Redefining the Embedded Security Paradigm
As an embedded security pioneer, Discretix was first to offer a system level approach, spanning hardware, infrastructure software and applications. Products incorporating Discretix’ solutions are designed with an open architecture that enables application providers to implement security rapidly and effectively. Discretix technology is compatible with leading real-time and open operating systems.
The hardware layer is delivered as Semiconductor IP for easy integration into ICs. Discretix’ patented technology implements the standardized cryptographic algorithms in a way that minimizes gate count and power consumption while maximizing performance and security. Key components of the hardware layer include:
Random Number Generator (RNG)
Asymmetric Encryption (PKA)
Symmetric Encryption (AES, DES, RC4, C2)
Digital Digest (Hash)
Secure Execution Environment
Security Middleware Layer
The middleware layer provides secure access to the hardware cores and serves as a robust security infrastructure for the application layer. It also provides secure storage, cryptographic schemes, key management and certificate management across multiple platforms and operating systems. Key components of the Middleware Layer include:
Cryptographic Abstraction Layer - provides a single API capable of interfacing with both hardware accelerators and software based cryptographic libraries.
Secure Database Module - includes a secure storage mechanism to protect sensitive information from unauthorized changes and to ensure the integrity of system software.
Standard APIs - a complete set of industry-standard APIs including; Symbian Cryptographic API, Microsoft Cryptographic API (MS-CAPI) and PKCS#11
Optimized Software Cryptography Library - includes software cryptographic libraries to be used when hardware cryptographic accelerators are not provided as part of the platform
Content Protection Applications
Discretix Multi-Scheme DRM Client and Discretix Multi-Scheme MobileTV Security Client deliver the highest level of security and robustness against unauthorized access of protected content, meeting the stringent requirements set by content owners and operators - while ensuring a totally transparent user experience. They provide a complete implementation of the key schemes in use today, associated cases and scenarios, as well as the flexibility to add new schemes as they become available.
Attack-Resistant Cryptographic Core
Discretix deploys unique and patented countermeasures across all layers of the solution architecture to provide robust protection against:
* Timing attacks (TA)
* Fault Attacks (FA)
* Power Analysis
Discretix offers a fully customizable range of embedded security solutions, comprising the following products;
Integrated Security Platforms – Discretix integrated security platforms provide an end-to-end security solution, starting from the security enhanced chipset foundations of the device, going through a security middleware layer, all the way to the applications, toolkits and user level at the top layer.
Related Products: CryptoCell, CryptoFlash, DxACAH, DxSD, DxPB
Content Protection Applications – Discretix Multi-Scheme DRM Client and Discretix Multi-Scheme MobileTV Security Client deliver the highest level of security and robustness against unauthorized access of protected content, meeting the stringent requirements set by content owners and operators - while ensuring a totally transparent user experience. They provide a complete implementation of the key schemes in use today, associated cases and scenarios, as well as the flexibility to add new schemes as they become available.
Related Products: Multi-Scheme DRM Client, OMA DRM, WM-DRM, CPRM, Multi-Scheme Mobile TV Security Client
Security Modules – Highly integrated, security modules designed to address specific security functionality. These modules enable SoC designers to equip their products with leading-edge solutions, tailored to specific requirements such as secure boot, anti cloning and anti-hacking, IPSec, and secure storage. These silicon-proven modules offer a robust embedded security solution for semiconductor designers, guaranteeing quick time-to-market, and significantly decreasing design and engineering costs.
Related Products: DxIPsec, DxHDCP, DxSB, Secure Database, Storage & Management, Certificate Handling, Cryptographic Software
Accelerators – Discretix' hardware based cryptographic accelerators offer the best size-performance ratio in the market. These silicon-proven cryptographic cores are deployed in numerous system-on-chip solutions supporting a variety of applications. Discretix' cryptographic accelerators are highly configurable and easily integrated, providing an industry proven solution and a fast-time-to market.
Related Products: DxAES, DxDES, DxHASH, DxRNG, DxPKA