SlideShare a Scribd company logo
1 of 15
Download to read offline
securing the connected world
© 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners.
Implementation Challenges and Framework
for Silicon Design and Supply Chain Security
Dr. Siva G. Narendra, CEO
About Tyfone
© 2016. Tyfone. Patented and Patents Pending.
All trademarks are property of their respective owners.
2
Enabler of securing Identity, Transactions, Supply Chain and Design
250,000 users
85 million
transactions
110+ issued/pending
patents
1100+ issued
invention claims
Customers in:
Banking
Government
Power Grid
Expertise:
Silicon Design, Hardware + Software System, Security as a Service
Use cases:
Strong identity authentication for mission critical use
Strong transaction authorization for non-repudiation
© 2016. Tyfone. Patented and Patents Pending.
All trademarks are property of their respective owners.
3
$170BDigital security market in 2020
Marketsandmarkets
$2.1TDigital crime loss in 2019
Juniper Research
50BIoT devices by 2020
Statista
7.3BSmartphones/tablets/PCs by 2020
Gartner
Threat surface in the interconnected market place
IT / OT
Infrastructure
Mobility
IoT
Silicon
Connected Silicon needs to consider this market place threats
© 2016. Tyfone. Patented and Patents Pending.
All trademarks are property of their respective owners.
4
Security challenge #1
Centralized management of data, keys, ID
© 2016. Tyfone. Patented and Patents Pending.
All trademarks are property of their respective owners.
5
Security challenge #2
Layered security approaches are not always used or not always distinct
© 2016. Tyfone. Patented and Patents Pending.
All trademarks are property of their respective owners.
6
Security challenge #3
Crypto keys co-reside logically next to cipher information
© 2016. Tyfone. Patented and Patents Pending.
All trademarks are property of their respective owners.
7
Decentralized physical hardware security use is growing!
Use of secure element
smart card chip cards
for payments and
enterprise ID
Apple put secure
element smart card
chip both inside
and outside the
phone
Device specific
readers for secure
element smart chip
cards
Layered approach to security
Required solution:
Secure and convenient
Why not for the silicon supply chain?
Eco-system & monetization
© 2016. Tyfone. Patented and Patents Pending.
All trademarks are property of their respective owners.
8
Layered security framework for connected silicon
DESIGN
OWNER
SYSTEMS
DESIGN
HSM
SUPPLY CHAIN
PERSONAL HSM BUILT-IN HSM DIELET HSM PORTABLE HSM
CONNECTED Si
© 2016. Tyfone. Patented and Patents Pending.
All trademarks are property of their respective owners.
9
Design owner – Personal hardware security module
Sleeve as Reader for Card Card with built-in reader
OR
HSM
CONNECTED Si
Post-packaging in a System
or Tester
PERSONAL HSM
ACTIVATED
BUILT-IN HSM
DESIGN OWNER’S SYSTEMS
LIVEConnection
© 2016. Tyfone. Patented and Patents Pending.
All trademarks are property of their respective owners.
10
Systems – Portable hardware security module
PORTABLE HSM WAFER TESTING APPLIANCE SYSTEMS
(BATCH PROCESSING & LIKELY OFFLINE)
PERSONAL HSM
Contact Interface
Contactless Interface
MicroSD memory card with Smart Card Controller,
miniature contactless antenna and large memory
as secure enclave for offline operation of batch system
UNACTIVATED
BUILT-IN HSM
HSM
© 2016. Tyfone. Patented and Patents Pending.
All trademarks are property of their respective owners.
11
Design IP Protection – Built-in HSM
Chip level I/O Barrier Solution
Unit level Logic Barrier Solution
Universal gate reconfiguration logic building block G
Coarse grain
Fine grain
Ultra fine grain
Built-in HSM Activation Process
© 2016. Tyfone. Patented and Patents Pending.
All trademarks are property of their respective owners.
12
Supply chain counterfeit prevention – Dielet HSM
Courtesy: SRI
For use in supply chain distribution
Marketplace
Security as a Service Platform
Personal HSM (CR80)
Portable HSM (MicroSD)
Built-in HSM & Dielet HSM
Decentralized HSMs
Supply Chain
Security as a service recurring revenue business model
© 2016. Tyfone. Patented and Patents Pending.
All trademarks are property of their respective owners.
13
STEP 1: ECO-SYSTEM (Learn from others…)
1. Smart card industry
 Handful of player defined ecosystem
 Standards followed
2. Backend HSM
 Use existing standards
3. Luxtrust
 Mandate driven
STEP 2: REVENUE CONSIDERATIONS
Focus on convenience and security
Enable IC supplier or OEM to authenticate/verify
Be aware of liability
- Leverage layered approach
- Leverage programs such as SAFETY ACT


