{"id":13621,"date":"2024-03-20T14:31:01","date_gmt":"2024-03-20T12:31:01","guid":{"rendered":"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/?p=13621"},"modified":"2024-06-06T10:06:23","modified_gmt":"2024-06-06T08:06:23","slug":"secure-firmware-updater-technology","status":"publish","type":"post","link":"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/blog\/device-security\/secure-firmware-updater-technology\/","title":{"rendered":"Secure Firmware Updater technology"},"content":{"rendered":"\n<p class=\"article-lead\"> Proekspert helps to develop secure firmware (FW) update solutions tailored specifically for industrial device manufacturers. We are experienced in working with embedded software platforms and developing custom software, helping to customize the solution to your needs.<\/p>\n\n\n\n<p>You can also <a href=\"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/04\/Proekspert_Secure-Firmware-Updater.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">download this as a PDF document<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1600\" height=\"840\" data-src=\"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-1.jpg\" alt=\"\" class=\"wp-image-13629 lazyload\" data-srcset=\"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-1.jpg 1600w, https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-1-300x158.jpg 300w, https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-1-768x403.jpg 768w, https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-1-1536x806.jpg 1536w, https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-1-1200x630.jpg 1200w\" data-sizes=\"(max-width: 1600px) 100vw, 1600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1600px; --smush-placeholder-aspect-ratio: 1600\/840;\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Key features<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Secure and tamper-proof FW update process<\/strong> \u2013 Through security features like Secure Boot, data encryption and TrustZone\u00ae, our solution ensures that the whole FW update process is safe and cannot be modified or tampered with by external unauthorized parties.&nbsp;<\/li>\n\n\n\n<li><strong>Authentic FW verification<\/strong> \u2013 Integrity and authenticity of the FW is checked after reading the initial package, plus the signature is matched utilizing our secure element chip, making sure only authentic FW gets updated in the process.&nbsp;<\/li>\n\n\n\n<li><strong>USB \/ offline FW updating<\/strong> \u2013 An offline, on-site update process is used to ensure security right at the target device level and make FW updates possible in places without online connections.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How does our Secure Firmware Updater work?&nbsp;<\/h2>\n\n\n\n<p>One of the key security features, TrustZone\u00ae, is used to separate sensitive cryptography-related operations into an isolated secure world. This adds an extra layer of security, since outside communication with the secure element takes place only through strictly defined interfaces, meant to minimize attack possibilities toward any sensitive data.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1253\" height=\"1024\" data-src=\"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-scheme-1253x1024.png\" alt=\"\" class=\"wp-image-13622 lazyload\" data-srcset=\"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-scheme-1253x1024.png 1253w, https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-scheme-300x245.png 300w, https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-scheme-768x628.png 768w, https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-scheme-1536x1256.png 1536w, https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-scheme.png 2000w\" data-sizes=\"(max-width: 1253px) 100vw, 1253px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1253px; --smush-placeholder-aspect-ratio: 1253\/1024;\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Enhanced security using Secure Boot&nbsp;<\/h2>\n\n\n\n<p>We use the Secure Boot process during the application startup phase to ensure that only trusted software components are loaded during the boot process. The process uses a root of trust, a trusted bootloader, and a series of verification steps to ensure only an authentic version of our application is allowed to run. The Secure Boot process, illustrated in the drawing below, can be customized or improved according to the client system\u2019s cybersecurity requirements.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"970\" height=\"64\" data-src=\"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-scheme2.png\" alt=\"\" class=\"wp-image-13624 lazyload\" data-srcset=\"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-scheme2.png 970w, https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-scheme2-300x20.png 300w, https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/03\/sfu-scheme2-768x51.png 768w\" data-sizes=\"(max-width: 970px) 100vw, 970px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 970px; --smush-placeholder-aspect-ratio: 970\/64;\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Security features in our products&nbsp;<\/h2>\n\n\n\n<p>Our Secure Firmware Updater ensures safe FW updates by supporting major security features.&nbsp;<\/p>\n\n\n\n<p><strong>Secure Boot<\/strong> \u2013 An extra layer of security which only allows the FW updater application to run when its integrity is verified against a trusted signature.&nbsp;<\/p>\n\n\n\n<p><strong>Secure Element<\/strong> \u2013 a.k.a. the Trusted Platform Module (TPM) or crypto chip. A Secure Element provides a secure storage- and generation environment for encryption, decryption, and verification keys.&nbsp;<\/p>\n\n\n\n<p><strong>Data signing and encryption<\/strong> \u2013 A firmware update package is encrypted and signed by the device manufacturer, ensuring that only trusted update packages are processed.&nbsp;<\/p>\n\n\n\n<p><strong>TrustZone\u00ae<\/strong> &#8211; Technology which helps us separate the device into the \u201ctrusted secure world\u201d and \u201cnormal world,\u201d so sensitive and critical operations such as data signature checks and decrypting the firmware can be handled securely and separately from regular operations.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Proekspert\u2019s supported MCUs and TPMs&nbsp;<\/h2>\n\n\n\n<p>In our Secure Firmware Updater, we currently use and support a variety of families of microcontrollers and secure elements by STMicroelectronics and Infineon.