building security and trust into devices To implement supply chain integrity and secure manufacturing requires building security and trust into devices with hardware-based security. To achieve this, a number of key building blocks must be put in place. First, OEMs must use securable IC elements or microcontroller units (MCUs) with storage protected by a hardware- based root of trust and a trusted execution environment. These elements or MCUs also must provide an immutable boot path and true random number generation mechanism to enable generation and usage of a unique device identity. While use of secure elements or units is


necessary to secure the end device, additional operations must be performed to further build on and enhance the security that is provided by the hardware-based roots of trust. This is accomplished in manufacturing through the process of secure provisioning that configures the hardware roots of trust on a device and, hence, creates the device identity and device-specific security credentials, binding these security elements to the IC responsible for securing the device. Security credentials like keys, certificates, chain of trust, firmware


Authentication of ICs before provisioning Data I/O has developed the SentriX security deployment-as-a- Service platform to deliver on the promise of secure manufacturing. Using SentriX, OEMs now have the ability to secure their supply chain and manufacture secure devices at scale – without risk of counterfeit production – using a trusted security deployment service. To prevent production of counterfeit or inferior devices, SentriX programming processes are designed to authenticate ICs for silicon- vendor proof of origin prior to provisioning additional security credentials into the device. Secure element ICs and MCUs provide a secure cryptography-based authentication process that is based on a silicon-vendor IC identity certificate that is pre- provisioned into the IC during the manufacturing process. During the SentriX authentication process for individual ICs, a silicon vendor ID, a product ID and a serial


Data IO Collaborate


number are read from the IC and compared against a list of such data provided by the silicon vendor. If the data read from the IC is not found in the list provided by the silicon vendor, the device is marked as counterfeit and


eliminated from the manufacturing process. SentriX is designed with the paramount goal of


securing and simplifying the IC provisioning process and


and data that are provisioned into a device IC are very important secrets for an OEM. Should a bad actor gain access to these security credentials during the manufacturing process, the security deployed into devices can be compromised. Thus, in order to protect the security credentials that need to be provisioned into devices during manufacturing, it is fundamental that the deployment process itself be secure.


helping eliminate the risk of counterfeit devices entering the market. The SentriX security deployment platform helps OEMs overcome key challenges of device security definition, secure manufacturing and the secure provisioning of trust into devices during manufacturing for improved security, lower cost, faster time to market and greater supply chain integrity. To learn more about SentriX IoT Security as-a-Service, download


Data I/O’s e-book “Securing the Electronics Supply Chain with SentriX IoT Security as-a-Service”, email sentrix@dataoi.com or visit www.dataio.com/sentrix.


Data I/O www.dataio.com


Data IO Counterfeit


OCTOBER 2021 | ELECTRONICS TODAY 33


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50