Our Solutions

- We provide unclonable chips and authentication software.

- We enable consumer engagement and cloud-based big data analysis on top of authentication.

- We provide secure volatile key generation.

Anti-Counterfeiting

Counterfeiting is not a problem exclusive of luxury brands. It's a widespread problem that not only creates negative value for brands but are also puts people's lives in jeopardy when it comes to food and drugs. Even the reputation of distributors and retailers is at risk.

Commonly used authentication mechanisms today, such as holograms, color-shifting inks, special printing, basic RFID chipped labels have shown to be ineffective in controlling counterfeiting. Some secure RFID ICs offer robust solution and a strong protection, but they are too expensive to be used at item level for high volume.

Internet of Things

The Internet of things (IoT) is a reality. Some experts estimate that there will be almost seven times as many connected devices in the world as there are people by 2020 (Cisco ISBG, April 2011). This idea of everyday objects being embedded with sensors and chips connected to the internet, having the ability to communicate and slowly taking over on easy daily tasks, is gaining momentum.

In this smarter world, staying connected is not a problem. Ubiquitous computing is everywhere: not only smart phones and tablets, but also wearables, medical patches, smart home appliances, cloud-based security systems, intelligent cars, smart meters... and much more.

Trusted Computing

In a world where machines are slowly taking over on easy daily tasks, authentication between two machines is critical. Strengthening communication nodes legitimacy is crucial so stakeholders can keep developing complex and efficient fully integrated machine-to-machine solutions.

In this area, Verayo has developed PUF-based highly secure key generation mechanisms that can be easily integrated in any ASIC and FPGA. Verayo can generate such a key at very small technology nodes where there is no secure memory to establish trust between machines.

X

Anti-Counterfeiting

Counterfeiting is not a problem exclusive of luxury brands. It's a widespread problem that not only creates negative value for brands but are also puts people's lives in jeopardy when it comes to food and drugs. Even the reputation of distributors and retailers is at risk.

Commonly used authentication mechanisms today, such as holograms, color-shifting inks, special printing, basic RFID chipped labels have shown to be ineffective in controlling counterfeiting. Some secure RFID ICs offer robust solution and a strong protection, but they are too expensive to be used at item level for high volume.

Verayo offers highly effective technology to aid in the authentication of products and protect against counterfeiting issues by extracting silicon biometrics and creating unclonable RFID chips.

  • Low-cost & Unclonable
  • Customizable to product requirements
  • Multiple consumer applications

With a simple tap of an NFC phone, consumers can verify authenticity of the product at any time. Verayo has also built a robust platform to enable consumer engagement and back-end big data analysis on top of authentication for a variety of applications: pharmaceuticals, liquor, cigarettes, luxury goods, electronic devices, cosmetics, clothing, access cards… and much more.


Depending on the customer's needs, Verayo offers two possible architectures:

An offline solution that checks the authenticity of a PUF-embedded NFC chip linked to a specific product. This solution requires providing readers and tags to users and is more dedicated to supply chain stakeholders.

An online solution that allows any users equipped with an NFC-enabled phone to check in real-time the integrity of the PUF-embedded NFC tag on the product. This is the perfect solution for consumer market.

Verayo currently deploys these solutions, involving the production of million of chips, with its partners in Asia and South America. In 2013, more than 40 million chips were sold worldwide.

For more information or specific requests, please contact

Verayo Sales Department

X

Trusted Computing

In a world where machines are slowly taking over on easy daily tasks, authentication between two machines is critical. Strengthening communication nodes legitimacy is crucial so stakeholders can keep developing complex and efficient fully integrated machine-to-machine solutions.

In this area, Verayo has developed PUF-based highly secure key generation mechanisms that can be easily integrated in any ASIC and FPGA. Verayo can generate such a key at very small technology nodes where there is no secure memory to establish trust between machines.

This technology generates volatile secrets, there is no need for trusted programming and it can be used for cryptographic applications (AES, RSA, HMAC...). These solutions have been extensively tested across different environmental conditions and have been proven to be extremely robust and reliable.

  • Small-process geometry
  • Highly secure applications
  • Tested across different environmental conditions

For more information or specific requests, please contact

Verayo Sales Department

X

Internet of Things

The Internet of things (IoT) is a reality. Some experts estimate that there will be almost seven times as many connected devices in the world as there are people by 2020 (Cisco ISBG, April 2011). This idea of everyday objects being embedded with sensors and chips connected to the internet, having the ability to communicate and slowly taking over on easy daily tasks, is gaining momentum.

In this smarter world, staying connected is not a problem. Ubiquitous computing is everywhere: not only smart phones and tablets, but also wearables, medical patches, smart home appliances, cloud-based security systems, intelligent cars, smart meters... and much more.

Over the years, chips and sensors are becoming smarter, smaller and cheaper. And with so many applications, low-cost authentication is becoming critical. Imagine a self-driving car or a civil drone communicating with a hacked server. Or medical patches and wearables sharing data with unauthorized entities. This could put people's lives in jeopardy. Security is a must.

Verayo uses state-of-the-art technology to produce continuous and simple IoT authentication. Each sensor or device enabled with PUF security is unique and unclonable.

Opal is a proof of concept. It's a small and lightweight, proximity-based authentication token to secure access to mobile devices. Relying on the latest bluetooth, if the token is more than three feet away from a paired electronic device, all screens and data lock automatically. Each token is unique and unclonable.

  • Unclonable ID
  • Light weight interface
  • Simple implementation

Unclonable devices provide strong user authentication and data signing. Beyond security, Verayo uses software and firmware layers to facilitate integration, simple implementation and user-friendly interface. This type of security paired with such simplicity is unlike anything else.

Verayo provides robust authentication with no need for stored keys, secure memory, crypto or anti-tamper technology. This technology is reliably used to authenticate the silicon remotely and establish trust for data being read or written to an IoT endpoint.

Verayo is working on multiple form factors and more functionality, seeking new partnerships for technology integration. Our small hardware can be embedded in any electronic device for additional functionality and more convenience to end users. Imagine a fitness wristband with the ability to securely lock/unlock devices and authorize transactions.

For more information or specific requests, please contact

Verayo Sales Department