Infineon provides turnkey mobile security solutions with OPTIGA™ Mobile

OPTIGAMobile security is poised for growth as global mobile data traffic from smartphones is expected to increase ten-fold between 2014 and 2020. To provide the market with turnkey mobile security solutions, Infineon Technologies AG today introduced OPTIGA™ Mobile. The new brand extends Infineon’s OPTIGA™ range of embedded security solutions with dedicated services around mobile security. OPTIGA Mobile helps mobile device manufacturers and OS providers to improve the security of their products while reducing investment in security critical production equipment and processes.

“With OPTIGA Mobile, we provide all building blocks for implementing a hardware-based Root of Trust in mobile devices”, said Juergen Spaenkuch, head of platform security at Infineon. “Our customers can now seamlessly integrate our chips into existing production and logistic lines. This gives them a competitive advantage and helps to maximize mobile security to the benefit of end users.”

Embedding security controllers into mobile devices is a challenging task: device manufacturers and OS providers face a broad range of security-critical processes as well as special logistic requirements for packaging and transport. With its OPTIGA Mobile offering, Infineon delivers customized turnkey security solutions and services directly to the customers’ production site. All security relevant production steps are handled within Infineon’s certified and secured manufacturing premises.

OPTIGA Mobile services include among others:

  • In-house generation and injection of keys (symmetric and asymmetric) and (CA-signed) public/private certificates
  • Pre-loading of customer provided static and dynamic data
  • Chip-individual code and data
  • Customer-specific marking and labelling on packages
  • Direct shipments to handset manufacturers or customer manufacturing sites

Infineon is a trusted supplier of mobile security solutions. Market giants such as Samsung and Lenovo use Infineon’s leading embedded security solutions to protect sensitive user data in smartphones, tablets as well as smart wearable devices.

Further information is available at

Tags: , ,

Categories: Security

CONNECT with Contactless Intelligence

Connect with us here

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: