Military-grade
Preeminent Secure Element, Preemptive Protection
Today’s evolving threat landscape triggers a need for preemptive and flexible security solutions. To meet the requirement, solution providers should engage in both defense and attack. Acquiring the know-how of hardware attack allows for accurate and effective security deployment, minimizing potential loss.
As the prerequisite of effective security lies in acquaintance with attack, there should be a customizable platform enabling tailor-made design to cope with a wide range of attacks in various contexts.
The Military-grade Omni platform features a security chip made by one of the most competent semiconductor vendors, Infineon. It has acquired Common Criteria EAL 5+ (Evaluation Assurance Level 5 plus), equaling military-grade security.
With IKV-Tech’s expertise, the Military-grade Omni platform fulfills agile reaction to changing atmosphere of security and threat landscape. The use case applications include cryptocurrencies, mobile payment, smartphones, blockchain, smart factories, firmware and software protection, secure communication, etc.
Today’s evolving threat landscape triggers a need for preemptive and flexible security solutions. To meet the requirement, solution providers should engage in both defense and attack. Acquiring the know-how of hardware attack allows for accurate and effective security deployment, minimizing potential loss.
As the prerequisite of effective security lies in acquaintance with attack, there should be a customizable platform enabling tailor-made design to cope with a wide range of attacks in various contexts.
The Military-grade Omni platform features a security chip made by one of the most competent semiconductor vendors, Infineon. It has acquired Common Criteria EAL 5+ (Evaluation Assurance Level 5 plus), equaling military-grade security.
With IKV-Tech’s expertise, the Military-grade Omni platform fulfills agile reaction to changing atmosphere of security and threat landscape. The use case applications include cryptocurrencies, mobile payment, smartphones, blockchain, smart factories, firmware and software protection, secure communication, etc.
Today’s evolving threat landscape triggers a need for preemptive and flexible security solutions. To meet the requirement, solution providers should engage in both defense and attack. Acquiring the know-how of hardware attack allows for accurate and effective security deployment, minimizing potential loss.
As the prerequisite of effective security lies in acquaintance with attack, there should be a customizable platform enabling tailor-made design to cope with a wide range of attacks in various contexts.
The Military-grade Omni platform features a security chip made by one of the most competent semiconductor vendors, Infineon. It has acquired Common Criteria EAL 5+ (Evaluation Assurance Level 5 plus), equaling military-grade security.
With IKV-Tech’s expertise, the Military-grade Omni platform fulfills agile reaction to changing atmosphere of security and threat landscape. The use case applications include cryptocurrencies, mobile payment, smartphones, blockchain, smart factories, firmware and software protection, secure communication, etc.
As the prerequisite of effective security lies in acquaintance with attack, there should be a customizable platform enabling tailor-made design to cope with a wide range of attacks in various contexts.
The Military-grade Omni platform features a security chip made by one of the most competent semiconductor vendors, Infineon. It has acquired Common Criteria EAL 5+ (Evaluation Assurance Level 5 plus), equaling military-grade security.
With IKV-Tech’s expertise, the Military-grade Omni platform fulfills agile reaction to changing atmosphere of security and threat landscape. The use case applications include cryptocurrencies, mobile payment, smartphones, blockchain, smart factories, firmware and software protection, secure communication, etc.
Hardware
- Enhanced 32-bit ARM® SecurCore™ SC300™ CPU
- 1 MByte SOLID FLASH™
- Common Criteria EAL 5+
Parametrics
Applications
Key Features
Hardware
- Enhanced 32-bit ARM® SecurCore™ SC300™ CPU
- 1 MByte SOLID FLASH™
- Common Criteria EAL 5+
Parametrics
Applications
For systems processing transaction, confidential data and digital content, IKV-Tech aims to construct a pertinent subsystem, which can grant possessors complete control over the digital assets in transit and at rest.Types of digital assets to be protected range from confidential data, which can be files that contain secret information, digital assets, which can be artificial intelligence (AI) codes and other kinds of intellectual properties, and cryptographic keys used for transaction.
