Flasher Secure, SEGGER’s flash programmer for authenticated off-site production, can protect the firmware image at all stages of the provisioning process between IP owner and contract manufacturer. TELP secures the link from programmer to target and ensures that captured signal traces cannot be used to clone devices by simply replaying the programming sequence: every device is programmed using mutually agreed and unique session keys for the encrypted link, and without those keys the captured trace is useless. Together, they ensure end-to-end IP security and protection against attacks of any kind.
IP owners and contract manufacturers alike will benefit from having the owners in complete control of the programming process.
The contract manufacturer never has access to the cleartext of a firmware image and consequently, both gain the peace of mind of ensuring the protection of IP from copying, cloning, and unauthorised production.
The Flasher Secure/TELP solution offers complete transparency with IP owners able to track the programming yield, device-specific data, and programmer details. This unparalleled transparency is particularly crucial when outsourcing production to third-party locations, providing a level of confidentiality unmatched in the market.
"Flasher Secure and TELP are redefining the standards of secure programming,” said Ivo Geilenbruegge, Managing Director of SEGGER. “Together they allow innovators to confidently bring their ideas to market, secure in the knowledge that their IP is protected all the way to the silicon.”
This is currently the only solution on the market that provides end-to-end security for the entire workflow, from firmware sign-off to final production, while also providing interfaces for quality assurance and warehouse management.
TELP can be used to secure a wide range of microcontrollers and is especially useful for protecting MCUs that do not come with built-in security features. The solution requires no special processors or pre-programming and no physical shipment.
Security is achieved using a combination of established and standardized cryptographic algorithms, cryptographically secure random number generators, and reliable key exchange algorithms.