New crypto tool suite provides authenticated software security for embedded products
ProductMarch 13, 2012
Officials at Green Hills Software in Santa Barbara, CA, released a security solution consisting of Suite B-Compliant Security Protocol Toolkits and Device Lifecycle Management (DLM) system, designed by the company's INTEGRITY Security Services (ISS) business unit.
Officials at Green Hills Software in Santa Barbara, CA, released a security solution consisting of Suite B-Compliant Security Protocol Toolkits and Device Lifecycle Management (DLM) system, designed by the company’s INTEGRITY Security Services (ISS) business unit. Packaged with the Green Hills INTEGRITY Real-Time Operating System (RTOS) the ISS Security Protocol Toolkit adds an additional reliability level and authenticated security that ensure all embedded devices powered by ISS solutions are secure.
The ISS solutions will address: authentication, authorization, network access control, confidentiality, integrity, and remote management. Authentication ensures that users, devices, and software on a network are correctly identified. Authorization grants the right to access resources and perform specified actions. Network access control limits access to the network to authenticated and authorized devices, software, and users. Confidentiality ciphers transform data to make it unreadable to anyone except those authorized and authenticated. INTEGRITY detects unauthorized changes to transmitted data through the life cycle of a device, software, and data remote management monitors, and updates and manages remotely manufactured and fielded devices.
The ISS DLM System and the ISS Embedded Cryptographic Toolkit are based on the Green Hills Federal Information Processing Standards (FIPS)-compliant Embedded Cryptographic Toolkit and Security Protocol Toolkits.