NXP Semiconductors N.V. - Experts & Thought Leaders
Latest NXP Semiconductors N.V. news & announcements
Iris ID, the global pioneer in iris recognition technology, is showcasing its newest advancements in identity detection and authentication technology at ISC West 2024 in booth #28057. The company is emphasising its portfolio of multi-modal iris and facial recognition solutions that deliver the highest levels of non-invasive personal identification and authentication accuracy. The frictionless solutions are designed for a myriad of mainstream and critical infrastructure applications, as well as use in the most demanding environments found in highly volatile manufacturing, industrial and mining applications. Range of private and public users "Iris ID continues to push the ceiling for biometrics, bringing to market the most accurate and versatile iris and face recognition solutions for personal identity detection and authentication. With solutions designed to fulfil both mainstream and specialised applications, our proven biometrics solutions stand out in the industry for their ability to accurately authenticate individuals even in the most demanding applications, including through hazmat suits, safety goggles, and even with worn-down fingerprints," said Mohammed Murad, Vice President, Iris ID. “This coupled with our unparalleled deployment success has generated demand from a wide range of private and public users, and we’re excited to share these innovations and use cases with ISC West attendees.” Product portfolio and solutions Iris ID is showcasing its full product portfolio and solutions that are currently used across several verticals Iris ID's solutions excel in high-security settings like power plants, data centres, airports and labs, meeting the growing needs of government agencies on both local and global scales. Particularly noteworthy is Iris ID's expanding influence on law enforcement and border applications following its integration into the FBI’s Next Generation Identification (NGI) Iris Service in 2020. At ISC West, Iris ID is showcasing its full product portfolio and solutions that are currently used across several verticals. Additionally, they are proud to debut a new iris and face fusion device for the access control and time and attendance industries. Cutting-edge biometric solutions “Our journey of innovation has culminated in our iris biometric technology becoming the first to attain certification for SIA OSDP version 2,” added Murad. "This significant achievement, combined with longstanding partnerships with industry pioneers such as HID and NXP, underscores our unwavering commitment to advancing heightened security with personal privacy protection using our cutting-edge biometric solutions." Iris ID continues to lead the identity and security sector by further evolving its iris recognition technology to deliver seamless compatibility, broader compliance, web-based functionality, and long-distance operation.
Axis Communications announced plans to expand the number of network physical security products certified to FIPS 140 under the Federal Information Processing Standards. This move will improve the cybersecurity postures of Axis customers that must meet the FIPS 140 certification, specifically in the government and critical infrastructure sectors. FIPS are widely recognised as state-of-the-art security standards issued by the National Institute of Standards & Technology (NIST) for the U.S. and Canada, and consequently also serve as a purchasing guideline across the private sector. Validating the security level in Axis devices During 2024, Axis will introduce new FIPS-compliant cryptographic hardware and software modules for its devices. The FIPS 140 standard specifies the security requirements of hardware and software modules needed to ensure the confidentiality and integrity of data. By complying with the standard, Axis provides assurance to customers about the security level in Axis devices. Axis provides assurance to customers about the security level in Axis devices Axis will launch the first devices outfitted with NXP® Semiconductors’ EdgeLock® SE052F secure element, a new FIPS 140-3 Level 3-certified hardware cryptographic computing module, in Q3 2024. By adhering to the latest standard in hardware device security, Axis devices will have even more sophisticated, built-in protection for sensitive data like cryptographic keys that are used to secure network traffic. FIPS 140-2 Level 1 certification The upcoming release of the Axis operating system, AXIS OS 12 will also include a cryptographic software module that provides FIPS 140-2 Level 1 certification for more than 150 Axis network devices. This certification ensures only approved, high-security cryptographic algorithms are used to secure HTTPS, IEEE 802.1X and other TLS-based connections. This meets the base cryptographic requirements for FIPS 140-regulated customers. AXIS OS 12 will also include a cryptographic software module that provides FIPS 140-2 Level 1 certification “Customers need to be confident that Axis devices ensure long-term cybersecurity and