Trusted Objects publishes a Position Paper on Software & IP Protection for OEM

AIX EN PROVENCE, France, May 13, 2020 /PRNewswire-PRWeb/ -- The purpose of this position paper is to analyze the vulnerabilities leading to software & IP hacking and theft, to look at the different solutions and their gaps and to finally introduce a new concept adapted to embedded systems.

Trusted Objects Position Paper "Software & IP Protection for OEM" analyzes the vulnerabilities that are often encountered during the device manufacturing process, on the off-the-shelf device and during the OTA (Over The Air) software update. The document then explores the different security technologies have been deployed for decades to protect data and software, including state-of-the art cryptography, digital signature, secure boot, obfuscation of executables. However, these existing security solutions have led to identifying some gaps for embedded systems.

The Position Paper concludes with the new concepts identified for software and IP protection, bringing a seamless protection all along the "chain of trust." Secure libraries based on cryptography and obfuscation techniques have proven to be efficient against reverse engineering, and easy to implement. Centralized solutions for secure programming are getting user friendly and easy to implement, at effective cost.

Trusted Objects has pioneered new concepts and innovative solutions for software & IP protection, including secure libraries, secure programming and secure boot for OTA secure software update. Trusted Objects has also partnered with System General to have TOPS, its secure programming solution, qualified on System General programming equipment.

The Position Paper "Software & IP Protection for OEM" is available from Trusted Objects website.

About Trusted Objects

Trusted Objects is a leading independent player in the Secure IoT market, providing innovative solutions including software and embedded firmware, to dramatically enhance the security of connected devices. Trusted Objects solutions are fully optimized, certified and are positioned as the root of trust to meet the end to end security needs of the IoT.

Trusted Objects also delivers a set of services and systems including security assessment, personalization engine, keys and certificates management, fast prototyping to accelerate the deployment of comprehensive solutions that meet the highest security requirements.

SOURCE Trusted Objects