• +886 2-2934-3166
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

KVSoftKey

SRAM PUF for heightened security and flexible deployment

The need for efficiency and the will to overcome impediments caused by time and space have brought about technological breakthrough in AIoT, peripheral computing and virtual machine deployment, which contribute to IT network expansion around the globe.

As individuals are closely connected than ever, the growing number of endpoints require stronger foundations of trust, secure communication, identification, and authentication.

KVSoftKey features a hardware root of trust that is generated via SRAM PUF (Physically Unclonable Function) technology. It provides eclectic cryptographic services reducing customers’ costs and efforts, allowing customers to deploy endpoint security without tedious configuration.

From intellectual property protection, digital rights management, IoT, communication, payments, to automobile, KVSoftKey ushers in an era of revolutionary security mechanisms, meeting requirements for time-to-market and cost-efficient mass production.

The need for efficiency and the will to overcome impediments caused by time and space have brought about technological breakthrough in AIoT, peripheral computing and virtual machine deployment, which contribute to IT network expansion around the globe.

As individuals are closely connected than ever, the growing number of endpoints require stronger foundations of trust, secure communication, identification, and authentication.

KVSoftKey features a hardware root of trust that is generated via SRAM PUF (Physically Unclonable Function) technology. It provides eclectic cryptographic services reducing customers’ costs and efforts, allowing customers to deploy endpoint security without tedious configuration.

From intellectual property protection, digital rights management, IoT, communication, payments, to automobile, KVSoftKey ushers in an era of revolutionary security mechanisms, meeting requirements for time-to-market and cost-efficient mass production.
Innate Uniqueness
An internally generated unique identity with no need for a costly security-dedicated silicon
Install Anywhere Anywhen
Invincible root of trust
Scalability and extensibility

Key Features

Innate Uniqueness
An internally generated unique identity with no need for a costly security-dedicated silicon
Install Anywhere Anywhen
Invincible root of trust
Scalability and extensibility
For systems or devices integrated with a secure element, KVSoftKey is “the last mile” to a holistic security solution building system-level defense.
KVSoftKey features Physically Unclonable Function (PUF), seamlessly incorporating every single component as a whole. PUF relies on the innate characteristics of the semiconductors to generate a root key that resembles a “fingerprint”, which is unique and unpredictable.

Using the root key to establish a secure channel with the existent secure element for subsequent key derivation and wrapping is trustworthy as it vanishes without trace right after tasks are done.

Compared with MCU TrustZone, in which a root key goes though the preload phase and gets 
stored in an isolated zone, PUF gets a head start with an innate root key dwelling by no means in memory, eradicating the threats of key extraction and data breaches.

Leverage PUF and IKV-Tech Expertise

For systems or devices integrated with a secure element, KVSoftKey is “the last mile” to a holistic security solution building system-level defense.
KVSoftKey features Physically Unclonable Function (PUF), seamlessly incorporating every single component as a whole. PUF relies on the innate characteristics of the semiconductors to generate a root key that resembles a “fingerprint”, which is unique and unpredictable.

Using the root key to establish a secure channel with the existent secure element for subsequent key derivation and wrapping is trustworthy as it vanishes without trace right after tasks are done.

Compared with MCU TrustZone, in which a root key goes though the preload phase and gets 
stored in an isolated zone, PUF gets a head start with an innate root key dwelling by no means in memory, eradicating the threats of key extraction and data breaches.

Competenece

I. Raising software-based security to hardware level
Whether it is data in transit or at rest, keys are by no means stored in memory, which allows the security of KVSoftKey mechanism to equal the one of a secure element, in which keys are protected by hardware. 

II. Heightening hardware-based security with secure channels
KVSoftKey can create synergy and fulfill system-level protection with secure elements. To establish a secure channel between a microcontroller and a secure element, the root of trust used to access the secure element is generated via PUF. Once the task is done, the root of trust will be erased, which ensures sensitive key materials are securely handled and minimizes the possibility of exposure.

I. Raising software-based security to hardware level

Whether it is data in transit or at rest, keys are by no means stored in memory, which allows the security of KVSoftKey mechanism to equal the one of a secure element, in which keys are protected by hardware.  

II. Heightening hardware-based security with secure channels

KVSoftKey can create synergy and fulfill system-level protection with secure elements. To establish a secure channel between a microcontroller and a secure element, the root of trust used to access the secure element is generated via PUF. Once the task is done, the root of trust will be erased, which ensures sensitive key materials are securely handled and minimizes the possibility of exposure.   

Use Case Application

IoT & Smart Factory

It enables device management, cloud-based authentication, encrypted end-to-end communication, and most importantly, system-level protection in case any data breach of a device may cause others to be compromised.

Automobile ECU & Sensor

KVSoftKey can endow every key component with the root of trust, which is used for encrypted data transmission, anti-counterfeiting, and other mechanisms for driving safety.

Secure Communication

KVSoftKey can provide the root of trust used to derive encryption keys. With IKV-Tech specializing in cryptographic algorithms, every message is encrypted with different keys.

Cryptocurrency Hardware Wallet

KVSoftKey can protect the key pair inside the security chip, using PUF to generate the root of trust underlying the activation and legitimate use of key pairs and other crypto functions.

Hardware Security Module

KVSoftKey aims to enhance the security of systems already embedded with a security chip, serving as the access key to its primitives and key pairs.

Cloud-based Security

KVSoftKey can help the cloud authentication center build the identification infrastructure in a speedy manner. There is no need to add extra hardware security chips on end devices.

Send your message

Image

Address: No. 218, Section 6, Roosevelt Rd,

Wenshan District, Taipei City, 116 

TEL:+886-2-29343166

FAX:+886-2-29343167

 
Copyright © 2022 InfoKeyVault Technology. All rights reserved.