-community Beat Keeping the embedded conversation going

By Jennifer Hesse www.embedded-computing.com

BLOGS | MARKET STATS | SURVEYS | VIDEOS | SOCIAL NETWORKING

-community Beat Keeping the embedded conversation going

By Jennifer Hesse

www.embedded-computing.com ON THE COVER Increasing connectivity is changing the fundamental design goals for embedded products to prioritize www.embedded-computing.com secure communications and processes. Check out this issue’s special section on security to find expert advice on protecting all facets of embedded November 2012 | Volume 10 • Number 7 | | | | BLOGSsystems M developmentARKET S fromTAT startS to finish. SURVEYS VIDEOS SOCIAL NETWORKING

7 Tracking Trends in Embedded Technology 30 -community Beat Embedded lockdown: Designing secure devices Keeping the embedded conversation going By Warren Webb By Jennifer Hesse

Silicon Software Strategies ARM technology update Security Digital signage and touch screens

8 18 24 Matching cores to demands ▲ Distributed software 14 Designing hardware for success ▲ in always on mobile applications execution using a Trusted in the digital signage market By John Goodacre, ARM Execution Environment By Barry Husbands, Blue Chip Technology By Asaf Shen, Discretix Modular standards extend 10 Expanding the possibilities 26 ARM platform scalability for Embedding security 18 of multitouch functionality smart, connected devices into data management By Andrew Morrison and Ian Crosby, Zytronic By Jack London, Kontron By Sasan Montaseri, ITTIA Control issues: 21 From protecting IP to monetizing it By Michelle Nerlinger, SafeNet

E-CASTS 2012 OpenSystems Media ® © 2012 Embedded Computing Design Discover Problems in Your Distributed System All registered brands and trademarks within Embedded Computing Design Before It’s Too Late magazine are the property of their respective owners. November 7, 11 a.m. EST iPad is a trademark of Apple Inc., registered in the U.S. and other countries. Presented by: RTI App Store is a service mark of Apple Inc. ISSN: Print 1542-6408, Online: 1542-6459 Virtualization in the Automotive Marketplace; One Size Does Not Fit All November 8, 9 a.m. EST Presented by: MontaVista Software

4 | November 2012 Embedded Computing Design www.embedded-computing.com INNOVATOrs buIld NeTwOrks wITh explOsIVe speed ANd excepTIONAl INTellIGeNce.

How do innovators build networks of stunning speed and intelligence, while keeping costs squarely under control? They work with Wind River. Our advanced networking solutions give leading network equipment manufacturers the packet acceleration, hardware optimization, and system reliability they need to deliver breakthrough performance and greater value—from the core to the consumer and everywhere in between. All while reducing their costs and cutting their time-to-market so they can focus on innovation to create a truly competitive edge.

Please visit www.windriver.com/customers to see how Wind River customers have delivered breakthrough performance and greater value. INNOVATOrs sTArT here.

WRV007 Networking_ESD.indd 1 2/15/11 2:36:55 PM Advertiser Information Page Advertiser/Ad title 32 AMD – The next generation of ECD Editorial/Production Staff embedded APUs – Innovate now! 2 Annapolis Micro Systems, Inc. – Warren Webb, Editorial Director Brandon Lewis, Associate Editor High performance signal and data [email protected] [email protected] processing Jennifer Hesse, Managing Editor Steph Sweet, Creative Director 15 Artila Electronics. Co., Ltd. – Professor [email protected] [email protected] Artila’s tips on embedded computing Sales Group 3 ELMA Electronic – Conveniently designed with a small footprint Tom Varcie International Sales 12 EMAC, Inc. – PPC-E4+ panel PC Senior Account Manager Elvi Lee, Account Manager – Asia 12 EMAC, Inc. – SoM-3517M system [email protected] [email protected] on module Rebecca Barker Regional Sales Managers 27 Interface Concept – Switches and Strategic Account Manager Barbara Quinlan, Midwest/Southwest IP routers [email protected] [email protected] 19 Sealevel Systems, Inc. – Eric Henry Denis Seger, Southern California COM Express: The advantage of [email protected] custom. The convenience of COTS Strategic Account Manager [email protected] Sydele Starr, Northern California 29 Supermicro – Integrated UPS SuperServer solution Ann Jesse [email protected] 23 Technologic Systems – Industrial Strategic Account Manager Ron Taylor, East Coast/Mid Atlantic controllers – powerful, rugged, [email protected] [email protected] affordable Christine Long 9 VIA Technologies, Inc. – Director – Online and Audience Engagement Reprints and PDFs VIA system on module solution [email protected] [email protected] 5 Wind River Systems, Inc. – Innovators build networks with explosive speed OpenSystems Media Editorial/Production Staff and exceptional intelligence 17 Wind River Systems, Inc. – Innovators think status-quo is Latin for “I quit.” 13 WinSystems, Inc. – A 1.66 GHz Warren Webb, Editorial Director Sharon Hess, Managing Editor Intel Atom industrial SBC of EPIC Embedded Computing Design VITA Technologies proportions [email protected] [email protected] 31 X-ES – Performance and SWaP Jennifer Hesse, Managing Editor Monique DeVoe Embedded Computing Design Assistant Managing Editor [email protected] PC/104 and Small Form Factors Reader Resources Jim Turley, Embedded Moderator DSP-FPGA.com Subscribe to magazines and E-letters: Embedded Computing Design [email protected] www.opensystemsmedia.com/subscriptions [email protected] Brandon Lewis, Associate Editor E-casts: Mike Demler, Editorial Director CompactPCI, AdvancedTCA, ecast.opensystemsmedia.com DSP-FPGA.com & MicroTCA Systems [email protected] TechChannels: EDA Digest tech.opensystemsmedia.com [email protected] Curt Schwaderer Technology Editor White Papers: John McHale, Editorial Director whitepapers.opensystemsmedia.com Military Embedded Systems Steph Sweet [email protected] Creative Director Videos: Jerry Gipper, Editorial Director David Diomede, Art Director video.opensystemsmedia.com VME and Critical Systems Joann Toth, Senior Designer Get news via RSS: [email protected] www.embedded-computing.com/news/rss.xml Konrad Witte Joe Pavlat, Editorial Director Senior Web Developer CompactPCI, AdvancedTCA, & MicroTCA Systems Matt Jones [email protected] Web Developer

Editorial/Business Office Patrick Hopper, Publisher Rosemary Kristoff, President Tel: 586-415-6500 [email protected] [email protected] Wayne Kristoff, CTO Subscriptions Updates 16626 E. Avenue of the Fountains, Ste. 201 Karen Layman, Business Manager Fountain Hills, AZ 85268 www.opensystemsmedia.com/subscriptions Tel: 480-967-5581 n Fax: 480-837-6466 Tel: 586-415-6500 n Fax: 586-415-4882 30233 Jefferson, St. Clair Shores, MI 48082

6 | November 2012 Embedded Computing Design www.embedded-computing.com Tracking Trends in Embedded Technology By Warren Webb

@warrenwebb [email protected]

