TECH
We develop the technology necessary for product security.
Key Technologies
01
Device Unique ID (DICE)
Using DICE (Device Identifier Composition Engine) technology, each product generates a unique ID, similar to a fingerprint, and creates a key pair. This is pre-registered and distributed through the supply chain, serving as a means of product authentication and preventing illegal replication.
02
Secure Boot &
Secure OTA(Over the Air)
By creating a Root of Trust within the hardware and utilizing digital signature technology, a chain of trust is established in the boot sequence for firmware, OS, applications, etc. This ensures product integrity and only allows updates with signed and verified code, preventing indiscriminate software patches or alterations.
03
TEE
(Trusted Execution Environment)
Critical security-related code and cryptographic keys are stored and executed within a Trusted Execution Environment (TEE) that leverages the processor’s memory protection. This ensures protection against physical attacks and provides Secure Storage to safeguard various authentication and encryption keys.
04
Mutual Authentication, SSL / VPN
When electronic devices communicate over networks, certificate-based mutual authentication and encryption are essential to prevent security incidents like password leakage or eavesdropping. If required, we also provide a high-security, VPN On Chip solution for enhanced protection.
01
Device Unique ID (DICE)
Using DICE (Device Identifier Composition Engine) technology, each product generates a unique ID, similar to a fingerprint, and creates a key pair. This is pre-registered and distributed through the supply chain, serving as a means of product authentication and preventing illegal replication.
02
Secure Boot &
Secure OTA(Over the Air)
By creating a Root of Trust within the hardware and utilizing digital signature technology, a chain of trust is established in the boot sequence for firmware, OS, applications, etc. This ensures product integrity and only allows updates with signed and verified code, preventing indiscriminate software patches or alterations.
03
TEE
(Trusted Execution Environment)
Critical security-related code and cryptographic keys are stored and executed within a Trusted Execution Environment (TEE) that leverages the processor’s memory protection. This ensures protection against physical attacks and provides Secure Storage to safeguard various authentication and encryption keys.
04
Mutual Authentication, SSL / VPN
When electronic devices communicate over networks, certificate-based mutual authentication and encryption are essential to prevent security incidents like password leakage or eavesdropping. If required, we also provide a high-security, VPN On Chip solution for enhanced protection.
Company Name | Security Platform Inc. | Representative | Hwang Soo-ik
Business Registration Number | 365-88-00109
Email | info@spi.im
4th Floor, 116 Teheran-ro, Gangnam-gu, Seoul
Business Hours | Weekdays 09:00 - 18:00
Consultation Hours | Weekdays 09:00 - 18:00
Consultation & Business Contact | 070-7613-0094
Copyright © 2024 Security Platform Inc. All Rights Reserved.
Company Name Security Platform Inc.
Representative Hwang Soo-ik
|
Business Registration Number 365-88-00109
|
Email info@spi.im
|
Address 4th Floor, 116 Teheran-ro, Gangnam-gu, Seoul
Business Hours Weekdays 09:00 - 18:00
|
Consultation Hours Weekdays 09:00 - 18:00
|
Consultation & Business Contact 070-7613-0094
Copyright © 2024 Security Platform Inc. All Rights Reserved.