Back to overview

Robust security - The basic need of IoT

To make the IoT work, robust security is key

Successful IoT strategies must be built on a security-by-design framework, where security is factored in from the ground up and not added as an after-thought. That is the best way to create > robust IoT solutions capable of responding to a growing and ever-changing threat landscape.

Device manufacturers are challenged to protect both the identity and integrity of cloud-connected devices, whether they be compute-intensive edge devices running intelligent algorithms, consumer devices, or IoT end nodes such as sensors. Creating trust between connected IoT devices is the first step in any security strategy.

> Discover more

IoT security: It’s all about identity

IoT security starts with identity: Every IoT device needs a strong and unique identity so it can prove it is trustworthy.

Counterfeit products can negatively affect device functionality and may even cause safety issues. The OPTIGA™ Authenticate product family meets this challenge by giving smart “things” a secured and unique ID so users can trust them.

As part of the OPTIGA™ Authenticate family, our new OPTIGA™ Authenticate IDoT gives things a unique identity to verify authenticity and build consumer trust through genuine user experiences. All products and accessories equipped with OPTIGA™ Authenticate IDoT are thus protected and can easily identify themselves as genuine or original parts.
This strong all-in-one, anti-counterfeit turnkey solution combines enhanced
> device authentication with unprecedented levels of configuration flexibility.

OPTIGA™ Authenticate solutions are ideal for all sorts of disposables and spare parts ranging from filters, purifiers, and cartridges to complex industrial systems.

> Learn more

Trusted wireless charging

Imagine a world without cables…

Reflecting the convenience trend, users want to be able to charge devices quickly and easily – no matter where they are. So it is not surprising that more and more IoT devices are offering the wireless charging feature. As wireless charging becomes more popular, the need for secured, safe, and proper charging processes is also gaining in importance.

Another member of our OPTIGA™ family, the > OPTIGA™ Trust Charge, meets this need. Designed for easy integration, this turnkey solution provides secured device authentication for inductive wireless charging. Secured wireless charging authentication with OPTIGA™ Trust Charge contributes to device and user safety by protecting against fake chargers.

> Read more

Stronger focus on privacy with 5G

With its strong focus on security, the 5G standard provides for more robust protection of privacy. It defines a broad set of security features across all network layers. Many of these are optional and thus at the discretion of the MNO. To support different implementations across the full spectrum from lightweight to more sophisticated adoption of the new 5G security features, we deliver a broad range of 5G-ready products.

Making wearables smarter for secured and seamless payments

> Smart wearables and IoT devices are becoming increasingly popular as they accommodate more and more functions on smaller footprints.

Our > SECORA™ Connect family brings NFC security capabilities to smart wearables and accessories, enabling users to securely provision, store, select, and use multiple credentials such as payment cards and transport tickets.

This complete turnkey solution allows smart wearable system designers with no security or antenna design experience to seamlessly integrate a very compact, ultra-low-power solution supporting various NFC-based applications.

Learn more about Infineon’s broad solution portfolio regarding wearables > here.

Next evolution: IoT in a heartbeat

We teamed up with the innovative start-up > DEED to integrate our NFC security solution SECORA Connect (and further Infineon products like the PSoC™) into DEED’s get® wristband.

Marking the next leap in the wearable evolution, this novel device combines higher security standards with a unique ID capture method and a revolutionary, screenless interface for an ultra-intuitive user experience.

get® uses the electric signal produced by the human heart (electrocardiogram) for strong, fast and secure authentication of contactless payments. Unique to each person, the electric heartbeat signal opens up new possibilities for biometric identification.
Share

More about IoT Security

Share
Share
Share