Embedded lockdown: Designing secure devices

Security precautions and potential information disclosure selects high-performance or energy-efficient processors ­consequences have changed the fundamental design goals for for each task to optimize portable platforms. Continuing embedded products. Designers are no longer driven to pro- with the low-power theme, Jack London, product manager duce the simplest, lowest-cost device for each project. Security in the COM Division at Kontron, shows how ARM-based requirements have forced designers to beef up resources with platforms such as the recently released Ultra-Low-Power faster and more capable processors, secure data storage, and Computer-On-Module (ULP-COM) standard can give embedded tamper-proof hardware to simultaneously protect the system designers standardized building blocks to create mobile and data while executing the application. Widespread inter- connected devices. connectivity also exposes a critical embedded system to data extraction or process manipulation from anywhere in the world. Combining the latest security software and processor archi- tectures, technical articles in the Strategies section of this As these connected embedded devices permeate society and issue concentrate on widely deployed embedded technology assume ever-more important roles in industrial, transportation, for digital signage and touch-screen interfaces. For example, and military applications, the consequences of security failures Barry Husbands, managing director of Blue Chip Technology, are potentially catastrophic. Hence, security must be a prime examines the challenges of this market and offers design guide- design consideration from conception through production, lines for low-cost, low-power, small-footprint hardware that deployment, and end-of-life disposal, given that it is almost will enable digital signage systems for lower-end applications. impossible to add security to an existing product. Presenting a new single-layer technology that offers an eco- nomically viable way to implement With security requirements at Security must be a multitouch functionality, Zytronic’s the top of the designer’s check- Andrew Morrison, technical dir- list, we asked several industry prime design consideration ector, and Ian Crosby, sales and experts to present their view- marketing director, demonstrate points in the Software section from conception through how touch-screen-based Graphical of this issue of Embedded production, deployment, and ­ User Interfaces (GUIs) can recog- Computing Design. To start the nize complex gestures and allow conversation, Asaf Shen, VP of end-of-life disposal. multi-user collaboration. marketing and IP products at Discretix, describes the Trusted Execution Environment (TEE) I hope that you find the articles and technical details on concept to protect sensitive information from security threats security, ARM technology, digital signage, and touch-screen aimed at open-source software systems such as Android. Next, interfaces presented in this issue of Embedded Computing ITTIA founder Sasan Montaseri gives details on the security Design helpful in your embedded development efforts. As precautions necessary for the development of software appli- we approach a new year, we will make every effort to bring cations, plus the authentication and encryption technologies you design information that is pertinent and on the cutting ­necessary to secure an embedded database. And finally, edge of embedded development. Michelle Nerlinger, director of product marketing at SafeNet, shows how embedded device manufacturers can protect and You can also help by sending us your suggestions for future monetize their with a combination of technical articles and online updates to support your design ­control, packaging, management, and tracking strategies. efforts. Technical articles can be an excellent tool to gain expo- sure in the embedded computing industry. If you’re looking for This issue’s Silicon section focuses on the latest updates and ideas, we have just released our 2013 Editorial Calendar with improvements to the popular ARM architecture from the mobile a wide range of topics covering the embedded industry and device perspective. Concentrating on the technical require- technology (see http://opensystemsmedia.com/media-kits). ments of always on mobility, John Goodacre, director of pro- If you would like to submit a technical article that would be gram management in ARM’s Processor Division, discusses the of interest to our readers, please send me an e-mail with a latest multicore generation called big.LITTLE that automatically short abstract. www.embedded-computing.com Embedded Computing Design November 2012 | 7 ARM technology update ARM technology

| Silicon Matching cores to demands in always on mobile applications

By John Goodacre

As the role of the continues to evolve, chip designers will face increased pressure to create processors that can handle next-generation computing. Designers need to look beyond single-core solutions to deliver powerful, energy-efficient processors that allow for the “always on, always connected” experience consumers want.

Change is under way Increased data processor speeds vary based on the Mobile usage has changed significantly, Consumers today desire an on-demand intensity of a task. Designers have also with today’s consumers increasingly computing experience that entails reverted to dual- and quad-core pro- using their smartphones for the majority having data available at the ready any- cessors that decrease power while still of the activities in their connected lives. time. Gone are the days when consumers delivering performance. As consumers This includes high-performance tasks owned smartphones for the sole pur- continue to trend toward an “always on, such as Web browsing, navigation and pose of making phone calls. They now always connected” experience, proces- gaming, and less demanding back- require a rich user experience allowing sors must become more powerful and ground tasks such as voice calls, social them to access documents, e-mail, pic- more energy efficient. networking, and e-mail services. As a tures, video, and more on their mobile result, the mobile phone has become devices. Combined with the more than Connectivity an indispensible computing device for 37 billion applications already down- The way consumers use computing many consumers. loaded, data consumption continues to devices is drastically changing, as their rise. According to a recent Cisco report, primary computing devices are no At the same time, new mobile form global mobile data traffic from 2011 longer stationary, but carried around factors such as tablets are redefining and 2016 will grow to 10.8 exabytes in their pockets, bags, and purses. The computing platforms in response to (1 ­billion gigabytes) per month, and by number of mobile connected devices consumer demand. This is creating new 2016, video is expected to comprise will exceed the world’s population in ways for consumers to interact with con- 71 percent of all mobile data traffic. 2012, according to industry studies. By tent and bringing what was once only 2016 there will be more than 10 billion possible on a tethered device to the Battery life mobile Internet connections around the mobile world. What we’re seeing is truly Mobile computing has always required world, with 8 billion of them being per- next-generation computing. a balance of performance and power sonal devices and 2 billion Machine-to- consumption. The combination of smaller Machine (M2M) connections. As with any technology shift, designers form factors and consumers demanding must consider several factors to address more out of their devices has led chip Implications for chips the changing landscape, but in this case, designers to develop ways around the So where is Moore’s Law going to take a few issues stand out more than the rest power/performance gap. Without cut- the embedded industry with this mobile as trends that will define where mobility ting power altogether, designers turn revolution? History predicts a doubling is going. to techniques like clock scaling, where every 18 months from thousands to

8 | November 2012 Embedded Computing Design www.embedded-computing.com big.LITTLE Subsystem

Virtualized GIC The first generation of GIC-400 big.LITTLE design (see Cortex-A15 Figure 1) combines a high-

