IAR Embedded Secure IP

Enabling existing products with unique and flexible security features at any point in the product's lifecycle.

product-page-background

01

Authenticity

A unique X.509 device certificate can be provisoined to each product, providing it with an identity that can be validated using industry standard Public Key Infrastructure authentication techniques.

02

Active IP protection

Ensuring the security of your intellectual properties such as applications, libraries, and other assets by providing encryption that guarantees safe device access.

03

Anti-cloning

Enable unique identification for both software applications and device hardware. This helps to prevent counterfeiting while also providing encryption for your manufacturing processes.

04

Legislation Compliance

Update existing product applications to comply with security-based legislation for IoT products, such as no default passwords.

Product Overview

Discover how the IAR Embedded Secure IP (eSecIP) product line delivers reliable security solutions for firmware applications, even at late stages of development. Enable security effortlessly before mass production, with minimal software effort—perfect for MCU-centric systems that need a swift, secure deployment.

Key Highlight Features

Strengthen device security with robust identity and data protection features.

Strong Unique Device Identity

  • By using the X.509 standard for identity certification, the product provides a generally accepted, standard solution for digital identity needs.

Secure Data Injection and Generation

  • Customers can supply their own data or have data generated by a true random number generator and have it securely stored on the device.

Data Obfuscation

  • Obfuscate sensitive data which might be otherwise compromised in a plain text format. It protects data stored at rest on small devices.

Production Records

  • A record containing device-specific information generated as the device is provisioned.

Device Anti-Cloning

  • Utilizing unique device information, the anti-cloning feature protects the product’s intellectual property from unauthorized replication.

Protection of Application Information

  • Sensitive portions of the executable application can be obfuscated and therefore protected while the device is at rest.

Ease security integration

  • Customers can select from a wide variety of chipset families, with ease and confidence.

Get started with IAR Embedded Secure IP

Implementing embedded security at late-stage development

This infographic illustrates how IAR Embedded Secure IP seamlessly integrates security measures into your product development, safeguarding it from malicious attacks and cyber threats. With active IP protection and anti-cloning measures, your product is secured from the start, saving you valuable time and resources.

Download infographic
embedded-secure-ip

Benefits of IAR Embedded Secure IP

01

Flexible security design for late-stage development

Developers can introduce security features for their products with a minimal amount of impact on any existing product designs.

02

Flexible security libraries

Security libraries are provided as source code, allowing developers to implement only what is needed for their product. Even devices with constrained memory can reap the benefits of an efficient security solution.

03

Integration with existing security features

IAR Embedded Secure IP has been designed using industry-standard security features and best practices. This allows developers to augment any existing security features with those provided by our solution. 

04

Zero-trust manufacturing

Strong IP protection from the final design to the fully manufactured product. Embedded Secure IP protects a product's assets throughout the manufacturing process. Learn more about IAR Secure Deploy.

esecip

Webinar on-demand

Cloning prevention: Locking software applications onto authorized devices

Discover how to overcome the substantial challenge of cloning faced by most brands. Join our webinar on-demand to learn how IAR solutions can help you implement anti-cloning features that ensures only authorized devices can utilize the information programmed onto them.

Access webinar

Find out more

Want to improve the security of your product? Our sales team is here to support you in finding the right solution. Fill in the form to get in touch.