CONNECT WITH US
Tuesday 3 June 2025
Eurosmart PP0117 protection profile: Response to the integrated security functions in SoC & MCU
IntroductionWith the increasing use of mobile devices, malware targeting smartphones and tablets has become more prevalent. Banking Trojans, in particular, are designed to steal banking credentials and financial information from mobile users.The modern trend in the Integrated Circuits industry is System on a Chip (SoC) and Microcontrollers (MCU), which integrate different discrete solutions, including security functions in a single IC. In particular, the Secure Element / Hardware Security Module (HSM)/UICC can be integrated into the SoC. The main motivations for this integration are reduced system cost, enhanced performance, and added-value functionality.The integrated security function in the SoC needs to meet the same security level as the discreet part. To address the security of integrated solutions and provide the industry with a unified set of security requirements to be fulfilled and clear to evaluate and asses, PP-0117, Secure Sub-System in System-on-Chip (3S in SoC) Protection Profile was developed.BackgroundCybersecurity statistics indicate that there are 2,200 cyber-attacks per day, with a cyber-attack happening every 39 seconds on average. In the US, a data breach costs an average of $9.44M, and cybercrime is predicted to cost $8 trillion by 2023.ENISA[1], in its "ENISA Threats Landscape 2022 Report", presented in several aspects that the segments which were affected the most were the Public Administration and the Finance sectors:Figure 1 ENISA: Reputational impact by sector[1] ENISA - European Union Agency for Cybersecurity, https://www.enisa.europa.eu/This figure points to the potential for negative publicity or an adverse public perception of the affected sector.In the following diagram, it can clearly be seen that the Public Administration and the Finance sectors suffered more seriously from damaged or unavailable systems, corrupted data files, or exfiltration of data compared to the other sectors:Figure 2 ENISA: Digital Impact by SectorSecure Element is a technical solution for digital payments via credit cards and mobile devices, as well as for identification and biometric purposes, such as passports and personal IDs.Since this device secures critical data, governmental bodies and private entities, such as credit card organizations, EMVCo[2], mandate that it be certified to Common Criteria EAL 5+ when using PP0084 – Security IC Platform Protection Profile with Augmentation Packages (Eurosmart, 2014)[3]. Till today more than 250 product certifications were done claiming for this PP.With the integration of the Secure Element in SoC, new challenges/threats were raised on top of the existing challenges/threats of the secure device with high resistance to physical and logical attacks:• Preventing the insecure state of the product by disturbing the boot process and enabling manipulation of the product by hostile software or malicious code.• Preventing content abuse of the data and code stored at the external non-volatile\volatile memory which is part of the SoC architecture by the attacker which accesses the external memory for disclosing or modifying the content of the external memory used by the secure component and by compromising confidentiality and/or integrity of secure content to be protected by the secure component.• Preventing Cloning of the content stored in the external memory or physical replacement of the external memory of the data and code stored at the external non-volatile\volatile memory.[2] EMVCo - https://www.emvco.com/about-us/overview-of-emvco/[3] Security IC Platform Protection Profile with Augmentation Packages : https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf• Preventing the ability of replay commands, the write, erase or responses to the read commands between the security component and the external memory, to affect the freshness of the content read from or written to the external memory. Preventing Unauthorized rollback of content.• Preventing the attempt to read the content of the external memory, record it, and later write it back to the external memory after the original content was updated by the Security component.• For SoC architecture that uses Secure Memory, the interface between the secure memory and the secure component should be protected from being blocked or intercepted by an attacker eavesdropping on the interconnection bus (e.g., by a man-in-the-middle attack), to disclose the user data and/or code data being written to or read from the secure external memory before security services are executed or finalized by the secure external memory.SoCs with integrated security functions appeared in the market and the security evaluation was done in a way of a mixture of PP0084 or part of it with extended requirements which might reflect the newly innovated device. No unified requirement. The challenge was to define all aspects of using and protecting the security functions when it is being integrated into the SoCThe methodEurosmart took the challenge and established a technical working group under its domain, ITSC. The subgroup includes Eurosmart members from the industry: semiconductor companies, software companies, ITSEF involved in evaluating security devices, Certification bodies, and consultants in this field.The national certification bodies were invited to the working group even though they are not Eurosmart members.On top of it, a liaisons\sharing was established with stakeholders who are referring \ interested \using this Protection Profile:A. Peers working groups: JHAS and ISCI-WG1.B. Organizations that reference the PP: FIDO, GlobalPlatform, GSMA.C. ENISA – for the alignment with CSA-EUCC which will be the scheme for this PP once the act will be implemented.The resultPP0117, Secure Sub-System in System-on-Chip (3S in SoC) Protection Profile includes the following:The TOE (Target of Evaluation) is "a Secure Sub-System (3S) implemented as a functional block of a System on Chip (SoC). The TOE implements a processing unit, security components, I/O ports and memories to provide a range of security functionalities covering a defined set of security objectives. The TOE provides its security features and security services isolated from the remaining SoC components, based on physical and/or logical isolation mechanisms. The TOE may rely on external memories to store content (data, code or both)."Figure 3: The Target of Evaluation (TOE)The TOE can be delivered as hard macro and/or programable macro, PL macro, as was defined in the team objectives.On top of it, the usage of external memory in different stages of the life cycle should be considered as well.The team strives to develop as generic as possible life cycle and highlight the new aspects of this architecture. It was clear that the new life cycle requires elaboration. With the cooperation with ISCI-WG1 a supplement guidance document, "Life-Cycle Model (LCM) Related Evaluation Aspects" was developed with more explanations related to the aspects that need to be fulfilled and assessed in the different phases of the life cycle.Figure 4: TOE Life CycleThe Protection Profile was structured with a base package of minimum requirements for any Secure Sub-System in a SoC, plus optional packages to address additional industry-specific needs arising from the architecture:• External Memory packages (Passive and Secure, volatile and non-volatile memory) – The restrictions related to the security of the data and code that are stored in the external memory.• Loader Package – The restrictions in loading functionality of the TOE Software or Composite Software from external memory.• Crypto Package - Framework for the integration of various cryptographic algorithms supported by the TOE. For addressing the need to be a generalized PP, this package, contrary to PP0084, doesn't define specific algorithms to implement but general instructions regarding the usage of recognized cryptographic algorithms.• Composite Software Isolation Package - The isolation features enable the separation between different software packages which may be delivered by different developers.Figure 5 PP Packages structureThe Security Problem Definition (SPD) which includes the assets to be protected, the threats, policies, and assumptions was developed in light of the collaboration with the JHAS group.In the Security Objectives section, dedicated objectives were defined related to the new approach of the TOE form (hardmacro\ PL macro).The base package of the Security Functional Requirements (SFRs) includes the PP0084 SFRs but for fulfilling the TOE need to be a Root of Trust, additional requirements for unique identification were included.The integration of the security sub-system in a non-secure SoC leads to the need to define the TOE as a way it provides its services isolated from the other SoC components based on physical and/or logical isolation mechanisms.The challenge in enabling integration of certified sub-systems in a non-secure system required new practices to be done by the developer and to be assessed by the ITSEF – the developer should instruct in which conditions the integration should be done and the ITSEF should verify that the integration was followed and no compromising of security was inspected during this process.Dedicated refinements related to the integration were added to the Security Assurance Requirements (SARs) for the ITSEF to verify the process was defined and done with no compromises.The evaluation was done by SGS with the supervision of BSI.SummaryPP0117 represents a significant advancement in cybersecurity certification for integrated systems. By providing a unified, flexible framework, it bridges the gap between traditional discrete certifications and modern integrated solutions, ensuring robust protection for sensitive data in an increasingly interconnected world.Winbond supports PP0117 by offering the W75F Secure Memory, which fulfilled the Secure External memory package. With Winbond EAL 5+ certified secure Flash, PP0117 can be claim in a composition with Winbond device and offer trusted external memory solution within SoC architectures. For more information, please visit Winbond website or download the latest Hardware Security White Paper.
