Konsulko Group has extensive expertise in device security including building a chain of trust starting at boot-time, and encrypting, verifying and measuring the integrity of the system and core software at every stage. Integration of these technologies in Yocto Project, and key management are other important components of the solution.
Our engineers have commercial experience with the open source technologies necessary to help you effectively manage and support the security of your project. We have helped customers in many disparate industries from consumer to medical to industrial.
Chain of trust
solutions
From power on
through applications
and software update
Secure boot
- NXP i.MX6/7/8
- NVIDIA Tegra K1/X1/X2/Xavier
- R-Car3
- TPM-based systems
Verified
boot support
- U-Boot
Verified root
filesystem support
- dm-verity
Encrypted
filesystem support
- dm-crypt
- fs-crypt
Integrity support
for encrypted volumes
- dm-integrity
Hardware Security
Manager
HSM-enabled kernel and
middleware key management
Linux Kernel Integrity
Measurement Architecture
- IMA
- EVM
End-to-end conditional
access systems
- Software implementation of modern crypto algorithms running on a smart card and other embedded microcontrollers
- Hardware engines on modern processors
- Server side OS hardening and lockdown