Safety Certification and Security

  • Where did that software come from?

    Where did that software come from?

    Where did the software on your embedded system come from? Can you prove it? Can you safely update systems in the field? Cryptography provides the tools for verifying the integrity and provenance of software and data. There is a process as to how users can verify the source of software, if it was tampered with in transit, and if it was modified after installation.

Close

Subscribe to Safety Certification and Security updates