Cortex-A15 Cortex-A15 Cortex-A7 performance Cortex-A15 Cortex-A7 Cortex-A7 multiprocessor cluster with a Cortex-A7 multiprocessor VIA System on SCU + L2 Cache SCU + L2 Cache cluster offering up to 4x the Module Solution energy efficiency of current 128-bit AMBA 4 128-bit AMBA 4 COTS designs that can be tailored to speci c designs. These processors requirements and applications CoreLink CCI-400 Cache Coherent Interconnect Full breadth of CPU performance range including are 100 percent architec- multi-core readiness System Memory turally compatible and have Availability of starter kits, embedded APIs, tools, technical documentation and SDKs the same functionality, in- Optimized to address SWaP-C (Space, Weight, Power, and Cost) requirements Figure 1 | ARM’s big.LITTLE processing combines cluding support for more Comprehensive support of ROTS and GPOS the high performance of the Cortex-A15 multiprocessor than 4 GB of memory, vir- with the energy efficiency of the Cortex-A7 multi- processor and enables the same application software tualization extensions, and functional units such as to switch seamlessly between them. COM Express Solution in NEON advanced Single Type 6/10, Mini/Basic/Compact billions of transistors, but actually looking Instruction, Multiple Data (SIMD) instruc- Form Factor VIA Eden™ X2 and Nano™X2 E at the performance of a single processor tions for efficient multimedia processing Processors shows that it has all but stalled because and floating-point support. This allows the amount of power that can be con- software applications compiled for sumed in the system has peaked. one processor type to run on the other without modification. Because the same For any single processor in the future, application can run on a Cortex-A7 or a heat dissipation will limit any significant Cortex-A15 without modification, this increase in speed. Once a device hits its opens the possibility to map application QSeven Solution for low power, thermal barrier, it will simply melt, or in tasks to the right processor on an oppor- handheld embedded applications the case of a mobile phone, start to burn tunistic basis. VIA Nano™ E Processor the user. Apart from the physical aspects of heat dissipation, it is also hugely power As we continue to usher in this new era inefficient. The amount of power it takes of computing, mobile phone designers to tweak a processor to perform faster and will find themselves focusing on how to faster becomes exponential, and the last deliver devices that allow for increased little bit is especially expensive. Whereas data consumption, connectivity, and in the past, double the size meant double battery life. ARM’s big.LITTLE processing the speed, double the size now equates to addresses the challenge of designing a ETX Module for VxWorks just a small percentage faster. That’s one System-on-Chip (SoC) capable of deliv- RTOS Support VIA Nano™ X2 E Processor of the reasons why designers have hit a ering both the highest performance and limit for single-core systems. the highest energy efficiency possible within a single processor subsystem. Solving the power problem This coupled design opens up the poten- If designers can’t make a single core go tial for a multitude of new applications faster, the number of individual cores and use cases by enabling optimal dis- has to increase. This brings the benefit tribution of the load between big and of being able to match each core to the LITTLE cores and by matching compute Up to 7-year demands being placed on it. capacity to workloads. product lifecycle

ARM’s big.LITTLE processing extends John Goodacre is consumers’ “always on, always con- director of program nected” mobile experience with up to management in double the performance and 3x the ARM’s Processor energy savings of existing designs. It Division. achieves this by grouping a “big” mul- ticore processor with a “little” multicore processor and seamlessly selecting the right processor for the right task based ARM on performance requirements. This [email protected] dynamic selection is transparent to the www.arm.com application software or middleware New Launch Follow: BLOG f in www.viaembedded.com [email protected] running on the processors. www.embedded-computing.com Embedded Computing Design November 2012 | 9 ARM technology update ARM technology

| Silicon

Modular standards extend ARM platform scalability for smart, connected devices

By Jack London

The competitive market for smart, connected devices is heating up, which requires OEMs to stay focused on differentiating their products and getting to market quickly. ARM-based building blocks are enabling OEMs to reallocate the resources needed to find, install, program, and troubleshoot drivers or debug hardware and concentrate instead on their core competencies. With prevalidated platforms that are fully configured and tested to deliver the required interoperability, compatibility, and functionality, OEMs can focus on application development and reuse existing application-specific software on a flexible hardware framework.

It is a dynamic time in the embedded market, as processors and generation to the next. The key to ARM technology’s long-term software advancements are breaking down the barriers that viability is a supportive hardware and software ecosystem that once limited the implementation of various computing plat- can deliver products providing interoperability and a smooth forms. In conjunction with these advancements, embedded migration path that embedded systems OEMs can depend on. computing board and module suppliers are continually enhancing their platform portfolios to take advantage of the ARM addresses smart, connected application requirements performance, interface, functionality, and power improvements The requirements of today’s smart tablet and HMI tool appli- available with next-generation processor architectures. cations extend beyond technology and power specifications to include rugged, extended life-cycle product support. The ARM architecture is now viewed as one of the enabling These applications are typically portable systems that chal- processor architectures for embedded systems because of its lenge embedded designers with space constraints and require ability to provide a true open-systems approach in its support fully sealed fanless enclosures that must operate reliably over of a broad range of interfaces and much-needed features. ARM extended periods. Designers have struggled to make existing also offers competitive performance that is comparable to standards and higher power consumption processor architec- x86 dual-core processors but at sub 5 W power consumption. tures work in these applications, and thus have anticipated the This is an attractive combination and a contributing factor as to introduction of more focused products specifically designed to why more and more smartphone, tablet, and Human-Machine support ARM-based subsystems. Interface (HMI) subsystem applications in low-power market segments are embracing ARM-based platforms. Similar to other popular CPU architectures, the ARM architecture offers an open-systems approach. ARM-based platforms The inherent benefits of ARM technology deliver the feature provide excellent performance-per-watt ratios with very low set required in an increasing number of small form factor appli- power consumption at less than 1 W operating power, as well cations. One former limitation of ARM was the availability of as CPU performance that is comparable to or exceeds what is scalable platforms from a growing group of providers that offered in the latest low-power x86 or RISC-based processors. could serve as the basis for efficient development from one ARM processors deliver the performance needed to power an

10 | November 2012 Embedded Computing Design www.embedded-computing.com Figure 1 | Kontron’s ULP-COM-sAT30 is a low-profile platform based on the ULP-COM specification, which was designed to extend the proven and scalable COMs-based usage model to new modules with ARM and SoC processors. easy-to-use Graphical User Interface (GUI) for mobile smart- phones and tablets and also support extended-temperature operation. When ARM’s up to 15-year platform longevity is added to the list of benefits, it is easy to see that these pro- cessors meet most smart, connected embedded application demands. However, in the past, a key element to success was missing – new embedded technology standards needed to be established to help drive continued innovation and swift platform adoption.

Global support for ARM platform standards A new vendor-independent standards organization called the Standardization Group for Embedded Technologies (SGET) was organized to help speed the development of standard- Figure 2 | Based on the 314-pin MXM 3.0 connector with ized hardware and software for embedded computing. To a height of 4.3 mm, the ULP-COM standard supports new keep pace with market demands and the dynamic pace of interfaces specifically tailored for the latest ARM processors, technology, SGET has set simplified rules and shorter objec- including video outputs such as LVDS and dedicated tion periods so that specifications can be passed much faster. camera interfaces.

The first working group formed under SGET has defined the The ULP-COM standard addresses the need for dedicated Ultra-Low-Power Computer-On-Module (ULP-COM) stan- interfaces supported by the latest ARM processors, which dard aimed at supporting ultra-low-power applications using makes it notably different from the COM Express standard (see System-on-Chip (SoC) devices. Figure 1 shows an example Figure 2). ULP-COM adds features that are not typically found of a ULP-COM platform. The ULP-COM specification is char- on COM Express, such as the cost-effective parallel TFT display acterized by its extremely flat form factor dimensions and its bus and MIPI display interface. It includes support for multiple optimized pinout for SoC processors. The ULP-COM standard SPI links and SDIO interfaces, which are needed for consumer specifies a 314-pin connector with a height of just 4.3 mm (the camera and phone memory cards. ULP-COM also supports MXM 3.0). This connection method satisfies mobile design LVDS, HDMI, and embedded DisplayPort for future designs. requirements for very low-profile, robust, and cost-effective modules. For additional design flexibility, two different module ULP-COM gives designers the standardized feature set spe- sizes are specified – a short module measuring 82 mm x 50 mm cifically matched to ARM I/O. This feature set brings to light and a full-size module measuring 82 mm x 80 mm. the importance software plays in enabling board compatibility and interchangeability and demonstrates why it has become a Standardization brings interface support benefits ­crucial system design decision now more than ever. Before ULP-COM, all existing module specifications were primarily based on x86 technology and its associated chipsets The value of a building block approach that support a multitude interfaces such as USB, PCI Express, ARM-based devices have been successfully implemented in and PCI Express graphics ports geared to PC design. ARM, many embedded systems. However, most of these existing on the other hand, supports more traditional embedded ports systems offer limited interoperability and lack a clear, scalable such as UART, I2C, I2S, and SDIO. design path. Furthermore, products that supported ARM in www.embedded-computing.com Embedded Computing Design November 2012 | 11 Silicon | ARM technology update