Tuesday 3 June 2025
'Otter Coding' team unveils next-generation AI-powered financial fraud detection system to combat criminal organizations
As criminal organizations expand their use of information technology, the frequency of global financial fraud rises to historic levels each year, posing significant challenges for governments and the financial system. According to a Nasdaq Verafin research report, global financial and bank crime generated US$485.6 billion in losses in 2023, with total unlawful money transfers totaling US$3.1 trillion.The "Otter Coding" team discovered during the "2025 AI Wave: Taiwan Generative AI Applications Hackathon" that conventional financial institutions frequently employ manual review and outmoded model screening to prevent such incidents from occurring. This method is both time-consuming and difficult to address in a timely manner. The team proposed a financial fraud detection system that enhances financial institutions' anti-fraud response capabilities by integrating AI and other advanced technologies.The "Otter Coding" team ultimately triumphed in the highly competitive "Financial Innovation" group of Taishin Financial Holding.Otter Coding claims victory in the Financial Innovation category with an AI-driven fraud detection system built to outsmart global financial crime. Credit: CompanyAI-powered anti-fraud detection targets suspicious accountsThe "Otter Coding" team initiated a two-pronged approach to address the challenges associated with conventional financial fraud prevention. The first step is to employ the bank transaction records and fundamental account information supplied by Taishin Financial Holding to implement AI models for the identification of potential warning accounts. These accounts should be swiftly designated as warning accounts to enhance anti-fraud awareness and alleviate the staffing strain. The secondary purpose is to perform a comprehensive reverse analysis of the existing detection system utilizing large-scale language models to pinpoint possible areas for model enhancement. This will facilitate the ongoing development and enhancement of the anti-fraud system's accuracy.Following the completion of the Generative AI Workshop offered by Amazon Web Services (AWS) and the analysis of the data content provided by Taishin Financial Holding, the "Otter Coding" team members utilized their after-work hours a week prior to the official competition to convene and contemplate the direction of AI model design. They proposed the concepts of data-driven, model optimization, and automation, and ultimately resolved to design and construct the model from five major stages.During the model training phase, the team employed Amazon SageMaker Data Wrangler to integrate transaction records, essential account information, and alert data, perform feature engineering, and train and optimize the XGBoost classification model to achieve high precision and recall. Secondly, in the fraud prediction phase, transaction data is converted into feature vectors and input into the model for risk assessment, enabling the swift identification of high-risk accounts.During the third phase of result evaluation, the "Otter Coding" team computed Precision, Recall, and F1-score by juxtaposing the predictions with the actual list of fraudulent accounts and performed a comprehensive study of the error types.In the fourth round of AI analysis, the team utilized Anthropic Claude 3.5 Sonnet v2 model on Amazon Bedrock, a fully managed service that makes high-performing foundation models, to conduct second-level risk analysis, provide model optimization recommendations, and assist financial specialists in identifying deception patterns.Ultimately, the team employed AWS Amplify, the frontend development tool, to deploy the frontend UI and stored the data in Amazon S3, resulting in an immediate and user-friendly visual analysis interface, during the cloud deployment and presentation phase."Otter Coding" commended the comprehensiveness of both AWS's Generative AI Workshop and DIGITIMES' event planning and venue preparation. Building on this success, the team aims to achieve similar outstanding results in future competitions.
