What if you could improve device security by using simple software and on-chip storage to create your very own root of trust (RoT)? Well, now you can.
Join this Embedded Toolbox Live interactive webcast where engineers from embedded system security IP leader Intrinsic ID will demonstrate the company’s new root key generation and management solution, BK Software IP. In a few short minutes, they’ll use the software and a NUCLEO-L4A6ZG development board from ST Microelectronics to show how you can leverage SRAM physical unclonable functions (PUF) to:
• Create a unique device identity
• Securely store multiple keys on or off chip
• Provision the device with a certificate
• Verify device authenticity with a challenge-response protocol
The first 100 qualified registrants will receive a free NUCLEO-L4A6ZG board from ST Microelectronics and trial version of BK Software IP so they can follow along during the live session. And after the tutorial, Intrinsic ID experts will field questions on BK Software IP, the company’s PUF technology, and ways you can overcome common embedded and IoT security obstacles.
Don’t be late for class. Register for “Democratizing Silicon Roots of Trust with Software,” an Embedded Toolbox Live interactive webcast sponsored by Intrinsic ID, today.
Anyone with the event link can attend
Please register for this Webinar to view the dial-in info.
Director, Field Application Engineers, Intrinsic ID
Olaf Heemskerk is the Director Field Application Engineers at Intrinsic ID. His primary responsibility is the managing the Field Application Engineering team and consulting and supporting customers. His technical expertise includes the internal...
Brandon is a tech journalist and electronics marketer with more than a decade of experience covering the embedded sector. In his current role as Editor-in-Chief of Embedded Computing Design, he guides the publication's content strategy, editorial...
Welcome to the Embedded Toolbox Live! with Intrinsic ID.
We're going to be investigating how you can use the BK Software IP software development kit to take advantage of the inherent entropy of uninitialized SRAM to create your own hardware root of trust in minutes.
Get ready with your questions, cuz we have experts on hand and the ability to screenshare into example solutions for any challenges you're facing.
See you in the lab...
Embedded Computing Design