This website uses cookies to make the offer more user-friendly and effective. Please agree to the use of cookies in order to be able to use all functions of the website.Further information

26 - 28 February 2019 // Nuremberg, Germany

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products embedded world 2018
Zoom product LOGO_Gemalto Trusted Key Manager

Gemalto Trusted Key Manager

LOGO_Gemalto Trusted Key Manager

Gemalto Trusted Key Manager

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Send
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitor Database.

An error has occurred.

OVERVIEW:

The end-to-end security solution for robust device authentication on IoT networks

The Gemalto Trusted Key Manager authenticates IoT devices and secures data exchanges on both cellular and non-cellular networks. With a massive number of connected devices, the cyber-attack surface is increasing.

This new solution enables strong digital security for all IoT ecosystem players, through a simple and trustful mechanism of secure keys provisioning, remote credential activation and lifecycle management.

The Trusted Key Manager prevents unauthorized devices from joining the network, thus ensuring the integrity of IoT devices and data they exchange, and speeding up massive and secure IoT deployments.

1- End-to-End cyber-security for Advanced Metering Infrastructure

New players and prosumers are joining the energy ecosystem, deploying renewable energy assets that tie into evolving smart grids. As the ecosystem gets more complex and keeps expanding, so does the opportunity for cyber-attacks. Gemalto helps Utilities and meter vendors to secure their assets and ensure a complete credential lifecycle management, over long periods.

Check our Solution Overview:

End–to-end Security for Advanced Metering Infrastructures

https://www.gemalto.com/brochures-site/download-site/Documents/iot-cs-smart-energy-security-solution.pdf

2- The specific case of LoRaWAN™ networks

LoRaWAN™* , one of the leading LPWAN technologies, connect cost-sensitive, battery-operated things that don’t require high bandwidth and speed. It offers extreme power efficiency and long-range connectivity, making it ideal for devices deployed in hard-to-service locations and that need to operate for 10 years or more.

Strong digital security is a must-have for all ecosystems players leveraging LoRaWAN. Gemalto - sponsor member of the LoRa Alliance ™* - secures the LoRa networks thanks to its Trusted Key Manager.

The Gemalto Trusted Key Manager provides chip and module markers, device makers, network operators and service providers with an advanced solution that ensures the end-to-end security of IoT devices connecting over LoRa®*  networks. The solution manages key provisioning and strong authentication on multiple levels, ensuring the integrity and confidentiality of data transferred over LoRa networks. It also allows seamless IoT device onboarding on any LoRa network. The solution can be deployed in cloud-based or in-house infrastructure.

How it works?

Using market-proven, standardized cryptography, the solution allows LoRa-based devices and LoRa networks to authenticate each other, ensuring a secure network´join process´. This automated and secure digital enrollment leverages a double key provisioning so that only authorized devices can connect to authorized networks. In addition, a second mutual authentication process between the device and the application server ensures complete data confidentiality, granting access only to entitled applications or solution providers.  

For more information, visit our dedicated page: https://www.gemalto.com/m2m/solutions/trusted-key-manager-for-lora

KEY BENEFITS:

IoT Device Makers

• Removes the burden of security provisioning, saving time and money

• Single device design allowing easy IoT device onboarding on any LoRa network and market

• Simplifies device credential lifecycle management through automated and secure network ´join process´

LoRa Network Operators:

• Simplifies device network onboarding, which is crucial when devices change ownership or country of operation, for instance

IoT Application servers and End Users:

• Ensures confidentiality and integrity of accessed data

Sentinel Embedded Software Monetization Solutions

LOGO_Sentinel Embedded Software Monetization Solutions

Sentinel RMS, LDK and FIT

LOGO_Sentinel RMS, LDK and FIT

Sentinel Cloud

LOGO_Sentinel Cloud

Sentinel EMS

LOGO_Sentinel EMS

Professional Services

LOGO_Professional Services

Cinterion® PLS62-W IoT Module

LOGO_Cinterion® PLS62-W IoT Module

Gemalto's family of IoT-optimized LPWAN products incl. LTE-M & NB-IoT

LOGO_Gemalto's family of IoT-optimized LPWAN products incl. LTE-M & NB-IoT

Cinterion® Module Services (Device Lifecycle Management)

LOGO_Cinterion® Module Services (Device Lifecycle Management)

Cinterion® IoT Development Kits

LOGO_Cinterion® IoT Development Kits

Gemalto Trusted Key Manager is assigned to following product groups:

top

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.