LinuxLink Login   |   1.866.392.4897 |   sales@timesys.com        English Japanese German French Korean Chinese (Simplified) Chinese (Traditional)
Embedded World Highlights: Build it faster & with stronger security

Embedded World Highlights: Build it faster & with stronger security

Security is becoming a critical differentiator in embedded system products across a wide range of applications.

And the tools are now available to ensure products can be more secure without sacrificing time-to-market and, in some cases, even accelerating development.

Those are key takeaways from this year’s Embedded World Exhibition and Conference that took place in Germany last week.

Continue reading “Embedded World Highlights: Build it faster & with stronger security” »

Security vulnerabilities and medical devices: when the software update itself is the problem

Security vulnerabilities and medical devices: when the software update itself is the problem

A classic security breach vector involves exploiting weak authentication. As security researchers like to point out, failing to change default passwords for administrative access remains the top security issue for all types of IT systems.

But a related — and perhaps more devious — attack vector involves exploiting a weakness in a process that is supposed to help ensure device security in the first place: the remote system update.

Continue reading “Security vulnerabilities and medical devices: when the software update itself is the problem” »

Secure Boot and Encrypted Data Storage

Secure Boot and Encrypted Data Storage

What is secure boot?

Secure boot ensures only authenticated software runs on the device and is achieved by verifying digital signatures of the software prior to executing that code. To achieve secure boot, processor/SoC support is required. In our experience, some of the more secure boot friendly processors with readily available documentation are NXP i.MX/QorIQ Layerscape, Xilinx Zynq, Atmel SAMA5, TI Sitara and Qualcomm Snapdragon series. Some TI Sitara processors (AM335x) might involve TI factory programming of signing keys and custom part numbers.

Continue reading “Secure Boot and Encrypted Data Storage” »

Industrial

Intelligent and Secure Industrial Environments

Business-critical monitoring and control systems. Secure, interconnected, machine-to-machine (M2M) embedded systems. Real-time intelligence — to optimize the system or to feed Big Data analytics. High performance applications and systems. Remote access. IIoT. These are just some of the benefits and use cases Timesys addresses with its industrial customers.

Timesys’ Software Engineering Services excel in addressing remote mobile access, networked devices, and integrated systems — from the BSP to the application and UI. Furthermore, Timesys’ development acceleration offering provides an integrated solution, addressing industrial customers’ unique needs like those for Qt, M2M protocols such as Message Queue Telemetry Transport (MQTT), firmware upgrade, and security vulnerability monitoring and management.

Completed Projects

  • Control and process automation
  • Industry 4.0 / Industrial Internet of Things (IIoT) — secure, connected, real-time
  • Food and material handling

Areas of Expertise

  • Industrial stack integration (CAN, EtherCAT, IEEE1588, Modbus, RS485, etc.)
  • Software performance optimization
  • BSP and driver development
  • Connectivity (WiFi, BT, GPS, 3G, M2M protocols)
  • Cross-platform, custom, embedded and mobile applications integration (native technologies in C/C ++, Qt, HTML5, Django, Node.js, Java, Microsoft.NET)
  • Security — BSP hardening, vulnerability notification and patching, secure boot, firmware upgrade
  • Private Cloud connectivity or Cloud solutions
  • Benchmarking, product testing, and integration testing

How Timesys has helped customers successfully bring products to market faster, with higher quality, and with stronger security

Industrial: Secure Boot

The manufacturer of industrial welders wanted to ensure all its installed devices in a customer’s factory could connect securely to its cloud using an IoT gateway that featured an Advantech SBC based on an NXP i.MX 6 Series processor. See how Timesys helped the company with its device security and cloud-based updating mechanism.
View


down arrow

Have a project you’d like to discuss?

Contact us for a free consultation.

Request Consultation