Infineon and Partners Demonstrate IoT Security at RSA Conference 2016

Date Published: February, 29, 2016
Munich, Germany and San Francisco, USA – February 29, 2016 – Increasingly important for the success of IoT (Internet of Things) development are the ease-of-use in system design and implementation paired with the robust nature of hardware-based security. The demand is large: IHS Technology forecasts that the use of embedded security controllers in IoT applications will grow at a compound annual growth rate of 30 per cent between 2014 and 2020, reaching shipments of more than 480 million units.

Together with partners, Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) will highlight the role of hardware-based security for the IoT at RSA Conference 2016 starting today in San Francisco:

With Cisco, Infineon is showing a cloud-served application for validating IoT sensors, actuators and gateways. This technique enables protection against rogue device attacks, snooping and device compromise, using an OPTIGA™ TPM (Trusted Platform Module) to protect each device in an IoT system.

Huawei is teaming with Infineon to show how its IoT management platform validates the integrity of devices by using the Remote Attestation feature of the OPTIGA TPM, all visible using Huawei’s management dashboard.

Wibu-Systems will show how its CodeMeter™ licensing and IP protection service can bind specific applications and usage rights to IoT devices using Infineon’s hardware-based security.

Globalsign, a leading provider of PKI (Public Key Infrastructure) services, and Infineon will demonstrate a management tool that securely provisions IoT devices with PKI certificates using an OPTIGA TPM in order to validate device authenticity and to protect keys.

Infineon, ranked as a world leading supplier of automotive semiconductors, shows a solution for embedded security in connected cars based on Infineon’s OPTIGA TPM. With up to 22 per cent of passenger vehicles worldwide expected to be connected to the Internet by 2020, TPM-based solutions will play a key role in securing vehicle-to-cloud (V2X) applications and systems.

Further information is available at:

To read more, please click here.


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More