Available on Kontron VME, VPX and TRACe products
A comprehensive approach with both hardware- and software-based solutions
Available as a turn-key baseline for your deployments ( https://kfrlabs.kontron.com/secline.html )
Or as ingredients to build your embedded security (below)
KONTRON SEC-Line (Secure Embedded Computing) modules and services combine the most up-to-date technologies for the protection of Embedded Applications: Trusted and Secure Boot, Trusted Modules, Advanced authentication and Application binary encryption.
To answer increasing security requirements for safety-critical applications, Kontron has built up its security capabilities into four modules, implementing hardware enforced root of trust, as well as software only techniques.
Based on a Trusted Platform Module (TPM) secure element
TRUSTED BOOT: protect the system software during the boot and help detect any system software alteration
AUTHENTICATION WITH TPM: authenticate the system hardware during communication phases (SSL/TLS) and thus enable secure network protocols.
Based on a dedicated hardware secure element:
APPROTECT: ensure the application’s integrity and confidentiality with a dedicated hardware secure element.
Sofware only techniques
SECURE BOOT: boot only signed software from the BIOS firmware
Together with SEC-Line, Kontron proposes in-house the necessary additional services compliant with ISO 27000 standard for the encryption of applicative software and the management of Security Certificates.