Proekspert develops firmware update solutions that ensure the device software is protected no matter how the update package is delivered to the device: over-the-air (OTA) or wired medium.
The secure firmware update solution is used in two case scenarios.
Updating devices over the internet or on-site by a technician poses risks of malicious usage and simple human error and may render a device inoperable, causing enormous expense, especially when the device is in a difficult to reach or remote location. To give device manufacturers more control in the software update process, Proekspert has developed a hardware-level device firmware authenticity validation solution.
Device makers need control over software that is run on their devices. Proekspert has developed a hardware-level license verification solution to determine if an end-user is eligible for software updates or new features.
Updating offline device software locally by a specialist or end-user requires confidence the updater has the specific firmware image coming from an authentic source which is built for the specific device.
Updating device software manually on site is costly for maintenance service providers (trained personnel, travel costs, complex on-site conditions, etc.).
Enabling remote update functionality over the internet exposes a device to malicious users who may tamper with the device by altering the original firmware update package.
Installing a software update can enable or disable features that were not meant for a specific user type or machine model. This may ruin the user experience or break important features.
Enabling secure remote updates Over-the-Air and via Ethernet
Preventing human errors by protecting a device against manual invalid FW updates online and offline
Protecting device software against malicious usage and network attack
Enabling device-level software licenses
Proekspert’s firmware authenticity verification software uses a crypto processor chip (TPM) integrated with a device’s motherboard to automatically verify an update file signature and/or decrypt a previously encrypted firmware update package. Each TPM is unique, so on the device software development side the firmware is signed or encrypted for devices one by one. When a device updater discovers firmware with an incorrect signature or encryption, the update process halts without altering already installed software.
Today, online connected devices are becoming more and more common. Also, device manufacturing companies are preparing for compliance with the forthcoming EU Cyber Resilience Act.
Proekspert has comprehensive expertise in developing custom industrial device security solutions. For 30 years we have helped our clients develop device security and update solutions. In addition of building custom firmware update solutions we are experienced in using over-the-air (OTA) and various industrial communication protocols and mediums.
If you’re looking for an experienced embedded software solutions development partner to improve your device security, feel free to contact us.
Your message has been sent. Our team will get back to you as soon as possible!
Live demo at The embedded world 2023 Fair by Jukka Antero Halttunen.
The embedded world 2023 Exhibition&Conference, Terry London and Jukka Antero Halttunen.
Please fill in the contact form below and we'll get back to you as soon as possible.
Your message has been sent. Our team will get back to you as soon as possible.
Close this window