EN
EN

SASe IC & Module

Revolutionizing Embedded Security

Products made for you

Products made for you

Products made for you

Integrate Unclonable Security with Ease

This module enables OEMs and ODMs to quickly and efficiently integrate PUF technology into existing devices via UART, SPI, or I2C interfaces.

What is SASe IC & Module?

What is SASe IC & Module?

What is SASe IC & Module?

SASe IC & Module is a comprehensive security solution that combines the power of our SASpuf technology with a programmable MCU.

This module is designed to provide a quick and efficient way to integrate PUF technology into existing devices, offering a range of advanced security features.

SASe IC & Module is a comprehensive security solution that combines the power of our SASpuf technology with a programmable MCU.

This module is designed to provide a quick and efficient way to integrate PUF technology into existing devices, offering a range of advanced security features.

Key Features

Key Features

Key Features

Introducing SASe IC & Module—a versatile hardware module featuring our cutting-edge SASpuf technology in a physical chip format.

Unmatched Security with SASpuf Technology

SASe IC & Module embeds our advanced SASpuf technology

Unique Identification

Unique Identification

Each module generates a unique digital fingerprint for secure device identification.

True Randomness

True Randomness

Complies with ISO/IEC 20897 and NIST FIPS SP800-90A/B/C guidelines for true randomness.

Dynamic Entropy

Dynamic Entropy

Dynamic Entropy

Combines dynamic and steady randomness for unparalleled security.

Self-PUF Encryption and Hashing

Self-PUF Encryption and Hashing

Self-PUF Encryption and Hashing

Includes self-PUF encryption and hashing mechanisms on top of standard AES256 and SHA256.

Versatile Applications

SASe IC & Module is designed to meet a wide range of security needs, including:

  • AI Data Security

    Secure AI data training weights, sign and encrypt data storage and system files, and digitally sign AI output.

  • IoT Security

    Handle end-to-end data encryption with clients.

  • Zero-Trust Authentication

    Handle zero-trust continuous challenge and authentication for embedded systems.

  • FIDO Authentication

    Acts as a FIDO authenticator, with firmware ready for C2PA and FIDO standards.

  • User-Role Based Security

    Manage additional user-role based security levels for system administrators.

Certifications and Compliance

SASe IC & Module meets the highest security standards

SESIP Level 1 Certified

SESIP Level 1 Certified

Ensures robust security for embedded systems.

SESIP Level 2 Certification Ongoing

SESIP Level 2 Certification Ongoing

Aims to provide enhanced security features.

FIDO Certified

FIDO Certified

FIDO Certified

Our SASe USB key is FIDO certified, ensuring reliable authentication.

Cipher Suites

Cipher Suites

Cipher Suites

Includes all cipher suites for standard cryptography such as IPsec, TLS 1.2, and TLS 1.3.

Customization and Integration Services

Customization and Integration Services

Customization and Integration Services

SASe IC & Module is highly customizable to meet your specific needs:

Ideal for Proof-of-Concept and New Device Integration

Ideal for Proof-of-Concept and New Device Integration

Ideal for Proof-of-Concept and New Device Integration

SASe IC & Module is the perfect platform for:

Why Choose SASe IC & Module?

SASe IC & Module embeds our advanced SASpuf technology

Unmatched Security

Unmatched Security

Combines PUF and TRNG for ultimate protection.

Versatility

Versatility

Supports a wide range of applications and use cases.

Compliance

Compliance

Compliance

Meets international security standards.

Customization

Customization

Customization

Highly customizable to meet your specific needs.

Join forces with us
for unmatched security with PUF Technology

Seamless Technology Integration

Seamless Integration

Discover how PUF technology can secure your data and the Internet of Things, providing a reliable solution tailored to your industry.

NYCU-IIST R&D Center

NYCU-IIST Joint research Focused on hardware security technology development

Enhance your systems' protection with PUF

Elevate your security effortlessly with PUF technology, where innovation meets unmatched protection

service@iist.com.tw

FAQ

For any questions, check our FAQ where we've compiled the most requested information.

What challenges are involved in enhanced device authentication?

What challenges are involved in enhanced device authentication?

What challenges are involved in enhanced device authentication?

What are the challenges of scalability in IoT secure deployments?

What are the challenges of scalability in IoT secure deployments?

What are the challenges of scalability in IoT secure deployments?

Why is secure key generation and storage important?

Why is secure key generation and storage important?

Why is secure key generation and storage important?

What is a true random number generator (TRNG) and why is it necessary?

What is a true random number generator (TRNG) and why is it necessary?

What is a true random number generator (TRNG) and why is it necessary?

How does resistance to cloning enhance security?

How does resistance to cloning enhance security?

How does resistance to cloning enhance security?

How can cost-effective security be achieved?

How can cost-effective security be achieved?

How can cost-effective security be achieved?