Trusted Objects has introduced to-security, a new set of products and services to protect IP in embedded software during the whole life cycle of electronic devices. These services and product have been designed to address the growing IP protection challenges facing the electronic industry.
Corporations are becoming more global, which means their products are deployed at a broader scale and their manufacturing often outsourced. Concerns are rising regarding IP protection in embedded software during the whole life cycle of electronic devices – at the manufacturing stage, off the shelves and during software update. Since assets value is lying less in hardware and more in software, the patenting approach is less efficient or applicable and there is a need to reconsider the way to protect software IP.
Based on the company longstanding experience in cybersecurity, acquired from the secure transactions industry and developed for IoT security, with dozens of projects already running around the world, Trusted Objects is offering to-security, a set of products and services to protect high value software embedded in microcontroller based devices.
All products and services that constitute to-security are easy-to-integrate, cost-effective and highly secured. For instance, with tops plug&go, secure programming operations can be done in three simple steps on any microcontroller, without an external connection and for a limited addition on programming cost.