Both companies offer dedicated security solutions for Industry 4.0 applications based on OPTIGA Trusted Platform Modules (TPMs) from Infineon Technologies AG. The ISPN is a network of security system providers who offer hardware-based security to IoT device manufacturers and service providers.
Industry 4.0 – also referred to as industrial internet – combines embedded system technologies with smart processes to raise overall production efficiency. At its core are smart factories connecting industry and production value chains. They must be protected adequately against theft of intellectual property or production downtimes.
As part of the ISPN, ESCRYPT provides a cryptographic Key Management Solution adapted for embedded systems. Among these are Infineon’s automotive microcontroller AURIX, industrial controller XMC and secure elements OPTIGA Trust and OPTIGA TPM. In the industrial field, ESCRYPT’s Key Management Solution safeguards industrial control systems (PLC) from software-based attacks originating outside or inside the plant. The solution protects integrity and authenticity of the software executed on the PLC. It enables secured identification of devices, PLC administrators or users and even complex machines in a cyber-physical system. The solution hampers malware as well as unauthorized software updates and allows for complex rights management for e.g. licensing of software on the PLCs throughout its whole lifetime. Besides providing onsite integration support for the Key Management Solution, ESCRYPT offers a comprehensive consulting service including security strategy and concepts development, security assessment, customized security engineering, application and code testing. A comprehensive security training program rounds off these services.
GlobalSign’s Identity and Security Solution allows Original Equipment Manufacturers (OEMs) to embed robust device integrity and authentication features into their devices. The provisioning of the devices during the manufacturing stage is integrated with a cloud-based or on-premise hosting service. The crypto co-processor safely stores a private key, allowing users to identify the origin of the device and prevent counterfeit products from connecting to their system. Once in operation, a secured connection can be established