editor's blog
Subscribe Now

Hardware Security in the Cloud

Some time back, we covered “physically unclonable functions,” or PUFs. These are techniques for deriving a key from the random characteristics of a specific piece of hardware, making it unique to that hardware and therefore unclonable by others. One of the companies covered was Intrinsic ID.

Intrinsic ID has now taken a step to make what is otherwise a low-level wonky technology available at the consumer and corporate level. They have created a cloud portal where data can be stored securely, accessible only by your computer or a computer with which you share your key.

The portal is called Saturnus, and it allows the uploading (and downloading) of any type of file. The key – so to speak – to how it works is in the security. And therein lies also a hitch, for the time being.

The system works with computers having “HIS” – Hardware Intrinsic Security. This is Intrinsic ID’s hardware key system that relies on the random state of SRAM when the system boots up. The bad news: your computer probably doesn’t have HIS on it. The good news: Intrinsic ID says that they have investigated a wide range of devices – computers, phones, etc. – and have found that all can have HIS installed; it’s not something that has to be factory-built. More good news: you’ll be able to purchase HIS for your systems. The bad news: it’s not available yet.

With HIS, you get a key that only resides on your machine. You can share that key with other systems so that only machines you’ve shared with can access your Saturnus account. So, for instance, you could have your desktop, laptop, and phone set up to get to your secured goods. You can also use random computers in cafes if you have a dongle containing the HIS information. (Just remember to take it out of the computer when you’re done.)

This launch seems somewhat premature in that no one can use Saturnus without HIS, which isn’t for sale yet. Likewise, I don’t have a good sense that the dongle solution actually exists today. The statement “You can do this” can often mean one of two things: “You can do this (today with product on the shelf)” or “You can (theoretically) do this (once someone actually develops the idea into a product).” My sense was this is a bit more of the latter than the former. But it will be an interesting approach once all the pieces are in place.

You can find more in their release

Leave a Reply

featured blogs
Oct 22, 2020
WARNING: If you read this blog and visit the featured site, Max'€™s Cool Beans will accept no responsibility for the countless hours you may fritter away....
Oct 22, 2020
Cadence ® Spectre ® AMS Designer is a high-performance mixed-signal simulation system. The ability to use multiple engines and drive from a variety of platforms enables you to "rev... [[ Click on the title to access the full blog on the Cadence Community site....
Oct 20, 2020
In 2020, mobile traffic has skyrocketed everywhere as our planet battles a pandemic. Samtec.com saw nearly double the mobile traffic in the first two quarters than it normally sees. While these levels have dropped off from their peaks in the spring, they have not returned to ...
Oct 16, 2020
[From the last episode: We put together many of the ideas we'€™ve been describing to show the basics of how in-memory compute works.] I'€™m going to take a sec for some commentary before we continue with the last few steps of in-memory compute. The whole point of this web...

featured video

Demo: Low-Power Machine Learning Inference with DesignWare ARC EM9D Processor IP

Sponsored by Synopsys

Applications that require sensing on a continuous basis are always on and often battery operated. In this video, the low-power ARC EM9D Processors run a handwriting character recognition neural network graph to infer the letter that is written.

Click here for more information about DesignWare ARC EM9D / EM11D Processors

featured paper

Fundamentals of Precision ADC Noise Analysis

Sponsored by Texas Instruments

Build your knowledge of noise performance with high-resolution delta-sigma ADCs. This e-book covers types of ADC noise, how other components contribute noise to the system, and how these noise sources interact with each other.

Click here to download the whitepaper

Featured Chalk Talk

Maxim's First Secure Micro with ChipDNA PUF Technology

Sponsored by Mouser Electronics and Maxim Integrated

Most applications today demand security, and that starts with your microcontroller. In order to get a truly secure MCU, you need a root of trust such as a physically unclonable function (PUF). In this episode of Chalk Talk, Amelia Dalton chats with Kris Ardis of Maxim Integrated about how the Maxim MAX32520 MCU with PUF can secure your next design.

Click here for more info about Amphenol RF 5G Wireless Connectors