comment on this article

Embedded World: Cypress processing solution with built-in system layer security

At Embedded World 2019, Cypress Semiconductor has announced a new line of its PSoC 6 microcontrollers (MCUs) designed to give Internet of Things (IoT) designers confidence in the security of their applications.

The new PSoC 64 Secure MCUs integrate robust, standards-based system layer security software with the hardware layer features available in the ultra-low-power PSoC 6 architecture. Specifically, PSoC 64 Secure MCU devices provide an isolated root-of-trust with true attestation and provisioning services.

In addition, the line includes devices that deliver a pre-configured secure execution environment supporting the system software of various IoT platforms, providing TLS authentication, secure storage, and secure firmware management. The MCUs also include a rich execution environment for application development, with an embedded RTOS from Cypress’ ModusToolbox suite that manages communication with the secure execution environment.

PSoC 64 Secure MCUs are one of the first Arm Cortex-M processors to be certified as Level 1 compliant within the Arm Platform Security Architecture (PSA) certification scheme, PSA Certified, utilising a secure Trusted Firmware-M (TF-M) implementation integrated into the Arm Mbed OS open-source embedded operating system.

The line of PSoC 64 Secure MCUs is supported in Cypress’ ModusToolbox suite, which will allow designers to select the system firmware of secure IoT platforms—such as Amazon Web Services (AWS), Arm Pelion and Alibaba—to develop their application, and then configure and verify their secure boot images.

The MCUs include a hardware-based root-of-trust consisting of secured storage and firmware, establishing a command-based set of trusted services. The root-of-trust includes hardware accelerated cryptography, as well as true random number generation (TRNG). The ModusToolbox suite brings best-in-class connectivity, processing, sensing, and security together in a unified environment, providing open access to third-party solutions.

Author
Bethan Grylls

Comment on this article


This material is protected by MA Business copyright See Terms and Conditions. One-off usage is permitted but bulk copying is not. For multiple copies contact the sales team.

What you think about this article:


Add your comments

Name
 
Email
 
Comments
 

Your comments/feedback may be edited prior to publishing. Not all entries will be published.
Please view our Terms and Conditions before leaving a comment.

Related Articles