Using identities to scale up your IoT products & projects.

Use digital identities...
Robust device protection as a foundation.
KEYNOA simplifies IT security in the IoT. Unique identities are a fundamental requirement for numerous security mechanisms. We empower manufacturers to securely implement these identities and leverage them effectively for digital services.

...Along the value chain...
Trust at the heart of the supply chain.
Ensuring device integrity within the value chain requires access control, allowing only authorized individuals to interact with the device. Ownership transfer of the device is crucial for this process. KEYNOA enables efficient and precise configuration of entire device fleets, fostering trust across the supply chain.

...to scale the onboarding.
Automatic onboarding as a catalyst.
Zero-touch provisioning revolutionizes industrial projects by enabling efficient device deployment without on-site manual intervention. This approach accelerates implementation, reduce error risks, and ensures seamless integration of new devices into existing infrastructures.

KEYNOA - How it works!
A single process to build trust across the entire value chain, unlocking numerous opportunities throughout.

The manufacturer produces the device with a unique identity and generates proof of ownership.
The manufacturer transfers the proof of ownership via KEYNOA and ships the device to the customer.
The integrator or operator uses the proof of ownership to centrally configure all devices.
A person who does not have to be trustworthy installs and starts the device.
The device registers its identity with KEYNOA.
KEYNOA authenticates the device and authorizes the exchange of information via a secure channel.
The device downloads secrets and files from KEYNOA and performs an automatic configuration according to the previously defined specifications.
The components of KEYNOA.
One process to establish trust across the entire value chain, unlocking multiple opportunities throughout.
Engine
- Is installed on the device as a client.
- Can be integrated into firmware or as an operating system process.
- It queries KEYNOA instances to initiate automatic provisioning.
- Compatible with TPM for robust protection of the private key.
Producer Service
- Ideally integrated during the device manufacturing process.
- Signs the device.
- Generates a certificate that validates ownership of the device.
- Handles the assignment to customers.
- Effortless integration with order picking systems.
KEYNOA
- Receipt and transfer of ownership proofs generated by the Producer Service throughout the supply chain.
- It can be installed as software on your own servers (on-premises) or in the cloud. As a SaaS solution, DEVITY handles the entire hosting.
- KEYNOA verifies the device's identity and provides it with information about which entities are trusted.
- After mutual authentication, a secure channel is established between the device and the server, through which the data required for onboarding automation (e.g., files and scripts) is transmitted to the device.
Powerful features for efficient processes
Automated onboarding
KEYNOA automatically identifies new devices when powered on and assigns the necessary software and configurations.
Certificate and identity management
KEYNOA enables automated management of digital identities throughout the entire device lifecycle.
Compatibility with third-party systems
KEYNOA enables seamless integration with IoT clouds, user management systems, and update management platforms.
Central Administration
KEYNOA provides location-independent, centralized management of device configurations, whether there are 5 or 10,000 devices.
Start quickly - Scale flexibility
We guarantee reliability, trust, and stability at every stage of our collaboration.
Eval-Kit
Discover the benefits of automated deployment processes. We will provide you with the KEYNOA Engine, a suitable device, and our KEYNOA backend free of charge for four weeks.
Co-Innovation
Launch the next phase of your IoT project. Together, we will enhance IT security and efficiency in just a few weeks. You’ll receive your own KEYNOA backend along with personalized consulting and development services.
Request a pilot projectSeamless Integration
KEYNOA integrates seamlessly into your system landscape. Benefit from our expertise in developing sustainable IT security concepts and zero-touch solutions across the value chain.
Get in touch.
Want to book a demo or have questions? Schedule a session with our CEO to learn how DEVITY can enhance the security and scalability of your infrastructure and projects.