&nbsp;&nbsp;<\/p>\n\n\n\n<p>MCU families supported:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>STM32F4&nbsp;<\/li>\n\n\n\n<li>STM32U5&nbsp;<\/li>\n\n\n\n<li>STM32L5&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Secure Elements supported:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>STSAFEA110&nbsp;<\/li>\n\n\n\n<li>Infineon OPTIGA Trust M&nbsp;<\/li>\n<\/ul>\n\n\n\n<section class=\"wp-block-cgb-section-block text-white margin-top-50\" style=\"background-color:#121337\"><div class=\"container container__main\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full img-pdf-download\"><img decoding=\"async\" width=\"414\" height=\"574\" data-src=\"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/06\/sfu.png\" alt=\"\" class=\"wp-image-14226 lazyload\" data-srcset=\"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/06\/sfu.png 414w, https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/06\/sfu-216x300.png 216w\" data-sizes=\"(max-width: 414px) 100vw, 414px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 414px; --smush-placeholder-aspect-ratio: 414\/574;\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading has-text-align-left h1\">Get the solution brief<\/h2>\n\n\n\n<p class=\"size18 margin-bottom-10\">Discover how Shield-loT enables organizations to monitor and secure any loT device, application and network<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-black-color has-white-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-content\/uploads\/2024\/04\/Proekspert_Secure-Firmware-Updater.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Download PDF<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-cgb-section-block left m-padding-left-0 m-padding-right-0\"><div class=\"container container__narrow\"><\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer visible-xs\"><\/div>\n<\/div><\/section>\n\n\n\n<h2 class=\"wp-block-heading\">Read more<\/h2>\n\n\n<div class=\"vlp-link-container vlp-template-default\">\n\t\t\t<a href=\"https:\/\/proekspert.com\/secure-firmware-update-solution\/\" class=\"vlp-link\" title=\"Secure firmware update solution | Proekspert\" rel=\"nofollow\" target=\"_blank\"><\/a>\n\t\t\t<div class=\"vlp-link-image-container\">\n\t\t\t\t\t\t<div class=\"vlp-link-image\"><img decoding=\"async\" data-src=\"https:\/\/proekspert.com\/wp-content\/uploads\/2023\/02\/secure-firmware-update-solution-fb.jpg\" style=\"max-width: 1200px; max-height: 1200px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><\/div>\n\t\t\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tSecure firmware update solution | Proekspert\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t\t\t\tProekspert develops secure firmware update solutions that ensure the device software is protected no matter how the update package&#8230;\n\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-post-link\">\n\t\t\t<a href=\"https:\/\/proekspert.com\/secure-firmware-update-solution\/\" title=\"Secure firmware update solution | Proekspert\" rel=\"nofollow\" target=\"_blank\">https:\/\/proekspert.com\/secure-firmware-update-solution\/<\/a>\n\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default\">\n\t\t\t<a href=\"https:\/\/proekspert.com\/blog\/connected-products\/secure-firmware-updaters-on-stm32-mcus\/\" class=\"vlp-link\" title=\"Secure Firmware Updaters on STM32 MCUs | Proekspert\" rel=\"nofollow\" target=\"_blank\"><\/a>\n\t\t\t<div class=\"vlp-link-image-container\">\n\t\t\t\t\t\t<div class=\"vlp-link-image\"><img decoding=\"async\" data-src=\"https:\/\/proekspert.com\/wp-content\/uploads\/2024\/03\/BlogPicture_sfu2-1.jpg\" style=\"max-width: 1200px; max-height: 1200px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><\/div>\n\t\t\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tSecure Firmware Updaters on STM32 MCUs | Proekspert\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t\t\t\tSTM32-based Secure Firmware Updater for industrial device manufacturers&#8230;\n\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-post-link\">\n\t\t\t<a href=\"https:\/\/proekspert.com\/blog\/connected-products\/secure-firmware-updaters-on-stm32-mcus\/\" title=\"Secure Firmware Updaters on STM32 MCUs | Proekspert\" rel=\"nofollow\" target=\"_blank\">https:\/\/proekspert.com\/blog\/connected-products\/secure-firmware-updaters-on-stm32-mcus\/<\/a>\n\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default\">\n\t\t\t<a href=\"https:\/\/proekspert.com\/iec-62443-compliance-analysis-service\/\" class=\"vlp-link\" title=\"IEC 62443 compliance analysis service | Proekspert\" rel=\"nofollow\" target=\"_blank\"><\/a>\n\t\t\t<div class=\"vlp-link-image-container\">\n\t\t\t\t\t\t<div class=\"vlp-link-image\"><img decoding=\"async\" data-src=\"https:\/\/proekspert.com\/wp-content\/uploads\/2024\/02\/iec-62443-compliance-analysis-service-hero.jpg\" style=\"max-width: 1200px; max-height: 1200px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><\/div>\n\t\t\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tIEC 62443 compliance analysis service | Proekspert\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t\t\t\tProekspert helps device manufacturers prepare for the EU CRA. One big part of the Cyber Resilience Act is introducing cybersecurit&#8230;\n\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-post-link\">\n\t\t\t<a href=\"https:\/\/proekspert.com\/iec-62443-compliance-analysis-service\/\" title=\"IEC 62443 compliance analysis service | Proekspert\" rel=\"nofollow\" target=\"_blank\">https:\/\/proekspert.com\/iec-62443-compliance-analysis-service\/<\/a>\n\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The technology behind the custom secure firmware updater for industrial devices<\/p>\n","protected":false},"author":5,"featured_media":13627,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-13621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-device-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-json\/wp\/v2\/posts\/13621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-json\/wp\/v2\/comments?post=13621"}],"version-history":[{"count":9,"href":"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-json\/wp\/v2\/posts\/13621\/revisions"}],"predecessor-version":[{"id":14228,"href":"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-json\/wp\/v2\/posts\/13621\/revisions\/14228"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-json\/wp\/v2\/media\/13627"}],"wp:attachment":[{"href":"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-json\/wp\/v2\/media?parent=13621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-json\/wp\/v2\/categories?post=13621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clients.triloogia.ee\/proekspert\/wp-new\/wp-json\/wp\/v2\/tags?post=13621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}