Ka-Ro TX COMs – the Secure Solution
It has never been more important for embedded developers to understand and implement security in their products. Without this, they expose their products and companies to the risks of hijacked devices or the exposure of customer data. This can leave your company open to costly lawsuits and damage to your company’s brand and reputation.
Ka-Ro has enabled a combination of secure services for TX COMs which together allow our customers to develop and deploy a secure product. These include:
Linux mainline BSP: By enabling continuous Linux development releasing their BSP to mainline Linux, Ka-Ro ensures that the latest security patches are available to our customers. Vulnerabilities are constantly discovered and patched, and it’s important to always have access to the latest Linux version. By keeping the BSP in the mainline, it is easy to leverage the work of the Linux community to keep your product secure.
If a BSP is not constantly updated, it becomes more and more difficult to apply security patches, until it becomes impossible, and a product is open and exposed to known vulnerabilities.
Secure Boot Services: It is no longer feasible to create an embedded product where the firmware is never updated after it is shipped. All connected products (by either Ethernet or wireless) are open and vulnerable to attack, risking the security and data on an entire system. Even with secure networking connections, hacking can expose valuable financial and personal data contained on your product.
Secure Boot services builds security into the foundation of your product. Ka-Ro leverages the ARM and NXP technology built into i.MX processors to ensure that your product cannot be accessed with a digitally signed authentication. This creates an important benefit to your customers who use your products: You can assure them that your products are secure and safe from attack and will only receive authorized product updates.
These pre-configured services are available from Ka-Ro now and require no complicated low-level development on your part.
Secure JTAG: In addition to software, it’s important to secure hardware ports to prevent access for unauthorized entry. JTAG, when used for development and device programming, is a point of vulnerability that must be controlled.
In the Ka-Ro TX form factor, JTAG is not part of the standard pinout on the edge of TX COMs. Instead it is provided as separate landing pads. JTAG can be used during product development and to program TX modules with custom firmware, but once the TX COM is installed in your product, there is no access to JTAG, eliminating the possibility of hacking or reprogramming via JTAG.
Ka-Ro’s secure solutions for TX COMs combine to protect your products, your customers, and your company’s brand and reputation.