 So you actually make big machines that are involved with the chip sets and everything. So what do you do at the company? Yeah, exactly. We are developing, producing and selling large programming systems. So those programming systems are programming on the chip level. This means the devices which can be programmed, whether it's flash memories or microcontrollers, secure elements, secure microcontrollers, et cetera. They are put into the system by Trey or by Reel. There they are programmed and then they are put to an output medium which is once more Trey or Reel and then can be used in the production. So right there is your slides where you talk about what do you introduce the company? Okay, short introduction of our company. So data is US-based headquarters in Redmond. We are founded in 1972. So we are nearly 50 years on the market already. What do we do? We produce and sell silicon device programming equipment and security deployment as a service. And this is basically what we will talk a little bit more today as well. When I look at some one of your slides, for example, there's a lot of silicon partners. You're working with ARM, with the NXP, ST, Renaissance, Microchip and also the service providers. So what is your role with all these companies? So starting with the silicon partners with those we are in close contact to get all the information about their devices and to be able to program and provision their devices with our system. So to understand that technology, their needs are to deal with the devices they produce. And regarding the service providers which are named here, those are the service providers who already now use our Centrix security deployment solution. So that means the system is on their place. We are supporting this and the customer can use this and offer this as a service to his customers. So maybe we can go back to your slides right here. Maybe you can, so what are you talking about at the embedded world? So let me skip here the slide and go to one more. So we are talking about security. And if you look on the security landscape, there are different players on the landscape. These are the OAMs, the service providers, the enterprises, the consumers and all they have different needs. And the question is, how can OAMs deploy advanced silicon security in a cost-effective way? And what has to be deployed are these different applications which they are needing. So it's a the identification, identity, cloud onboarding, secure boot and others. But which part do you provide in this? And so there are all these chips, right? The chip provider, make the other CPU, the ARM SSEs or something like that. And what do you do? Your big machine does a package or something or what do you do with this? So I think this is the slide to explain it a little bit more in detail. So we are producing the big system which is here in the middle and all the software around which is needed to program and provision those devices which are produced by NXP, ST and all the other large companies. So our system takes those devices, puts the data in, puts all the secrets, keys, credentials into those devices and repacks them and then they can be used in the manufacturing line. So a chip provider is making a chip and you are putting stuff around the chip physically or is it to do with firmware or? So the chip provider is producing the chip and our customer usually are either OAMs or programming centers. They have a need to program those chips to put security into these chips. So they are purchasing our equipment, our centrics equipment for example and the process line is basically divided into two steps. So we have one step which is happening at the OAM. The OAM is using a software which is the Centric Pro Creator and with this software, he defines all settings which are needed for those devices, all functions, features. He adds keys to this, he adds certificates, he wraps and encrypts this and transfers these to the security provision system which is based on the customer side and here on the customer side, there's a system, the blank devices are put into the system, the devices are programmed and provisioned and then repacked and once more given to the factory, to the electronic factory for further processing and putting it on the PCBs already. So it could be like end users who want to make something extra secure something but yeah, there's data, input, output, right? That's the name of the company, right? So you are... Yeah, basically what we are producing is programming equipment. So that means that each company or each manufacturer who has an electronics production line and needs data into the devices, into his devices. He's using in this line, can use our equipment to put this data into those devices and with the Centrics, this is then one step further so it's not just putting data into the devices but it's also securing the devices using keys and certificates and other security credentials and thus making the device really unique and secure against counter-fight and things like this. All right, so if I just do a Google search for data IO programmer, there's a bunch of results. Are they all from your company in the last 50 years? Some of them, yes. I think there's not only our... So it looks like that. ...shown but this large one, yeah, basically we have two kinds of equipment. We have some desktop equipment and we have the large automated programming systems which are used in the large electronic productions. Is that also part of your technology there? We're looking at? No, not really. No, not this one, sorry. So the Google search shows... A bunch of stuff, yeah. A bunch of stuff, not only ours. All right. And then it's a big machine. So who buys these? I mean, you already mentioned, right? Yeah, so these systems are bought by electronic manufacturers. This might be e-mess companies, OEMs and programming centers as well who provide the programming of the chips as a service to other electronic manufacturing. So what more you would show in your presentation? Did you have a round table at the Embedded World? Yeah, we had several round tables here in the Embedded World especially to show our centric solution for the secure provisioning of devices and where we were also showing a live demo on our Centric Product Creator software which is new and which also was we get the... Just look at my... So we were awarded with the... Well, we