You need to get a lot of things right to build a truly secure system. The EdgeLock secure enclave is preconfigured to help ease the complexity of implementing robust, system-wide intelligent security and avoid costly errors. This fully integrated built-in security subsystem is a standard feature across the i.MX 8ULP and i.MX 9 applications processors, providing scalable options to deploy security in thousands of edge applications, from next-generation wearables to industrial automation.
Self-contained, on-die hardware security subsystem has its own dedicated security core, internal ROM, secure RAM and it supports state-of-the-art side-channel attack-resilient symmetric and asymmetric crypto accelerators and hashing functions for security services to the other userprogrammable cores within the system-on-chip (SoC).
Features run-time attestation, silicon root of trust, trust provisioning, finegrain key management augmented by extensive crypto services and simpler path to security certifications.
Where security is governed – this fortress inside the chip stores and protects key assets, including RoT and crypto keys to protect the system against physical and network attacks.
Agents extend security across the chip – distributed outside the central headquarters – to establish and maintain trust of security capabilities.
Tracks power transitions to help prevent attack surfaces from emerging on heterogeneous multicore devices.
Preconfigured security policies help you reduce the complexity and avoid costly errors.
NXP Semiconductors announced the i.MX 93 family of applications processors designed for automotive, smart home, smart building and smart factory applications, which leverage edge machine learning to anticipate and automate based on user needs.
Our ultra-low power crossover applications processor product line, the i.MX 8ULP family, features a giant leap in security for edge processors with the integration of EdgeLock secure enclave.
Innovative EdgeLock secure enclave enables developers to more easily achieve their security goals, freeing them to focus on new ways to differentiate edge applications.