and the patient, as medical data should
not be disclosed to the wrong people.
Secure communication ensures not only
that network endpoints are trustworthy
but also that the data are not somehow
modified in transit (i.e., data integrity). To
guarantee secure communication, devices
will often employ secure communication
protocols like Transport Layer Security
(TLS), which offer a high level of security
to connected devices.
Secure storage of information is the
concept of ensuring that data are stored
safely on the device and that only users
with the correct security credentials can
access stored information. The installation
of malware and the introduction of viruses
are common attack vectors that must
be considered for secure storage of
information.
Analog Devices helps ensure trusted
operations for connected devices by
• Offering customers authenticators
with the capability to check the digital
signature of firmware on small MCUs
with limited compute power.
• Designing integrated circuits (ICs)
that enable easy management and
distribution of certificates and
credentials.
• Offering products that leverage secure
communication protocols like TLS.
C h a p t e r 2 | Tr u s t e d O p e r a t i o n s f o r C o n n e c t e d P r o d u c t s
Trusted operations refer to the security
measures and protocols for ensuring the
secure and reliable execution of critical
operations and functions within an
information system or network. Trusted
operations are usually implemented in
environments that require high levels of
security, such as military, government,
financial, and healthcare systems."
Mohammed Ibrahim
Field Application Engineer, Ruptela
12
Embedded Security: Keeping Edge Data Safe