Phone :
+886-3-6687008
Address :
Rm. 107, 4F., No. 5, Xin’an Rd., East Dist., Hsinchu City 300091, Taiwan (R.O.C.) 300091新竹市東區新安路5號4樓之1(107室)
Symbol of Trustworthy Edge Computing

Solutions & Products

INNOVATING INFORMATION DELIVERY
Core Technology

Computing Security

System Integration solution which combines software,
firmware, hardware to achieve three different
level of security.
SECURE INFORMATION

Trusted Rich Execution Environment
(T-REE)

  • Certified Containerized Applications
  • Dedicated Processors & Memory
  • Protected I/O Channels
  • Confidential Computing with Information Isolation
  • Remote Attestation & Workflow
  • Control using Smart Contracts
Secure Edge Computing


Basic Features

FW & SW Secure Boot
VM & Container Support
Advantages
Suit for Private Systems
Automated Operation
Cloud Native Operation
Private OTA Update

Trusted Edge
Computing

 

Additional Features

T-REE
Container Notary
Advantages
Suit for Open Systems
Trusted Operation
Trusted App Download
Secure OTA Update

Confidential Edge
Computing

 

Additional Features
Information Isolation
Trusted Transactions
Advantages
Suit for Info Sensitive App
Raw Data Privacy
Data Monetization

 

Trusted Computing

FiduciaEdge Secure Edge Computing Platform​

Fiduciaedge committed to providing trusted edge computing platform designed for edge computing nodes, building an ecosystem not only allows data, AI algorithms, and applications to be secured but also protect data privacy at the source.

Value and Benefits
Better isolation between services.
Much easier to maintain each service status.
Prevent unauthorized user to access or hijack sensitive information.
Host resources can better allocate:
  • Resource limits
  • I/O passthrough

Supporting Edge
AI Platforms

NVIDIA Jetsons-Edge nodes
NVIDIA DGX/EGX-Edge servers

NVIDIA
Jetsons-Edge nodes

NVIDIA Jetsons-Edge nodes
  • Jetson Xavier AGX
  • Jetson Xavier NX
  • Jetson TX2
NVIDIA DGX/EGX-Edge servers
  • DGX A-100
  • EGX A-100
  •  

Business Model

Computing Security Solutions
Sales Model Target Customer Detail
System Integration System integrators For SI who are looking for trust edge computing total solution, we not only have software tech but also great partners who product excellent edge hardware, together we can offer the best solution on the market so far.
Software License AI companies/ Edge device owners For those who already had edge devices without trust computing function, we can license our software if the hardware was supported.
Bundle Selling on branded edge devices Edge device manufacturers We provide our trust computing firmware which can embed to their edge device and become a total solution for their customers.
Containerized Software Verification
Sales Model Target Customer Detail
CCSaaS Service IPC and ICT equipment suppliers with manufacturing technology/system integrators and operators with secure OTA updates (such as TelCo and ISP) Provide CCSaaS service for the system software of the device to be developed to ensure the security and correctness of the system and prevent IoT devices from discovering security vulnerabilities or malicious behaviors after deployment; at the same time, provide CCSaaS services for deployed IoT devices to ensure system updates the correctness and safety of the system.
ISN&R Platform Application provider (for example: Industrial Technology Research Institute, National Taiwan University, Jiaotong University AI Center, etc.) / service provider (for example: ITS system integrator and operator) .The ISN&N platform performs security checks and endorsements for users and applications, and provides management tools and services such as OTA maintenance, update, and debugging for program developers, and charges users membership fees.

.When a program developer performs an OTA update and other operations for an application that has been deployed on an IoT device, it must go through ISN&R to re-verify and register to ensure the security of the new program and update files.

.The ISN&R platform can match transactions between users of different levels on the platform (such as the match between IoT hardware vendors and application developers), and extract 5%-30% of the transaction amount.

Business Opportunities

Intelligent Transportation System​

Fiducia will be the market leader on solution offerings in compliance of IEEE industrial standards of 1934/1935 and others for the demands in:

  • – Trusted/Confidential Edge Computing
  • – Trusted Data Rental

    In the areas of:
  • – ITS (Intelligent Transportation System)
    – RSU (Road Site Unit)
  • – 5G/AIoT with Level 3-5 Auto-driving
  • – Data Center security services
Business Projection​

Taiwan (2021)
.ETC Highway RSUs
.Intelligent Science Park & AI Park
.Smart City Infrastructure
.Smart Lampposts
.Smart Medical Devices

Hong Kong (2021)
.Smart Lampposts
.Digital Highways

Millions
(NTD)

Industrial Standard Leadership

CORPORATE DEVELOPMENT

Involvement in Standard Development Organizations (SDO) and Industrial Consortia

Leading Technology Development and Early Adoption

Standard Development Organizatons (SDO)

Key Milestones

Successful Case :
HK Smart Lampposts
Applications

Scalability

Implementation and rollout of new network infrastructure,
including consolidation.

Privacy Social Security Network System

Interface Design

Intelligent Transport System

Real-time Editing

Real-time Editing

Global Market Business Development

Benefits of Computing on
the “Edge”

Latency is a problem in use cases where nearly instantaneous transfer of information is necessary. In modern networks, every increment of time counts.

Processing data locally using edge devices and servers distributes power across a network and reduces bandwidth requirements at central locations. With less need for large onsite data centers or extensive server equipment, businesses can reduce power consumption and cut IT costs. Companies providing streaming services and other content to users of connected devices can also benefit by caching data closer to their customers, which allows for faster delivery and a better overall experience.

Security Considerations in
Edge Computing

Loopholes in edge security can provide hackers easy access to the core of a network. The smaller size of edge devices also makes them more vulnerable to being stolen or otherwise physically manipulated.

Any network in which edge computing is a major player must be maintained in a unified manner to ensure all devices receive regular updates and proper security protocols are followed. Encryption, patching and the use of artificial intelligence to monitor for, detect and respond to potential threats are all essential, and the responsibility for implementing these security measures falls squarely on companies, not end users.

Can Edge Computing Make Networks Safer?

Companies are beginning to focus on this and other measures for making data safer, including the use of encryption and creating solutions to manage, update and secure IoT devices.

Security agents, devices designed to handle the security measures of which IoT devices are incapable, may provide another solution. This allows security to be undertaken at a network level without sending data all the way to a central server or requiring frequent device upgrades. Security agents are installed near IoT components and function separately to provide the computing power necessary to handle cryptographic security and ensure strong protection against malicious activities.