would like to have been awarded with the Embedded Award. Unfortunately, we just came into the last three but another company got this award. But two years ago, we were awarded with the Embedded Award for our centric solution in total. This year, we had the chance to get it also with further development of our product. And this is the centric's video that explains... But maybe it also shows similar stuff that what you're showing on the slides. Yes, it's similar, it shows once more who are the players on the field of the security who has need in security and the different players have different focuses what they need in the whole process. So for the enterprise, for example, they have to be robust according to future requirements which are in the market. The customers, of course, they want to have that their identity is protected or don't want to have the possibility of counterfeit of their products. And here you see some pictures which as of today were in the traditional in-house deployment of security which are the roadblocks. The high cost, it was high complex. The lack of collaboration tools between production and development and all those things we are addressing with our centric solution to make it much easier and to simplify all this process. All right, and maybe Andres, are you going to show how it works or what are you going to talk about? I can show, I was planning to show the user interface how the end user or the OEM would use our software to set up his security credentials so that they then can be used in production to start provision devices. So maybe you can share your screen how you do that, Thorne. Oh, yes, let me just show it. And this is the video is continuing there to show more of the security deployment as a service. Yes, deployment as a service means that we have a service model which allows our customers really to have really low upfront cost. We have no minimum quantities in this process so we can start really with just one device or go to millions of devices to program. And it's a really easy to use process. We have, and this is what Andres will show, some predefined use cases. So to make it for the customer easier to get all the input into the system which is needed or requested by the chip manufacturers. We have a highly secure solution here. It is compliant to 540. It supports hardware rules of trust. The secures are cryptographical protected. And we offer it as a service. So basically our customers pay just per part or they can upgrade existing programming system they have in the field already which belong to the customers to add this service to the service that they provide today already. So is your technology deployed in millions and millions of products out there? So this was one thing also on the first slide. We have an installed base of more than 300 of our programming systems worldwide. And with those we cover basically a capacity of about one billion devices to be programmed per year. One billion chips per year. Can be programmed per year with an installed base we have with our devices. So these machines are like a desktop size or something like that but they can process tens of hundreds of millions even. Yeah, you see it here in the middle in this picture there are some of our systems. So there's a no desktop system. They really stand alone, large systems for production purposes, have a high throughput. All right, so maybe I can share Andrea's screen. Yes, please. And what are we looking at here? We're looking at the software that OEM would use to set up his security credentials. Let me show the demo by demoing, setting up credentials for an Infineon TPM 2.0 device. So just selecting the device, selecting the software version. At the next step, the software will show the so-called predefined use cases. Predefined use cases are settings and groups of settings defined by data and the device manufacturer to cover the most common settings in order to make it easier for an OEM to find out the correct settings. In this example, we will be using selecting chip authenticity to check that the device was indeed manufactured by Infineon. We will also select creating an anti-counterfeit identity and creating a cloud onboarding identity. These are two identities established in the TPM device that will be used later in the end product to properly identify the device and bind them to the OEM producing the device. And by the way, any combination of use cases can be used or selected. So this is a software people use when they are connected with, for example, the PSV7000? No, that's the whole point that this software is standalone. It can be used at any laptop, any PC at the OEM site. The OEM, there's no requirement to be connected to the actual programming facility. As this would kind of defeat the purpose of allowing the OEM to easily set up a product definition without having access to the programming center, to the factory. So the programming center, the factory, as you call, is 300 physical locations in the world that have these bigger machines? Not 300 locations, but 300 machines. And think about in Europe, about 20 to 50 locations. So it could be a programming house. It could be an off-site electronics manufacturer. It could be your own factory to produce electronics. Either one works. Are there many thousands and thousands of people that understand and know how to use this? That's hundreds, yes. Hundreds. And so the people that work with this software are, their role is to optimize, finalize before mass production or what is this part? The role is handing over to mass production and the people who would be using it are typically software engineers or security experts. So these would be the persons that are familiar with how security works, how credentials works, and those are the people managing those credentials. When it says anti-counterfeit identity security going on in there, how do people counterfeit chipsets or machines or products or is it something that happens? Absolutely. In today's world, every single product is affected by counterfeit. It doesn't matter how small or how little the value are. The higher the value, the more likely it is that something will be counterfeit. But how can they counterfeit chipset from Renezas or they will get the chip differently and then counterfeit the product? You can counterfeit the whole product by rebuilding the PCB and the hardware. That's