Security Devices

Our technology currenlty supports the U.S. Dept of Defense (DoD)

Our patented design solves several challenges faced by today's devices.

Unlimited Entropy Pool

Unique Device Authentication based on inherent signatures  

Radiation Hardened, Low Power, Low Cost

Cyber-Security
?u=https%3A%2F%2Fupload.wikimedia.org%2Fwikipedia%2Fcommons%2Fthumb%2F3%2F36%2FNorthrop_Grumman_logo_blue-on-clear_2020.svg%2F1200px-Northrop_Grumman_logo_blue-on-clear_2020.svg.png&f=1&nofb=1
XQ
?u=https%3A%2F%2Ftse1.mm.bing.net%2Fth%3Fid%3DOIP.ikXOdnBab5ao0XV4cTfClQAAAA%26pid%3DApi&f=1
?u=https%3A%2F%2Ftse3.mm.bing.net%2Fth%3Fid%3DOIP.OzvdlkiIUAGHhKB2dwBh4gAAAA%26pid%3DApi&f=1
url?sa=i&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FFile%3AASML_Holding_N.V._logo.svg&psig=AOvVaw3owy4txF6OE9x99CCU8Tx-&ust=1673999079479000&source=images&cd=vfe&ved=0CA8QjhxqFwoTCODyydWizfwCFQAAAAAdAAAAABAE
2880px-ASML_Holding_N.V._logo.svg.png?20161211005347
?u=https%3A%2F%2Ftse1.mm.bing.net%2Fth%3Fid%3DOIP.ckw8DE7fU6PSjKLufHna-gAAAA%26pid%3DApi&f=1
?u=https%3A%2F%2Ftse2.mm.bing.net%2Fth%3Fid%3DOIP.iFSbcn9hjsetC4HYq0eQ5QAAAA%26pid%3DApi&f=1

Quick Facts

Unique Chip Identification

Our battle tested system is used in the hostile DoD environments. We are able to track individual chips through the supply chain and in fielded use. Our patented device identification method scales easily, compliments other existing technologies, and is perfect for IoT devices.

 

 

Radiation Hardened

Radiation Hardened- why is it important?

If we want to work with Elon Musk and SpaceX, we better be prepared to make components that can survive hostile environments. For now, we feel accomplished actively supporting low orbit devices... but we can dream.

Supply Chain 

The root of trust the is singularity from which all security is built.

Our devices are designed with an inherent "Root of Trust", which is necessary for implementing a "chain of custody" and true provenance tracking.

Quantum Secure 

The point of Quantum Encryption is to protect data from Quantum Computers able to decode encryption we all use today. Standard encryption is vulnerable because everything is based on mathematical processes. To increase security, we have always increased the complexity of the encryption. Quantum Computers can out perform the complexity, so new encryption sources and schemes are needed. SecureFoundry has taken a different path and it has made all the difference.

Extreme Low Power

Low power consumption is great for many reasons.

  • Extends component longevity
  • Helps Prevent Physical Attacks (Side Channel)

Our current system uses nanomps (nA) to execute operations on the chip. Any signature created hides in the noise of electricity. Not only is the electrical signal of the device obfuscated, we also have quantum encryption to protect data as it leaves the system.

Unlimited Entropy Pool (NIST Approved)

In computing, a hardware random number generator or true random number generator is a device that generates random numbers from a physical process, rather than by means of an algorithm. Our processes are, in theory, completely unpredictable, and the processes assertions of unpredictability are measured in entropy. Cheap IoT devices has a significantly limited "pool" of available entropy, which hurts their ability to encrypt. Depending on how much encryption is occurring a large pool is needed. Ours is unlimited.

5g-changing-birmingham-in-real-time-1920x1080-1.jpg

SecureFoundry selected to support Indiana's 5G Zone with Quanutm Encryption

Indiana will launch a new 5G hub to drive the testing and development of 5G-enabled technologies and assist businesses and innovators by propelling research and development with faster speeds, lower data latency and increased reliability.

As one of only two metro areas in the U.S. selected for the launch of both AT&T and Verizon 5G broadband networks, Indiana’s capital city is uniquely positioned to be at the center of global advancements and growth in 5G.