the past typically required more in-depth development, as the A strong ecosystem of hardware and software providers is software was tied directly to both the hardware and the spe- currently overcoming the continuity of support issues associ- cific application, making them more proprietary in nature. That ated with implementing ARM. The availability of standards- meant that any new design basically had to start from scratch. based platforms such as the new ULP-COM makes it easier It was obvious that flexible building blocks were necessary to for designers to implement and speed the development of support the demands of evolving market applications. ARM-based products. ULP-COM platforms deliver the desired performance-to-power ratios needed for portable and fully This is where platform suppliers with experience bringing stan- enclosed systems and offer an array of flexible display options dardized form factors such as COM, Mini-ITX motherboards, for the full range of deployment needs. and Pico-ITX embedded SBCs to market can benefit OEMs. It is this know-how for creating standardized modules that Above all, the ULP-COM platforms gives OEMs a prevali- will create ARM-based platform building blocks that OEMs dated building block approach that helps ease integration, can leverage to secure system longevity and smooth migra- reduce design risk, and shorten the time from development to tion from generation to generation. While ARM processors will deployment of smart, connected devices. The ability to reuse never completely replace x86 or RISC processors in embedded these known building blocks provides the needed interoper- systems, ARM-based computing platforms can be used as ability and evolutionary design path embedded systems OEMs ­optimized building blocks for certain applications and market demand while also securing technology investments. Suppliers segments that are presently underserved. are taking these steps with the goal of making it easier for OEMs to adopt new modules so that ARM’s long-term viability Steps taken ensure easy adoption and long-term viability and development benefits will be available for many years Designers have realized that ARM processor-based platforms to come. are ideal for low-profile, high-density embedded devices such as tablets, smartphones, and HMI tools. ARM satisfies these Jack London is product manager in application requirements with long product life – a minimum the COM Division at Kontron. of 7 years and up to 15 years – with processors that are small in size and height and do not require a chipset. With no Kontron moving parts, simplified passive cooling and thermal man- www.kontron.com agement are achieved to eliminate points of failure for higher system reliability. Follow: f in

SPECIAL ADVERTISING FEATURE ARM Partners Product Spotlights

SoM-3517M System PPC-E4+ Panel PC on Module • ARM9 400 MHz Fanless • ARM Cortex A8 – 600 MHz Processor Fanless Processor, 24-bit • Up to 1 GB Flash & 256 MB RAM LCD Interface • 4.3" WQVGA 480 x 272 TFT • Up to 512 MB of DDR2 LCD with Analog Resistive SDRAM, Neon Math Touchscreen Coprocessor • 10/100 BASE-T Ethernet, POE, • Up to 1GB of NAND Flash SPI & I2C, 4 ADC & Audio & 2GB of eMMC Flash • 3 RS232 & 1 RS232/422/485 Port • 3 USB, 4 Serial Ports, 2 I2C and 2 SPI ports • 2 USB 2.0 & 2 Micro SD Flash Card Sockets • 10/100 BASE-T Fast Ethernet, CAN 2.0 B Controller • Portrait or Landscape Display • 2D/3D Accelerated Video w/ Resistive Touch EMAC, inc. EMAC, inc. 618-529-4525 618-529-4525 www.emacinc.com www.emacinc.com EQUIPMENT MONITOR AND CONTROL [email protected] EQUIPMENT MONITOR AND CONTROL [email protected]

12 | November 2012 Embedded Computing Design www.embedded-computing.com A 1.66GHz Intel®AtomTM Industrial SBC of EPIC Proportions

The EPX-C380 is a rugged single board computer that provides an open powerful platform for industrial applications. Powered with either a single or dual core processor, it has a wealth of onboard I/O plus expansion options. Also it supports Linux, Windows® XP embedded, and other x86 real-time operating systems.

• 1.66GHz Intel® Atom™ N450 single core or D510 dual core processor available • Embedded Gen 3.5+ GFX video core supports CRT and LVDS fl at panels simultaneously • Custom splash screen on start up • Optional 1MB of battery backed SRAM • Two Gigabit Ethernet ports • Two SATA channels • Eight USB 2.0 ports • Four serial RS-232/422/485 channels • 48 bi-directional digital I/O lines • CompactFlash (CF) card supported SPECIAL ADVERTISING FEATURE • MiniPCIe and PC/104-Plus expansion connectors • High Defi nition audio supported (7.1) • WDT, RTC, LPT, status LEDs, and beeper • +5 volt only operation • EPIC sized: 4.5” x 6.5” and RoHS compliant • EBX form factor SBC (5.75” x 8.0”) also available • Extended temperature operation • Responsive and knowledgeable technical support Call 817-274-7553 or Visit • Long-term product availability www.winsystems.com/EPX-C380E1 • Quick Start Kits for software development Ask about our 30-day Contact us for additional information, pricing, and custom product evaluation confi gurations. Our factory application engineers look forward to working with you.

715 Stadium Drive • Arlington, Texas 76011 Phone 817-274-7553 • FAX 817-548-1358 E-mail: [email protected] Security

|

Software

Distributed software execution using a Trusted Execution Environment

By Asaf Shen

More sensitive commerce- and entertainment-related credentials assets are finding their way onto devices with open operating systems, creating a wider array of attack vectors. The prevalent approach to mitigate this threat is based on hardware isolation of an execution environment for sensitive information, ensuring data privacy for end users and services.

Mobile devices and associated security standards and ­protocols The following discussion describes the prevalent approach to have been around for many years. It is common practice to mitigate this threat or at least limit the scope of assets compro- secure inbound and outbound communications and to protect mised and minimize the associated cost of such control loss on the permanent data stored on a device. Standards and tech- the rich OS. This approach, which is based on hardware isolation nologies that address these requirements are well-defined and of an execution environment for sensitive information, is critical have been widely adopted – for example, standards defined by to ensure data privacy for end users and services, particularly in the Internet Engineering Task Force such as Internet Protocol the case of video on demand, commerce, and banking services. security (IPsec) and Transport Layer Security (TLS) or ­persistent storage encryption technologies for disk or flash such as It is important to note that the phenomenon of devices BitLocker for Windows and dm-crypt for Linux. However, as exposing an ever-growing attack surface is not limited to the lifestyles have become increasingly digital and smart devices mobile consumer electronic space. Other embedded systems have become an inseparable part of our daily activities, the that were justly classified as “closed” in the past, such as need for security has increased significantly. ­automotive control units or industrial systems, are becoming vulnerable to a similar type of attack. The main code execution As technology has evolved and enabled additional use cases, entities in these devices are no longer safe due to OS open- more sensitive assets are finding their way onto devices such ness, along with a multitude of external connections. as commerce- and entertainment-related credentials. This development has increased the circle of potential hackers and An isolated execution environment ­created a wider array of attack vectors trying to exploit the The key to this security approach is the introduction of a vulnerabilities of modern embedded systems. Trusted Execution Environment (TEE), as it is termed by the GlobalPlatform. This environment, depicted in Figure 1, is iso- A recent prominent class of threats has resulted from the lated from the feature-rich, performance-based Rich Execution ­proliferation of “rich and open” Operating Systems (OSs) Environment (REE). In a nutshell, the TEE is used to protect such as Android. While Android’s intentional openness – mani- ­sensitive, software-based security services from the REE. fested as code and documentation availability, as well as a Modern Systems-on-Chips (SoCs) typically base this isolation built-in debug tool – leads to ground-breaking innovations by on one of the following hardware measures: a massive developer community, it comes at the price of inno- vative attack vectors. These vectors typically lead to a state ›› A hardware-separated execution mode in the main where a black hat has managed to gain privileged execution SoC processor: This approach is evident in TrustZone rights and full access to all assets available to the Android OS technology developed by ARM and available on all at runtime. members of the Cortex-A processor series. Note that

