Anyone knows that the best way to keep a secret is never to share it with anyone. Which works fine for your own most personal secrets, but it’s not very useful when you have to share with at least one other, such as in cyber-security. One such need, of enormous importance in the IoT, is authentication; are you who you claim to be? Seas of… Read More
WP_Term Object ( [term_id] => 87 [name] => Intrinsic ID [slug] => intrinsic-id [term_group] => 0 [term_taxonomy_id] => 87 [taxonomy] => category [description] => [parent] => 14433 [count] => 5 [filter] => raw [cat_ID] => 87 [category_count] => 5 [category_description] => [cat_name] => Intrinsic ID [category_nicename] => intrinsic-id [category_parent] => 14433 [is_post] => )
Pim Tuyls is the Founder and CEO of Intrinsic ID. He initiated the work on Physical Unclonable Functions (PUFs) that forms the basis of Intrinsic ID’s silicon fingerprinting technology. The original work on PUFs was carried out at Philips Research, where Pim was Principal Scientist and managed the cryptography cluster. In 2008… Read More
As we are preparing for the “IoT Devices Can Kill and What Chip Makers Need to Do Now” webinar next week, Intrinsic-ID did a nice press release with Integrated Device Technology. IDT is one of the companies I grew up with here in Silicon Valley that pivoted its way to a $6.7B acquisition by Renesas.
IDT is focused on automotive,… Read More
After the onslaught of IoT devices Christmas brought to the masses we really need to talk about security or lack thereof. Do me a favor and count how many IoT devices you have now? Our house IoT count is probably a bit higher than average due to my technology addiction but we are firmly in the double digits and the security breach stories… Read More
Unique device identities are at the core of all computer security systems. Just as important is that each unique identity cannot be copied, because once copied they can be used illegitimately. Unique device IDs are used to ensure that communications are directed to the correct device. And they also provide the ability to encrypt… Read More