Key Injection
Applications

Key Injection

Key Injection gives every Device an Identity

Security by Design the route to secure identity. The number of connected devices in the Internet of Things (IoT) is growing exponentially, increasing the risk of manipulation of these devices. As a result, the authenticity, integrity and confidentiality of the device or the data needs to be guaranteed.

Key injection is the starting point for securely managing an IoT device over its product lifetime. To make sure that device identities are not hacked, keys need to be generated by an HSM.

Business value

Business value

Icon

Root of Trust for IoT

  • Ensuring that each device has a unique electronic identity that can be trusted and managed throughout the complete device life-cycle from manufacturing (key injection) through device operation (PKI) to end-of-operation (key termination). Secures key storage and processing inside the secure boundary of the HSM
  • Extensive key management with key authorization
Icon

Device & Data Security

  • Providing each device with a trusted ‘key injected’ identity using digital certificates
  • Ensuring secure communication and software updates over the lifetime of the device
  • Secures storage of data obtained and shared by devices in a database using encryption and secure key storage in an HSM
  • Device auditing & tracking
  • If a device demonstrates unusual behaviour, administrators can revoke privileges or decommission the device
Icon

Scalable and flexible

  • Seamless integration – supplying a key injection solution for establishing a secure, authenticated network of devices
  • Performs periodic key rotations in the instance of suspected or known key compromise by quickly and efficiently replacing terminal keys in the field
  • Multiple integrations with PKI applications, database encryption
  • PKI can be managed on-premise or cloud-based.
  • Supports the requirements of Verifone Remote Key (VRK), allowing customers with their own Terminal Management Systems to build a remote keying facility.
Icon

Remote Access

Remote Key Delivery- Supporting the remote distribution of keys to deployed (POI) terminals

Icon

Software Simulator included

Included simulator allowing for evaluation and integration testing to benchmark the best possible solution for each specific case

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.