14 | November 2012 Embedded Computing Design www.embedded-computing.com in this approach, a CPU core is either executing code

belonging to the TEE or the REE (typically switching back Trusted Trusted Trusted Application Application Application and forth between the two domains). DRM Payment CorporateCorporate ›› A physically separated processing entity (a stand-alone CPU) dedicated to security tasks: This approach, which is GlobalPlatformGlobalPlatform more intuitively understood, though not necessarily better TEETEE FunctionalFunctional APIAPI GlobalPlatform TEE Internal API (as always, the devil – aka the black hat – is in the details), GlobalPlatformGlobalPlatform TEE TEE Client Client API API TTrustedrusted CoreCore Trusted has been around for a longer period of time and is still used EnvironmentEnvironment Functions in many devices. Note that in this approach, the dedicated Rich OS TEE Kernel security CPU core is only executing TEE-related code. HW Keys, Secure Storage, HW Secure Trusted UI (Keypad, Screen), Crypto accelerators, A comparison of the two approaches is tightly coupled with Hardware Platform Resources NFC controller, Secure Element, etc. specific implementation details, and the right method can differ from system to system. Another approach to achieve such iso- lation that is currently less prevalent in the embedded space is Figure 1 | TEE architecture, as portrayed by the GlobalPlatform based on a hypervisor or Virtual Machine Monitor (VMM). With organization, is used to protect software-based security services from the REE. Source: GlobalPlatform white paper, “The Trusted this method, execution environments or virtual machines are Execution Environment: Delivering Enhanced Security at a separated by a software layer (the hypervisor) that is running at a Lower Cost to the Mobile Market,” February 2011. higher privilege level. Assuming a robust, mathematically proven implementation of the hypervisor, this software-based approach the need for an exhaustive review and verification of code can be very effective. placed in the TEE, especially if this code is serving multiple unrelated security services running within the TEE. An interesting term-related distinction in this context is parallel to the difference between a Trusted EE and a Secure EE. The TEE implementation term Trusted alludes to the basic assumption behind the usage The TEE typically offers generic security services known as Secure model: Code that is placed in the TEE is trusted to be nonmali- OS, which includes handling secure boot, communications, per- cious and bug-free. There is nothing inherent in the TEE that sistent data storage, cryptography, secure platform manage- prevents ill-formed TEE code from revealing sensitive assets to ment, and more. In addition, specific Trusted Applications (TAs) the world outside the TEE’s “walled garden.” This trust implies run in the TEE using these services. A TA is typically a component

Professor Artila’s Tips on Embedded Computing

www.aaxeon.com // [email protected] // +1 (714) 671-9996 www.artila.com Authorized Distributor www.embedded-computing.com Embedded Computing Design November 2012 | 15 Software | Security of an application of wider scope that runs in the REE and inter- Android Application faces with the user and other parts of the OS. Content App 1 Content App 2 Android Multimedia Player An example of a usage scenario is one where the user tries to Android Java Layer Android Native Layer consume high-value content such as HD video obtained through Wi-Fi Android Media Framework (Stagefright) a subscription service. The user interface and multimedia frame- Android DLNA Display OS Android DRM Framework work interface are performed in the rich OS while portions of Discretix Multi-Scheme DRM Client Plug-in the Digital Rights Management (DRM) scheme such as usage Discretix Discretix DTCP-IP HDCP 2.1 Discretix Microsoft Discretix Discretix policy enforcement, content key extraction, and secure video PlayReady CPRM OMA DRM path enforcement are handled in the TEE by a dedicated TA.

This separation is required to comply with robustness rules pub- Secure Environment Driver lished by the DRM scheme owner in an open environment. Hardware Platform Secure OS with Secure Graphic-video Discretix Content Path Trusted Processing Unit A single-usage scenario can involve several TAs. Along the lines HW Execution Security Services Environment of the HD content consumption example, a user might want to HW Cryptographic Services send video from a handheld device to a remote and perhaps ARM CPU with TrustZone Secure SHA ECC AES RNG RSA larger display using a standard such as the Wi-Fi Alliance’s Clock Miracast. To comply with Miracast security-related requirements on an open system, the Miracast software stack must be located Legend: on the REE, communicating with a TA in the TEE implementing the High-bandwidth Digital Content Protection (HDCP) 2.x spec- 3rd Party Android TEE IC/HW Discretix ification as required by the Miracast specification. Figure 2 | Breaking down a content protection usage scenario between the TEE and the REE in an Android-based device Careful attention must be given to the task of breaking down reveals performance problems and security issues. a use case into the parts benefiting from execution in the REE versus those mandated to be ported into the TEE (see Figure 2): phenomenon could change once design teams become better acquainted with the concepts, related tools, and development ›› Excessive code pushed into the TEE could lead to perfor- environments. TEE usage adoption rates will be accelerated if mance degradation (throughput and power consumption), service providers’ requirements mandate it. as well as potential security issues. As stated earlier, the trust in the TEE code originates from a careful review of One concern service providers have is the scalability of their what is placed there, a task favoring minimal code. systems due to the fragmentation of devices and their security ›› Not having all the parts needed in the TEE could increase capabilities. No one wants to redo an application repeatedly. the risk of potential security breaches, resulting in a greater This concern is currently being addressed by the GlobalPlatform probability of financial sanctions. Licensees of most, if not standards organization. The GlobalPlatform plans to publish a all, content protection schemes accept liabilities in the formal process for TEEs entailing certification by accredited labs. ­multimillion-dollar range. It is a common misconception that only the cryptographic parts of a security-related protocol The openness of modern devices, along with the extended must be well secured, while leaving the logic that connects connectivity introduced by new use cases, calls for higher levels the crypto outside of the TEE. In fact, tweaking the “harm- of security in the embedded space. Distributed software exe- less” glue logic completely circumvents the security scheme. cution using an REE alongside a hardware-based TEE has the potential to form a robust security solution, meeting stringent The complexity level rises significantly when multiple TAs are requirements without compromising the user experience. needed in the TEE. The basic requirement is for mutual distrust between those TAs (assuring that a compromised TA cannot As with other technologies, the key for adoption is defrag- compromise others). Mutual distrust is typically handled by mentation through standardization, an ongoing process in which the Secure OS security services layer. Nevertheless, there are the concept of a TEE is gaining support. Stay tuned for more scenarios where different TAs must collaborate and exchange progress in TEE embedded software development. information securely, such as the aforementioned content pro- tection scenario employing DRM and HDCP link protection. Asaf Shen is VP of marketing and IP products at Discretix. The road ahead Notwithstanding its accompanying security benefit, the task Discretix of distributed embedded software development using TEE [email protected] and REE is not trivial, and compared to traditional develop- www.discretix.com ment actually hinders the development cycle. Being a rela- Follow: BLOG f in tively nascent technology, this finding is not surprising. The

16 | November 2012 Embedded Computing Design www.embedded-computing.com INNOVATORS THINK STATUS-QUO IS LATIN FOR “I QUIT.”

