OPTIGA™ TRUST M SLS32AIA
OPTIGA™ Trust M是一个高端安全解决方案，为将物联网设备接入云端提供了一个可信任锚，从而为每一台物联网设备赋予唯一身份。这种预个性化交钥匙解决方案具备安全的易于集成与实现快速接入云服务所需的高性能。
OPTIGA™ Trust M具备多种安全特性，使其成为工业和楼宇自动化应用、智能家居和联网消费类设备的理想选择。
OPTIGA™ Trust M提供两种温度范围：
- 对于大多数商用场合而言， SLS32AIA010MS标准温度范围为-25至+85°C
OPTIGA™ Trust M的开源主机代码立即提供！
- 高端安全控制器，通过CC EAL6+（高）安全认证
- 一站式解决方案 ›ECC NIST P256/P384，SHA-256，TRNG，DRNG，RSA® 1024/2048
- 支持Shielded connection的I2C接口
- 最大10 kB用户内存
- USON-10（3 x 3 mm）
An IoT device needs to prove its identity to other networked devices and to verify the identity of all other networked devices. The mutual authentication feature of OPTIGA™ Trust M supports secured device authentication.
Many IoT devices collect and store valuable data, while also receiving commands over the IoT network. In order to protect critical data transferred over the network and thus the applications running on the device, OPTIGA™ Trust M offers a secured communication feature. It supports the TLS and DTLS protocols to protect against eavesdropping, tampering and message forgery.
In many cases, software running on a microcontroller contains valuable company IP that may be key to the company’s competitive edge. To protect this IP, OPTIGA™ Trust M supports one-way ECC-384-based authentication.
To activate this IP protection feature, customers can integrate multiple checks into their software, using the one-way OPTIGA™ Trust M authentication capabilities. The code will only ever run if this authentication process is successfully executed. This feature protects customer IP against simple image cloning.
Power efficiency is particularly important in battery-run devices. OPTIGA™ Trust M enables users to set a maximum power consumption limit in a range from 6 to 15 mA. The autonomous go-to-sleep feature also helps to conserve power; it can be set to a delay anywhere in the range between 20 ms and 255 ms.
During software updates, it can be challenging to protect both the software itself and the device that is being updated. Software updates that are protected with dedicated hardware security features achieve a higher level of security.
OPTIGA™ Trust M protects the processing and storage of code by means of encryption, fault and manipulation detection, as well as secured code and data storage.
Device integrity needs to be verified in order to detect unauthorized changes. Protecting the boot process is one of the most effective ways of doing this. Also known as secured, verified or trusted boot, boot access protection blocks unauthorized booting of computing devices to stop compromised devices from exchanging data over the IoT.
OPTIGA™ Trust M offers a set of features to enhance boot protection, also offloading complex, compute-intensive cryptography functions of the IoT device.
IoT environments can make it difficult for manufacturers to protect their ecosystem. For example, if a manufacturer produces both a main system and a smaller accessory or spare part, they may be keen to harden the main system against lower-quality counterfeit products.
OPTIGA™ Trust M offers a one-way authentication feature so that the main device or server can easily authenticate the new accessory or spare part.
- Secured data storage and key provisioning
- Lifecycle management