top of page
laavat_003_Solutions 1.jpg

Device identities and PKI 

Most secure way to generate unique device identities and maintain device PKI hierarchies

Support for strong and unique 
device identities 

A strong and unique identity allows the IoT device to authenticate itself when it connects to the network. It also ensures secure and encrypted communication with other devices, services, and users.


Our Platform supports the issuance of initial device identities during manufacturing, utilizing, for example, X.509 certificates to provide the credentials necessary to protect the entire IoT ecosystem. Cryptographic key pairs can also be generated within the device for enhanced security. 

Additionally, we support the issuance of short-lived identities to facilitate client-initiated bootstrapping mode for LwM2M protocol-based device management solutions. 

Stron device identity
Secure boot PKI hierarchies

PKI hierarchies for secure boot 

Secure boot authentication is typically based on public key cryptography. In some cases, this requires creating and maintaining a PKI hierarchy specific to the microcontroller. An example of this is the High Assurance Boot (HAB) for NXP i.MX families. Our Platform supports the seamless creation of the microcontroller-specific PKI hierarchy in addition to all other keys required for secure boot. 

Check out how                        — a global market leader in weather, environmental, and industrial measurement technologies — utilizes  LAAVAT solution to provide secure and reliable edge gateways and sensors that customers can trust.

Vaisala logo

Contact us to find out how LAAVAT can help you to securely manage your cryptographic keys and operations

bottom of page