© 2016. Tyfone. Patented and Patents Pending.
All trademarks are property of their respective owners.
14
DESIGN
OWNER
SYSTEMS
DESIGN SUPPLY CHAIN
HSM
PERSONAL HSM BUILT-IN HSM DIELET HSM PORTABLE HSM
Layered security framework for connected silicon
CONNECTED Si
securing the connected world
siva@tyfone.com
© 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners.

More Related Content

What's hot

The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune SystemJustin Hayward
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture Block Armour
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Block Armour
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyBlock Armour
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile BankingVeridium
 
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour
 
Glm Institute - Mumbai
Glm Institute - MumbaiGlm Institute - Mumbai
Glm Institute - Mumbaiglminstitute
 
Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali OWASP Delhi
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTWitekio
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, EverywhereLINE Corporation
 
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...Block Armour
 
Banking the Unbanked
Banking the UnbankedBanking the Unbanked
Banking the UnbankedVeridium
 
Understanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of ComplianceUnderstanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of ComplianceVeridium
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationFIDO Alliance
 
Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...Dictao
 
FST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationFST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationYanivt
 

What's hot (20)

The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune System
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
 
Glm Institute - Mumbai
Glm Institute - MumbaiGlm Institute - Mumbai
Glm Institute - Mumbai
 
Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
IES Innovative Sgp Cos Asis Tech
IES Innovative Sgp Cos Asis TechIES Innovative Sgp Cos Asis Tech
IES Innovative Sgp Cos Asis Tech
 
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
 
Banking the Unbanked
Banking the UnbankedBanking the Unbanked
Banking the Unbanked
 
Understanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of ComplianceUnderstanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of Compliance
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
IoT Security Challenges
IoT Security ChallengesIoT Security Challenges
IoT Security Challenges
 
Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...
 
FST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationFST Biometrics Corporate Presentation
FST Biometrics Corporate Presentation
 

Similar to Connected Silicon Security Challenges and Framework - Tyfone - Siva Narendra

IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringWaterfall Security Solutions
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT ImplementationsTechWell
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarForgeRock
 
IOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdfIOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdfcvrlifesciences
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSource Code Control Limited
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information SecurityVineet Sood
 
Smart Guard Systems Corporate
Smart Guard Systems CorporateSmart Guard Systems Corporate
Smart Guard Systems CorporateGURUDAS
 
Signature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 FullSignature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 Fullnoelheng
 
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Benjamin Cabé
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall WebinarAT&T
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile securitySatya Harish
 

Similar to Connected Silicon Security Challenges and Framework - Tyfone - Siva Narendra (20)

IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
推動數位革命
推動數位革命推動數位革命
推動數位革命
 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and Engineering
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things Webinar
 
IOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdfIOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdf
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
 
Smart Guard Systems Corporate
Smart Guard Systems CorporateSmart Guard Systems Corporate
Smart Guard Systems Corporate
 
Signature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 FullSignature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 Full
 
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile security
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Fortinet_for_SAP
Fortinet_for_SAPFortinet_for_SAP
Fortinet_for_SAP
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Connected Silicon Security Challenges and Framework - Tyfone - Siva Narendra