meet the latest requirements such as FIPS 140-compliance,” said Johan Paulsson, Chief Technology Officer, Axis Communications, adding “By collaborating with experts in hardware security, such as NXP, we can together provide our customers with cutting-edge cybersecurity features, as well as adapt to well-known and relevant cryptography standards and technologies. Axis’ approach to cybersecurity is to provide device protection throughout the device lifecycle, from start to beyond the point of purchase. Through AXIS OS software updates, customers can benefit from newly introduced features and improved protection throughout the device’s lifetime.” Long-term collaboration to empower device security Axis, as NXP’s EdgeLock SE052F lead customer, is the first manufacturer within the physical security industry engaging with the recently launched secure element, to be showcased at Embedded World. Axis has been collaborating with NXP since 2019 to support the secure operations of innovative Axis solutions. As a world pioneer in secure connectivity solutions for embedded applications, NXP is known for its trusted security solutions, including securing smartphones and passports, and Axis is leveraging the same solution for its network devices. Axis has been uniting with NXP since 2019 to support the secure operations of creative Axis solutions “Collaboration is one of the cornerstones of an effective cybersecurity strategy and is the key to delivering robust cybersecurity solutions,” said Alasdair Ross, Senior Director, NFC IoT Security at NXP Semiconductors, adding “Collaboration with companies such as Axis has enabled us to leverage best-in-class technology to develop innovations that tackle today’s security challenges head-on. The launch of the new SE052F secure element this year represents the next level of protection at the edge, helping our customers to keep their valuable data safe.” Improving customers’ cybersecurity postures Axis’ long-term commitment to industry standards and support for FIPS 140-certified solutions, are key to its Axis Edge Vault cybersecurity platform, which supports a multi-layered approach to security for edge devices. FIPS 140 compliance will consequently no longer be limited to Axis’ most advanced product lines. Customers will have broader access to Axis’ wide product offering, covering use cases within video surveillance, analytics, access control, intercom, and audio systems. Providing FIPS 140 compliance gives both FIPS and non-FIPS-regulated organisations the confidence that their system and devices are both interoperable and meets long-term security requirements.
The Connectivity Standards Alliance ("Alliance") Product Security Working Group is pleased to announce the release of their IoT (Internet of Things) Device Security Specification 1.0, with the accompanying certification program, and Product Security Verified Mark. This groundbreaking initiative aims to establish a unified IoT cybersecurity standard and certification program, providing manufacturers with a one-stop solution to certify their devices, enabling them to comply with multiple international regulations and standards more easily. Diverse international regulations "The unveiling of the IoT Device Security Specification 1.0, alongside its certification program and the Product Security Verified Mark, signals an important milestone in bolstering IoT security and building confidence with consumers," said Tobin Richardson, Alliance President & CEO of the Connectivity Standards Alliance. "By bringing together diverse international regulations into a cohesive specification, the Product Security Certification Program streamlines the process, reduces redundancy, and provides manufacturers with a singular, respected avenue for certifying their devices globally." IoT Cybersecurity baselines The Product Security Working Group aims to meet this challenge by consolidating requirements With the increasing adoption of consumer IoT devices, there is a heightened emphasis on security due to a rise in incidents involving breaches and malicious device hijackings. The Product Security Working Group aims to meet this challenge by consolidating requirements from the three most popular IoT Cybersecurity baselines from the United States, Singapore, and Europe into a single specification and certification program. This unifying effort helps manufacturers more easily and efficiently address these regulatory regimes' requirements aiming to instil confidence in consumers and regulators. Value of IoT devices "As consumers embrace the convenience and value of IoT devices, the Alliance is dedicated to helping to create more comprehensive protection for consumers. This initiative aims to establish a robust baseline for all consumer IoT devices," said Steve Hanna of Infineon Technologies AG and Chair of the Product Security Working Group Steering Committee. "The Alliance's Product Security Verified Mark and IoT Device Security Specification 1.0 will make it easier for manufacturers to address consumer IoT security requirements around the world." IoT Device Security Specification 1.0 