Tuesday 3 June 2025
AI smart salesperson reshapes telemarketing: Cloud Science Network Management team enhances sales performance
Telemarketing, a conventional sales channel, faces substantial challenges, such as a persistent attrition of qualified personnel, elevated labor costs, variable sales quality, and obstacles in scaling operations, despite the widespread adoption of digital transformation in numerous industries.At the second "2025 AI Wave: Taiwan Generative AI Applications Hackathon," the "Cloud Science Network Management" team presented an innovative solution that merges AI with user-centric design to transform telemarketing. This groundbreaking approach won the Eastern Home Shopping & Leisure's "Next-Gen Retail" competition.The "Cloud Science Network Management" team comprises individuals from the departments of Electronics, Computer Science and Engineering, Information Management, and Electrical Engineering at National Yunlin University of Science and Technology in Taiwan. Break away from conventional thinking, they leverage their professional expertise to develop an intelligent sales system addressing market challenges. This system uses AI technology to resolve long-standing industry pain points, while maintaining a humanized interactive experience.Cloud Science Network Management wins “Next-Gen Retail” award with their AI Smart Salesperson that transforms telemarketing through natural voice and real-time strategy. Credit: CompanyThe team discovered that traditional telemarketing is confronted with three significant challenges following extensive market research. Initially, corporate profits are significantly impacted by the high costs of labor and training. Secondly, the performance levels of salesmen are inconsistent, and it is exceedingly challenging to standardize sales scripts. Thirdly, personnel recruitment bottlenecks that severely limit sales expansion.Although telemarketing continues to be a significant promotional channel, market research indicates that consumers are evidently opposed to interactions that appear to be overly mechanical. Consequently, the optimal solution must strike a balance between the efficacy of AI and the humanization of interaction in order to establish a sales process that is both strategic and highly consistent, while also ensuring consumers cannot detect they are interacting with an AI system rather than a human representative.To address these challenges, the team developed the "AI Smart Salesperson," a sophisticated solution employing AI technology for telemarketing. The system transforms AI into a highly effective telephone sales representative by incorporating data-driven analysis, real-time emotional assessment, and natural voice interaction technology. The operational workflow consists of four phases: first, inputting basic customer and product information; second, developing personalized sales strategies based on customer backgrounds; third, initiating the calling process where the customer's voice is transcribed using speech-to-text (STT) technology, dynamic responses are generated through a dialogue large language model (LLM), and these responses are converted into natural speech using text-to-speech (TTS) technology; and finally, using an analytical LLM to simultaneously assess customer emotions and responses, enabling real-time adjustments to sales strategy based on immediate feedback.The "AI Smart Salesperson" substantially reduces labor and training expenses while ensuring uniformity and consistency in sales methodologies, significantly enhancing both sales success rate and customer experience. The system's technical architecture is built on Amazon Web Services (AWS) and leverages multiple innovative technologies to ensure reliability and natural interaction. The core technologies include large language models responsible for dialogue generation, strategy planning, and real-time analysis, along with bidirectional text-to-speech (TTS) and speech-to-text (STT) conversion capabilities.For the AWS implementation, the team utilized Amazon Bedrock, a fully managed service that makes high-performing foundation models, to integrate models such as Anthropic Claude for dialogue generation. They employed Amazon SageMaker for machine learning model training and inference, and Amazon Transcribe for automatic speech recognition to enable speech-to-text functionality. The solution's data storage uses MySQL databases, while Amazon CloudFront handles web request delivery. The entire infrastructure runs on Amazon Elastic Compute Cloud (Amazon EC2) instances, providing the scalability and reliability needed for production deployments.This groundbreaking approach received unanimous recognition from judges in Eastern Home Shopping & Leisure's "Next-Gen Retail" category. The system features natural voice simulation for a genuine interactive experience indistinguishable from human interaction, standardized speech, and dynamic adjustment capabilities to maintain consistent and adaptable sales quality, along with a data-driven recommendation mechanism that significantly enhances the likelihood of a successful transaction.Furthermore, customers can promptly activate the platform by importing product information and listings, without the need to construct additional complex infrastructure, as a result of the out-of-the-box design. These benefits not only resolve the telemarketing dilemma that contemporary enterprises encounter, but they also establish a new paradigm for the application of AI throughout the entire industry.
Tuesday 3 June 2025
Famous on the Board intros an AI-assisted PC case design platform to achieve faster design cycles and brand consistency
Companies have begun to incorporate generative AI models with CAD drawings, design specifications, simulation data, and other information in order to improve design efficiency and accelerate innovation in response to the increasing competition in the commercial sector and volatile consumer demand. This facilitates the rapid generation of initial design drawings or concepts, reduces the length of product development timelines, and maintains the brand's essence.At the "2025 AI Wave: Taiwan Generative AI Applications Hackathon," "Famous on the Board" (a team name referencing PC hardware culture)unveiled an AI-assisted PC case design platform that addresses user pain points to achieve three objectives: "expediting the design cycle," "maintaining brand consistency," and "enhancing innovation efficiency and diversity of inspiration." This innovative platform combines image generation technology and natural language processing to convert user-defined requirements into structured specifications. This encompasses color, style, shape, material, ventilation, lighting, features, environment, and more, and it delivers high-quality rendered images in real time.The platform reduces communication disparities within the development team, enhances interactivity through real-time previews, enables version management for process traceability and restoration, and supports multiple models to increase rendering flexibility, thereby further alleviating the workload. Furthermore, it received recognition from the jury of Cooler Master's "PC DIY Innovation" category and was granted the Excellence Award.Famous on the Board wins Excellence Award with their AI-powered PC case design platform that blends speed, creativity, and brand identity. Credit: CompanyDriving inspiration diversity and enhancing innovation efficiencyThe "Famous on the Board" solution is distinguished by its ability to automatically document each attribute modification and rendering outcome, generate a visual design process timeline, and allow users to generate a PC case design from inception through the inspiration generation module. This allows users to scrutinize and trace discrepancies among multiple versions, enabling them to immediately revert to any historical version for iteration and optimization with a single click.The design of platform functions prioritizes fundamental features such as inspiration discovery, market trend analysis, design prompt generating, version control, and project collaboration management. A machine learning-generated database includes six key attribute databases essential for PC case design: design style, case material, color style, distinctive design, presentation form, and background atmosphere, helping designers rapidly produce design drafts that align with brand positioning.The AI-assisted PC case design platform employs Amazon Nova Pro, Anthropic Claude 3.7 Sonnet, Amazon Nova Canvas, and Stability AI's Stable Image Core on Amazon Bedrock, a fully managed service that makes high-performing foundation models from Amazon Web Services (AWS). It simultaneously supports natural language processing and creative image generation capabilities, thereby augmenting the intelligence and automation of the design process. React and TypeScript are employed in front-end development, complemented by Tailwind CSS to build a responsive user interface that supports internationalization (i18n). The backend architecture utilizes FastAPI and PostgreSQL 17.4 to guarantee data processing efficiency and reliability, while accommodating extensive asynchronous workloads."Famous on the Board" concluded that the essence of its success is rooted in the team's diverse composition. The team comprises development engineers with technical expertise and individuals from various sectors, particularly the gaming industry, each providing distinct perspectives on the application and conceptualization of AI. The challenging work was completed in under 30 hours through collaborative brainstorming and idea exchange, garnering unanimous recognition from the jury for the team's technical expertise, creativity, and degree of completion.
