8/2/2018 8:36:44 AM
Soracom aims to simplify IoT with two new services
IoT Deployment,IoT Security,IoT Authentication
https://appdevelopermagazine.com/images/news_images/IoT-Security-Becomes-Simpler-with-Soracom-App-Developer-Magazine_9o8385dv.jpg
App Developer Magazine

Featured Apps


GPS Mobile Tracking
GPS Mobile Tracking



Want to see your app here? Contact us

IoT

Soracom aims to simplify IoT with two new services


Thursday, August 2, 2018
3,163

IoT security service developed by Soracom named Krypton makes it easier to securely provision deployed IoT devices through Wifi, Ethernet, and cellular connections.

Soracom, Inc. announced the release of its Krypton service, which helps simplify and lower the cost to securely provision connected devices in the field. Krypton uses SIM authentication to identify each unique device the first time it is connected to a cloud service.  This allows shipment of devices with a common firmware image to end customers, who can then add unique device information and keys at deployment using the Soracom web console or API.

While the Krypton service utilizes SIM authentication, it is effective when the device is connected via cellular, WiFi, Ethernet or low-power radio network links. This gives developers and user organizations flexibility for both secure deployment and in-field updates to devices.

“Secure embedding of unique authentication information for connected edge devices is critical to IoT security,” said Kenta Yasukawa, Soracom CTO, and Co-Founder.  “Using the Soracom Global Air SIM as the basis for authentication is a straightforward, cost-effective way to manage production and management of devices for IoT deployments at any scale, from prototype to multinational roll-out.” 

Typically, management of individual device authentication and security key provisioning at the time of manufacture and delivery can add significant complexity and cost to production supply chains. "With Soracom Krypton, authentication becomes a simple step in connecting the device in the field and provisioning cloud and network services." The process corresponds to issuing appropriate certificate credentials for cloud services. The service also can be used to share keys between customer IoT devices and third-party authentication systems.



Comments

There are no comments yet, be the first to leave your remarks.

Leave a Reply

co