Designing Robust Security Options for Embedded Systems

Embedded devices have traditionally had limited security features. The small size of
most embedded devices prevents extensive security features from being implemented,
which is a big problem for Enterprise System OEMs who require data be rendered
unreadable in the advent of a security breach. With Enterprise System OEMs, the host
system must maintain ultimate control over security algorithms.

A comprehensive solution came out called SiSecure. With SiSecure, application data 
and software IP are tied to a specific drive, which means the host system can verify 
the drive and create unique encryption keys to prevent theft. Confidential data can 
be removed at several levels, from ultra-fast data erasure to complete destruction 
of the master boot records, file allocation tables (FATs), or even the drive itself.
Write protection can be set up for read-only access, and password protection is available
for read/write access. Design engineers can define up to five independent security zones
with different security parameters for protection and flexibility.

Applications requiring advanced levels of security, such as data recorders, wearable
and field computers, medical monitoring and diagnostic equipment, POS systems,
and voting machines are able to activate features such as ultra-fast data erasure
and sanitization, data zones with independent security parameters, and
secure areas for OEMs to access and create their own encryption/decryption
keys. SiSecure protects application data and software IP from theft, falling into the
wrong hands from deployments in high risk areas, corruption, and accidental or
malicious overwrites.

The security industry has focused on portable storage devices for the consumer
electronics industry for users who want the security algorithm to travel with the storage
device (such as, a USB thumb drive). This technology allows the user to protect and use
the data on any system, whether it is an office PC, home computer, Internet kiosk, or
other public computer. Software applications and user data are encrypted and password
protected using industry-defined security protocols, which become targets for Internet

Enterprise System OEMs operate under a different premise. Data must be rendered
unreadable if the storage devices are removed from the systems for which they were
intended. Highly-visible security breaches, such as a flash card with sensitive military
documents being found in a bazaar in Bagram, Afghanistan, have become more
prevalent as more and more embedded devices handle sensitive data.
In the Enterprise System OEM market, the host system must maintain ultimate control
over security algorithms to protect data and prevent IP theft. These algorithms can be as
simple as ensuring that the correct storage product is in the host, or as intricate as 
tying the software IP and application data directly to the storage device.

SiSecure :-

SiSecure is a comprehensive solution that overcomes the design challenges and performance 
trade-offs in hard drives and traditional flash cards to deliver an unprecedented level of 
embedded storage system security. SiSecure enables designers to easily integrate security 
to guard against critical data from falling into the wrong hands and software IP theft. 
In addition, SiSecure integrates a suite of low-level, and specific commands that can be 
used by the host to create a completely proprietary, highly-configurable security algorithm.

SiSecure increases storage system flexibility, while decreasing cost by eliminating the
need for storing information on multiple platforms based on security requirements.
Benefits to OEMs include IP theft prevention, new market opportunities, and being able
to capture untapped revenue streams and enhanced product differentiation.

, , , , , , , ,

  1. Leave a comment

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: