• +886 2-2934-3166
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

Safeguard Digital Property


Scalable deployment for embedded systems

Platform for Customizable Solution

Tailor-made security solution to cope with sophisticated threat landscape

Safeguard Digital Property


Scalable depolyment for any system

Platform for Customizable Solution

Cope with sophisticated threat landscape

Risk Assessment

We analyze application scenarios, exploring potential threat and assess the risk that may cause imminent loss

Cost Efficiency

Based on risk assessment, we propose a suitable security level taking customers' business model and operation cost into account

Tailor Made

A tailor made solution according with risk assessment and cost-efficiency will be implemented on customers' system

Silicon IP of Algorithms

Available IPs include

  • AES
  • SHA2 family
  • SHA3 family
  • ECC family
  • SM2/SM4 (for China)

Key lengths and modes of operation are configurable. We also analyze potential threats in our customers’ scenarios in order to tailor countermeasures against hardware attacks.

Document

SRAM PUF - KVSoftKey

KVSoftKey uses SRAM PUF technology to generate the hardware root of trust for software-based cryptographic functions. It also serves as the access key to secure elements, ensuring the key inside them are protected by secure channels and accessed only through authorization.

KVSoftKey achieves scalability in security and efficacy in business operation cost for these applications

  • IoT & Smart factory
  • Automobile ECU & Sensor
  • Secure communication
  • Hardware security module
  • Cryptocurrency hardware wallet

Document

SRAM PUF - KVSoftKey

KVSoftKey uses SRAM PUF technology to generate the hardware root of trust for software-based cryptographic functions. It also serves as the access key to secure elements, ensuring the key inside them are protected by secure channels and extracted through authorization.

KVSoftKey achieves scalability in security and efficacy in business operation cost for these  applications

  • IoT & Smart factory
  • Automobile ECU & Sensor
  • Secure communication
  • Hardware security module
  • Cryptocurrency hardware wallet

Document

Authentication Chip

Authentication chips aim to protect devices, circuit boards and other embedded systems from counterfeiting. It performs strong authentication featuring Elliptic Curve Cryptography (ECC), ensuring the security of application use cases as follows.

  • Printer Cartridges
  • Accessories
    • Earphones, docking stations, game controllers, chargers
  • Peripherals (adaptors, etc.)
  • Original replacement parts
  • Diagnostic & medical equipment

Document

Military-grade Security Chip

Leveraging Infineon’s security chip with CC EAL 5+ certification, we tailor military-grade security solutions for different application use cases, including 

  • blockchain key management
  • game software protection
  • encrypted communication
  • software IP protection
  • firmware protection
The military-grade security chip is the most robust and extensible platform enabling customers to implement security in any system or device. It has so far been adopted in several industries, including but not limited to gaming, payment, communication, secure network, blockchain, hardware security modules, and so on.

Document

Military-grade Security Chip

Leveraging Infineon’s security chip with CC EAL 5+ certification, we tailor military-grade security solutions for different application use cases, including 

  • blockchain key management
  • game software protection
  • encrypted communication
  • software IP protection
  • firmware protection
The military-grade security chip is the most robust and extensible platform enabling customers to implement security in any system or device. It has so far been adopted in several industries, including but not limited to gaming, payment, communication, secure network, blockchain, hardware security modules, and so on.

Document

Fusion FPGA Platform

The spirit of Fusion FPGA lies in security of robustness and eclectic cryptographic functions. Fusion FPGA uses Physically Unclonable Function (PUF) to generate innate keys dwelling not in memory but serving as the hardware root of trust and generated on need-basis only. It allows for the establishment of secure channels protecting data transmission among MCUs and the security chip, greatly mitigating the risk of data breaches. 

The Fusion FPGA platform features high-speed cryptographic services, such as digital signing and data encryption, also equipped with security at the highest level. It can be implemented on systems processing large data flows.

Document

iBadge Device Management

iBadge device management platform aims to ensure legitimacy of client-side access to servers. By integrating security chips into devices, each device acquires a unique identification to log into the cloud. The server test devices’ authenticity via Elliptic Curve Cryptography (ECC) strong authentication. It can reduce the risk of counterfeiting, unauthorized access, DDoS and protect IoT systems.

The iBadge device management solution covers a wide range of use case applications, including

  • Device management and authentication center for 
    • AIoT
    • Smart factory
    • Smart home
    • Smart lock

Document

iBadge Device Management

iBadge device management platform aims to ensure legitimacy of client-side access to servers. By integrating security chips into devices, each device acquires a unique identification to log into the cloud. The server test devices’ authenticity via Elliptic Curve Cryptography (ECC) strong authentication. It can reduce the risk of counterfeiting, unauthorized access, DDoS and protect IoT systems.
The iBadg device management solution cover a wide range of use case applications, including

  • Device management and authentication center for 
    • AIoT
    • Smart factory
    • Smart home
    • Smart lock

Document

Cryptocurrency Hardware Wallet

The essentials of securing crypto assets consist in key management, and the aspects of hardware and software should be covered. IKV-Tech has a great command of how transaction and cryptography work in blockchain application, also the notion of implementation on both hardware and software to resist attacks.

Success stories of our customers display some award-winning and top players around the globe, including

  • Cool Wallet from CoolBitx
  • AT Wallet from AuthenTrend
  • SecuX Hardware Wallet.

Document

Send your message

Image

Address: No. 218, Section 6, Roosevelt Rd,

Wenshan District, Taipei City, 116 

TEL:+886-2-29343166

FAX:+886-2-29343167

 
Copyright © 2020 InfoKeyVault Technology. All rights reserved.