Years of experience in embedded security enable IKV-Tech to embody robust security in any form factors to fit any system. On the given platform, IKV-Tech has exerted its ability to the greatest possible extent.
From secure communication for national security to protection of digital content worth millions of US dollars, and cryptocurrency transaction used around the globe without any breaches, extensive exploration of its potential has not been marked with a period.
Leverage IKV-Tech Expertise
For systems processing transaction, confidential data and digital content, IKV-Tech aims to construct a pertinent subsystem, which can grant possessors complete control over the digital assets in transit and at rest.Types of digital assets to be protected range from confidential data, which can be files that contain secret information, digital assets, which can be artificial intelligence (AI) codes and other kinds of intellectual properties, and cryptographic keys used for transaction.
Years of experience in embedded security enable IKV-Tech to embody robust security in any form factors to fit any system. On the given platform, IKV-Tech has exerted its ability to the greatest possible extent.
From secure communication for national security to protection of digital content worth millions of US dollars, and cryptocurrency transaction used around the globe without any breaches, extensive exploration of its potential has not been marked with a period.
I. Tailor-made algorithm and mechanism
The quintessence of security lies in threat modeling and risk assessment. Security takes effect only when potential threats are successfully predicted. In light of it, to tackle security issues in the rapidly evolving threat landscape, we have practical and technical mastery of customizing security solutions for different use case applications.
II. Countermeasure against hardware attack
The never-ending pursuit of new vulnerabilities and attacks propels us to keep up with the top-notch countermeasure know-how. We implement countermeasures against one of the most notorious hardware attacks, side-channel attack (SCA), on both hardware and software, assuring customers a predominant position in the high-end market.
Competence
I. Tailor-made algorithm and mechanismThe quintessence of security lies in threat modeling and risk assessment. Security takes effect only when potential threats are successfully predicted. In light of it, to tackle security issues in the rapidly evolving threat landscape, we have practical and technical mastery of customizing security solutions for different use case applications.
II. Countermeasure against hardware attackThe never-ending pursuit of new vulnerabilities and attacks propels us to keep up with the top-notch countermeasure know-how. We implement countermeasures against one of the most notorious hardware attacks, side-channel attack (SCA), on both hardware and software, assuring customers a predominant position in the high-end market.
Over the past years, public awareness of security has been raised, specifically for those who confronted imminent attacks or targeted markets that abounded with counterfeit products. Under the circumstance, security becomes a must rather than a choice. A great number of vendors consequently reached us and voiced their concerns. They covered a wide range of use case applications, in which the security mechanism was designed on the Military-grade Omni platform and is still taking effect now. In these cases, the given platform has proven a real-world impact on vendors’ cost, trustworthiness and high-end market penetrability.
The Military-grade Omni platform enables “security” and “usability” to go hand in hand because
The Military-grade Omni platform enables “security” and “usability” to go hand in hand because
- it supports a variety of form factors, including the smallest SIM, microSD, USB, PCIe
- a unique hardware root is in every system for identification and authentication
- customizability enables security by design, compliance security by default
- countermeasures are implemented to tackle a wide range of security issues
- a unique 32-bit CPU based on the ARM® SecurCore™ SC300™ controller is inside
Success Stories about Our Customers
Over the past years, public awareness of security has been raised, specifically for those who confronted imminent attacks or targeted markets that abounded with counterfeit products. Under the circumstance, security becomes a must rather than a choice. A great number of vendors consequently reached us and voiced their concerns. They covered a wide range of use case applications, in which the security mechanism was designed on the Military-grade Omni platform and is still taking effect now. In these cases, the given platform has proven a real-world impact on vendors’ cost, trustworthiness and high-end market penetrability.
