Академический Документы
Профессиональный Документы
Культура Документы
SECURITY
LIFECYCLE
MANAGEMENT
Gemalto’s approach to security
closes the loop, managing the
complete security lifecycle of
the connected object together
IOT SECURITY
with data at rest and in motion CONSULTING &
CERTIFICATION
from the network to the cloud. SERVICES
SECURE SECURE
THE CLOUD THE DEVICE
1
6 Pole SCS - Security 15/03/2016
Delivering security
Secured Secured
app app
Security Security
libs libs
Processor Processor
Processor Processor
Secure Element
Security libs
Security libs
HSM
Dedicated chip for
Dedicated chip for
security
security
AppSKey
AppSKey
NwkSKey
NwkSKey
• Application Providers
NwkSkey
… or to repude them
How the LoRa Operator ensures the network authentication and ensures the
confidentiality to its customers ?
Secure the
2 Distribution 4
Trusted Key Manager application
AppSKey
AppKey 3 Secure the
NwkSKey network
AppSKey
AppKey NwkSKey
Devices manufacturer
The device AppKey is never disclosed between the device manufacturer, the
network operator, and the service provider
The device AppKey is securely stored in a tamper resistant server
13 Pole SCS - Security 15/03/2016
Device Security
3
14 Pole SCS - Security 15/03/2016
LOGO COLOR VERSIONS
Gemalto Embedded Security Choices
LOGO
KMS
KMS
Trusted Third Party
KMS
Connect Monetize
> Out-of-the-box > Flexible monetization
connectivity
> Licensing and entitlement
> Multiple form factors software
> Quality of Service > IoT application upgrades
> Subscription Management Secure > Application Development
> Secure the device