Monday 2 June 2025
Cloud Ninjas builds assistant robots with GenAI and creates new framework for AI smart manufacturing
Smart manufacturing has become a global consensus in the manufacturing industry due to the rapid changes in consumer market demand. The implementation scenarios that incorporate generative AI technology are anticipated to further enhance the efficiency of production lines.At the "2025 AI Wave: Taiwan Generative AI Applications Hackathon," the victor of Chang Chun Group's "Smart Petrochemical Manufacturing" category, "Cloud Ninjas," adeptly developed an intelligent assistant system capable of promptly processing natural voice commands from on-site operators by integrating three key technologies: speech recognition, semantic comprehension, and task scheduling. This unique approach digitizes important operational experience and significantly enhances the natural fluency of human-machine communication via voice-driven operations.The "Cloud Ninjas" proposal's acknowledgment by the judges is ascribed to three primary features: "intuitive," "real-time," and "expandable." This transformation of human-computer interaction from a conventional one-way operation to a reciprocal comprehension and immediate response is facilitated by these attributes, which render the machine that "understands," "delivers," and "learns rapidly."The team meticulously defined a variety of command types, situational actions, and operational scenarios that were derived from real-world industrial contexts during the system design process. These scenarios included traversing from point A to point B, retrieving object A, activating button A, and articulating and reiterating content A. The scenario setting program simulates human operational modes through three state transitions: standby, pondering, and speaking. By employing the aforementioned rigorous designs, this AI machine assistant is capable of not only comprehending language but also autonomously executing the most appropriate action options based on the context.The "Cloud Ninjas", which was initially unfamiliar with one another, resolved to form a group to compete after attending a generative AI workshop from Amazon Web Services (AWS). They specifically targeted the manufacturing industry, which was more familiar to them. Despite the fact that all members possess a level of programming expertise, they are not acquainted with cloud tools, artificial intelligence, or other related technologies. Fortunately, they were able to demonstrate their results in the "2025 AI Wave: Taiwan Generative AI Applications Hackathon" after completing a series of pre-competition training courses from AWS and becoming more familiar with the use of a variety of tools.Throughout the development phase, "Cloud Ninjas" utilized several AWS generative AI services, including the generative AI-powered assistant, Amazon Q Developer to expedite program writing for software development, and Amazon Nova Pro, the multimodal model on Amazon Bedrock —a fully managed service that makes high-performing foundation models available—to attain precise semantic comprehension, response generation, and function calling. Simultaneously, it integrates the automatic speech recognition service, Amazon Transcribe, to convert speech to text, and the AI voice generator and text-to-speech tool, Amazon Polly, to provide natural and fluent vocal responses, thus creating an intelligent voice conversational robot."Cloud Ninjas" also integrates a real-time query response demo to autonomously search the Internet for user questions and return detailed information and related links in terms of generative AI technology. The team anticipates that these capabilities will expand to include high-value applications, such as immediate decision-making recommendations and operation manual searches.The global manufacturing industry is anticipating the attainment of more flexible operational objectives and increased efficiency through smart manufacturing as the world undergoes a tide of digital transformation. The "Cloud Ninjas" solution is a prime example of how generative AI is employed to develop AI assistants, serving as a key engine driving digital transformation in manufacturing.
Monday 2 June 2025
'Hero Song' resolves medical disputes; MediCAM employs AI to tackle communication issues between physicians and patients
In recent years, sporadic medical disagreements have arisen. Inadequate communication between the medical team and patients, together with their families, accounts for around one-third of medical mishaps, according to data from the Taiwan Patient Safety Net. Misunderstandings and distrust will ensue when a substantial information void exists between the attending physician and the anxiously expecting family members.During the second "2025 AI Wave: Taiwan Generative AI Applications Hackathon," the "Hero Song" team introduced a novel solution that integrates edge computing and AI technology, enhancing doctor-patient communication and securing victory in Advantech's "Intelligent Edge-Cloud Control" category.The members of the Hero Song team are from the Computer Science department at National Tsing Hua University in Taiwan. They discovered that the medical profession is confronted with two significant challenges following a comprehensive analysis. The initial issue is that there is a significant information divide between family members and physicians. The complete diagnosis and treatment instructions are not comprehended by family members, which leads to an increase in medical safety risks. The second reason is that family members frequently experience anxiety and the doctor-patient relationship is fraught as a result of their inability to comprehend the condition and the doctor's advice in real time. In order to resolve the aforementioned issues, the team developed "MediCAM," a cutting-edge medical communication system that integrates generative AI technology with Advantech's industrial AI camera (ICAM) and Amazon Web Services (AWS) cloud services.MediCAM comprises four principal functions: the first is "real-time image streaming," enabling family members to remotely observe patients' current conditions; the second is "automatic summary of medical advice," wherein the system records and converts doctors' instructions into comprehensible text; the third is "instant question and answer regarding patients' conditions," allowing family members to inquire about patients' statuses using natural language and receive informed responses based on actual medical data; the fourth is "AI daily patient status report," which autonomously generates a concise report on patients' conditions daily to assist family members in monitoring recovery progress. Not only can this system eradicate the information asymmetry gap, but it can also establish a foundation of mutual trust between doctors and patients, thereby significantly reducing medical risks caused by poor communication.The technical architecture of MediCAM is thoroughly designed, integrating cloud AI and edge computing.The team installed Advantech ICAM AI camera edge devices adjacent to patients' beds to collect on-site visual and auditory data. The system utilizes the Whisper model for voice-to-text and Amazon SageMaker, a machine learning service, to transcribe the doctor's instructions. Additionally, Yolo and FaceNet technologies are employed to verify the doctor's identity and perform facial recognition to ensure the legitimacy of the information source.The team employed Amazon Nova Pro on Amazon Bedrock, a fully managed service that makes high-performing foundation models, to process medical order summaries and enable intelligent question-and-answer capabilities. They used a retrieval-augmented generation (RAG) architecture to ensure the precision and dependability of the results. All data is encrypted and transmitted securely to protect patient confidentiality. AWS provides reliable support for streaming, access, and security control, enabling the consistent processing of large quantities of image, audio, and text data.MediCAM, which is both practical and inventive, was the standout technology proposition in the Advantech technology proposition category for the "Hero Song" team.The jury stated that this system possesses numerous advantages: the high level of immediacy enables family members to comprehend the patient's condition promptly; the information is transparent and objective, while the automatic transcription and summarization of medical orders prevent information omissions or misinterpretations; the intuitive interactive experience permits users to obtain answers by merely posing questions in everyday language, significantly reducing the barrier to understanding. The solution utilizes AWS cloud services and can be rapidly scaled to multiple hospital campuses. This technology not only significantly diminishes the likelihood of ineffective communication between doctors and their patients, but also facilitates the integration of AI applications into Taiwan's healthcare system.