relatively easy to do if you have the right equipment. And then the only thing that can be done by an OEM to make sure that this hardware was actually built by him is by using security chips. And those security chips then having a identity that can be bound to the OEM. So a cellphone manufacturer puts in a chip, a security chip provisioned by this cellphone manufacturer and this identity in the security chip will then be used in the field to verify that this piece of hardware was actually manufactured by the OEM and is not a counterfeit product. And these modern Cortex M33 kind of chips have hardware security on the SoC. Is it something like that that can be used for this or where is the security chip? It can be either one. They're different classes. The easiest class is a standalone security chip. So it's a single piece of hardware that only manages security and as keys and identities stored. The next higher class would be secure microcontrollers. That is, as you said, a microcontroller with additional hardware integrated. And this hardware will be used to store secret identities. And it's completely impossible to counterfeit that. I wouldn't say the word impossible. The goal is to make it as hard as possible so that it's no longer beneficial. So that cracking the security will cost more than the benefit is. And there really are like in China or somewhere in Thailand or something, some companies trying to counterfeit a whole bunch of stuff. And because I could imagine that it requires so much work that it doesn't, it's, well, I guess there's some products that are, there's maybe more attractive for them to try to counterfeit it, I guess. Of course, not everything will be counterfeit, but almost all products are in danger of being counterfeit. And when I look behind you, it says trusted, secured, integrated. So it's not only about anti-counterfeit, it's about many other things, right? Counterfeiting is one risk. The other risk is that the product could be manipulated. Speak of a microcontroller in a car and somebody would change the firmware or actually the motor engine software, that's a common problem. So manufacturers need to make sure that only verified firmware is installed on the product. That third parties are not able to install manipulated firmware. So when I go around your website, there's stuff on their solutions. So the automated programming systems, the centric security provisioning, that's what you're talking about, right? Yes. So those are the big desktop machines here and then there's manual programmers. The desktop programmers are the manual ones, you mentioned, and the others are really big standalone systems. PSV7000, PSV5000 are the big standalone systems. But these are the smaller ones like that? For automated programming, and those are the small manual programmers. They have to put the chips in really manual, so these are for labs or for first articles, for example, but not for mass production. So there are slots to put the chip in each of these? Exactly. In each of these sockets, you have to put the chip and this is the same technology which is then used in the large systems. There's the differences that the chips are put into these programmers then by a handling system. So it's fully automated. These kind of machines, they cost like tens of thousands or hundreds of thousands or what kind of, do you talk about that, the prices or? Well, yes, so it's more hundreds of thousands, yes. So it's very specialized, very precise kind of technology that goes on in there? Exactly. So such a system, if you're looking on the large PSV7000, the program up to 2,000 devices per hour and it's running really 24-7. So it's really for high volume mass production. And what goes in there with these rolls? On these rolls, these are the tapes with the chips. So the customers get them on tapes, for example. And the system takes them out of these tapes, put them into these programming sockets that they are programmed and provisioned. And if this process is finalized, the handler takes them out of this socket and puts them to the output device which can be once more the tape. And then this tape is put to the production line. So your machines are used by SMT lines? They are used by S-manufacturers who use SMT lines as well, exactly. So it's like your machine would be one of these machines on the way in SMT? It would be in parallel to this. So the offline programming is a parallel process. So the process in the SMT line, that's not adding a process time to the process of the SMT line because it's a parallel process. And when you look at automotive flash growth, we're talking about there's more and more data, more and more cameras, more and more chips in these cars. Exactly, the data needs of cars are really rapidly growing. And as a result, you need high-speed programming capacities and possibilities to program these very large data files. And if you would do this in the production line, this would mean it would add a lot of time to the production of the boards. And therefore, this is done here as a parallel process, which is not adding any time to the production line. All right, so you are a very important part of the industry, like everybody who does chips as a customer? Of course, we are an important part of the industry. So programming is something in today's electronics, you always have something which has to be programmed. So basically for each production of electronics, our equipment is something they can use. All right, so what else are you talking about? You've been to Embedded World for many years, your company, for the last 50 years. Now, I don't know how long Embedded World has been going on, but... Well, we have usually been at the Protonica exhibition and we started to join Embedded World about four or five years ago. Then we introduced our century solution because then we started really to deal with security and this was a perfect fit for the embedded systems. There is one process change when it comes to security. In the traditional electronics development world, usually a product is developed, so the hardware is developed, the software is developed, it's tested, released, and then when everything is done and finished, then you hand it over to production. So that usually means that the software development engineer develops his software, he finishes the project, the project is done and over with for him, and