Company Talks

IoT devices are being developed at an exponential rate which means the value of penetrating and compromising these networks is also increasing.  Because of this trend, adversaries targeting IoT networks are better funded, more capable, and are more motivated than ever.  Newly enacted and emerging regulations will help, such as General Data Privacy Regulations (GDPR) in Europe, California’s Connected Device law, and the UN Economic Commission for Europe (UNECE) WP.29 regulations on cybersecurity.  These regulations call for a security by design approach, protection of data, the ability to change passwords, safe and secure software updates, and the ability to detect security incidents. 

JI offers competencies to help address these requirements that include encryption of sensitive data, protection of IP, over the air (OTA) software updates, securing passwords, secure communications, and authenticating code before it is run.  These elements of cybersecurity are critical to fielding automotive, consumer, and industrial IoT devices that maintain confidentiality, integrity, and availability.

  • Connected Consumer Devices
  • Networked Pro-Audio Equipment
  • Automotive Telematics and Infotainment Solutions
  • Wearable Telemedicine and Healthcare Devices
  • Industrial IoT
  • Root of Trust
  • Chain of Trust
  • Symmetric and Asymmetric Cryptography
  • Multi-stage boot
  • Compliance to CIA (Confidentiality, Integrity, Availability)
  • Wired and Wire-less OTA
  • End-to-End security from the server to the IoT device on the edge
  • Hardware Cryptographic Engines
  • True Random Number Generator (TRNG)
  • Secure Memory
  • Secure Boot

Want to know more?