Thursday 29 May 2025
Pegatron debuted independently at Computex 2025,
showcasing AI and smart manufacturing capabilities to establish itself as a leading design and manufacturing services brand
Pegatron Corporation made its first-ever independent appearance at COMPUTEX 2025, held in Taipei, Taiwan. The opening ceremony was hosted by Chairman T.H. Tung and was attended by leading figures from the tech industry, including Chia Chung-Yung, General Manager of Chunghwa Telecom's Network Technology Branch; Ken Lin, Senior Vice President of AMD Taiwan; Tasha Chuang, Vice President of Intel's Sales and Marketing Group and General Manager of Intel Taiwan; and Ying Yin Shih, Global Director of Data Center Products at NVIDIA.Historically, traditional Electronic Manufacturing Service (EMS) providers have often played a behind-the-scenes role for brand clients, with their own brand value receiving less prominence. However, with the evolution of the industrial ecosystem, Pegatron deeply recognizes that its outstanding professional manufacturing and design capabilities inherently constitute significant core brand value. By exhibiting independently at COMPUTEX 2025, Pegatron aims to demonstrate its profound strength and core competitiveness in areas such as design, precision manufacturing, and smart factories to the global industry. This move also underscores Pegatron's leadership as a Design and Manufacturing Service (DMS) provider and its crucial role in the current wave of technological innovation, actively seeking to establish deeper strategic partnerships with global brand clients.This year's exhibition is themed "TECH MAKER," closely aligning with the "AI Next" era. The booth is meticulously planned around four main thematic areas: "High-Performance AI Computing," "E-Mobility & Car Computing," "Telecommunication & Network Solutions," and "Consumer, Aesthetic & Assisted Living," comprehensively presenting Pegatron's latest R&D achievements and innovative solutions in these fields. Notably, Chairman T.H. Tung announced at the opening ceremony that robotics will continue to be a key R&D focus for Pegatron, demonstrating its proactive approach in the realms of smart automation.Credit: PegatronProminent highlights showcased by Pegatron at COMPUTEX 2025 include:High-Performance AI ComputingPegatron showcased cutting-edge liquid-cooled servers developed in collaboration with NVIDIA, alongside high-density servers equipped with the latest technologies from AMD and Intel. Furthermore, Pegatron will prominently feature its independently developed AI platform (PEGAAi) and digital student platform (PEGAVERSE). Through these two platforms, Pegatron empowers enterprises to enhance their autonomous operational capabilities, thereby enabling a more agile response to the evolving industrial landscape.E-Mobility & Car ComputingPegatron is actively advancing the development of safe autonomous driving technologies, having independently designed and manufactured Taiwan's first long-range automotive high-precision LiDAR optical sensing module. Building on this solid foundation, Pegatron is charting the future blueprint for next-generation smart cockpits. By leveraging the latest-generation TEEA (presumably referring to a specific Electrical/Electronic Architecture) and integrating zonal architecture with specialized Scalable Central Compute Resource (SCCR) modules, Pegatron further enhances vehicles' real-time computing capabilities and overall system efficiency. Moreover, Pegatron has developed "Simba," a highly integrated robotic dog designed for wide-ranging applications in demanding environments, such as disaster relief and battlefield scenarios.Telecommunication & Network SolutionsPegatron continues to aggressively expand its presence in the 5G domain, deeply integrating AI technologies to deliver several key innovative networking solutions. These include a 5G enterprise private network solution enabling rapid deployment and efficient management; real-time intelligent surveillance through its Nura 4K camera and MG54AX router; and the development of high-performance indoor and outdoor small cell base stations. These base stations excel in bandwidth utilization, low power consumption, and wide temperature range operation, and can be powered by standard voltage mobile power sources, ensuring stable and efficient 5G connectivity even in demanding environments.Consumer, Aesthetic & Assisted LivingIn the "Beauty Tech & Health" sector, Pegatron is targeting the vast potential of the beauty tech industry with the launch of the "PRIIO" facial beauty device. This device allows consumers to enjoy professional-grade deep cleansing, skincare product infusion, and facial muscle toning at an affordable price. Furthermore, Pegatron has developed Taiwan's first multi-wavelength picosecond laser machine, capable of addressing deep skin issues and delivering high-density energy to the skin, thereby reducing the number of treatments and promoting rapid skin recovery. Pegatron holds multiple patents in this area, ushering in a new era for Taiwan's medical aesthetics industry.To create a better future, Pegatron demonstrates its commitment to technological innovation and social responsibility. Leveraging its own technology, the company has developed several universally designed products to benefit the public, such as the DRP retinal projection device and the Tenor 2 Bluetooth hearing aids. These aim to enable individuals with low vision and hearing impairments to enjoy life more freely, embodying the warmth and inclusivity of technology.Through its independent exhibition at COMPUTEX 2025, Pegatron successfully showcases its exceptional capabilities and innovation in key technology areas including artificial intelligence, high-performance computing, and smart manufacturing, as well as its dedication to a better future. Pegatron will continue to deepen its collaborative relationships with global technology leaders such as NVIDIA, AMD, and Intel, striving to promote the widespread application of AI technology across various industries and resolutely advancing towards a new future of digital and intelligent manufacturing. We invite you to continue following Pegatron and witness more world-changing innovations together!Pegatron Corporation Website: https://www.Pegatroncorp.com/Pegatron SVR Website: https://svr.Pegatroncorp.com/Pegatron 5G Website: https://5g.Pegatroncorp.com/Credit: Pegatron
Wednesday 28 May 2025
DEEPX aims to deliver energy-efficient, low-cost AI chip solutions for edge computing
