STMicroelectronics Highly Secure Encryption-Technology Platform for Device Security

STMicroelectronics and ClevX, an intellectual-property innovator and technology developer for portable storage and mobile device manufacturers, have announced the availability of a FIPS 140-2 Level 3 compliant Encryption Technology Platform reference design for security applications using commercial/ industrial-, rather than military-grade chips. The STM32 microcontroller-based platform will aid designers and manufacturers to design and build highly secure FIPS-compliant solutions suited for applications that require certified cryptographic functions. These application domains include consumer, corporate, and industrial applications in healthcare, home automation and security, secure-access control systems, and portable data storage.

“Using the STM32’s advanced security features helped ClevX fortify their secure portable-storage reference platform,” said Tony Keirouz, VP IoT Strategy, Security, and Microcontrollers, STMicroelectronics’ Americas Region. “With the reference platform’s quality independently proven through its FIPS 140-2 Level 3 certification, and the benefit of using high-quality commercialgrade products instead of military-grade ones, designers and manufacturers can meet their application’s security needs on time and on budget.”

The new ST/ ClevX reference design is based on the ClevX-patented DataLock/ DataLock BT technology platform for secure portable-storage media. The design uses ST’s ultra-low-power STM32 MCUs and Bluetooth® Low Energy chips (BlueNRG), along with both ST/ ClevXbased hardware, firmware and the related smartphone/ wearables app is immediately available for licensing and partnerships.

“With ever-increasing public and corporate requirements for privacy and security,” said Lev Bolotin, Founder/ CEO, ClevX, LLC, “The DataLock and DataLock® BT Security solutions use ST and ClevX technologies to allow designers and manufacturers to create and build cost-effective FIPS 140-2-compliant solutions that are simple to use while allowing legitimate operators to authenticate themselves to the devices and systems they need to use with FIPS compliant solutions.”

Leave a Comment