2025-09-09 *人氣 603*
CHANGING will participate in SEMICON Taiwan 2025 from September 10 to 12 at Taipei Nangang Exhibition Center, Hall 2, 1st floor (Booth Q5744). At the SECPAAS Security Pavilion, organized by the Industrial Technology Research Institute (ITRI), CHANGING will showcase the Ciot Security Solution, which provides comprehensive protection from key generation and device identity provisioning to the update phase. This helps manufacturers integrate cybersecurity controls at the early stages of product design, addressing both supply chain protection and international compliance challenges.
The global IoT device market is expanding rapidly. According to Transforma Insights, the number of active IoT devices worldwide is expected to reach 1.77 billion by the end of 2024 and exceed 4.06 billion by 2034 [Note 1]. More than one-third of corporate security incidents already involve IoT devices as either the initial entry point or part of the attack chain [Note 2]. Embedded systems—small devices powered by firmware and designed for specific functions—often operate with limited resources but remain exposed to highly connected environments, making security and management increasingly difficult.
“Security and compliance should not be burdens added after shipment, but rather fundamental requirements during the design and manufacturing stages,” said Mr. Chih-Cheng Chiu, Senior IoT Consultant at CHANGING.
Dual Protection Across Production and Operations — Security from the Start
The Ciot KMS (Key Management System), designed by CHANGING for both manufacturers and operators, efficiently manages large volumes of device-specific keys in production and operation environments. It integrates with multiple HSMs and MCU signing tools to execute key generation, signing, and storage. With Secure Boot verification to prevent firmware tampering, devices complete identity initialization and root of trust establishment before shipment. All processes comply with international standards such as FIPS 140-3 and IEC 62443, ensuring devices are security-ready across diverse application markets.

Image: The Ciot Security Solution provides end-to-end protection, from key provisioning at manufacturing to update validation during operations.
Full Lifecycle Control — From Device Identity to Operational Updates
After deployment, devices still face challenges such as license management, communication security, and identity updates. The Ciot CLM (Certificate Lifecycle Management) System automates certificate issuance, management, and revocation. Supporting the ACME protocol, it enables cloud and server environments to automatically request and renew certificates. Compatible with multiple Certificate Authorities, the system provides real-time visibility into certificate status through a web interface and offers RESTful APIs for flexible integration with existing IT/IoT infrastructures, making it suitable for cross-platform and multi-regional deployments.
From Chip to Cloud — Ciot Architecture Ready for Future Security Standards
The Ciot architecture is designed with flexibility to adopt Post-Quantum Cryptography (PQC) algorithms, supporting long-term trust and future standard transitions. Applicable to high-security domains such as smart homes, smart grids, automotive, industrial control, and healthcare, CHANGING will continue strengthening partnerships with chipmakers and device manufacturers to align with international regulations and expand its presence in high-security application markets. For more information, please visit: https://www.changingtec.com/EN/。
〔Note 1〕Global IoT connections forecast to rise above 40 billion in 2034
〔Note 2〕IoT Security Statistics 2025–26: Threats, Trends & Safeguards in a Connected World
CHANGING Booth: Q5744 (SECPAAS Security Pavilion)
Date: September 10 (Wed) – September 12 (Fri), 2025
Venue: Taipei Nangang Exhibition Center, Hall 2, 1F
SEMICON Taiwan 2025 - Event Map
https://www.changingtec.com/EN/iot_security.html
CHANGING – Marketing & PR Department
Tel: +886-3-563-0688
EMAIL: marcom@changingtec.com
CHANGING Information Technology Inc.
Committed to independent research and development, CHANGING strives to build a secure and convenient digital environment. Its core expertise lies in identity and authentication security for people, processes, and devices, including zero trust architecture, IoT security, FinTech cybersecurity, and digital transformation applications. With more than 25 years of professional experience, CHANGING's mission is to help various industries establish a trustworthy and secure zero trust network infrastructure. Through continuous innovation, it provides diverse products and services to meet the evolving needs of customers, working together to create a safer and more efficient digital ecosystem. In the digital age, CHANGING aims to be your most trusted partner.