Use for device manufacturers
Interoperable devices for the networking of the future.
Steps to implement KEYNOA.
1. Adjustment
In the first step, our embedded team evaluates the compatibility with the existing device software. With its flexible architecture and support for common standards, the KEYNOA Engine ensures easy adaptation and seamless interoperability.
2. Integration
In the second step, we integrate the KEYNOA Engine and demonstrate how it interacts with your device. If a Trusted Platform Module (TPM) is already in place, we will showcase the secure storage and management of cryptographic keys and certificates.
3. Production
During production, a unique identity is generated for each device, cryptographically bound, and clearly assigned to the device. This identity certifies the device's integrity within the supply chain and forms the foundation for the automatic provisioning process. For this purpose, DEVITY offers the Producer Service.
The components of KEYNOA.
Engine
- Is installed on the device as a client.
- Can be implemented in firmware or as an operating system process.It can be implemented in firmware or as an operating system process.
- It queries KEYNOA instances to initiate automatic provisioning.
- Compatible with TPM for robust protection of the private key.
Producer Service
- It is preferably integrated during the device manufacturer's production process.
- Signs the device.
- Generates a certificate that validates ownership of the device.
- Handles the assignment to customers.
- Effortless integration with order picking systems.
KEYNOA
- Receipt and transfer of ownership proofs generated by the Producer Service throughout the supply chain.
- It can be installed as software on your own servers (on-premises) or in the cloud. As a SaaS solution, DEVITY handles the entire hosting.
- KEYNOA verifies the device's identity and provides it with information about which entities are trusted.
- After mutual authentication, a secure channel is established between the device and the server, through which the data necessary for onboarding automation (e.g., files and scripts) is transmitted to the device.
Your added value through KEYNOA.
Maximize the benefits of KEYNOA. By using KEYNOA, you can unlock the following advantages:
Onboarding
Instant provisioning of thousands of devices.
Flexibility
Compatibility with operating and maintenance cost optimization for the devices.
IT security
Ensure integrity and confidentiality throughout the entire device lifecycle.
KEYNOA in action.
Initial situation
Numerous manual steps are required to install sensors in large-scale systems.
The customer, a sensor manufacturer, aims to enhance device functionality by enabling centralized configuration management and securely utilizing the latest industrial protocols. Previously, commissioning hundreds of sensors for customers' systems required numerous manual steps.
Solution
IT security for intelligent sensors.
During production, each sensor is assigned a unique identity that is cryptographically bound and uniquely linked to the device. These device identities are transferred directly to the customer via the Producer Service, enabling the IT administrator to configure the sensors prior to their physical delivery. Since all systems are cloud-connected, the operator utilizes the KEYNOA platform as a browser-based SaaS solution. This allows the devices to be equipped with the necessary operational information and configurations—without the need for unpacking—using their pre-assigned identities.
Result
An efficient and networked system.
With KEYNOA, thousands of IoT sensors can be seamlessly networked across multiple locations and configured in no time, eliminating the need for on-site IT specialists. The fast setup and system integration enable the sensor manufacturer to leverage IoT networking immediately. Additionally, KEYNOA provides comprehensive device management throughout the entire lifecycle, ensuring that updates and security patches are consistently applied.