SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Timo Grassmann, Product Marketing Manager
OPTIGA™ Trust – Brand Protection
and Device Authentication
We focus on three central needs
of modern society
Energy Efficiency Mobility Security
Power Management & Multimarket
Automotive
Chip Card & Security
Industrial Power Control
Page 2Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
OPTIGA™ Trust –
Increased security and lower system costs
 Counterfeiting is big business – OPTIGA™ Trust is your security solution
 Motivations and applications
 Why OPTIGA™ Trust?
 Distribution and partner network
 Markets and OPTIGA™ Trust family
 Infineon – the partner of choice for device authentication
Page 3Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
Product counterfeiting inflicts billions of dollars
in damages to businesses
IACC (int'l anti-counterfeiting coalition) EU Customs (OECD) 09/2013
 Almost 40 million counterfeit
articles were detained in 2012
 Equivalent genuine product
value is estimated to be just
below 1 billion Euro
 It is estimated that
counterfeiting is a $600 billion
a year problem
 It's a problem that has grown
over 10,000 percent in the
past two decades
 ~5% to 7% of the world trade
is in counterfeit goods
Page 4Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
Different customers have different motivations
to prevent product counterfeiting
Docking
station
RELIABILITY
Toner &
printer
cartridges
PROFIT
Projector
QUALITY
Company
Brands
IMAGE
AC adapter
LIABILITY
Medical
devices
SAFETY
Page 5Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
Asymmetric: Two different keys for En- and Decryption
SW-Encryption
Public KeyNon-Secure
SW environment
Public Key Only
HW-Decryption
Secret Key
Symmetrical Algorithms can not afford SW implementations:
They pose a high risk of "Break-once, Publish-everywhere"
Private Key
is protected
in Hardware
OPTIGA™ Trust – Protecting Electronic Devices and
Accessories against Product Piracy
Page 6Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
The possible applications for OPTIGA™ Trust
authentication products are endless
Electronic accessory
authentication
(e.g. MP3 players)
ICT Infrastructure
authentication
(e.g. routers)
Gaming
authentication
(e.g. slot machines)
Industrial
Printer cartridge
authentication
Medical equipment
authentication
Cloud computing
authentication
Software/ IP
authentication
Page 7Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
Why OPTIGA™ Trust?
Improved security
 Chip individual, unique magic number, 10 byte unique ID
 State of the art asymmetric elliptic curve cryptography
 Uniqueness provided by chip individual key pair
Lean and easy connectivity with Single Wire Interface
Optimized system costs with 1 chip solution
Smallest foot print using USON-3 package
Easy integration due to full turn key solution
Page 8Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
OPTIGA™ Trust Evaluation Board
For Demo
 USB stick demonstrating
 Authentication
 Memory usage
 Plug-and-play functionality
 Software and documentation
 Windows-based GUI
Page 9Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
Customer benefits
Revenue assurance/ protection
of business case
Increased product safety, and
reliability due to original product
Improved customer and
end customer satisfaction
Page 10Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
OPTIGA™ Trust SLS 10ERE
 Cost efficient
 ECC based asymmetric crypto
 Secret stored on-chip only!
 Turnkey solution
OPTIGA™ Trust P SLJ 52ACA
 Programmable security controller
 Java
OPTIGA™ Trust E SLS 32AIA
 Fully featured solution
 Certified security controller
>2 bn units to be sold in 2018 Products

Infineon is offering a comprehensive portfolio of products to
address the growing demand for authentication solutions
Electronic
accessory
authentication
(e.g. MP3 players)
ICT
Infrastructure
authentication
(e.g. routers)
Gaming
authentication
(e.g. slot
machines)
Industrial
Printer cartridge
authentication
Medical
equipment
authentication
Page 11Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.

