Using identities to scale up your IoT products & projects.
Use digital identities...
Robust device protection as a foundation
KEYNOA was developed to simplify IT security in the IoT. Unique identities are a fundamental requirement for numerous security mechanisms. We empower manufacturers to implement identities securely and leverage them effectively for digital services.
...Along the value chain...
Trust at the Heart of the Supply Chain
To ensure device integrity in the value chain, it must be ensured that only authorized persons can access the device. Therefore, ownership of the device must be transferred. Our innvoative technology uses this feature to enable efficient and precise configuration of device fleets.
...to scale the onboarding.
Automatic onboarding as a Catalyst
Zero-touch provisioning is a game-changer in industrial projects, enabling efficient and automated device deployment without the need for on-site manual intervention. This approach accelerates implementation, minimizes error risks, and ensures seamless integration of new devices into existing infrastructures.
KEYNOA - How it works!
One process to build trust across the entire value chain, unlocking numerous opportunities throughout.
Manufacturer produces device with unique identity and creates proof of ownership.
The manufacturer transfers the proof of ownership via KENYOA and ships the device to the customer.
The integrator or operator uses the proof of ownership to centrally configure all devices.
A person who does not need to be trusted installs and activates the device.
The device submits its identity to KEYNOA.
KEYNOA authenticates the device and grants authorization for secure information exchange.
The device downloads secrets and files from KEYNOA and automatically configures itself based on the previously defined specifications.
The components of KEYNOA
One process to establish trust across the entire value chain, unlocking multiple opportunities throughout.
Engine
- Is installed on the device as a client.
- Can be implemented in firmware or as an operating system process.It can be implemented in firmware or as an operating system process.
- It queries KEYNOA instances to initiate automatic provisioning.
- Compatible with TPM for robust protection of the private key.
Producer Service
- It is preferably integrated during the device manufacturer's production process.
- Signs the device.
- Generates a certificate that validates ownership of the device.
- Handles the assignment to customers.
- Effortless integration with order picking systems.
KEYNOA
- Receipt and transfer of ownership proofs generated by the Producer Service throughout the supply chain.
- It can be installed as software on your own servers (on-premises) or in the cloud. As a SaaS solution, DEVITY handles the entire hosting.
- KEYNOA verifies the device's identity and provides it with information about which entities are trusted.
- After mutual authentication, a secure channel is established between the device and the server, through which the data required for onboarding automation (e.g., files and scripts) is transmitted to the device.
Powerful features for efficient processes
Automated onboarding
KEYNOA automatically identifies new devices when powered on and assigns the necessary software and configurations.
Certificate and identity management
KEYNOA enables automated management of digital identities throughout the entire device lifecycle.
Compatibility with third-party systems
KEYNOA enables seamless integration with IoT clouds, user management systems, and update management platforms.
Central Administration
KEYNOA provides location-independent, centralized management of device configurations, whether there are 5 or 10,000 devices.
Start quickly - scale flexibly.
We guarantee reliability, trust, and stability at every stage of our collaboration.
Eval-Kit
Discover the benefits of automated deployment processes. We will provide you with the KEYNOA Engine, a suitable device, and our KEYNOA backend free of charge for four weeks.
Co-Innovation
Launch the next phase of your IoT project. Together, we will enhance IT security and efficiency in just a few weeks. You’ll receive your own KEYNOA backend along with personalized consulting and development services.
Request a pilot projectSeamless Integration
KEYNOA integrates seamlessly into your system landscape. Leverage our expertise in developing sustainable IT security concepts and zero-touch solutions across the value chain.
Get in touch
Would you like to book a demo or have additional questions? Schedule a session with our CEO to learn how DEVITY enhances the security and scalability of infrastructures and projects.