Samsung tackles IoT data security at chip level

Samsung tackles IoT data security at chip level
Samsung says the secure element solution will stop and reset itself the moment it detects abnormal activity.
Published: 5 December 2017 - 2:01 p.m.
By: Manda Banda

Semiconductor maker Samsung Electronics Co, has launched an integrated secure element (SE) solution for Internet of Things (IoT) applications that offers a turn-key service for both hardware and software needs.

Samsung stated that as the benefits of IoT devices grow, so does the importance of security throughout the network that spans from cloud, servers and hubs to the individual connected devices.

The company added that with both hardware and software support for the security requirements in today's IoT devices, Samsung's SE solution will help chip manufacturers to easily employ reliable security features and bring innovative products and services to market faster.

"Securing personal information stored on electronic devices and in the cloud is a top priority," said Ben K. Hur, vice president, System LSI marketing at Samsung Electronics. "Samsung's Secure Element solution is another demonstration of our advanced security technology that has been proven through mobile application processors (AP), smart card ICs and other semiconductor products. We believe that applications for Samsung's SE solution will continue to diversify along with the vastly expanding IoT industry."

The vendor said at the hardware level, its SE solution will stop and reset itself the moment it detects abnormal activity, thus protecting the sensitive data stored within the security IC (integrated circuit). The company added that the SE adopts embedded flash (eFlash) for the first time in the industry at the 45-nanometer (nm) process node, which brings faster data processing and more flexible software modifications compared to traditional electrically erasable programmable read-only memory (EEPROMs).

Samsung's dedicated software for the SE supports various tasks such as personal verification, security key storage, encoding and decoding. In addition, the software also allows key and authentication information to be safely transferred between devices, servers and clouds.

Click here to add your comment

Please add your comment below
Your email address will not be published