Lifecycle System

Manage Device Identity Throughout

Certificate Lifecycle Management Platform

Bind unique IDs with PKI certificates to manage the device lifecycle. From manufacturing and deployment to operation and decommissioning, ensure identity verification and security at each stage. Centralized management allows clear and transparent monitoring of device status and activity. Easily revoke one or millions of certificates in case of incidents or mass decommissioning.

Lifecycle System Steps

Secure Device Certificate Deployment

Automate registration, updates, and configuration for large numbers of devices. Use IoT-specific workflows like EST, CMPv2, SCEP, and batch issuance to ensure unique and secure device identities. Enhance large-scale device management and operations.

Bidirectional Authentication and TLS Secure Channel

Use device certificates for bidirectional authentication. Verify the validity of each certificate. Connect devices via Bluetooth, WiFi, WANGOX, or NBT to create an encrypted secure channel for data transmission. Ensure data privacy, integrity, and reliability, meeting international standards.

TLS Secure Channel

Secure OTA (Over-The-Air) Updates

Push software or system updates to devices over the network. During the OTA upgrade, devices do not need to connect to a computer or use a USB cable. Updates are received and installed automatically via the network, allowing for quick and easy updates. This reduces maintenance costs for users and service providers.

Secure OTA Connections

OTA upgrade services use comprehensive security mechanisms, including Transport Layer Security (TLS) for mutual authentication. The OTA server manages and delivers update traffic, with each HTTP or MQTT message authenticated and authorized. Firmware can also be digitally signed before OTA updates to ensure its source is reliable and untampered.

OTA Security

Device Certificate Monitoring

  • Status Monitoring: Track device health, connectivity, and uptime in real-time.

  • Event Monitoring: Detect and log events such as alarms, errors, and faults for timely response and action.

  • Proactive Monitoring: Actively monitor devices rather than passively waiting for alerts or events.

Device Monitoring

Connect with Our Sales Team