At Computex in Taipei, Lokwon Kim, founder and CEO of the Korean semiconductor company DEEPX, shed light on his company's robust capabilities in designing high-performance AI chips that prioritize cost-effectiveness and power efficiency. DEEPX aims to compensate, rather than compete with, industry giants like NVIDIA, by focusing on the burgeoning "on-device" AI market.Kim came to sign an MOU of strategic partnership with Taiwan-based AIC Inc., a storage and server solutions provider. DEEPX's advanced Neural Processing Units (NPUs) will be integrated with AIC's robust industrial-grade server platforms. This collaboration aims to deliver unprecedented computational power combined with significant energy efficiency and compact form factors tailored specifically for edge environments.Kim formalizes strategic partnership with Taiwan-based AIC Inc. through MOU signing. Credit: DEEPXKim's journey into AI chip design began during his PhD program at UCLA in 2007, where he had the opportunity to work on a deep learning processor project at the IBM T.J. Watson Research Center, which he calls "the number one research organization in the world." His research contributed to the early development of NPUs, even before the term "deep learning" was widely used."At that time there's no word like deep learning. We just call artificial neural network. So I was really extraordinary fortunate to start earlier than others," Kim shared. This early start gave him a significant advantage.Having graduated from UCLA, Kim's tenure at Cisco, working on semiconductors for internet routers, provided crucial insights into the explosive growth of connected devices and the impending data deluge. He foresaw that by 2025, 70 billion devices would be connected to the internet, generating an unprecedented amount of data that humans alone could not process. Furthermore, he recognized that "40% of the internet data must be processed in a real time manner, not the data center we are waiting for." This realization fueled his vision for a low-power, high-performance, and low-cost AI processing solution at the device level."We need a very low power, high-performance, low-cost solution to process that on device, not the data center," Kim explained that relying on the cloud makes no sense due to latency, cost, and security problems.DEEPX CEO Lokwon Kim at ex-Apple. Credit: DEEPXHe was inspired by the late Steve Jobs when he started working for Apple in 2014. "At the entrance of the Apple campus, there is this quotation from Steve Jobs that says, 'if you do something and it turns out pretty good, then you should go do something else that's wonderful…, Just figure out what's next." Kim decided it was time to answer that call when his internal startup idea was turned down by Apple. He decided to realize that dream by building a chip for the edge environment at his home country, South Korea, leveraging the foundry service of Samsung to support his fabless venture.In 2018, Kim established DEEPX, and now the company has more than 100 employees in South Korea and will soon establish a branch office in July 2025, with FA engineer and salesperson stationed in Taipei."We Compensate the Giant, Not Compete"Kim draws a parallel between the current AI chip landscape and the CPU market in the 1990s, where Intel dominated until ARM emerged with a more suitable solution for mobile devices due to its lower power consumption. He believes a similar dynamic is at play with AI processors, where NVIDIA's GPUs, while powerful, are not ideal for small, power-constrained devices due to their "high power consumption and very hot, high cost." As Kim put it, "We cannot put GPU solution into our small electrical devices. That's the point. So I wanted to solve it."DEEPX's strategy is to address this gap by providing AI chips specifically designed for on-device applications, thereby "compensating Nvidia's market." This approach prioritizes:• Real-time processing: "On device device zero latency guaranteed zero latency," Kim emphasized, highlighting the critical need for immediate responses in applications like self-driving cars and factory automation.• Privacy and security: Kim explained the risk of sending factory data to data centers for AI processing, stating, "If you send the used data to the cloud for AI processing, hackers may intercept and leak that data. " On-device processing mitigates this risk.• Total Cost of Ownership (TCO): DEEPX offers a significantly more affordable long-term solution. Kim provided an example: "The cost of our chip is under $100 for 10 years."• Carbon emission reduction: Kim highlighted the environmental impact of current solutions: "Already, all the H100 GPUs in the world together consume more power than the total power consumption of France, which is one huge country." DEEPX's power-efficient chips offer a sustainable alternative.DEEPX is already demonstrating its capabilities through collaborations with major companies. They are working with a large IT company in China on industrial monitoring and smart city projects. They are also partnering with South Korea company for white appliances, enabling functionalities like autonomous movement for robot vacuum cleaners and home security features such as detecting unauthorized individuals or elders' falling. DEEPX has already shared samples of their chips with over 300 global companies, achieving significant success in the pre-mass production market. Their chips are manufactured by Samsung's 5nm process.DEEPX CEO Lokwon Kim at Computex Taipei 2025. Credit: DEEPXDX-M2: Chip for Generative AI at the EdgeLooking ahead, DEEPX is developing DX-M2, their next-generation chip for generative AI. DEEPX aims to enable generative AI models with over 1 billion parameters, such as Meta LLaMA4 and Deepseek MoE, to run on-devices with just 5 watts of power consumption, and they are also considering TSMC 3nm or Samsung 2nm for future products.Kim believes this will address the current financial challenges of generative AI. "Generative AI is not profitable right now because OpenAI pays huge energy bills to maintain its operations," said Kim, emphasizing DEEPX's solution would make generative AI accessible and affordable, with the chip costing under $50 and a module under $150, effectively eliminating the need for expensive data center charges for a decade once purchased. Kim believes this on-device generative AI will be a "hugely popular product." He acknowledges the skepticism, recalling similar disbelief when they announced their first chip's performance with low power, but he remains confident in their ability to deliver." Actually when we announced our DX-M1, nobody believed... But we did it. We proved it. Now we will do it again," he affirmed.Lokwon Kim, CEO of DEEPX, on a mission to break into tech's top 10. Credit: DEEPXAiming to be Top 10 Players in TechDEEPX's long-term vision, as outlined by Kim, aligns with the suggestion of Jensen Huang, who he admires and considers a "rockstar." Huang's suggested phases for chip companies include:1. Low cost and high usability: DEEPX has achieved this by creating chips that are highly useful and inexpensive.2. Patent protection: DEEPX boasts over 300 patents for NPU technology, exceeding those of Intel, ARM, Qualcomm, and NVIDIA.3. Ecosystem development: The next phase involves building an ecosystem with software frameworks and applications to increase the solution's value and profitability.Kim's ultimate goal for DEEPX is to become "one of the major families in the world, within the top 10 players in the world" within the next 5 to 10 years, contributing to "the process of transformation process of human civilization, which is going to the super-intelligent."This ambition, fueled by a decade of pioneering research and a clear strategic vision, positions DEEPX not just as a chip maker, but as a key enabler of a more intelligent, efficient, and sustainable technological future. As the demand for on-device AI continues to skyrocket, DEEPX's commitment to cost-effective, power-efficient, and high-performance solutions promises to democratize AI, making its transformative power accessible to countless devices and industries worldwide. To stay updated on the latest from DEEPX, follow the official DEEPX LinkedIn page.
