Intel and Veracity Protocol Partner to Secure Transparency in Supply Chains
Intel® Transparent Supply Chain
At the Intel Security Day event during RSA Conference 2020, Intel furthered its commitment to the Intel® Transparent Supply Chain (TSC) with an emphasis on hardware security. Recognizing its critical role in helping to ensure that manufactured hardware has not been tampered with, Intel and its partners have built tools to promote traceability and accountability for platforms with component-level reporting.
"Security solutions rooted in hardware will provide the greatest opportunity to help provide security assurance against current and future threats," said Tom Garrison, Intel VP and GM of Client Security Strategy and Initiatives. "Intel hardware, and the improved assurance and security technologies it brings, helps harden the layers above from attack."
Intel with Veracity Protocol
Securing Intel's critical hardware ultimately means helping to protect national security. Aligned with the semiconductor giant's new initiatives, Veracity Protocol developed computer vision technology that enables any camera to create a tamper-proof Physical Code™ based on an item's unique material structure — no proprietary hardware or embedded security elements required. The goal is to help secure the authenticity, integrity, and security of physical objects in the Intel® TSC.
Together, Intel and Veracity Protocol are first focusing on motherboards to detect product tampering, such as a malicious chip. This is a hot topic in the global trade war, as countries move to restrict access to national chip technology, citing national security concerns.
"We're thrilled to work on securing transparency across Intel's supply chain. Because once hardware is compromised, no software security can help. We're finally bringing forward the technology that can detect malicious chips and help ensure product security," shares Jakub Krcmar, CEO of Veracity Protocol.
About Intel (www.intel.com)
Intel, a leader in the semiconductor industry, is shaping the data-centric future with computing and communications technology that is the foundation of the world's innovations. The company's engineering expertise is helping address the world's greatest challenges as well as helping secure, power and connect billions of devices and the infrastructure of the connected world – from the Cloud to the network to the edge and everything in between.
About Veracity Protocol (www.veracityprotocol.org)
Veracity Protocol is the new standard of trust for physical objects to protect people, brands, and national security. Using computer vision, Veracity Protocol enables any camera to create a tamper-proof Physical Code™ based on an item's material structure. The standard is used as the key component for preventing counterfeiting, fraud, and manipulation, and as the immutable bridge between the physical and digital.