secureSPOT

Design Securely

In an increasingly connected world, device security plays a vital role in safeguarding sensitive data, preserving privacy, and upholding the integrity of digital systems and communications. Our secureSPOT technology addresses these essential concerns by delivering a comprehensive suite of security features without compromising device performance or battery life.

secureSPOT 3.0 Highlights

01

Secure Boot

Enhanced security with root of trust ensures that only authenticated and trusted firmware is loaded during device initialization, safeguarding against unauthorized/malicious code execution from the boot process onwards.

02

Secure Peripherals

Bolstered protection through hardware-based security features like encryption, authentication, and access control, ensuring data integrity and confidentiality in peripheral operations.

03

Secure Debug

Controlled and authenticated access to debugging interfaces, ensuring that only authorized users can access and interact with the device during development.

04

Secure Lifecycle Management

Ensure the integrity and security of the device throughout its lifecycle, from manufacturing and provisioning to deployment and decommissioning, mitigating risks and vulnerabilities at every stage.

Security Centered

Our products are specifically engineered to serve a diverse array of applications, encompassing wearables, medical devices, smart home technologies, IIoT solutions, and more.

Specifications

secureSPOT 3.0 with Arm TrustZone®

  • Secure Boot
  • Extensible to Custom Secondary Boot Loader
  • Secure/Non-Secure True Random Number Generator (TRNG)
  • Trusted Execution Environment
  • Anti-Tamper Protection
  • Secure Peripherals
  • PUF-based Identity/Sign/Verify
  • Key Revocation
  • Flash protections (copy and write protection)
  • Hardware cryptographic acceleration
  • Hardware Keys (Inaccessible to software)
  • Secure Upgrade (OTA)
  • Wired Interface Support
  • Anti-Rollback
  • Encryption support for updates
  • Recovery (factory reset)
  • Hardware Entropy
  • Security Lifecycle Management
  • Secure Debug
  • OTP Support
  • Secure Key Storage

secureSPOT 2.0

  • Secure Boot
  • Extensible to Custom Secondary Boot Loader
  • True Random Number Generator (TRNG)
  • Key Revocation
  • Flash protections (copy and write protection)
  • Hardware cryptographic acceleration
  • Hardware Keys (Inaccessible to software)
  • Secure Upgrade (OTA)
  • Wired Interface Support
  • Anti-Rollback
  • Encryption support for updates
  • Recovery (factory reset)
  • Hardware Entropy
  • Security Lifecycle Management
  • Secure Debug 
  • OTP Support 
  • Secure Key Storage

secureSPOT 1.0

  • Secure Boot
  • Extensible to Custom Secondary Boot Loader
  • Key Revocation
  • Flash protections (copy and write protection)
  • Secure Upgrade (OTA)
  • Wired Interface Support
  • Anti-Rollback
  • Encryption support for updates
  • Recovery (factory reset)
  • Hardware Entropy
  • Debugger Lockout Support

Video Library

Design Resources

Browse our Design Resources which includes product briefs, datasheets, selector guides, family brochures, white papers, quick start guides, and more to help you learn more about products.

Additional documentation

  • Set favorites
  • Get update notifications
  • Use search filters
Preparing to download