The Military-grade Omni platform enables “security” and “usability” to go hand in hand because
The Military-grade Omni platform enables “security” and “usability” to go hand in hand because
- it supports a variety of form factors, including the smallest SIM, microSD, USB, PCIe
- a unique hardware root is in every system for identification and authentication
- customizability enables security by design, compliance security by default
- countermeasures are implemented to tackle a wide range of security issues
- a unique 32-bit CPU based on the ARM® SecurCore™ SC300™ controller is inside
Use Case Application
FIDO Enabler - Security Chip with FIDO Inside
The FIDO strong authentication framework may be a revolutionary practice raising security to a higher level. The reason why it is not a revolutionary “technique” is that strong authentication based on the asymmetric cryptography system has been existing for decades. What FIDO Alliance does is to “assemble” hardware vendors, software vendors, service providers, operating systems, browsers and some consortiums for one aim – replacing vulnerable password-based authentication with the crypto-based one. The benefits accrue to data protection during data transferring, sharing and storage, audit logging, secure logon and access control. FIDO-certified solutions flip a new page of data protection allowing for greater awareness and transparency than accounts and passwords. Especially hardware USB authenticators, despite the downside being the additional efforts to safekeep the device, are sure to root out phishing and unauthorized access
For vendors who intend to implement the FIDO authentication framework on hardware authenticator in any form factor, we provide the ready-to-go crypto core, allowing for FIDO-compliant asymmetric cryptographic algorithms, FIDO-certified authentication mechanism and other value-added cryptographic functions. It is compatible with fingerprint authenticators, USB security keys, security cards, etc
For vendors who intend to implement the FIDO authentication framework on hardware authenticator in any form factor, we provide the ready-to-go crypto core, allowing for FIDO-compliant asymmetric cryptographic algorithms, FIDO-certified authentication mechanism and other value-added cryptographic functions. It is compatible with fingerprint authenticators, USB security keys, security cards, etc
Why is our security chipTrustworthyReliableRobust?
I. Manufactured by world-known companies (Infineon)
Security chips own many patents, including cryptographic algorithm, tamper resistant, secure COS and sensors that detect intrusive and non-intrusive attacks. Though many companies buy intellectual properties trying to devise a SoC that equals a standard security chip, it turns out that the cost is several times higher than gains.
Security chips own many patents, including cryptographic algorithm, tamper resistant, secure COS and sensors that detect intrusive and non-intrusive attacks. Though many companies buy intellectual properties trying to devise a SoC that equals a standard security chip, it turns out that the cost is several times higher than gains.
II. Equipped with an accelerator and safe storages
The absence of accelerators leads to poor performance in the encrypting process since cryptographic algorithms usually involve computing big numbers. For security concern, the accelerator functions only in the secure areas of chips to boost the overall performance of security services. Storages are likewise very important, especially for cryptographic keys and confidential information.
The absence of accelerators leads to poor performance in the encrypting process since cryptographic algorithms usually involve computing big numbers. For security concern, the accelerator functions only in the secure areas of chips to boost the overall performance of security services. Storages are likewise very important, especially for cryptographic keys and confidential information.
III. Capability of detecting and resisting intrusion
Means of intrusion vary with hackers’ tricks. Without appropriate design and implementation, devices are very likely to be attacked within seconds once vulnerabilities are exposed. Smart cards are an example.
Means of intrusion vary with hackers’ tricks. Without appropriate design and implementation, devices are very likely to be attacked within seconds once vulnerabilities are exposed. Smart cards are an example.
IV. Strictly controlled channel by the original manufacturer
The market of security chips usually involves export control; only by NDA and certification can the access be obtained, and regular inspection is also needed. Security chips available on DigiKey or Mouser have been cracked and proven extremely vulnerable.
The market of security chips usually involves export control; only by NDA and certification can the access be obtained, and regular inspection is also needed. Security chips available on DigiKey or Mouser have been cracked and proven extremely vulnerable.
V. Acquisition of international certificates
- FIPS 140-2 Validation Certificate
- ISO 15408 Certification
- Common Criteria EAL
These three mainstream certificates cost considerably high, from hundreds of thousands of US dollars to millions.
The market of security chips is very challenging; for manufacturers, precaution and countermeasures are in any time needed to satisfy clients’ requirements in this ever changing world, so our skills should always keep up with hackers’ newest tactics. Besides internationally accredited security chips, we also localize and customize our services, such as risk assessment, cost benefit analysis (CBA) and penetration test.
Lastly, to provide robust security chips and reliable solutions, IKV-Tech collaborates with world-known manufacturer, Infineon, to resell and develop the finest security chips.