Secure Connection Manager

The system is equipped with a crypto element for secure device connectivity and data exchange through encrypted formats.

Secure Connection Manager

The system is equipped with a crypto element for secure device connectivity and data exchange through encrypted formats.

zerynth

Secure Connection

The crypto element securely manages credentials to ensure they are not readable by third parties.

zerynth

Blind authentication

Zerynth’s IoT devices are authenticated both on the cloud and on the device, guaranteeing secure and trusted communication between the two.

zerynth

Encrypted data

Data is exchanged in an encrypted format with a unique key for each connection, ensuring secure and private communication between devices and the intended recipients.

zerynth

Cloud authentication

Zerynth’s IoT devices are authenticated by the cloud using keys stored in the crypto element. Any other device cannot connect to the cloud to send data and thus simulate a Zerynth device. This solution helps to mitigate the risks of “man-in-the-middle” attacks and enhances the overall security of the system.

Device authentication

The device only receives data from the Zerynth cloud and cannot be contacted or manipulated by other systems. This solution reduces the risk of IoT device hacking, ensuring a higher level of security for the device.

zerynth
zerynth

Encrypted data

All data is exchanged in an encrypted format with a unique key for each connection. Private keys are never stored in the firmware of Edge devices or in the source code of our cloud platform. The private keys are generated by the manufacturer of the Crypto Element on the chip during production. We use the Crypto Element to store the network credentials of our devices, ensuring that they remain unreadable by third parties. This approach enhances the overall security of the system and mitigates the risk of unauthorized access to sensitive information.

zerynth

Secure Connection

The crypto element securely manages credentials to ensure they are not readable by third parties.

zerynth

Blind authentication

Zerynth’s IoT devices are authenticated both on the cloud and on the device, guaranteeing secure and trusted communication between the two.

zerynth

Encrypted data

Data is exchanged in an encrypted format with a unique key for each connection, ensuring secure and private communication between devices and the intended recipients.

zerynth

Cloud authentication

Zerynth’s IoT devices are authenticated by the cloud using keys stored in the crypto element. Any other device cannot connect to the cloud to send data and thus simulate a Zerynth device. This solution helps to mitigate the risks of “man-in-the-middle” attacks and enhances the overall security of the system.

zerynth

Device authentication

The device only receives data from the Zerynth cloud and cannot be contacted or manipulated by other systems. This solution reduces the risk of IoT device hacking, ensuring a higher level of security for the device.

zerynth

Encrypted data

All data is exchanged in an encrypted format with a unique key for each connection. Private keys are never stored in the firmware of Edge devices or in the source code of our cloud platform. The private keys are generated by the manufacturer of the Crypto Element on the chip during production. We use the Crypto Element to store the network credentials of our devices, ensuring that they remain unreadable by third parties. This approach enhances the overall security of the system and mitigates the risk of unauthorized access to sensitive information.

Main Features

1

Secure connection with Zerynth Platform Core.

2

Secure Element natively integrated.

3

Connectivity Stack based on TLS v1.2 e v1.3 standard protocols.

4

Data Encryption during the connection between Edge Device and Zerynth Platform.

5

idirectional Authentication and keys change based on ECDSA.

How Zerynth Platform works

The Secure Connection Manager is an integral part of the Zerynth Platform.
With its features, it enables secure device connectivity and ensures that data is sent and received only by authorized and recognized entities.

How Zerynth Platform works

The Secure Connection Manager is an integral part of the Zerynth Platform.
With its features, it enables secure device connectivity and ensures that data is sent and received only by authorized and recognized entities.