Some people refuse to accept things as they are. For them, there’s Wind River. Our world-class RTOS and open source solutions power breakthroughs in industries from aerospace to automotive and mobile to manufacturing. In fact, we’re at the heart of more than a billion embedded computing devices worldwide. And we’re not about to stop. We’ll continue to provide the security, safety and reliability innovators need to push the boundaries of the possible. Because no matter how good things may be, we’re more interested in what they’ll become.

www.windriver.com/innovators INNOVATORS START HERE.

WRV002 BrandWindmill OpenSystems 8X10.875.indd 1 10/3/12 5:28 PM Security

|

Software

Embedding security into data management

By Sasan Montaseri

Securing data is becoming more critical and more difficult to accomplish as embedded application development has increased in complexity, especially when different communication protocols are incorporated into embedded designs. Developers need to know the options for managing data in a secure way and understand the role of a database in maintaining security over data management channels.

Security is an important consider- data securely across all phases of devel- to the design, security supervision ation when mobile devices and other opment for embedded systems. Whether becomes more problematic, and devel- embedded systems interoperate with an engineer is building a mobile device, opers must learn about various options other systems and components. solar inverter, medical equipment, or any such as securing the socket layer so data Unauthorized access, eavesdropping, other embedded system, data security is can be accessed safely. session hijacking, and other security the riskiest part of a design. threats can result in irreversible damages Securing data at the application level such as data loss, intellectual property Authentication and encryption tech- Databases and applications can offer theft, and malfunction. nologies are essential to secure data a safe haven to make data secure. storage and distribution, but what does Developers can encrypt data before Data management security is a fun- an embedded developer need to know it leaves the application and arrives damental requirement of applications to secure an embedded database? As in the database, but this is only viable developed for embedded systems. securing data becomes more critical for unsearchable data. For example, an From industrial automation and medical and regulators and consumers demand embedded system that manages secu- devices to solar power inverters and serious data protection, an application rity for a gate will have a list of staff even home entertainment systems, developer might ask: How do I ensure and their credentials, such as PINs or data must be protected both at rest on that my application will be secure? passwords. The credentials should be the device and during communication. Should data be secured at the appli- encrypted by the application so they But who bears responsibility for data cation level or at the database level? can be verified individually. However, security? All device components must Can security be implemented by simply any information used to identify or list employ a security-conscious design, assembling the right combination of staff members must not be encrypted by from the application and embedded technologies? the application. database down to the hardware. As long as data remains local to an Physical security is also important. A Safeguarding embedded data embedded system with no communica- gate security system should not store Embedded application development is tion layer, security management is not data on removable flash media that becoming more complex, and developers very complex. However, as communica- could be easily replaced to circumvent are interested in learning how to manage tion protocols such as TCP/IP are added security. However, even if data is stored

18 | November 2012 Embedded Computing Design www.embedded-computing.com internally, a dedicated attacker with physical access to the device can almost always access the data stored there. Storage-level encryption is necessary to protect sensitive data in this scenario. Computing/HMI Serial I/O

Securing data at the database level Encryption is a recognized security method where data is encoded with a COM Express: specific encryption key and the same The Advantage of Custom. The Convenience of COTS. data can only be read by supplying the same key. File encryption is a way COM Express modules and Sealevel custom carrier to keep the data secure, as it will block boards provide the advantages of custom solutions with access to each database file until the the conveniences of COTS. Sealevel can include common application provides the correct key. I/O features such as serial, analog and digital I/O, all of This method protects data in case of which are designed to the exact electrical and mechanical media theft and, as long as access to requirements for your specific application. data is limited to local connections, is a preferred method for offering security. Sealevel COM Express In the past, encrypting data before it designs offer: left the system was a common way to > Scalability for easy manage and secure data. However, upgrade this approach can make it difficult to > Application specific analyze data and search for individual I/O information. > Flexible mechanical configuration Securing remote access and > Vibration resistance data distribution > Extended operating Take advantage of Sealevel’s Database security is important to devel- temperature engineering expertise and let opers who are concerned with data us help create a custom design > Long-term availability confidentiality, integrity, and availability. to fit your application. > Superior life cycle While steps such as creating a procedure management for end-user access can restrict physical access, database security requires spe- To see the design capabilities, reliability improvements cial attention and greatly affects risk and design control advantages that a Sealevel COM management for an embedded system. Express carrier board design will bring to your next Developers of mission-critical applica- product, visit our Design Center to watch a short video at tions and business intelligence systems experience critical safety vulnerabilities at sealevel.com/ecd/com. if malicious systems on the network or malware applications intercept access to confidential data.

How can a developer secure remote access from an unauthorized session? Remote access requires protection from unauthorized access, as well as eavesdropping and session hijacking. These faults can be caused by a lack of security for data management and data distribution.

When consumers access data remotely, sealevel.com > [email protected] > 864. 843. 4343 they might connect to the database without authorization, allowing anyone to access this data online. Therefore, it is necessary to implement an autho- rization token so consumers can use Learn more about COM express custom solutions at passwords to access the database. This sealevel.com/ecd/com or scan this QR code with your smart phone. © 1986-2011, Sealevel Systems, Inc. All rights reserved. Software | Security

secures communications to prevent direct access to the database by an unauthorized party.

Embedded database security features Some applications collect data locally and periodically post that data to a server on the Internet. Other computers on the Internet or local network can observe or tamper with that connec- tion if it is not encrypted. Developers often look for security and authentica- tion features in the embedded database to offer flexible data safety techniques that address these problems. Using database security features, developers can achieve data security in embedded applications by encrypting both network communications and storage media.

ITTIA DB SQL is a database software library for mobile devices and other embedded systems that offers secure file storage, remote access, and replica- tion (see Figure 1). Whether a database file is only accessed locally or shared over a public TCP/IP network, the en- cryption features provided by ITTIA DB SQL ensure that data is protected from unauthorized access, eavesdropping, and session hijacking. Figure 1 | The ITTIA DB SQL embedded relational database management system To protect data at rest on a device, each offers secure file storage, remote access, and replication. database file can be encrypted with an AES-128 or AES-256 key. Advanced (SCRAM) that does not require the embedded devices, software developers Encryption Standard (AES) is a data database password to be transmitted must consider the security implications encryption specification that has been over the network. This ensures that of data sharing and storage. Selecting adopted by the U.S. government and only authorized parties can initiate a an embedded database that provides other governing bodies across the connection and modify the embedded the required features is critical to the world. Even if the database is removed database. specification and design of secure appli- from the device, it cannot be read or cations. While it is ultimately up to the modified without the encryption key. As Connections over a public network such application to implement adequate a result, sensitive data can be stored on as the Internet should also secure the security measures, an embedded data- or backed up to the removable media communication channel with Transport base that offers the fundamentals for on a consumer mobile device without Layer Security (TLS) or its predecessor, managing security is essential to protect compromising security. Secure Sockets Layer (SSL). This pre- embedded designs. vents eavesdropping from other devices Security becomes an even greater on the network and man-in-the-middle Sasan Montaseri ­concern when an embedded device can attacks such as session hijacking that is the founder share data with other devices and back- can compromise security even after an of ITTIA. end systems. Whether data is shared authenticated connection is established. over an active client/server connection ITTIA or through passive replication, commu- Whether an application targets [email protected] nications should be authenticated using Windows, Linux, Android, ThreadX, www.ittia.com a protocol such as Salted Challenge QNX, or one of the many other oper- Follow: in Response Authentication Mechanism ating systems commonly found in

20 | November 2012 Embedded Computing Design www.embedded-computing.com Software

|

Security

Control issues: From protecting IP to monetizing it

By Michelle Nerlinger

Beyond the challenges of a tough economy and fierce competition, embedded developers face problems with deliberate and unintentional misuse of their software, competitive IP theft, and tampering. While implementing an effective and IP theft prevention plan can guard against security threats, it’s only the first step needed to unlock the potential value of source code. Organizations must understand how to use advanced licensing systems to protect against risk and better monetize their work, all while reducing operating costs.