OPTIGA™ Trust and XMC microcontrollers
…a perfect match
 The OPTIGA™ Trust authentication chip and
the XMC microcontroller can be perfectly
matched in any embedded environment
 Easy integration due to integrated XMC
development environment (DAVE)
Host side Client side
Authentication
Page 12Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
OPTIGA™
OPTIGA™
Security Products for Embedded Systems
Scalable and tailored to application needs: Infineon's OPTIGA™
product portfolio is the perfect match to secure embedded systems
OPTIGA™ Trust
Device authentication is the focus of the OPTIGA™ Trust
family matching function and performance to value
OPTIGA™ TPM
Compliant to the Trusted Computing Group specifications,
the OPTIGA™ TPM family is the Root-of-Trust for PC,
mobile and embedded computing applications
Page 13Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
Infineon is the partner of choice for the key trends in
the device authentication market
With advanced hardware based security
and asymmetric algorithms
OPTIGA™ Trust products consist of a chip
and all necessary software
Increased security at lower system costs
Turn-Key solutions for fast and easy designs
Page 14Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
Contact information
Your contact at Infineon:
Page 15Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
 Phone: +49 (0)89 234-81413
 Cell: +49 (0) (170) 2288324
 eMail: timo.grassmann@infineon.com
 Internet: www.infineon.com
Timo Grassmann
Product Marketing Manager
OPTIGA™ Trust – Brand Protection and Device Authentication

Más contenido relacionado

Más de Infineon Technologies AG

Advanced and Low-Complexity Authentication
Advanced and Low-Complexity AuthenticationAdvanced and Low-Complexity Authentication
Advanced and Low-Complexity AuthenticationInfineon Technologies AG
 
Infineon Technologies - Unternehmenspräsentation Q3 2014
Infineon Technologies - Unternehmenspräsentation Q3 2014Infineon Technologies - Unternehmenspräsentation Q3 2014
Infineon Technologies - Unternehmenspräsentation Q3 2014Infineon Technologies AG
 
LED Driver "BCR402U" - Datasheet | Infineon Technologies
LED Driver "BCR402U" - Datasheet | Infineon TechnologiesLED Driver "BCR402U" - Datasheet | Infineon Technologies
LED Driver "BCR402U" - Datasheet | Infineon TechnologiesInfineon Technologies AG
 
Energy Efficient Lighting | Infineon Technologies
Energy Efficient Lighting  | Infineon TechnologiesEnergy Efficient Lighting  | Infineon Technologies
Energy Efficient Lighting | Infineon TechnologiesInfineon Technologies AG
 
Battery powered Applications: Selection Guide | Infineon Technologies
Battery powered Applications: Selection Guide | Infineon TechnologiesBattery powered Applications: Selection Guide | Infineon Technologies
Battery powered Applications: Selection Guide | Infineon TechnologiesInfineon Technologies AG
 
Solutions for Wind Energy Systems | Infineon Technologies
Solutions for Wind Energy Systems | Infineon TechnologiesSolutions for Wind Energy Systems | Infineon Technologies
Solutions for Wind Energy Systems | Infineon TechnologiesInfineon Technologies AG
 
High Power Semiconductors | Infineon Technologies
High Power Semiconductors | Infineon TechnologiesHigh Power Semiconductors | Infineon Technologies
High Power Semiconductors | Infineon TechnologiesInfineon Technologies AG
 
NPN Silicon AF Transistors | Infineon Technologies
NPN Silicon AF Transistors | Infineon TechnologiesNPN Silicon AF Transistors | Infineon Technologies
NPN Silicon AF Transistors | Infineon TechnologiesInfineon Technologies AG
 
PNP Silicon AF Transistor | Infineon Technologies
PNP Silicon AF Transistor | Infineon TechnologiesPNP Silicon AF Transistor | Infineon Technologies
PNP Silicon AF Transistor | Infineon TechnologiesInfineon Technologies AG
 
LED Driver "BCR401U"| Infineon Technologies
LED Driver "BCR401U"| Infineon TechnologiesLED Driver "BCR401U"| Infineon Technologies
LED Driver "BCR401U"| Infineon TechnologiesInfineon Technologies AG
 
LED Driver "BCR420U / BCR421U" | Infineon Technologies
LED Driver "BCR420U / BCR421U" | Infineon TechnologiesLED Driver "BCR420U / BCR421U" | Infineon Technologies
LED Driver "BCR420U / BCR421U" | Infineon TechnologiesInfineon Technologies AG
 
LED Driver "BCR402W" | Infineon Technologies
LED Driver "BCR402W" | Infineon TechnologiesLED Driver "BCR402W" | Infineon Technologies
LED Driver "BCR402W" | Infineon TechnologiesInfineon Technologies AG
 

Más de Infineon Technologies AG (20)

NFC Technology for Smart Wearables
NFC Technology for Smart WearablesNFC Technology for Smart Wearables
NFC Technology for Smart Wearables
 
Infineon Inverstor Relations Q4 2015
Infineon Inverstor Relations Q4 2015Infineon Inverstor Relations Q4 2015
Infineon Inverstor Relations Q4 2015
 