  • 1. securing the connected world © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. Implementation Challenges and Framework for Silicon Design and Supply Chain Security Dr. Siva G. Narendra, CEO
  • 2. About Tyfone © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. 2 Enabler of securing Identity, Transactions, Supply Chain and Design 250,000 users 85 million transactions 110+ issued/pending patents 1100+ issued invention claims Customers in: Banking Government Power Grid Expertise: Silicon Design, Hardware + Software System, Security as a Service Use cases: Strong identity authentication for mission critical use Strong transaction authorization for non-repudiation
  • 3. © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. 3 $170BDigital security market in 2020 Marketsandmarkets $2.1TDigital crime loss in 2019 Juniper Research 50BIoT devices by 2020 Statista 7.3BSmartphones/tablets/PCs by 2020 Gartner Threat surface in the interconnected market place IT / OT Infrastructure Mobility IoT Silicon Connected Silicon needs to consider this market place threats
  • 4. © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. 4 Security challenge #1 Centralized management of data, keys, ID
  • 5. © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. 5 Security challenge #2 Layered security approaches are not always used or not always distinct
  • 6. © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. 6 Security challenge #3 Crypto keys co-reside logically next to cipher information
  • 7. © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. 7 Decentralized physical hardware security use is growing! Use of secure element smart card chip cards for payments and enterprise ID Apple put secure element smart card chip both inside and outside the phone Device specific readers for secure element smart chip cards Layered approach to security Required solution: Secure and convenient Why not for the silicon supply chain? Eco-system & monetization
  • 8. © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. 8 Layered security framework for connected silicon DESIGN OWNER SYSTEMS DESIGN HSM SUPPLY CHAIN PERSONAL HSM BUILT-IN HSM DIELET HSM PORTABLE HSM CONNECTED Si
  • 9. © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. 9 Design owner – Personal hardware security module Sleeve as Reader for Card Card with built-in reader OR HSM CONNECTED Si Post-packaging in a System or Tester PERSONAL HSM ACTIVATED BUILT-IN HSM DESIGN OWNER’S SYSTEMS LIVEConnection
  • 10. © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. 10 Systems – Portable hardware security module PORTABLE HSM WAFER TESTING APPLIANCE SYSTEMS (BATCH PROCESSING & LIKELY OFFLINE) PERSONAL HSM Contact Interface Contactless Interface MicroSD memory card with Smart Card Controller, miniature contactless antenna and large memory as secure enclave for offline operation of batch system UNACTIVATED BUILT-IN HSM HSM
  • 11. © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. 11 Design IP Protection – Built-in HSM Chip level I/O Barrier Solution Unit level Logic Barrier Solution Universal gate reconfiguration logic building block G Coarse grain Fine grain Ultra fine grain Built-in HSM Activation Process
  • 12. © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. 12 Supply chain counterfeit prevention – Dielet HSM Courtesy: SRI For use in supply chain distribution
  • 13. Marketplace Security as a Service Platform Personal HSM (CR80) Portable HSM (MicroSD) Built-in HSM & Dielet HSM Decentralized HSMs Supply Chain Security as a service recurring revenue business model © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. 13 STEP 1: ECO-SYSTEM (Learn from others…) 1. Smart card industry  Handful of player defined ecosystem  Standards followed 2. Backend HSM  Use existing standards 3. Luxtrust  Mandate driven STEP 2: REVENUE CONSIDERATIONS Focus on convenience and security Enable IC supplier or OEM to authenticate/verify Be aware of liability - Leverage layered approach - Leverage programs such as SAFETY ACT  
  • 14. © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners. 14 DESIGN OWNER SYSTEMS DESIGN SUPPLY CHAIN HSM PERSONAL HSM BUILT-IN HSM DIELET HSM PORTABLE HSM Layered security framework for connected silicon CONNECTED Si
  • 15. securing the connected world siva@tyfone.com © 2016. Tyfone. Patented and Patents Pending. All trademarks are property of their respective owners.