then a year later maybe there's the transition to mass production. The problem in that process is that the people who are involved in development, they may not be available anymore because they're already on the next project. Now that's a problem you can work around in the traditional electronics manufacturing, but this is starting to cause big headaches when we talk about security because with security you need to provision keys and everything into the devices in mass production and you need to set up this process during development time. Not after, not after you need to develop the process and you need to set up mass production as early in the development process as possible to make sure that security really works and there are no holes in the security design. For this reason we have been going to the starting to go to the embedded show to get more contact to developers to make people, to make sure that people understand the issues in the process or the changes that are required in the development process to really include security in their devices. So our goal is to address the development engineers, make them understand and aware of the process changes and how security affects mass production of electronics. So what are the demands that they have? What did they hope that you would bring? What's next? Do you have stuff on the roadmap also that you're talking about? Or what is the discussion usually at the embedded world? The discussion is usually, here's my product, how do I get it into mass production or at least that's what we are talking about. And it's about more and more devices to be supported by our system. So we have, it's also on the web page a list of devices we support already today and we are adding more and more devices. So the more and more, for more and more projects, this can be used in the long end. All right. So every chip that goes out there in the world and especially in more and more important products is more and more security in consideration. Like 10, 20 years ago maybe cars didn't really consider anything about security, right? They were just, I don't know, running kind of like open or something like that. But now everything is, everybody wants to have more security everywhere and they might have 100 chips and they all need to be secure and they need to have unique IDs, unique security in each of the chips, identifiable stuff in there and you get in there and you make it all. We make it possible to do this really in mass production with the parallel and secure process. All right. Go ahead. No, please go ahead. Yeah, what you were saying. The device manufacturers are adding exactly those features into their chips. If you look at the changes in the microcontroller development, almost all families are adding secure elements or secure features to their microcontroller families. And when they do that, it provides you with more access, even more, you can put all your stuff in there. It provides the OEM, the user developing the application with the ability to put secure stuff in there, secure keys, secure identities and so on. All right. Cool. So how many roundtables did you do in an embedded world? We had a roundtable every day and so on these roundtables, we were exactly talking about these security issues and doing a live demo every time about the ProCreator software to show how this is really done at the OEM. And in addition, we had also every day a jump in discussion also with different themes about security, it was also quite interesting to see how many people were participating in those. Nice. So I'm trying to load right here, this is your, right there, this is your embedded world digital booth, right? Exactly. With these images also, showing the machines. Exactly. So this is then inside the machine showing the two heads, which are picking up the devices and putting them into the sockets to be programmed and then processing them further. And here you see the sockets in which the devices are put into this and programmed. Once more, some images of the machine. Here an example with a tray. So that would be full of chips? Yeah, this would be full of chips. So this is one of the input-output options to have the chips on tray, the others would be on tape. All right. Colleagues. And here's a scene at ML chip. Yeah, so you see just a bunch of chips showing that we can handle really each size and each vendor of chips can be handled by our systems. Why do I see an SD card? Well, also SD cards are being pre-programmed sometimes. Also, this can be done with our systems. All right. So this is what happens and people can also watch the video. Maybe it's the one we were checking out before. Or is it the different one? It should be the same. The same, yeah? And that was the embedded world and your colleagues right here, your contact. And then from there, you were doing your roundtables and your presentations. Exactly. It can be downloaded here, of course. We have the data sheet of our center solution. We have our general portal catalog. So all information can be found here on the web page of the show, of the embedded, and of course on our web page as well. All right. Thanks a lot for talking about your technology on my YouTube channel here for the embedded world 2021. There's just one question came in. Any use case for automotive industry like connected cars? Yeah, we were talking about that a little bit before, right? This is a big deal. Exactly. Automotive is our largest customer segment. So about 60% of our sales is in the automotive sector. I think we are well known there and can support really every use case. Pretty much like the top 10 car manufacturers in the world, they all your customer or? So it's the automotive companies. It's not only the car manufacturers. These are the large OEMs for the cars like Bosch, Continental and others. So nine out of 10 of them are our customers. All right. So that's everybody. So the one that is not your customer, they don't care about security. I'm joking, but they do something else, right? Yeah. Okay. Cool. So thanks a lot and thanks everybody for watching and more information on your website and you will have maybe more YouTube videos and stuff in the future. Maybe it'd be nice to see how these big machines work and what goes on because it looks like it could be great to see that on video. Yeah. Thank you very much. Thanks for your time. Thanks for watching.