Embedded developers are evolving. As embedded systems transition to become combinations of solution-specific software running on off-the-shelf hardware, the value of Intellectual Property (IP) has increasingly transitioned to software. This evolution marks a significant change in how these hardware-turned-software vendors must operate to maximize prof- itability and continue delivering a positive customer experience.

To successfully monetize their IP, intel- ligent device manufacturers need to leverage the four aspects of a successful software monetization strategy: control, packaging, management, and tracking (see Figure 1). Each aspect directly affects profitability by either helping reduce costs or increase revenue.

The reality is that today’s embedded device manufacturers are facing a much Figure 1 | A comprehensive software monetization strategy hinges on four key more complex business environment that factors: how effectively software publishers can package, control, manage, and monitor goes well beyond providing protection their offerings. www.embedded-computing.com Embedded Computing Design November 2012 | 21 Software | Security from tampering and reverse engineering they have not paid for or, even worse, customer wanted to upgrade to a pre- of their products. Software monetization result in regulatory compliance problems. mium device, they would have to return strategies for intelligent device manu- Without proper protection, intelligent their old device and wait for the vendor facturers must take into account how device vendors are unknowingly leaving to ship them a new one. these core elements are connected. their code vulnerable to tampering. Considerations such as profitability, With feature-based licensing and enti- user experience, and usage control By effectively controlling access to tlement management, device manu- directly affect each other and should software source code, intelligent device facturers can develop and maintain a be approached comprehensively. When vendors can protect revenue and safe- feature-rich application installed on all software monetization strategies are guard the integrity of their brands and devices. The functionality of the device implemented successfully, the intelligent products by preventing product tam- is controlled through licensing. This device manufacturer can offer a more pering, reverse engineering, and IP theft. enables software vendors to ship the efficient experience for the user and a same product with different functionality more profitable solution to the market. Usage control to different customers at varying price It all begins with controlling IP. Usage control is the next piece of the points and upgrade products remotely monetization puzzle. Vendors must be with lower support and fulfillment The key to controlling IP able to control the use of their software costs, thus delivering a better customer Intelligent device manufacturers put at the product and feature level to pre- experience. hours and hours of time and know-how vent overuse of their offerings – delib- into developing unique software code erate or unintentional – and ensure that Tracking usage to evolve business that meets the needs of their customers they are being fairly compensated. As strategies and drives their businesses. Controlling the intelligent device market continues The benefits of software licensing do not that IP is the foundation of software to mature, it will be critical for vendors stop with control or packaging enhance- monetization, as intelligent device to minimize manufacturing costs while ments. Implementing a sophisticated manufacturers face problems with delib- achieving greater flexibility in their licensing and entitlement management erate and unintentional misuse of their product packaging. This is accomplished system also provides a means to to track software, product and feature overuse, through feature-based licensing. By pro- product activation and usage right down competitive IP theft, product reverse viding customers the flexibility to license to the feature level. Intelligent device engineering, and code tampering – all software features of intelligent devices vendors can use this information to problems that have plagued tradi- already on premise, and by controlling drive decision-making around product tional software organizations for years. access to that software, vendors can packaging, roadmap investment, sales, The key to controlling access and use create new revenue opportunities. and marketing strategies. Product man- of a device involves controlling who is agement and engineering teams can dis- granted access to the software running Leveraging control to improve continue feature combinations that are the device, when they’re granted access, customer experience unpopular and create software packages and to what extent. An effective software licensing strategy containing the most valued features that will not only give vendors the means to customers want. Access control control how their software is accessed The software embedded within an intel- and by whom, it will also provide them Marketing and sales teams can utilize ligent device is typically a vendor’s most with a tool to help develop sophisti- customized reports to determine what, valuable asset. It not only holds all the cated packaging and pricing strategies. when, and how products are being used development secrets hackers or compet- In addition to preventing unauthorized and leverage this data to plan, launch, itors would love to gain access to, it also access, these systems lay the ground- and execute more effective sales and determines how the product functions. work to change how the intelligent marketing activities (see Figure 2). End- Stolen code can end up in the hands of device industry is able to do business. user registration data can also help competitors or be used to reproduce Control over software at the feature level vendors who sell via multiple channels knockoff versions of a similar product. enables vendors to consolidate hardware to identify and gain direct access to stock-keeping units and provide remote every individual who uses one of their While theft of trade secrets is one threat, upgrade and support services, in addi- products. for many intelligent device manufac- tion to opening the door to a whole new turers, so is tampering. Both scenarios world of marketing and sales tools. Licensing best practices: case studies have great potential to damage overall Because most intelligent devices, soft- market share and therefore decrease In the past, if a vendor wanted a pre- ware and licensing systems, end users, revenue potential. Tampering with the mium and a standard version of a piece and ecosystems are all unique, examples software embedded within a device can of equipment, they would build two of licensing best practices can help illus- change how the device functions. This applications for installation on two dif- trate some key elements of an effective can provide users with access to features ferent hardware platforms. If a standard software monetization strategy.

22 | November 2012 Embedded Computing Design www.embedded-computing.com Industrial Controllers

EMS http://ems2-demo.na.sentinelcloud.com/ems/entitlementMain.html Powerful, Rugged, A ordable EMS ENTITLEMENT MANAGEMENT SYSTEM 2.0.0 Welcome admin Logout Change Password Help Series starts at qty 100 Home Entitlements Activations Reports Customers Catalog Users Configure Channel Partner Tools 199 Most Popular Most Popular Most Popular Entitlements Show All Activations Show All Top 5 Customers Feature License Model Region qty 1 Monthly Weekly Daily Monthly Weekly Daily Last Year Last Month Last Week 229

6 6

5 5

4 4

3 3

2 2

1 1

0 0

Mar Apr May Jun Jul Aug Sep Mar Apr May Jun Jul Aug Sep

License Expiring in next 30 days Show All Pending re-credit for revoke Show All Customer AID Expires On Customer RID No records found. No records found.

New User Registrations Show All High selling products in last 30 days Show All Figure 2 | SafeNet’s Sentinel EMS helps vendors monitor software usage to better understand their customers.

