Loading...
Hardened Security. Simplified.
Time to Market icon

STRONG SECURITY + ABSTRACTION = FASTER TIME-TO-MARKET

  • Abstracts SoC complexity
  • Streamlines process from design to manufacturing
  • Drastically reduces time-to-market for complex hardware designs
Secure Firmware Update icon

PROTECT FIRMWARE THROUGH PRODUCT LIFECYCLE

  • Provisioning process for manufacturing in nonsecure facilities
  • Prevent counterfeiting, firmware theft, and unauthorized production
Foundational Security icon

FOUNDATIONAL SECURITY ACROSS IoT/EMBEDDED VERTICALS

  • Trusted boot and secure update
  • Secure enclave/trusted execution
  • Key injection, management, trusted device ID
Deep Expertise icon

DEEP SECURITY & EMBEDDED SYSTEMS EXPERTISE

  • Use cases to security mapping
  • Complex customizations and security reviews
  • Rigorous implementation of embedded security

Supported Platforms & Availability

Microchip logo

SAMA5D2 Series (D21, D22, D23, D24, D26, D27, D28)

SAMA5D4 Series (D41, D42, D43, D44)

NXP Logo

i.MX 8M,i.MX 8M Mini

7Dual/7Solo, 7ULP

6Quad/6Dual/6DualLite/6Solo

LS1043A, LS1012A

EmSPARKTM Suite is immediately available for purchase. To learn more, please Email us.

EmSPARK™ Security Suite Capabilities

SECURITY & TRUST FOUNDATION
Turn-key Solution
  • Secure boot chain from ROM to Linux
  • Secure enclave
  • Closed backdoors

APPLICATION DEVELOPMENT
Abstract Hardware Security
  • Linux SDK
  • Trusted execution & crypto
  • Secure key/Cert store
  • Trusted device ID

MANUFACTURE SECURE DEVICES
Adapt to Existing Manufacturing Process
  • Firmware packaging
  • Firmware provisioning
  • Fuse provisioning
  • Keys injection

IN-FIELD MANAGEMENT
Lifecycle Security
  • Firmware update
  • Key management
  • Firmware protection
  • Data protection

Explore Our Products

Follow Us