Welcome!

News Feed Item

INSIDE Secure Demonstrates End-to-End Security for Next-Generation Home Energy Gateways

INSIDE Secure (NYSE Euronext: INSD), a leader in semiconductor and software solutions for securing transactions, content and digital identity, has developed a demonstration design of a next-generation home energy gateway that will meet the stringent end-to-end security requirements mandated by the German BSI (Bundesamt für Sicherheit in der Informationstechnik) also known as the Federal Office for Information Security. The design will meet these security requirements – now being adopted by other countries – using the INSIDE VaultIC™ security module, which works together with the Freescale i.MX28 application processor to protect consumer data privacy, prevent hacking and fraud and address other security, safety and privacy concerns.

As the interface between the home area network of consumer appliances, meters and other home premises equipment and the wide area network link to the utility companies and service providers, the home energy gateway must address the security needs of all stakeholders. Not unlike TV set top boxes and cable operator head ends, home energy gateways and utility back-end servers must be able to authenticate each other before establishing a secure communications channel to prevent fraud and eavesdropping. The gateway itself must be immune from hacking, too.

“Our VaultIC security module was designed with exactly this kind of application in mind, and together with the Freescale processor provides all the features and functions necessary to ensure the gateway can meet the strict device and data security requirements set out by the BSI,” said Christian Fleutelot, executive vice president of the digital security business line at INSIDE Secure. “Based on an original design by Freescale Semiconductor, we believe this next-generation home energy gateway demonstration design will provide energy gateway manufacturers with everything they need to address end-to-end security, safety and privacy concerns in Germany and other countries.”

The VaultIC security module provides comprehensive security functions such as mutual authentication, verification and generation of digital signatures, encryption/decryption and managing secure storage of cryptographic keys and certificates. It is also FIPS140-2 Level 3 certified.

The Freescale i.MX28 processor includes hardware accelerated encryption/decryption and hashing functions, dedicated hardware support for AES128-based authenticated boot and signed/authenticated firmware, an AES crypto engine, secure off-chip storage mechanisms and other security features in addition to robust microcontroller functionality.

BSI specifies the use of the Transport Layer Security (TLS) protocol between the gateway and the wide area network. This protocol is implemented by the i.MX28 processor, with the VaultIC module providing necessary security functionality.

A home energy gateway collects power consumption data from smart appliances and smart meters over a home area network, controls power activation/deactivation of these appliances and communicates with utility networks through an easy-to-use, touch-enabled wireless remote user interface. It is a key component of smart grid deployments, allowing utilities to adjust home appliance use according to power demand, provide feedback to consumers about power usage and simplify local and remote appliance monitoring and control.

The INSIDE Secure solution will be demonstrated in the Freescale booth, Hall 4A/ 4A-206 and in the INELTEK booth, Hall 1/1-424 during the Embedded World 2013 Exhibition and Conference being held in Nuremberg, Germany, February 26 - 28.

About INSIDE Secure

INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD.PA), is a leading designer, developer and supplier of semiconductor and software solutions for securing transactions, content and digital identity. INSIDE Secure mobile NFC, secure payment, embedded security and digital security solutions provide security for a wide range of information processing, storage and transmission applications. The company’s customers are found in a wide range of markets including mobile payment, identification documents, access control, transit, electronic device manufacturing, pay television, mobile handsets and wireless content and service providers. For more information, visit www.insidesecure.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In his session at @DevOpsSummit at 19th Cloud Expo, Yoseph Reuveni, Director of Software Engineering at Jet.com, will discuss Jet.com's journey into containerizing Microsoft-based technologies like C# and F# into Docker. He will talk about lessons learned and challenges faced, the Mono framework tryout and how they deployed everything into Azure cloud. Yoseph Reuveni is a technology leader with unique experience developing and running high throughput (over 1M tps) distributed systems with extre...
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"We provide DevOps solutions. We also partner with some key players in the DevOps space and we use the technology that we partner with to engineer custom solutions for different organizations," stated Himanshu Chhetri, CTO of Addteq, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Actian Corporation has announced the latest version of the Actian Vector in Hadoop (VectorH) database, generally available at the end of July. VectorH is based on the same query engine that powers Actian Vector, which recently doubled the TPC-H benchmark record for non-clustered systems at the 3000GB scale factor (see tpc.org/3323). The ability to easily ingest information from different data sources and rapidly develop queries to make better business decisions is becoming increasingly importan...
The IoT has the potential to create a renaissance of manufacturing in the US and elsewhere. In his session at 18th Cloud Expo, Florent Solt, CTO and chief architect of Netvibes, discussed how the expected exponential increase in the amount of data that will be processed, transported, stored, and accessed means there will be a huge demand for smart technologies to deliver it. Florent Solt is the CTO and chief architect of Netvibes. Prior to joining Netvibes in 2007, he co-founded Rift Technologi...
"Operations is sort of the maturation of cloud utilization and the move to the cloud," explained Steve Anderson, Product Manager for BMC’s Cloud Lifecycle Management, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, gave users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion with b...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
What are the successful IoT innovations from emerging markets? What are the unique challenges and opportunities from these markets? How did the constraints in connectivity among others lead to groundbreaking insights? In her session at @ThingsExpo, Carmen Feliciano, a Principal at AMDG, will answer all these questions and share how you can apply IoT best practices and frameworks from the emerging markets to your own business.
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...