Tuesday 27 May 2025
The role of industrial organizations in defining cybersecurity specifications: Eurosmart, GlobalPlatform, and TCG
In the evolving landscape of cybersecurity, industrial organizations play a pivotal role in establishing robust specifications and standards. These entities bridge the gap between industry needs and regulatory frameworks, ensuring the creation of secure, interoperable, and scalable solutions. Among the most influential players in this domain are Eurosmart, GlobalPlatform, and the Trusted Computing Group (TCG). Additionally, organizations like the European Telecommunications Standards Institute (ETSI) and the International Electrotechnical Commission (IEC) contribute significantly to shaping global cybersecurity frameworks. Together, these organizations form a cohesive ecosystem to address the multifaceted challenges of cybersecurity.Eurosmart: Advocating for secure digital solutionsEurosmart, an association dedicated to fostering security in digital interactions, has long been a key player in shaping cybersecurity specifications. Focused on secure elements, identity solutions, and security subsystems in Systems on Chips (SoCs), Eurosmart promotes standards that address emerging threats and technological advancements.Key Contributions:• Standardization of Secure Elements: Eurosmart develops specifications for secure elements used in smart cards, e-passports, and secure SoC subsystems. These standards ensure data integrity and protection against unauthorized access.• Engagement with Regulatory Bodies: By collaborating with EU regulators, Eurosmart aligns its specifications with legislative requirements like the EU Cyber Resilience Act (CRA). This ensures that security measures meet both industry and governmental expectations.• Focus on Secure Subsystems: Eurosmart plays a significant role in defining cybersecurity specifications for secure SoC subsystems, Focuses on embedded security functions within SoCs, including external secure NVM, secure boot, data integrity, and cryptographic functionalities. These ensure robust protection against sophisticated threats, making SoC subsystems integral to secure digital infrastructure.Eurosmart's contributions extend beyond technical specifications. Its advocacy for certification frameworks ensures that products meet high-security benchmarks, enhancing consumer trust and market reliability.GlobalPlatform: Enabling interoperability and securityGlobalPlatform focuses on the standardization of secure digital services and devices, with an emphasis on enabling interoperability. This organization's specifications are widely adopted in the mobile, IoT, and payments industries, making it a cornerstone of secure device communication.Key Contributions:• SESIP Certification: Through the Security Evaluation Standard for IoT Platforms (SESIP), GlobalPlatform provides a streamlined certification process tailored to IoT products. This approach reduces complexity while maintaining high-security assurance levels.• Secure Component Standardization: GlobalPlatform defines standards for secure elements, trusted execution environments (TEEs), and mobile platforms. These standards ensure compatibility and security across devices and services.• Collaborative Technical Working Groups: GlobalPlatform engages with technical working groups to address specific industry challenges, ensuring its standards remain relevant and comprehensive.GlobalPlatform's emphasis on interoperability ensures seamless integration across devices and networks, enhancing both user experience and security.Trusted Computing Group (TCG): Building Trustworthy SystemsThe Trusted Computing Group (TCG) specializes in developing open standards for hardware-based security. Its specifications provide foundational trust mechanisms for a wide range of devices, from PCs and servers to embedded systems.Key Contributions:• Trusted Platform Modules (TPMs): TCG's TPM specifications establish a hardware root of trust, enabling secure boot processes, encryption, and key management. TPMs are integral to safeguarding critical data and system integrity.• Embedded Systems Security: TCG extends its standards to embedded systems, addressing the unique challenges of securing constrained devices. Its specifications are widely used in industrial automation, automotive, and healthcare sectors.• Collaboration with Technical Groups: TCG works closely with groups like ISCI to enhance standards for industrial control systems and critical infrastructure security.TCG's focus on hardware-based security provides a strong foundation for building resilient systems capable of withstanding sophisticated cyber threats.ETSI: Shaping telecommunications securityThe European Telecommunications Standards Institute (ETSI) is a global leader in creating standards for telecommunications, including cybersecurity. ETSI's work ensures secure communication protocols and infrastructure.Key Contributions:• Development of Cybersecurity Standards: ETSI's EN 303 645 serves as a baseline for IoT security, outlining requirements for device integrity, data protection, and vulnerability management.• Support for Telecommunications Security: ETSI has developed specifications to secure 5G networks, addressing threats like unauthorized access and data breaches.• Collaboration with Industry: By working with network operators, manufacturers, and regulators, ETSI ensures its standards meet the dynamic needs of the telecommunications sector.ETSI's focus on telecommunications security ensures that global communication networks remain robust and resilient.IEC: Global safety and security standardsThe International Electrotechnical Commission (IEC) develops standards for electrical and electronic systems, integrating cybersecurity into its frameworks. Its work spans industries like energy, healthcare, and industrial automation.Key Contributions:• Industrial Control System Security: IEC 62443 provides comprehensive guidelines for securing industrial control systems, mitigating risks associated with cyber-attacks on critical infrastructure.• Healthcare Device Security: IEC collaborates with ISO to create standards for medical device security, ensuring patient safety and data protection.• Integration with Cyber-Physical Systems: IEC's standards address the cybersecurity challenges of interconnected systems, including smart grids and autonomous vehicles.Collective impact on cybersecurityEurosmart, GlobalPlatform, TCG, ETSI, and IEC collectively contribute to a cohesive cybersecurity landscape. Their specifications ensure:• Enhanced Security: By addressing vulnerabilities at both hardware and software levels, these organizations provide comprehensive protection against cyber threats.• Global Interoperability: Standardization efforts promote compatibility across devices and systems, fostering international collaboration and trade.• Market Confidence: Certification programs and adherence to high-security benchmarks enhance consumer trust in products and services.Challenges and future directionsDespite their significant contributions, industrial organizations face challenges such as:• Keeping Pace with Technological Advances: Rapid innovation demands continuous updates to specifications and standards.• Global Harmonization: Aligning standards across regions requires extensive collaboration and negotiation.• Balancing Security and Usability: Striking the right balance between robust security measures and user convenience remains a critical task.Looking ahead, the role of industrial organizations will expand to address emerging technologies such as quantum computing, AI, and blockchain. By continuing their collaborative efforts, these organizations will ensure that cybersecurity specifications remain relevant, effective, and universally adopted.ConclusionIndustrial organizations like Eurosmart, GlobalPlatform, TCG, ETSI, and IEC are at the forefront of defining and implementing cybersecurity specifications. Their efforts underpin the secure operation of digital services and devices worldwide. By addressing current and future challenges, these organizations ensure that the global digital ecosystem remains resilient, secure, and trustworthy.Winbond actively participates in key industry organizations such as GlobalPlatform and Eurosmart, contributing to the development of new cybersecurity standards and ensuring alignment with evolving regulatory requirements.All Winbond Secure Flash products meet modern cybersecurity regulations and requirements, supporting industry standards and certification processes. They are pre-certified with various cybersecurity frameworks, easing the certification burden for customer platforms. Additionally, Winbond provides a complete turnkey solution, including pre-certified devices, software, and conformance documentation, tailored to regulations such as the EU Cyber Resilience Act (CRA) and the EU Radio Equipment Directive (RED).For more details on how Winbond can help secure your supply chain and simplify compliance, visit Winbond's website or contact Winbond directly, or download the latest Hardware Security White Paper.
