Page 68 - Cyber Defense eMagazine for July 2020
P. 68

card can be used to manage software licensing and feature activation. Access control, code encryption
            or digital signature allow the definition and management of different software configurations for products.



            Retrofittable and future-proof

            In comparison to a soldered TPM, the idea of a pluggable security module might at first seem unusual.
            However, older machinery and systems generally have a USB interface or interfaces for memory cards
            (Fig. 2). Therefore, the big advantage of using pluggable security modules is that existing devices can
            easily be retrofitted and secured using Swissbit security memory.

            This ability to retrofit devices offers another advantage in the constant race to keep up with cyber security.
            Attack  and  defense  methods  develop  cyclically  and  harmonizing  them  with  for  example  the  project
            lifecycle of an industrial plant is challenging. A situation could arise where it necessary to allocate a new
            ID  with  improved  cryptography  technologies  to  the  M2M  communication  participants.  Swissbit’s
            retrofittable solution makes this possible.





























            Fig 2. Memory interfaces, such as USB, can be used to retrofit a TPM function.



            Outlook

            In response to the rapidly increasing market demand for embedded IoT, Swissbit opened its new factory
            in October 2019, located in Berlin, Germany. This factory is equipped with state-of-the-art advanced 3D
            chip scale packaging technology, developing and producing customized system-in-package and multi-
            chip  module  designs  for  its  customers.  This  technology  facilitates  not  only  the  integration  of
            microcontrollers, NAND chips and crypto chips, but also sensors, wireless chips and antennas. Using
            memory  interfaces  with  TPM  and  encryption  components  for  security  solutions  might  only  be  the
            beginning, with the scope for the addition of further functionalities that can be miniaturized and integrated.




            Cyber Defense eMagazine –July 2020 Edition                                                                                                                                                                                                                         68
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   63   64   65   66   67   68   69   70   71   72   73