Embedded Trust

Security development tool that enables you to create an identity chain, protect your application and deliver secure, encrypted code.

01

Customized Security Contexts

Embedded Trust uses the innovative Security Contexts technology to help you with protecting your application. A Security Context defines the configuration of a trusted execution environment by describing the security environment that is required to protect an application.The tool allows you to create new or customize existing Security Contexts through a step-by-step wizard.

02

Unique device identity

Embedded Trust enables the creation of a identity chain for unique or class device identity.

03

Integrated in standard flow

Developers inherit the Security Context generated in Embedded Trust. Correct security and encryption settings are automatically enforced in C-Trust according to the Security Context. All developers are aligned and do not need to be security experts.

04

Integrated prototyping & production

Embedded Trust can simply export the production packages to the Secure Desktop Provisioner. This enables a closed-loop development and prototyping, from the creation of production first articles to export to volume production.

Embedded Trust and C-Trust

Embedded Trust and C-Trust deliver a complete security development environment for embedded applications, enabling you to implement foundation security measures such as encrypting the codebase and setting manufacturing limits. 

Together, our security tools help companies to substantially reduce the risk of counterfeiting and cloning during production.

Supported devices

STMicroelectronics Renesas Microchip NXP

STM32F405
STM32F407
STM32F412
STM32F429
STM32F475
STM32F777

STM32L4R
STM32L4S5

STM32L5

STM32H725
STM32H735
STM32H743
STM32H753
STM32H7A3
STM32H7B3

RA6M3

RX65N
RX72N

SAML11 K22/K24
K56/KV58
K64/K65/K66

LPC55S16
LPC55S28
LPC55S69

i.MX RT1064

 

Innovative Security Context technology

A Security Context defines the configuration of a trusted execution environment by describing the security environment that is required to protect an application. For simplified development, C-Trust includes Preconfigured Security Contexts. With Embedded Trust, companies can define custom Security Contexts which are able to uniquely service companies' specific needs.

Details about Security Context

C-Trust enables you as developer to use Preconfigured Security Contexts, ensuring that you remain in control of system operation today, and into the future. With Embedded Trust, companies are able to define custom Security Contexts, which uniquely service their specific needs.

Security Contexts define the configuration of the trusted execution environments. Security Contexts enable organizations to simplify:

  • Complex cryptographic device identities and ownership structures
  • Creation of a robust Root of Trust, ensuring device authentication, authorization and attestation, the core proofs of identity
  • Implementation of security hygiene, dependant on device hardware support
  • Secure Boot Manager extensions to support core boot functionality
  • Application of patches, updates, and other lifecycle management criteria
  • Delegation of identity for onboarding into cloud infrastructure applications

These Security Contexts provide the foundation for a set of core security concepts, enabling Security From Inception, including protection of Intellectual Property, which is about inhibiting IP theft and malware injection, and Production Control, which is about protecting keys across development and production.

Security Contexts

The IP Protection and Production Control Security Contexts have been designed to enable developers to rapidly protect the high value and critical IP that organizations create, and to provide reassurance that only authorized and authenticated IP can be installed on devices.

Features

  • Secure application and credential provisioning
    Ensuring devices are born securely with the correct software
  • Integrated Secure Boot Manager
    Providing low level device services to manage device access
  • Device-specific Security Management
    Servicing the device specific Root of Trust and system configuration
  • Authorized & authenticated software install
    Cryptographic enforcement of ownership and delegated rights
  • Automatic encryption and signature of code
    Ensuring only correctly managed and formatted code can be installed
  • Update policing in Secure Boot Manager
    Integrated device level configuration for seamless updates and patches
  • Integration into secure provisioning flow
    Compatible with Secure Desktop Provisioner
  • Integrated application versioning management
    Providing structured versioning in the development flow
  • OEM-Developer defined software key infrastructure
    Enabling developers to define the critical key management of their application
  • Application updates with anti-rollback protection
    Providing protection against roll-back attacks and versioning threats
  • Bootloader device level trace and debug management
    Configuration of the device to ensure integrity of the boot process and RoT

Want to know more about this product?

We are available to answer any questions about our products. To help you make the most out of your experience, you can also find plenty of information in our Learn section and at the customer portal My Pages.

Request for quote

Complete this request for quote form and our sales team will contact you with a price offering tailored for your needs. We look forward to your request!

* read our Privacy policy

We do no longer support Internet Explorer. To get the best experience of iar.com, we recommend upgrading to a modern browser such as Chrome or Edge.