• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

Platform provides root-of-trust for end-to-end IoT device security

June 1, 2022 By Redding Traiger

Trusted Objects has partnered with Crypto Quantique in which their combined technologies will deliver end-to-end security to customers designing networks of IoT devices.
Trusted Objects’ software secure element, called to-protect, is a root-of-trust for generic microcontrollers (MCUs). Designed for use with IoT devices in which MCUs have limited computing and communication capabilities, it enables onboard generation of unique device identities and cryptographic keys, secure storage, and secure boot. It provides the foundation for device authentication and secure data transfer and supports a variety of communication protocols. Suitable for new and retrofit applications, the secure element is quickly and easily downloaded onto any generic MCU platform without hardware changes.
Crypto Quantique’s QuarkLink platform works seamlessly with to-protect to add secure provisioning, automated secure onboarding to on-premises or cloud platforms, security monitoring, and certificate and key renewal or revocation for to-protect customers and their end-users. Technology agnostic, QuarkLink enables thousands of IoT devices to be securely connected to servers through cryptographic APIs in a few minutes. This is achieved with a few keystrokes via the platform’s simple graphical user interface.

You may also like:


  • Security standards and MCUs

  • What’s a Neural microcontroller?

  • What happens when an MCU powers up?

  • Edge computing security: Challenges and techniques

  • What’s special about embedded microcontrollers?

Filed Under: IoT, microcontroller, Products, Security, Telecommunications, Tools Tagged With: trustedobjects

Primary Sidebar

Featured Contributions

Can chiplets save the semiconductor supply chain?

Navigating the EU Cyber Resilience Act: a manufacturer’s perspective

The intelligent Edge: powering next-gen Edge AI applications

Engineering harmony: solving the multiprotocol puzzle in IoT device design

What’s slowing down Edge AI? It’s not compute, it’s data movement

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Aerospace & Defense
Modern defense and aerospace systems demand unprecedented sophistication in electronic and optical components. This Tech ToolBox explores critical technologies reshaping several sectors.

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy