Product

How do you perform digital signatures and verification?

Hello, UNiD fans! This time, I would like to talk about UNiD's feature, Digital Signature, and its verification function. As explained in past blog posts, UNiD uses DPKI (Decentralized Public Key Infrastructure), built on the foundation of DID (Decentralized Identifiers), to manage private and public keys in an autonomous and …

Continue reading

Fully Automated Provisioning

Fully Automated Provisioning

"Fully Automated Provisioning" is one of the core features of UNiD, which can fully automate device provisioning that used to be done manually. In this blog, I'd like to introduce how it works. The typical flow In the typical flow, the provisioner generates key pairs of the device and registers …

Continue reading

UNiD Product Lineup

UNiD Product Lineup

In this blog, I would like to introduce our product lineup. UNiD EDGE SDK is an open-source embedded middleware. By embedding our SDK into your devices, you can securely connect all devices to any cloud via UNiD HUB. UNiD HUB is a message routing hub for establishing E2E secure channels …

Continue reading

UNiD design concept

Hello, UNiD fans! Today, I'd like to talk about the design concept of UNiD products. The UNiD Edge SDK currently under development focuses on edge devices as its initial target. Still, there are many variations of edge devices. For example, even if I only compare the OS layer, the RA …

Continue reading

Two engineers working on UNiD

Hello, UNiD fans! I would like to introduce the current development team members of the UNiD Project. Currently, there are three products in the whole UNiD Project. Still, each product does not have its own development team. Two engineers, including me, are working on design, implementation, and testing. The three …

Continue reading

UNiD Security Lifecycle

UNiD Security Lifecycle

A lifecycle defines the states of an object through its lifetime. Each security state in the security lifecycle of a device defines the security properties in that state. Security state can depend on: Software versions Run-time statuses such as data measurements, hardware configuration, and status of debug ports Product lifecycle …

Continue reading

Now we use linter

It's always hard for developers to build a development environment and understand the coding and communication rules within a project. For people to devote themselves to development in a psychologically secure state, we believe it is important to handle things as systematically as possible, with no cliched rules or room …

Continue reading
Your cart
    Checkout