requirements The Product Security's IoT Device Security Specification includes dozens of specific device security provisions. IoT Device Manufacturers must demonstrate compliance with those provisions, supplying justifications and evidence to an Authorised Test Laboratory with expertise in security evaluation and experience certifying products relative to this specification. Highlights of the specific requirements include: Unique identity for each IoT Device No hardcoded default passwords Secure storage of sensitive data on the Device Secure communications of security-relevant information Secure software updates throughout the support period Secure development process, including vulnerability management Public documentation regarding security, including the support period Driving requirements and specification These units spearheaded the process by driving needs and specification action Nearly 200 member companies — including Amazon, Arm, Comcast, Google, Infineon Technologies AG, NXP Semiconductors, Schneider Electric, Signify (Philips Hue and WiZ), and Silicon Labs — have collaborated, pooling related technologies, expertise, and innovations enabling the IoT Device Security Specification 1.0, the accompanying certification program, and Product Security Verified Mark to meet the diverse needs of stakeholders, including consumers, device manufacturers, and regulators. Together, these companies spearheaded the process by driving requirements and specification development and ultimately helping validate the final specification. The Product Security Certification Program and Verified Mark Product Security Verified Mark is proof a product meets the specification's security needs Encompassing a broad spectrum of smart home devices such as light bulbs, switches, thermostats, doorbell cameras, and more, the Product Security Certification Program establishes minimum requirements for IoT devices. By consolidating several international regulations into a single set of requirements, the Certification Program streamlines the process, helping manufacturers meet certification criteria from multiple countries or regions with a single evaluation. The Product Security Verified Mark is confirmation a product meets the specification's security requirements, with the goal of inspiring consumer confidence. When displayed prominently on certified product packaging, store signage, and online platforms, this Verified Mark builds trust by serving as a marker for secure IoT devices. A printed URL, hyperlink, QR code, or a combination of these representations on the Product Security Verified Mark gives consumers access to more information about the device's security features. Looking ahead As technology advances and new threats emerge, the Product Security Working Group remains committed to continuously enhancing the IoT Security Device Specification and the accompanying certification program. To learn more about how to be a part of the next generation of the IoT, visit here and become a Member of the Connectivity Standards Alliance.
Insights & Opinions from thought leaders at NXP Semiconductors N.V.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimetres. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focusses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organisation. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localise devices and objects to 10 centimetres of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilised by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
In the state of the residential security market today, we see many who are offering home security packages that rely on numerous sensors and multiple devices to provide a comprehensive coverage of the home and provide peace of mind. Each individual sensor or device within the package provides a specific functionality, and the user finds himself burdened by an overwhelming amount of sensors and devices. This overload is intensified by the penetration of additional IoT and smart devices into the home, such as pet-cams or smart speakers that add to the burden of installation and maintenance. In addition, we are witnessing the rise in popularity of DIY security devices, indicating that users are looking for models and technologies that provide both contract flexibility and simplicity of use. The past years have seen major advancements in radar technology, which have brought the formerly military technology into the consumer space. Radars provide interesting prospects for home security and smart homes due to several inherent characteristics which give it an advantage over existing technologies. The resolution of an advanced radar sensor enables not only presence detection, but also provides advanced features for security, automation and well-being Advanced security and automation features Of primary importance, a consumer designed radar sensor provides the user with full privacy, but the use of radar is also beneficial because it is indifferent to environmental, temperature and lighting conditions. In addition, radar signals (at certain frequencies) are capable of penetrating