Automotive

automotive banner final x

Automobiles provide an ideal environment for the convergence of consumer electronics platforms including audio, video and data communications. Vehicles today are manufactured with increasingly complex and numerous electronic subsystems including advanced infotainment systems with multiple screens and advanced connectivity and communications. In addition, embedded control units (ECUs) in modern vehicles control various vital functions and are essential for operation, performance and safety.


Robust Security Solutions

A whole range of new applications for automobiles are coming to the market based on vehicle to infrastructure and vehicle to vehicle communications. Elliptic provides a broad portfolio of proven hardware and software-based solutions for automobile applications, which include robust DRM and link protection, as well as secure communication and platform security.

Whether you need to protect the high value audio and video content, or provide platform security to avoid tampering, or provide secure communication, Elliptic addresses these needs with a comprehensive portfolio of embedded security solutions.

 

Products

Featuring

tRoot w embedded chip flexible future proof 

 

Elliptic's Secure Foundation of Trust 

Elliptic's tRoot is a highly-secure foundation of trust that enables connected devices to securely and uniquely identify and authenticate themselves to create secure channels for remote device management and service deployment for further revenue opportunities. tRoot has a unique architecture with the ability to effectively adjust to future security requirements and standards, and enable personalization of features, services and environments to create business growth and monetization in the exploding IoT market. Learn more >>

 

EE Journal logo

"I Am tRoot" by Jim Turley

Apart from handling cold-boot procedures, tRoot also lends a hand in other security-related chores. Need to deliver DRM-protected material? Elliptic's hardware and software will manage the keys. Worried about cloning? Your tRoot is on the job. Concerned that hackers armed with sensitive instruments might mount a side-channel attack? That's the sort of thing tRoot was born to fight. Read the EEJournal article about Elliptic tRoot >> 

 

S5 Box