
Steps to implement KEYNOA.
1. Compatibility Assessment
In the first step, our embedded team evaluates compatibility with your existing device software. Thanks to its flexible architecture and support for common standards, the KEYNOA Engine ensures smooth adaptation and seamless interoperability.
2. Integration
Next, we integrate the KEYNOA Engine and demonstrate its interaction with your device. If a Trusted Platform Module (TPM) is already in place, we showcase the secure storage and management of cryptographic keys and certificates.
3. Production
During production, each device is assigned a unique, cryptographically bound identity that certifies its integrity within the supply chain. This identity forms the foundation for automatic provisioning. For this process, DEVITY offers the Producer Service.

The components of KEYNOA.
Engine
- Is installed on the device as a client.
- It can be implemented in firmware or as an operating system process.
- It queries KEYNOA instances to initiate automatic provisioning.
- Compatible with TPM for robust protection of the private key.
Producer Service
- It is preferably integrated during the device manufacturer's production process.
- Signs the device.
- Generates a certificate that validates ownership of the device.
- Handles the assignment to customers.
- Effortless integration with order picking systems.
KEYNOA
- Receipt and transfer of ownership proofs generated by the Producer Service throughout the supply chain.
- It can be installed as software on your own servers (on-premises) or in the cloud. As a SaaS solution, DEVITY handles the entire hosting.
- KEYNOA verifies the device's identity and provides it with information about which entities are trusted.
- After mutual authentication, a secure channel is established between the device and the server, through which the data necessary for onboarding automation (e.g., files and scripts) is transmitted to the device.
Your added value through KEYNOA.
By using KEYNOA, you unlock the following benefits:
Onboarding
Instant provisioning of thousands of devices.
Cost Efficiency
Optimizing operational and maintenance costs of devices.
IT security
Ensures integrity and confidentiality throughout the device lifecycle.
KEYNOA in action.

Initial situation
Numerous manual steps are required to install sensors in large-scale systems
A sensor manufacturer faced challenges with extensive manual steps to install sensors in large-scale systems. The goal was to enhance device functionality through centralized configuration management while securely utilizing the latest industrial protocols.
Solution
IT security for intelligent sensors
During production, each sensor is assigned a unique, cryptographically bound identity. These identities are transferred directly to the customer via the Producer Service, enabling IT administrators to configure sensors before physical delivery. Through the KEYNOA platform—a browser-based SaaS solution—devices can be equipped with necessary operational configurations without unpacking, using their pre-assigned identities.
Result
Efficient, networked systems
With KEYNOA, thousands of IoT sensors can be seamlessly networked across multiple locations and configured quickly, eliminating the need for on-site IT specialists. The fast setup and system integration allow the sensor manufacturer to leverage IoT networking immediately. KEYNOA also ensures comprehensive device management throughout the lifecycle, including consistent updates and security patches.