through almost any type of material, enabling concealed installation, robust monitoring in cluttered spaces and even the coverage of several separate rooms with only one device. In terms of capabilities, simple time of flight 2-antenna radar sensors, which have been around for a while, do not provide much additional value in comparison to existing solutions and are not necessarily competitive in terms of pricing. However, the new generation of radar sensors are also opening up new capabilities previously achieved with optics only. Today, the resolution of an advanced radar sensor is high enough to enable not only presence detection, but also to provide advanced features for security, automation and well-being, all in one. Imagine for example, that the security sensor installed in your elderly parent’s home could also detect a fall having occurred, monitor the breathing of a baby or even leaks in your wall. Due to the unique field of view that radar provides as well as the multi-functional potential, this technology will be the key to the awaited convergence of smart home functionalities and minimisation of home devices. The security sensor installed in your elderly parent’s home could also detect a fall having occurred Secret of the consumer radar A radar sensor’s accuracy and its ability to support wide functionality and applications is determined initially by its resolution, which is based on two key factors: bandwidth and number of channels. The wider the bandwidth and the more channels the radar supports, the more accurate the data received. Imagine the difference between a 1990s television model and a 4K 2018 television model - As the resolution is ever improving, the sharper and more detailed is the image. When looking at the short-range radar sensor market, prominent companies such as Texas Instruments and NXP are offering radar-on-chip solutions supporting 2\3 transmitters (Tx) and 3\4 receivers (Rx), mainly utilising frequency bands of 77-81GHz, as they target mostly automotive and autonomous driving applications. Another company that develops such radar-on-chip solution is Vayyar Imaging, an Israeli start-up, founded in 2011, that developed a radar sensor for 3D imaging. Vayyar Imaging directly targets the smart home and security markets with its radar-on-chip, developing modules and products for intruder detection, automation and elderly care (fall detection). Providing not only chips, but complete systems, the new model makes radar technology highly available and accessible. The radar-on-chip technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue Radar-on-chip solution The radar-on-chip solution supports 72 full transceivers, an integrated DSP and radar bands between 3-81GHz. The resolution provided by this type of specification is high enough to provide subtle information about people’s real time location posture (lying down\falling\sitting\walking), and breathing, and enables to classify pets from humans, but it is low enough as to not compromise privacy. This type of technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue, such as in bathrooms or heavily lit environments. Moreover, utilisation of this technology allows to dramatically minimise the numbers of sensors installed in the home, as it provides full home coverage with just one or two sensors and enables using the same HW to support additional capabilities such as breath monitoring, fall detection and highly accurate automation. Using AI and machine learning, the data derived by these sensors can be leveraged to provide smarter, verified alerts on the one hand and whole new insights on the on the other. The sensor can be tuned to learn the location of the house entrances or boundaries, where the inhabitants are expected to be at night, or where they should be expected to enter from into the home, adding new logics to the traditional yes\no decision making. Home security is widely regarded as a necessity, provides peace of mind to people and is integral to people's day to day lives Additional smart home services Among the evolving home technology verticals, security is by far the most relevant and integral to people’s day to day lives. Home security is widely regarded as a necessity and provides peace of mind to people. Being a legacy industry with many well-known and well-trusted brands, security players are well positioned to introduce new technology into the home and have the ability and credibility to expand their offerings to additional smart home services by utilising existing infrastructure and channels. With technology giants entering the security arena through the smart home door the DIY security solution market expected to explode with a CAGR of 22.4% (according to a report by Persistence Market Research). Now that new pricing and service models offer minimal commitment, traditional security players will need to step up. Security companies will need to explore new technologies and expand their offering if they intend to stay relevant and competitive in a market trending on functionality converge and minimisation of maintenance and installation costs.
