In a fully networked world, where processes and data-based business models are enabled by digital duplicates, conventional models and solutions for securing IoT data quickly reach their limits since they are not sufficiently scalable, economical or trustworthy to guarantee the integrity and authenticity of the data.
UBIRCH has rethought IoT security and is pursuing a revolutionary approach based on robust established cryptography and blockchain technology. The UBIRCH solution is easy to integrate into IoT platforms and other system environments, requires no additional hardware and consists of only two components: the Ubirch Nano Client and the Ubirch Trust Service.
How it works
Before data is transferred from the physical to the digital world, we seal every single data packet directly at the point of data capture using robust cryptography and block chain technology. This creates an unalterable "chain of trust" that guarantees at source that IoT data is not manipulated, duplicated or deleted. The data can be verified by any recipient anytime, anywhere, just as if they were at source.
UBIRCH Nano Client
One of the two components required for the UBIRCH solution is the Nano Client, a small and lightweight software library. Designed for edge devices, tiny MCUs and SIM cards as well as for signing and chaining data into the blockchain-based UBIRCH protocol, the library is used directly at the source of the data acquisition.
UBIRCH Trust Service
Our Trust Service completes the UBIRCH solution package. The user-friendly cloud service anchors IoT data in the block chain and allows users to check the authenticity and integrity of the received data via a REST interface. This is how simple and effective UBIRCH IoT security can be for digital duplicates.
The world's first
In collaboration with our partners G+D Mobile Security and 1NCE, we have developed the world's first solution that combines block-chain-on-a-SIM with connectivity services. The new service unites the security standards of mobile telephony with those of block-chain technology.
The solution works like a block chain that starts at the point of data generation, the IoT sensor. A private key located on the SIM card seals the IoT data. In the backend, these micro certificates are then stored in a so-called Merkle tree and anchored in public block chains. This creates an unchangeable and irrefutable data set for each individual sensor. Since the protocol is bidirectional, an IoT sensor can also check incoming data packets for authenticity and integrity. This provides efficient protection against unauthorized commands or unknown sources. The benefits for customers are enormous, since IoT data can be verified during each processing operation and new data-driven business models such as smart contract insurance are supported. Since only verifiable packets are processed, it also offers protection against major hacker attacks such as "man in the middle" or "packet duplication/suppression".
Thanks to UBIRCH secured data, there are no limits to the scope of new data-based digital business models. We have put together some examples from different industries for you.Discover the applications
You recognize digital transformation’s potential and would like to know how trustworthy data can benefit your company? We have got some answers for you.Make an appointment
Want to discover what blockchain technologies can do for you? Develop and implement great ideas for your company? UBIRCH IoT workshops are perfect for you.More on IoT workshops
As a multichannel media marketer, we are already planning for the responsive city of the future – something IoT technologies will play a decisive role in.
The way UBIRCH secures data strikes us as providing a good solution to a number of challenges that arise.
Parametric assurances will become increasingly important in the future – but we also need solutions to obtain reliable IoT sensor data.
UBIRCH uses the intelligent application of blockchain technology to provide an exciting solution.
Developing a IoT device involves solving a whole host of problems including certification, user experience, battery life and firmware.
Thanks to UBIRCH’s solution we were able to solve our IoT data security issue very easily. At the same time, the UBIRCH system has enabled us to add a strong additional feature to our product without having to develop it ourselves.
Digital twins are key to digital transformation – these duplicates are often generated by data from IoT sensors.
UBIRCH technology offers the unique opportunity to intrinsically secure such data. I see great potential especially when it comes to integrating the UBIRCH solution on SIM cards.
Where industrial IoT applications are concerned, it is usually extremely important that data from IoT devices can be distributed securely - especially when we are working in complex IoT ecosystems.
In terms of solving this problem, the UBIRCH solution looks to hold great promise.
Ubirch renders the data from our clients' facilities invoiceable, thus making it available for pay-per-use business models.
What we especially like about the Ubirch solution is that the Ubirch client can be easily implemented in any IIoT solution.