Multilayer protection for your applicationCyber Security provides the foundation for protection against multi-layered intrusion attempts. From protecting the running application from attacks in real time via CAN or Ethernet, to protecting the code base in flash memory from being read or data manipulated. To provide sufficient security, modern applications must be secured at multiple levels. | The difference in productionProMik offers extensive knowledge to support the implementation of cyber security standards in production. The implementation of cyber security in production brings with it many challenges. Among them is the secure handling of serial numbers and keys during the production process. On the other hand, know-how about on-chip security mechanisms is required, such as password protection or the setting of blocking bits. |
Stronger networking, additional interfaces and functionalities also increase the attractiveness of an attack on vehicles and the connected infrastructure by hackers with different motivations.
The increasing degree of automation also makes it necessary to protect corresponding vehicle functions against manipulation through security measures. In order to be able to meet customer demands for networking and functionality in the digital age, appropriate security concepts are needed that offer sufficient overarching protection for the vehicles, connected backend systems and customer terminals.
The interface for transferring production and security data
from the OEM to the production facility of Tier 1 is in many cases represented
by a manufacturing execution system (4). Via this communication path, ECU-specific data can be
transferred to the corresponding database at the OEM (6), as well as security-relevant data, for example, from a key management system (5).
If key provisioning, i.e. the generation of keys, takes place at Tier1, these can also be transferred to the back-end of the OEM. Alternatively, the security information can also be transferred directly, without an intermediate MES, using the OEM-specific communication interface.
Consulting & implementation of customer-specific cyber security requirements
Secure OEM back-end connection via encrypted communication
Encryption & decryption of the application software via MES, programmer and bootloader
Mastering encryption methods like PGP, AES, RSA and „Elliptic Curve Algorithmen"
Hardware for cyber security relevant applications
Device reprogramming with active security functions via fieldbus interfaces e.g. software updates
Protect modern applications during production with ProMik's cyber security expertise. Draw on our years of industry experience and implement state-of-the-art security mechanisms in production. With ProMik solutions, you can easily get software, keys, certificates or artefacts securely onto your ECUs.
PortfolioSecurity for production | Consulting The implementation of cyber security mechanisms in production involves various tasks. It should be emphasised that a profound knowledge of the microcontroller architecture is necessary to protect control units against manipulation, data theft and cyberattacks. ProMik actively supports its customers at this point with solutions for production concepts and their implementation. In doing so, ProMik implements the individual customer requirements taking into account the current cyber security standards. From the determination of the security concept in the production environment to the creation of the protection concept on the application, ProMik advises along the entire value chain in order to successfully implement the demands made by OEMs on the topic of security in production. Implementation When implementing cyber security in production, the customer benefit lies in ProMik's many years of industry experience. Through its market leadership in the development of programming solutions and bootloaders, ProMik gained in-depth security expertise at an early stage, as the microcontroller's security mechanisms have a major impact on programming, and built up comprehensive technology knowledge of secure booting, hardware security modules and SHE/SHE+ modules, as well as strong key management. Plug & Play Cyber Security solutions from ProMik guarantee easy integration in production and implement them according to customer-specific requirements, taking into account the relevant automotive standards. |
Key management server
| Programming of
| On-chip security feature
|