Device-to-Device Authentication
SEALSQ combines secure chips, PKI and trusted device identities to ensure authenticity, confidentiality, and data integrity for device pairing, secure command and control, secure communication, and trusted peer‑to‑peer data sessions.
Introduction
Identity & Authentication
Whether for device‑to‑device pairing or peer‑to‑peer networks, authentication ensures the identity of the device so that confidentiality and validity of data collected can be trusted.
The solutions that we provide have cryptographic private keys and certificates that establish the identity of each device in your ecosystem. Establishing a secure identity is essential for use cases like drone to controller security, P25 radio communication, Wireless Sensor Network (WSN) and device pairing.
One-Stop Shop
Fully integrated solution from ID generation & management to hardware protection. No need to manage different suppliers: easier and more secure.
Safe user data
Protect users, comply with regulations, and avoid any liability due to impersonation and data theft
Granted System Integrity
Ensure the integrity of the system and the actions it performs. Avoid loss of control and potential damages.
Fast compliance
Pre-certified Secure element for specific use cases like P25 radios allows faster compliance and shorter time-to-market.
The Challenge: Authentication between two remote devices
In use cases like Qi3 Wireless chargers, drone to controller pairing, P25 radio communication, or Wireless Sensor Networks (WSNs) devices need to authenticate each other, encrypt and trust the exchanged data to prevent counterfeiting and attacks like man-in-the-middle, spoofing or impersonation. For instance, When a drone is in flight, the command and control must be trusted and the data from the onboard camera and sensors must remain confidential and uncorrupted. The drone must trust the controller and the base station must trust the data from the drone.
The Solution: SEALSQ Device-to-Device remote Authentication
INes CMS allows to create and manage an identity for each device. Devices are personalized with their ID using Vault-I-Trust SaaS services. The SealSQ VaultIC405 or 408 embedded in the devices protects the keys and certificates and executes all the cryptographic operations required by mutual device authentication. VaultIC405 and 408 can be personalized for any specific use-case and is NIST certified FIPS140‑2 Level 2 and 3, and FIPS 140-3 to ensure not only the highest level of security but also fast time-to market and full compliance of your products with market regulations.
KEY FEATURES
ID generation & management
SaaS CMS portal to generate & manage device identities (certificates) throughout the lifecycle
Personalization
SaaS Vault-I Trust service to pre-personalize the chips in CCEAL5+ secure environment or Over The Air for zero-trust environments.
Immutable Identity
Keys and certificates are permanently secured inside the VaultIC tamper resistant microcontroller
Certified Microcontrollers
Our VaultIC secure semiconductors have been certified by state-of-the-art labs for FIPS140-2(3) Levels 2&3 and Common Criteria certification
Fast authentication
The VaultIC micro‑chip provides cryptographic acceleration for faster mutual device authentication and better performance
Comprehensive toolbox
Rich software and development kit toolbox with personalized technical assistance for fast and easy integration
They trust us
Secure FIPS certified P25 radio with VaultIC405
Discover how SEALSQ’s specifically engineered version of the VaultIC405 Secure Element will enable faster time-to-market and lower dev. costs to achieve FIPS 140.2 level 2 and Level 3 security certifications in the design phase of P25 Radios for government or military applications.
Enter you email and download the full e-book
The Challenge: Authentication by contact between two devices
In use cases like Battery-to-host/charger, USB Type C connection, Cartridge-to-printer etc. devices and/or parts need to authenticate with each other to prevent damages and accidents resulting from counterfeit products as well as associated liabilities for the manufacturer. For instance, a fake battery or charger could permanently damage a device and even lead to serious user injuries. One of the reasons why USB-IF has recently included authentication and certificates in their specification for USB type C devices
The Solution: SEALSQ Device-to-Host “self-authentication”
Digital security based on cryptography and electronic signatures offers a robust way to mutually authenticate devices in contact. The combination of Vault-IC secure hardware module, trusted identity generation, provisioning, and flexible design customization services is ideally suited to protect users, products and brand while ensuring compliance with specifications like USB Type-C.
KEY FEATURES
ID generation & management
SaaS CMS portal to generate & manage device identities (certificates) throughout the lifecycle
Personalization
SaaS Vault-I Trust service to pre-personalize the chips in CCEAL5+ secure environment or Over The Air for zero-trust environments.
Immutable Identity
Keys and certificates are permanently secured inside the Vault IC tamper resistant microcontroller
Tamper resistant
Our VaultIC secure semiconductors include a comprehensive set of countermeasures to protect against many type of attacks
Fast authentication
The VaultIC micro‑chip provides cryptographic acceleration for faster mutual device authentication and better performance
Comprehensive toolbox
Rich software and development kit toolbox with personalized technical assistance for fast and easy integration
They trust us
Power Tool battery-to-host authentication
Discover how SEAL SQ’s specifically engineered version of the VaultIC 18X Secure Element, when embedded into a battery pack, can enable authentication from the Host or from the Charger to prevent counterfeiting or implement innovative revenue collection models.