Foot traffic remained at respectable levels during Day Two of IFSEC International 2016 at ExCeL London. Attendees are bombarded with sensory overload as manufacturers look for new ways to stand out from the crowd. The result sometimes seems more like a lot of noise. Everyone is looking for ways to stand out from the noise of competing product features and claims at the show. One exhibitor, Tyco Security Products, is taking a different approach at this year's show, abandoning traditional emphasis on individual products and opting instead to focus on customer solutions targeted to end users. Tyco Security Products’ end-user targeted solutions Peter Ainsworth, Tyco Security Products' Director of Marketing for Europe, Middle East and Africa (EMEA), says everything at the Tyco stand -- from the layout to collateral material -- is built around the need to answer "so-what" questions from customers. "They want to know how we can save them money and make their lives better," says Ainsworth. A single brochure provides the "ultimate takeaway" for Tyco's visitors at this year's show; the "augmented reality" brochure has images that can be scanned with a smartphone to provide additional information, data sheets, etc. Tyco Security Products is also giving away a "magic cube" that can be configured as a cube showing Tyco's product lines, and then reconfigured into a multi-sided "star" shape that depicts various vertical market applications. There are "trigger points" on the cube that can be scanned using a smartphone app to provide additional information for potential customers, including videos. The design of both the brochure and the cube emphasise the message that Tyco Security Products understands customers' businesses. "This is where we see our product fitting within your establishment," says Ainsworth. "We take them through the journey at our stand." The brochure depicts the same journey and "helps the end customer understand what we can do for them," he adds. "It's not about intrusion, access or video, but about the total solution." "At a trade show like IFSEC, we are one of hundreds of stands," says Ainsworth. "We want something that people will remember us for. It's different and innovative, and reflects who we are as an organisation." TDSi Gardis access control "At a trade show like IFSEC, weare one of hundreds of stands.We want something that peoplewill remember us for. It's differentand innovative. It's not aboutintrusion, access or video, butabout the total solution" In addition to getting customers' attention, some manufacturers have other agendas. Gathering feedback for product development is another way exhibitors can get the most out of IFSEC. For example, TDSi is previewing its new Gardis access control platform at IFSEC, including all-new, intuitive software that is easier to navigate, and a new hardware controller, both conformant to ONVIF Profiles A and C. Two years in development, the system will be easier to integrate with third party systems, using a REST-based application programming protocol (API). The new TDSi products are six months or so away from launch, and TDSi is using the IFSEC show to get feedback about changes customers might like to see as the software is fine-tuned; then it will undergo extensive field trials in the next several months. Getting feedback from potential customers is an invaluable tool for TDSi's development engineers, and IFSEC is an ideal venue to provide the feedback. "We can do an awful lot in three days that would take us weeks driving around in a car or flying around," says John Davies, TDSi's Managing Director. "It's a cost-effective way to achieve the same thing. Also, every year at the show we dig up a couple of projects that pay for the stand. This year we met with a customer that has 900 sites. We're in the early stages of talking with them about the new platform." IFSEC 2016 provides a first look at the new TDSi technology, which Davies says the company will introduce to the U.S. market by 2017, likely as a hardware component of an OEM partner's access control system. The open, ONVIF-conformant strategy makes it possible. TDSi has not been active in the U.S. market for 10 years or more; developing the open-architecture product is a favourable alternative to entering the large market with an older, "me too" product, says Davies. HID Global Seos and Mobile Access solution Also at the show, HID Global introduced new high-definition direct-to-card printers, and showed its HID Mobile Access solution, powered by Seos. The company also emphasised integration of its Seos mobile credentialing system with time and attendance, fleet management and hand-held devices. There is a related managed services offering. A lot of buzz has surrounded Seos since it came on the market in September 2014, and currently there are several hundred mobile access systems installed worldwide, including hundreds of thousands of mobile identities in use in Western Europe and the United States. There have been several notable installations in the United States, especially among colleges and universities. HID Global is currently in the process of building out a "global wallet" in cooperation with chip manufacturer NXP, which is preloading its computer chips with Seos, usable for many applications beyond physical access control. At IFSEC, HID Global announced it has been selected by Vodafone Italy to modernise the company's physical access control system by providing a group of employees a mobile access solution across multiple sites and applications at the Vodafone Village in Milan.
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download