Connected home security evaluation kit with OPTIGA™ Trust M for Raspberry Pi
Discover the plug and play solution for Connected Home over IP
The connected home security evaluation kit with OPTIGA™ Trust M for Raspberry Pi is an easy-to-use development tool that enables customers to achieve end-to-end security capabilities complying with the Connected Home over IP project of the Zigbee Alliance. Using this kit customers can start evaluating the new benefits that this connectivity standard will bring.
The evaluation kit comes with the OPTIGA™ Trust M Shield2Go and the Shield2Go adapter for Raspberry Pi (Raspberry Pi is not included). This allows customers to use the evaluation kit with a Raspberry Pi for fast prototyping.
The Connected home security evaluation kit with OPTIGA™ Trust M for Raspberry Pi is used to build security for any application that will be connecting to a Connected Home over IP system.
The evaluation kit supports the following:
- X.509 certificates
- Device authentication
- ECC-256-384 / RSA 2048
- Key management
- Secured data storage
- Encrypted I2C between Host and OPTIGA™ Trust M
- Wi-Fi
- BLE 5.0
Summary of features
OPTIGA™ Trust M Shield2Go:
- OPTIGA™ Trust M with Common Criteria Certified EAL6+ (high) hardware security controller
- I2C interface with Shielded Connection (encrypted communication)
- Cryptographic support: ECC NIST P256/P384, SHA-256, TRNG, DRNG, RSA 1024/2048
- Hibernate for zero power consumption
Shield2Go adapter for Raspberry Pi:
- Compatible with Raspberry Pi
Benefits
- Smoother and easier smart home user experience
- Universal interoperability
- Strong security: Pervasive & robust; Based on proven techniques
One development kit for the cloud:
- Connectivity
- Security
- Different sensors and displays through the supported add-on shields
All you need for end-to-end security and connectivity:
- Reliable performance
- Easy to use Host Library
- Support for multi-cloud ecosystems
- Support for AWS Multi-Account Registration, Just-In-Time Registration, and Bring-Your-Own-Certificate.
Supporting a wide range of use cases:
- IoT security
- Cloud connectivity
- Secured communications
- TLS Security
- Public Key Infrastructure (PKI)
- Device authentication
Potential Applications