- Software & Tools
State-of-the-art answers to today’s embedded security challenges with OPTIGA™ Trust
The OPTIGA™ Trust product family offers a full range of security chips to address individual needs in the field of embedded authentication and brand protection and further security applications. Whether you are looking for a turnkey security chip enabling fast and easy integration or a feature-rich programmable solution, OPTIGA™ Trust has the perfect match for your business model.
Ease of integration paired with reliable device authentication
State of the art security solutions for embedded systems.
- turnkey -
Robust turn-key cryptographic solution to protect original products.
- turnkey -
Security solution for protecting original high-value goods and industrial applications.
- programmable -
Security solution for various embedded systems requiring maximum flexibility.
At a glance
Protecting your business model, process know-how and IP against:
- Counterfeiting and cloning
- Unauthorized products
- Intentional attacks
- Unintentional operator errors
Designed for ease of implementation
- Available in a great variety of models supporting everything from basic authentication to advanced implementations
- Easy to implement and convenient to handle based on turnkey designs with reference code
- Reliable performance
Supporting a wide range of use cases
- Industrial control and automation
- Consumer electronics and accessories
- Smart home and home automation
- PKI networks
- Original replacement parts
- Diagnostic and healthcare equipment and networks
- Energy generation & distribution systems
Additional Product Information
|265 KB||20 Jul 2016||07_16|
|204 KB||27 Mar 2017||01_00|
|417 KB||10 Feb 2016||02_16|
|276 KB||10 Feb 2016||02_16|
|291 KB||10 Feb 2016||02_16|
|2.6 MB||23 Jun 2016||06_16|
|358 KB||02 Feb 2016||01_00|
|1 MB||24 May 2016||01_00|
|2.2 MB||26 Oct 2015||10_15|
|1.1 MB||10 Nov 2015||11_16|
|625 KB||01 Feb 2016||01_16|
|1.5 MB||18 Feb 2016||02_16|
Product Selection Guide
|2.1 MB||03 Nov 2015||11_15|
|OPTIGA TRUSTP DEMO KIT||Security||With this board customers get a first overview of the functionalities of the OPTIGA™ Trust P and have the option to extend the kit to a full development board.
|OPTIGA TRUST E EVAL KIT||Security||With XMC4500 controller as the host on the evaluation kit allows to connect to the OPTIGA(TM) Trust E (SLS 32AIA) through I2C interface, customer can use this evaluation kit to either debug the host lib code or demostrate major features of SLS10ERE product through an intuitive PC GUI.
|EVAL BOARD SLS 10ERE||Security||With XMC4500 controller as the host on the evaluation kit allows to connect to the OPTIGA(TM) Trust (SLS 10ERE) through SWI interface, customer can use this evaluation kit to either debug the host lib code or demostrate major features of SLS10ERE product through a PC GUI.
Infineon offers a range of security solutions for industrial automation and Internet of Things that strengthen the security. These solutions support the limitation of system or network access to trustworthy components and machines.
Get started with the OPTIGA™ Trust E evaluation kit. The OPTIGA™ Trust E is a high-security solution for industrial automation systems, smart homes, consumer or medical devices. Based on its 1-way authentication mechanism, it provides enhanced protection of services, business models and user experience. The evaluation kit with its intuitive graphical user interface allows you to try out the most common applications such as a one-way authentication mechanism – an easy way to get started with IoT security.
Security is a critical success factor for the deployment of the IOT
Counterfeit products are a major problem for brands and for the global economy: they can cause the loss of hundreds of billions in revenue, tax income and even jobs.
The global business with counterfeit electronic devices continues to expand. This creates a strong demand for robust authentication and brand protection solutions. To meet the growing counterfeit challenge, Infineon’s OPTIGA™ Trust product helps manufacturers of electronic accessories and replacement parts to protect their businesses against damages caused by counterfeiting.
Counterfeit products are a major problem for user experience. Besides that, fake products are a significant threat to system manufacturers with regard to their Investments. Device authentication helps avoiding damage to user devices as a result of non-original, sub-standard accessories or parts.
Learn more about Infineon’s IoT security device – the OPTIGA™ Trust E. The turnkey authentication solution supports you in protecting your system against counterfeit accessories and spare parts. The Evaluation Kit allows you to test the different functionalities of the product and is a quick and easy way of getting started with IoT security. Don’t miss the chance to win one of the OPTIGA™ Trust E Evaluation Kits at www.ebv.com/optiga.
This demo shows how sensitive data can be communicated through secured channels from one production site to another using OPTIGA™ TPM (Trusted Platform Module). The security chips (OPTIGA™ TPM) identify computers, routers and machines in networks and grant access to the company network only to authorized persons and non-manipulated devices. Only after the successful authentication process, encrypted data can be transmitted from one business site to another via secure telecommunications networks. OPTIGA™ TPM is a standardized, feature-rich security solution which protects the integrity and authenticity of devices and systems in embedded industrial networks. It builds on proven technologies and supports the latest TPM 2.0 standard.
Infineon offers a range of security solutions for industrial automation that strengthen the security of industrial systems. These solutions support the limitation of system or network access to trustworthy components and machines.
Demonstration at Embedded World 2016
Find an answer to your question
Infineon welcomes your comments and questions.
If you have any questions concerning our products, please fill out the following form. Your inquiry will be sent to the appropriate specialist who will be in touch with you as soon as possible.
You will receive a confirmation E-mail to validate your address in our system. Any attached file to the reply which will help to support your inquiry is highly appreciated.