Security has become ubiquitous – in many cases you trust that it is there – in other situations you may not even know it is there – but security has permeated nearly every aspect of our modern technology oriented lives and it spans across a wide range of markets and applications, from wireless, networking, home entertainment and digital media, to smart grid, automotive, card payment, medical, government and military.
Security is crucial and it is important to get it right. You might find it when you place a call, watch a movie in-flight, use a credit card, check an on-line bank account, turn on your smart phone, store a file to disk or even when you replace an ink cartridge. Security protects our very conversations and identities. Companies use security to protect their property and digital assets, enable employees to securely work out of the office and fight the growing tide of gray market and counterfeit products.
Each of these applications drive the need for complete and robust security solutions, based on a combination of security standards, cryptography, certification and security expertise.
Elliptic offers a broad and trusted embedded security portfolio of highly integrated and intelligent solutions that are helping SoC manufacturers, embedded system OEMs and network operators secure products in wide range of applications including 4G LTE-Advanced, DRM and content protection, Platform Security, networking security, disk and tape storage and NSA Suite B.
Elliptic customers know that software is a vital element for their successful roll-out of a complete reference design. As such, Elliptic has invested in a veteran software team which is offers software development kits (SDKs) as part of each core delivery as well as a standard library of security software known as Ellipsys. The team can also be made available to assist customers in integrating Elliptic Technologies Inc. cores into the target operating systems or even writing software protocol stacks such as the DTCP rights management middleware recently offered for general release.
A highly programmable and unique Security Protocol Accelerator specifically designed to efficiently process data for high capacity wireless and network applications. The engine is perfectly suited for applications that deal with multiple active connections and significant traffic load on different contexts, such as 4G LTE-Advanced wireless cellular base stations and femtocells.