Page 68 - Cyber Defense eMagazine for July 2020
P. 68
card can be used to manage software licensing and feature activation. Access control, code encryption
or digital signature allow the definition and management of different software configurations for products.
Retrofittable and future-proof
In comparison to a soldered TPM, the idea of a pluggable security module might at first seem unusual.
However, older machinery and systems generally have a USB interface or interfaces for memory cards
(Fig. 2). Therefore, the big advantage of using pluggable security modules is that existing devices can
easily be retrofitted and secured using Swissbit security memory.
This ability to retrofit devices offers another advantage in the constant race to keep up with cyber security.
Attack and defense methods develop cyclically and harmonizing them with for example the project
lifecycle of an industrial plant is challenging. A situation could arise where it necessary to allocate a new
ID with improved cryptography technologies to the M2M communication participants. Swissbit’s
retrofittable solution makes this possible.
Fig 2. Memory interfaces, such as USB, can be used to retrofit a TPM function.
Outlook
In response to the rapidly increasing market demand for embedded IoT, Swissbit opened its new factory
in October 2019, located in Berlin, Germany. This factory is equipped with state-of-the-art advanced 3D
chip scale packaging technology, developing and producing customized system-in-package and multi-
chip module designs for its customers. This technology facilitates not only the integration of
microcontrollers, NAND chips and crypto chips, but also sensors, wireless chips and antennas. Using
memory interfaces with TPM and encryption components for security solutions might only be the
beginning, with the scope for the addition of further functionalities that can be miniaturized and integrated.
Cyber Defense eMagazine –July 2020 Edition 68
Copyright © 2020, Cyber Defense Magazine. All rights reserved worldwide.