Securing railway control systems
Securing railway control systemsSecuring railway control systems
Securing railway control systems
 
Infineon Car Security
Infineon Car SecurityInfineon Car Security
Infineon Car Security
 
Advanced and Low-Complexity Authentication
Advanced and Low-Complexity AuthenticationAdvanced and Low-Complexity Authentication
Advanced and Low-Complexity Authentication
 
Infineon DLD Conference 2015
Infineon DLD Conference 2015Infineon DLD Conference 2015
Infineon DLD Conference 2015
 
Car security driving trust
Car security driving trustCar security driving trust
Car security driving trust
 
Infineon Technologies - Unternehmenspräsentation Q3 2014
Infineon Technologies - Unternehmenspräsentation Q3 2014Infineon Technologies - Unternehmenspräsentation Q3 2014
Infineon Technologies - Unternehmenspräsentation Q3 2014
 
Infineon company presentation q3 2014
Infineon company presentation q3 2014Infineon company presentation q3 2014
Infineon company presentation q3 2014
 
LED Driver "BCR402U" - Datasheet | Infineon Technologies
LED Driver "BCR402U" - Datasheet | Infineon TechnologiesLED Driver "BCR402U" - Datasheet | Infineon Technologies
LED Driver "BCR402U" - Datasheet | Infineon Technologies
 
Energy Efficient Lighting | Infineon Technologies
Energy Efficient Lighting  | Infineon TechnologiesEnergy Efficient Lighting  | Infineon Technologies
Energy Efficient Lighting | Infineon Technologies
 
Battery powered Applications: Selection Guide | Infineon Technologies
Battery powered Applications: Selection Guide | Infineon TechnologiesBattery powered Applications: Selection Guide | Infineon Technologies
Battery powered Applications: Selection Guide | Infineon Technologies
 
Solutions for Wind Energy Systems | Infineon Technologies
Solutions for Wind Energy Systems | Infineon TechnologiesSolutions for Wind Energy Systems | Infineon Technologies
Solutions for Wind Energy Systems | Infineon Technologies
 
High Power Semiconductors | Infineon Technologies
High Power Semiconductors | Infineon TechnologiesHigh Power Semiconductors | Infineon Technologies
High Power Semiconductors | Infineon Technologies
 
XMC4000 Brochure | Infineon Technologies
XMC4000 Brochure | Infineon TechnologiesXMC4000 Brochure | Infineon Technologies
XMC4000 Brochure | Infineon Technologies
 
NPN Silicon AF Transistors | Infineon Technologies
NPN Silicon AF Transistors | Infineon TechnologiesNPN Silicon AF Transistors | Infineon Technologies
NPN Silicon AF Transistors | Infineon Technologies
 
PNP Silicon AF Transistor | Infineon Technologies
PNP Silicon AF Transistor | Infineon TechnologiesPNP Silicon AF Transistor | Infineon Technologies
PNP Silicon AF Transistor | Infineon Technologies
 
LED Driver "BCR401U"| Infineon Technologies
LED Driver "BCR401U"| Infineon TechnologiesLED Driver "BCR401U"| Infineon Technologies
LED Driver "BCR401U"| Infineon Technologies
 
LED Driver "BCR420U / BCR421U" | Infineon Technologies
LED Driver "BCR420U / BCR421U" | Infineon TechnologiesLED Driver "BCR420U / BCR421U" | Infineon Technologies
LED Driver "BCR420U / BCR421U" | Infineon Technologies
 
LED Driver "BCR402W" | Infineon Technologies
LED Driver "BCR402W" | Infineon TechnologiesLED Driver "BCR402W" | Infineon Technologies
LED Driver "BCR402W" | Infineon Technologies
 

