Menu

IoT FEATURE NEWS

Mocana Supports Trusted Platform Module

By

Mocana Corporation is a provider of mission-critical security solutions for industrial control systems and the Internet of Things (IoT). The company announced their support for the Trusted Platform Module (TPM) 2.0 to enable device manufacturers to more easily build products that meet the highest standards for cyber-security.

What does this technology use to ensure it secures important information properly? Used to secure billions of computer hardware and financial systems, TPM technology uses a unique secret key embedded into a microchip or firmware. With Mocana, IoT device manufacturers can more easily secure storage, communications, firmware updates and containerized applications.

“As the pace of cyber attacks on IoT and industrial systems increases, there is a critical need for stronger security on IoT devices,” said Srinivas Kumar, VP, engineering, Mocana. “TPM technology has been used broadly to prove the identity of a computer or financial transaction device. We are now enabling the latest TPM 2.0 feature set on IoT devices. This will significantly reduce the effort for our customers to leverage TPM technology and avoid reading the more than 3,000 pages of TPM technical documentation.”

The Trusted Platform Module (TPM) is an international standard for a secure crypto-processor. It is a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. The important standard was created by the Trusted Computing Group (TCG), a computer industry consortium. It was later standardized by International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). In 2009 the two organizations merged together to form the ISO/IEC 11889.

Advanced Ciphers Support, which supports advanced ciphers including Elliptic Curve Cryptography (ECC) and 2 56 and 512-bit Secure Hash Algorithms (SHA) 2. Multiple ownership of keys separates owners for the TPM Endorsement Key (EK) by signing/attestation from the Storage Root Key (SRK) with support for Endorsement Hierarchies (EH) and Storage Hierarchies (SH). The support offers seeding and reseeding of a non-deterministic pseudorandom number generator with an entropy source internal to the TPM’s cryptographic boundary to ensure a high degree of randomness for key generation.

Also it includes support for Windows and Linux. These solutions are optimized for embedded systems running their own based operating systems. Pre-integrated support for multi-vendor of TCG TPM 1.2 and 2.0 specifications from Infineon, Nuvoton, and STMicro is also available.

Mocana’s support offers compliance with cyber-security standards, which is the only solution to meet the requirements for US NIST 800-63B AAL3. This is the highest level of authentication assurance, and support Proof of Possession of a secret for both Certificate Management over CMS (CMC) and the Enrollment of Secure Transport (EST).


Chrissie Cluney has been a correspondent for IoT Evolution World since 2015. She holds a degree in English with a concentration in writing from the College of Saint Elizabeth.

Edited by Ken Briodagh
SHARE THIS ARTICLE
Related Articles

Google and the Future of Machine Learning and AI at the IoT Evolution Expo

By: Ken Briodagh    12/18/2018

We spoke to Ricardo Prada, UX Director at Google, and upcoming keynoter at the IoT Evolution Expo, about his session on the future of Machine Learning…

Read More

Nearing the Start of a New Year, Cybeats Closes on $3M in Funding

By: Arti Loftus    12/18/2018

Cybeats, a cybersecurity company protecting Internet of Things (IoT) devices, announced this week it has raised $3 million to expand their team in Tor…

Read More

Processing the Impact of Qualcomm

By: Carl Ford    12/18/2018

Qualcomm's release of the 9205 chip is a reduction in size to half of the 9206 chip and reduces power consumption by 70 percent. As for processing, it…

Read More

IoT in Health Podcast S.1 Ep.8 Healthy Nevada Project

By: Ken Briodagh    12/13/2018

On this episode of the monthly IoT in Health Podcast, Ken Briodagh sits down with Jim Metcalf, Chief Data Scientist, Healthy Nevada Project, to talk a…

Read More

Capitalize on the Promise of IoT Automation by Mastering the Basics

By: Special Guest    12/13/2018

According to Bsquare's IoT Maturity Index, there are five stages commonly associated with IIoT technology adoption.

Read More