Monday 26 May 2025
Virtual reality and online poker: Creating immersive gaming experiences
VR is totally shaking up online poker, pulling players into virtual casinos where they can actually interact with others and feel like they're sitting at a real poker table VR's come a long way—it's not just about slick graphics anymore. Now, it's all about offering an interactive experience that regular online poker can't quite keep up with. It brings a new level of connection, making the experience feel more authentic and engaging.Expanding horizonsAs virtual reality (VR) reshapes online poker, players are exploring new ways to enhance their experience. VR isn't just changing poker tables—it's impacting the gaming world in general. For example, in Population: One, players interact in vast virtual spaces, adding a new layer to social gaming. Similarly, VR is transforming fitness with games like Beat Saber, turning exercise into a fun challenge. In poker, VR platforms are bringing realistic, interactive environments, making online play feel more like a live casino experience.Okay, so let's talk about offshore poker platforms. They've got a lot to offer—more games, better bonuses, and a whole bunch of benefits that can seriously step up your game. These platforms offer a broader selection of game types and tournament structures, accommodating both beginners and seasoned players. They often provide more attractive bonuses and promotions than domestic sites, enabling players to maximize their bankrolls. Additionally, these platforms support a variety of payment methods, including cryptocurrencies, ensuring secure and efficient transactions. For those interested in exploring these opportunities, this guide on offshore online poker can provide valuable insights into selecting the right platform and understanding the associated benefits.As VR keeps evolving, it's not just gaming that's changing. It's touching everything, from fitness to socializing—and honestly, it's pretty wild to think about. The technology is making waves in fields like fitness, with games such as Beat Saber engaging users in a fun and active way.How VR transforms the poker tableOnline gaming has always had that sense of connection, but there's always been something missing, right? You're playing with others, but you're not really with them. That's where VR changes everything. Picture this: you're at a poker table, but each player is in their own space. Still, it feels like you're all there together. You can see their faces, hear them react to the game, and feel the intensity of the cards being dealt. It's not just about playing your hand anymore—it's about the whole experience of sitting at the table with real people, feeling the buzz of a real game. That's something you can't quite replicate on a flat screen.And honestly, when's the last time you felt like you were actually socializing in an online game? I mean really socializing, not just chatting with someone in the background while focusing on your cards. With VR, that's exactly what happens. It's not just a game anymore—it's a way to truly connect with other people, to share in the highs and lows together. The cards, the strategy—they all become part of a bigger experience. That's why VR poker keeps players coming back.Take PokerStars VR. It started off pretty basic—just a VR poker room. But now? It's something way more immersive. It's like going from a cheap knockoff to the real deal. Now, it's not just poker—it's a whole casino experience. You've got blackjack, roulette, and slots. And the coolest part? You're not just playing against avatars who don't react. You're playing with real people, in a lively, interactive environment. It's like being at a real casino, but without leaving your home. The sense of connection is palpable—everyone's there, sharing the moment. It's poker at its most immersive.The social side of VR pokerOnline gaming is usually about connection, but let's face it—sometimes it still feels a bit distant. VR changes that completely. Imagine sitting at a poker table with others. Everyone's in their own space, yet it feels like you're all together. You can see their faces, hear their voices, and feel the excitement of the game. It's no longer just about the cards; it's about the people you're playing with.When was the last time you truly felt like you were socializing in an online poker game? VR makes that happen. It brings players together, creating a real community. You can share strategies, celebrate big wins, or just enjoy some lighthearted banter between hands. It's not just a game—it's an experience. And that's what keeps people coming back for more. The game is fun, but the social connection? That's what makes it special.VR and the future of online pokerSo, what comes next for online poker in the world of VR? We're just scratching the surface. There are still a few obstacles to clear—better VR hardware, faster internet speeds, and the time it takes to adapt to new interfaces. But the potential? Massive. As VR technology advances, poker will likely feel even more immersive. Imagine smoother gameplay, environments that almost look and feel real—it's a whole new level of experience.And here's the interesting part: cross-platform play could soon become a reality. Picture this: logging into a VR poker room with your headset but still playing against someone on a computer or mobile device. That would open up the game to a whole new group of players, making VR poker accessible no matter the device they're using. This kind of flexibility could bring in a much wider audience, each with different tech preferences.VR poker is tapping into something much bigger: the increasing demand for immersive digital experiences. As more players step into virtual casinos, the need for fresh, innovative platforms is only going to grow. We may be seeing the early days of a shift in online gaming—a time when the divide between the virtual and real worlds gets blurrier, making the experience feel much closer to reality.Looking ahead, VR poker's future looks pretty exciting. With how fast VR tech is moving, poker will probably look completely different in just a few years. It's going to be wild. Traditional 2D avatars could soon feel outdated as VR takes center stage. Right now, though, this is still a space that's evolving, where the thrill of the game and the excitement of a casino are coming together in ways that could change digital gaming for good.