Último

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

OPTIGA™ Trust – Brand Protection and Device Authentication

  • 1. Timo Grassmann, Product Marketing Manager OPTIGA™ Trust – Brand Protection and Device Authentication
  • 2. We focus on three central needs of modern society Energy Efficiency Mobility Security Power Management & Multimarket Automotive Chip Card & Security Industrial Power Control Page 2Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
  • 3. OPTIGA™ Trust – Increased security and lower system costs  Counterfeiting is big business – OPTIGA™ Trust is your security solution  Motivations and applications  Why OPTIGA™ Trust?  Distribution and partner network  Markets and OPTIGA™ Trust family  Infineon – the partner of choice for device authentication Page 3Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
  • 4. Product counterfeiting inflicts billions of dollars in damages to businesses IACC (int'l anti-counterfeiting coalition) EU Customs (OECD) 09/2013  Almost 40 million counterfeit articles were detained in 2012  Equivalent genuine product value is estimated to be just below 1 billion Euro  It is estimated that counterfeiting is a $600 billion a year problem  It's a problem that has grown over 10,000 percent in the past two decades  ~5% to 7% of the world trade is in counterfeit goods Page 4Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
  • 5. Different customers have different motivations to prevent product counterfeiting Docking station RELIABILITY Toner & printer cartridges PROFIT Projector QUALITY Company Brands IMAGE AC adapter LIABILITY Medical devices SAFETY Page 5Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
  • 6. Asymmetric: Two different keys for En- and Decryption SW-Encryption Public KeyNon-Secure SW environment Public Key Only HW-Decryption Secret Key Symmetrical Algorithms can not afford SW implementations: They pose a high risk of "Break-once, Publish-everywhere" Private Key is protected in Hardware OPTIGA™ Trust – Protecting Electronic Devices and Accessories against Product Piracy Page 6Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
  • 7. The possible applications for OPTIGA™ Trust authentication products are endless Electronic accessory authentication (e.g. MP3 players) ICT Infrastructure authentication (e.g. routers) Gaming authentication (e.g. slot machines) Industrial Printer cartridge authentication Medical equipment authentication Cloud computing authentication Software/ IP authentication Page 7Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
  • 8. Why OPTIGA™ Trust? Improved security  Chip individual, unique magic number, 10 byte unique ID  State of the art asymmetric elliptic curve cryptography  Uniqueness provided by chip individual key pair Lean and easy connectivity with Single Wire Interface Optimized system costs with 1 chip solution Smallest foot print using USON-3 package Easy integration due to full turn key solution Page 8Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
  • 9. OPTIGA™ Trust Evaluation Board For Demo  USB stick demonstrating  Authentication  Memory usage  Plug-and-play functionality  Software and documentation  Windows-based GUI Page 9Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
  • 10. Customer benefits Revenue assurance/ protection of business case Increased product safety, and reliability due to original product Improved customer and end customer satisfaction Page 10Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
  • 11. OPTIGA™ Trust SLS 10ERE  Cost efficient  ECC based asymmetric crypto  Secret stored on-chip only!  Turnkey solution OPTIGA™ Trust P SLJ 52ACA  Programmable security controller  Java OPTIGA™ Trust E SLS 32AIA  Fully featured solution  Certified security controller >2 bn units to be sold in 2018 Products  Infineon is offering a comprehensive portfolio of products to address the growing demand for authentication solutions Electronic accessory authentication (e.g. MP3 players) ICT Infrastructure authentication (e.g. routers) Gaming authentication (e.g. slot machines) Industrial Printer cartridge authentication Medical equipment authentication Page 11Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved. 
  • 12. OPTIGA™ Trust and XMC microcontrollers …a perfect match  The OPTIGA™ Trust authentication chip and the XMC microcontroller can be perfectly matched in any embedded environment  Easy integration due to integrated XMC development environment (DAVE) Host side Client side Authentication Page 12Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
  • 13. OPTIGA™ OPTIGA™ Security Products for Embedded Systems Scalable and tailored to application needs: Infineon's OPTIGA™ product portfolio is the perfect match to secure embedded systems OPTIGA™ Trust Device authentication is the focus of the OPTIGA™ Trust family matching function and performance to value OPTIGA™ TPM Compliant to the Trusted Computing Group specifications, the OPTIGA™ TPM family is the Root-of-Trust for PC, mobile and embedded computing applications Page 13Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
  • 14. Infineon is the partner of choice for the key trends in the device authentication market With advanced hardware based security and asymmetric algorithms OPTIGA™ Trust products consist of a chip and all necessary software Increased security at lower system costs Turn-Key solutions for fast and easy designs Page 14Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.
  • 15. Contact information Your contact at Infineon: Page 15Embedded World 2014 Copyright © Infineon Technologies AG 2014. All rights reserved.  Phone: +49 (0)89 234-81413  Cell: +49 (0) (170) 2288324  eMail: timo.grassmann@infineon.com  Internet: www.infineon.com Timo Grassmann Product Marketing Manager