This workshop covers code proofs, runtime proofs, and an overview of OEM best practices. Microchip will show you how to securely develop and sign an image file, then receive and authenticate the image file on the client.
Total of 1 lessons31 minutes and 37 seconds
Once your product is ready for production, don't you know how to efficiently upload tens of thousands of certificates into your AWS IoT environment? Then this online workshop is for you. You'll learn how to bulk upload preconfigured certificates from Microchip Trust&GO or TrustFLEX secure elements using AWS ThingPress and AWS IoT. You'll also learn why this AWS cloud architecture helps you efficiently scale production of IoT devices when loading certificates in your cloud production account. We will also discuss how to deal with issues such as ownership transfers.
Total of 1 lessons28 minutes and 35 seconds
Learn how choosing a secure element can reduce project risk and save money, and learn how configuring encryption keys can significantly reduce costs and risks during product development and production. Overview of the benefits of reducing cost and risk using Microchip Secure Elements such as the ATECC608 and leveraging trusted platform tools and in-house provisioning services as your security foundation.
Total of 1 lessons24 minutes and 25 seconds
Security configuration is a process that allows you to securely instantiate a microprocessor (MPU) root of trust. In this session, we'll explain why secure configuration is important for MPU-based solutions and demonstrate how this process works.
Total of 1 lessons24 minutes and 56 seconds
In the latest WPC Qi 1.3 specification, WPC mandates the addition of a new secure authentication function that complies with the specification. In this seminar, our experts will explain the security aspects of the specification and guide you through the WPC authentication process. It will also discuss what your secure element vendor should have in order to implement secure authentication and successfully authenticate with WPC.
Total of 1 lessons21 minutes and 4 seconds
For IoT products, security always comes first. However, for engineers, how to produce, provide and protect the privacy of secure IoT products is also very important. This seminar will introduce the WFI32E01PC series of Wi-Fi enabled MCUs using Trust&GO technology, and discuss how this solution provides factory-programmed, verifiable secure identity in an integrated module, thereby greatly reducing the cost of producing IoT products. complexity and workload.
Total of 1 lessons29 minutes and 9 seconds
Future Electronics has designed GoodLock, a unique trusted development board that helps designers develop and test hardware security solutions for their embedded designs. This cost-effective, general-purpose development board is packed with advanced features and a built-in on-board debugger/programmer, making it an ideal development platform for adding security to your products.
Total of 1 lessons25 minutes and 43 seconds
In this online seminar, Microchip technical experts will explain how the secure element in Microchip’s Trusted Platform for CryptoAuthentication™ series assists in secure booting of small microcontrollers, how to protect OTA’s public keys, and how to enhance IP protection of firmware ;It will also be demonstrated how this can be achieved with the pre-configured ATECC608A TrustFLEX via the Trusted Platform Design Kit.
Total of 1 lessons40 minutes and 1 seconds
Is your system booted via SPI flash? How do you protect your system from the unexpected during the boot process and firmware upgrades? How does your system detect and recover from damaged flash files? Join us for an online seminar to discuss NIST800-193 guidance on platform firmware security resiliency.
Total of 2 lessons52 minutes and 46 seconds
From production to deployment to field upgrades, Secure Boot protects your microprocessor unit (MPU) solution. Secure Boot is central to maintaining the hardware root of trust, ensuring the integrity of the product throughout its lifecycle. Through this seminar, you will learn how easy it is to implement secure boot on Microchip MPUs!
Total of 2 lessons55 minutes and 11 seconds
Currently, various applications and businesses implemented through cloud services are developing rapidly, resulting in a large number of cloud service connections. This means your IP is facing greater and broader threats from hackers, counterfeiters, and competitors. We will explore these potential threats and how to protect against them using a combination of software and hardware solutions.
Total of 2 lessons42 minutes and 20 seconds