Find IP Sell IP AI Assistant Chip Talk About Us
Log In

Secure-IC

Secure-IC is a pivotal player in the field of embedded cybersecurity, dedicated to equipping industries with robust security solutions for their connected devices. Their comprehensive portfolio spans the lifecycle of secure systems from design through deployment and management in diverse fields such as automotive, defense, healthcare, and consumer electronics. With a global presence, they aim to safeguard the ecosystem of the Internet of Things (IoT) against a wide array of cyber threats, ensuring that each level of system architecture is fortified against potential security breaches. Read more

Is this your business? Claim it to manage your IP and profile

5
IPs available

Secure Protocol Engines

Secure Protocol Engines are designed to significantly enhance network and security processing capabilities. This IP offers high-performance processing of network traffic with secure protocol applications. It includes efficient engines for SSL/TLS handshakes and algorithms such as MACsec and IPsec, enabling swift encryption and decryption, thus enhancing security for data centers and similar infrastructures. These engines help in offloading intensive cryptographic operations from CPUs, thereby optimizing performance and resource allocation.

Secure-IC
AMBA AHB / APB/ AXI, CXL, Embedded Security Modules, Ethernet, I2C, IEEE1588, Security Protocol Accelerators, USB, V-by-One
View Details

Securyzr iSSP

The Securyzr iSSP, or Integrated Security Services Platform, provides a comprehensive security solution for devices throughout their lifecycle. It enables zero-touch security lifecycle services, including provisioning, firmware updates, security monitoring, and device identity management. The platform integrates Secure-IC's Root of Trust, ensuring robust system protection from chip-level threats. By combining strong hardware and software security measures, it ensures end-to-end protection for devices operating in various environments.

Secure-IC
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Securyzr Key Management System

The Securyzr Key Management System provides a robust framework for managing cryptographic keys within embedded systems. By ensuring secure storage, key generation, and access protocols, it strengthens the cryptographic foundation of devices. This system supports multiple security applications and meets stringent certification requirements, ensuring that key information remains protected throughout the device lifecycle. It enhances security by preventing unauthorized access and preserving data integrity through effective key management strategies.

Secure-IC
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Integrated Secure Element

Secure-IC's Integrated Secure Element (iSE) serves as a cornerstone for secure computing environments. Embedded on the main system-on-chip (SoC), it provides services including secure boot, key isolation, and anti-tampering measures. The iSE ensures security at a hardware level, creating a more robust defense against advanced cyber threats. Its design incorporates features to maintain strong isolation, offering dual computation capabilities that aid in resisting various forms of attacks while maintaining high performance.

Secure-IC
Embedded Security Modules, Platform Security, Security Subsystems
View Details

Post-Quantum Cryptography

Post-Quantum Cryptography from Secure-IC is engineered to offer resilience against future quantum computer threats. This IP includes advanced cryptographic algorithms designed to withstand the potential power of quantum decryption. It is part of Secure-IC's commitment to future-proof secure systems and involves continuous research and development in creating and integrating post-quantum solutions. These cryptographic solutions are critical in maintaining data integrity and confidentiality in the face of emerging computational power threats.

Secure-IC
Cryptography Cores, Platform Security
View Details
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Review added

Claim Your Business

Please enter your work email and we'll send you a link to claim your business.

Review added

Claim Email Sent

Please check your email for a link you can use to claim this business profile.

Chatting with Volt