Beyond Semiconductor
Security   ›   GEON Secure Boot    
GEON Secure Boot


The GEON Secure Boot provides a hardware root of trust and ensures that only authentic, vendor-issued software is allowed to run on a device.


 
 Purpose
The GEON Secure Boot implements an essential security functionality for any SoC with processor:
  • Ensures that only authentic, vendor issued software is allowed to run on device.
  • Enables recovery from breached software (with OTA update).
  • Provides a hardware root of trust for the software stack.
 
 
Feature Highlights
  • Processor agnostic, supports any ARM, Xtensa, RISC-V, Beyond BA2x and other.
  • End-to-end solution for Secure Boot, with end-to-end cryptographic guarantees.
  • Does not require any secret (key) to be stored on a device.
  • Zero or minimal boot time impact (typically from 0 – 5 ms).
  • Firmware downgrade prevention.
  • Many cryptographic algorithms supported, including RSA, ED25519, NIST curves, SHA2, SHA3, AES-GCM...
  • Optional authentication algorithm and boot mechanism change without ASIC respin.
  • Integration with existing PKI / backend infrastructure or setup of dedicated PKI / backend infrastructure (storage of long term signature keys, processes for secure firmware signing, required server side software or cloud service).
 
 
Applications
  • Any SoC with a processor and upgradable software/firmware.
  • Aerospace, Defense, Medical, Critical Infrastructure.
  • Automotive, Industrial.
  • Connected devices, IoT, 5G.
 

The GEON SoC Security Platform
 
The GEON SoC Security Platform comprises of multiple security functions that share common hardware logic and accelerators wherever possible. This way adding additional security function may have only negligible impact on power and gate count. For example, cryptographic hardware accelerators, secret (key) storage, protection mechanisms, random number generator, etc., are shared among all implemented GEON security functions.
 
The GEON SoC Security Suite includes the following security functions:
 
Device is either Secure or Not Secure given Security Assumptions and Threat Model. Effective security requires understanding of the likely attacks, exposure of the device and severity of consequences so that the effort can be spent where it matters most.
 
Beyond works with clients determining pragmatic Threat Model with focus on denying high impact and high likelihood threats first.
 

Dear visitor,
 
thank you for your interest in further details about GEON Secure Platform and its features. At the moment, its documentation is available upon request. Please visit "More Info" tab and let us know what documentation you would like us to provide.
 
Thank you. 
 

If you would like to inform yourself further about Beyond Semiconductor products, please complete the webform below and let us know your questions, requirements or requests.
 
Please note that all submitted information will be handled confidentially and used only to address your inquiry. Therefore, we kindly ask you to fill out all the fields of the form.
 
You may expect our answer shortly.
 

Name (first, last):*
Corporate email address:*
Company:*
Subject:
Your inquiry:*
 
 

 

 

Copyright © 2006 - 2024 Beyond Semiconductor. All rights reserved.