Security, Secure Boot and Chain-of-Trust Experts
Konsulko Group has extensive expertise in device security including building a chain of trust starting at boot-time, and encrypting, verifying and measuring the integrity of the system and core software at every stage. Integration of these technologies in Yocto Project, and key management are other important components of the solution.
Our engineers have commercial experience with the open source technologies necessary to help you effectively manage and support the security of your project. We have helped customers in many disparate industries from consumer to medical to industrial.
Chain-of-trust solutions
From power on
through applications
and software update
Secure boot
- NXP i.MX6/7/8
- NVIDIA Tegra K1/X1/X2/Xavier
- R-Car3
- TPM-based systems
Verified boot support
- U-Boot
Verified root filesystem support
- dm-verity
Encrypted filesystem support
- dm-crypt
- fs-crypt
Integrity support for encrypted volumes
- dm-integrity
Hardware Security Manager
HSM-enabled kernel and
middleware key management
Linux Kernel Integrity Measurement Architecture
- IMA
- EVM
End-to-end conditional access systems
- Software implementation of modern crypto algorithms running on a smart card and other embedded microcontrollers
- Hardware engines on modern processors
- Server side OS hardening and lockdown