Example 1: Protecting software code processes such as pasteurization. This picture of TS-8820-BOX from theft and resale company used a software monetiza- The first example is a software publisher tion solution to protect the software 250MHz (ARM9) or 800MHz who provides a compression algorithm from being accessed and control who (ARM9 or Cortex-A8) CPU that is nearly lossless. It is imperative can change the parameters that control Fast startup (under 3 seconds) that the algorithm not be deciphered the machines. Fanless operation from -20°C to +70°C because it is critical IP and unique in User-programmable opencore FPGA this company’s industry. The software Confidence in greater protection publisher leveraged the code-wrapping Shifting from an equipment manufacturer Program in Ladder Logic or C feature of a software licensing solu- business model to that of a software Debian Linux tion to protect their code from reverse company does not happen overnight Modbus support engineering and therefore protect their and typically occurs in phases. Intelligent PoE capable 10/100 Ethernet competitive IP from getting into the device manufacturers who embrace the USB 2.0 high speed Host Ports hands of pirates or the competition. transition and use software monetiza- tion tactics to overcome the challenges Industrial screw-down connectors Example 2: Leveraging feature-based they face will be able to vigorously Opto-Isolated DIO, Digital Counters, software licensing pursue greater market share and reduce Quadrature Another example is one of the largest manufacturing and inventory costs with Up to 46 DIO with PWM networking companies in the world that the confidence that they are protected Temperature Sensors decided to monetize the software that against competitive threats to their IP. Opto-Isolation available for RS-232, ships on their appliances. The company They will also be able to more cost- RS-485 and CAN used a sophisticated software licensing effectively expand their product lines DIN mount option and entitlement management imple- and bring innovative devices to market. mentation to protect their code and In short, those vendors making the tran- Design your solution with created smart, feature-based licensing sition to a software business model will one of our engineers packages for their enterprise customers be more nimble and better positioned to maximize the return on their IP. for the future. Over 25 years in business Never discontinued a product Example 3: Protecting software Michelle Nerlinger Engineers on Tech Support from tampering is director of Open Source Vision The last example is a company in the product marketing manufacturing industry that develops for SafeNet’s Custom products w/ excellent pricing and machines that create end-to-end pack- software turn-around time aging of consumer food products such monetization Most products ship next day as milk and orange juice. The software solutions. that runs these machines is programmed to comply with dozens of public health SafeNet and safety regulations. The company’s [email protected] Technologic IP protection concerns centered around www.safenet-inc.com/software- Systems monetization-solutions controlling access to the software run- We use our stuff. ning the machines and the ability to visit our TS-7800 powered website at Follow: BLOG f in tamper with key parameters that control www.embeddedARM.com (480) 837-5200

Ad Measures 2 3/4 + 3/16 X 10 7/8 + 6/16 Digital signage and touch screens Digital signage and touch

|

Designing hardware for success in the digital signage

Strategies market

By Barry Husbands

Digital signage is a big business that is constantly growing and changing. To stay competitive, digital signage suppliers are turning to small, low-power, low-cost hardware platforms. Embedded designers targeting digital signage systems must recognize the challenges of this market and leverage new technologies to provide the graphics capabilities and low power consumption required for these applications.

The challenge of a mature market In many ways, the digital signage market To meet the demand for small, low- The growth of digital signage is being is now quite mature, so the players must power hardware for lower-end digital driven by the fact that product sales work harder to find new business. As signage applications, designers are using increase when local advertisements are a result, the market is moving toward ARM-based smart phone technology as displayed. Various reports show sales low-power, small-footprint, lower-cost the basis of the hardware platform. increases from 8 percent to 50 percent hardware/software products. This trend Offering power consumption of 1 W to due to digital signage use. Furthermore, is helping the industry maintain exist- 2 W, no moving parts, ultra-compact users have developed a need for more ing clients and penetrate new areas to size, high-temperature operation, and information and entertainment and have maintain sales revenue. rich functionality, the latest ARM-based become more accustomed to digital devices with 720p/1080p graphics signage. Meanwhile, the cost of digital ARM-based low-power technology engines and support for Windows CE/ signage has reduced, thus increasing the The digital signage industry comprises Embedded Compact, Android, or Linux opportunity for vendors to achieve sub- several major software suppliers including enable the creation of small, rugged, stantial ROI on capital expenditures for Scala and Omnivex. These companies low-cost platforms that are ideal for screens, software, players, and content develop high-level application software this next stage of the industry. This new management. that enables the screen to be configured, technology is helping digital signage messages to be scheduled, and general companies target small retail organiza- Improvements in broadband communi- system performance to be controlled. tions, hotels, and sporting venues, as cations have also contributed to this well as offering shelf-side digital signage growth, allowing content to be streamed This application software runs on an products in retail outlets. to digital signage systems rather than embedded hardware platform. The circulated by flash disks or DVDs. Real- most common form of hardware is an Design requirements time changes to content and scheduling embedded PC running Windows XP One of the major challenges of devel- are now common and, along with other Embedded from a hard drive. This choice oping hardware for digital signage is technology advancements, are expand- is primarily driven by the low cost and ensuring true 24/7 reliability. The cost ing the market for digital signage. scalability of Windows XP Embedded. of sending an engineer to the site to

24 | November 2012 Embedded Computing Design www.embedded-computing.com investigate and repair a system can be RS-422/485, audio, SD, GPIO, real-time expensive and, if numerous trips are clock plus battery, touch-screen con- necessary, can easily ruin a business troller, 7 V to 36 V DC power input, model. To curtail these expenses, digital Wi-Fi, and Bluetooth. The platform is signage hardware must be designed built to industrial computer standards to work continuously without technical and has an extended temperature range problems in difficult environments. of -40 °C to +85 °C at 600 MHz to ensure reliability. For projects with a large rollout, custom- Figure 1 | The Blue Chip RE2 ARM- ers require hardware with a long life Utilizing dual- and quad-core ARM based SBC offers graphics capability to cycle. They want to deliver the exact Cortex-A9 and Freescale i.MX6 tech- drive 720p resolution video content in same hardware to ensure that the costs nology, the RE3 platform will soon be digital signage applications such as the of management and ownership are as available, offering additional features public phone-charging kiosks pictured low as possible. Any variation of the such as SATA, video capture, Mini at the beginning of this article. deployed hardware will add cost to the PCI Express, SIM socket for 2G and creation and maintenance of software 3G/4G, and four USB 2.0 host ports. As this hardware can be running 24 hours images, spares, and so on. Hardware The RE3 can also drive two indepen- a day, often as a multidistributed system, design should therefore be sensitive to dent displays simultaneously. While energy usage has become an important the life cycle of all components in the resolutions depend on one or two dis- factor for the decision maker. The digital signage player. In contrast, with plays being driven, 1080p plus another market is now embracing extremely small projects, customers are more likely ­high-resolution screen is achievable. low-power devices. Cost of ownership to request the latest technology, regard- (maintenance contracts and license less of the long-term ramifications. Improved networking and bus tech- costs) has become a similar issue, nologies are also enabling intelligent whereby end users are now desiring A final design consideration is the distributed systems, remote configu- license-free products they can own and electrical environment in which digital ration, and video streaming. Although manage themselves. In this respect, signage is often used. One example Wi-Fi has been welcomed by many control software is moving toward more of a potentially harsh environment is a industries, the digital signage sector simple and intuitive interfaces. railway station, where noisy mains and has some concerns about data security, temporary power outages can occur. so it is not currently featured in digital Exceeding design expectations These risks affect the design of the signage systems. The success of a digital signage system power supply (holdup time, backup, and boils down to the ROI that the customer filtering), as well as the bootloader or Choosing whether or not to use sound gains from the project. The system has BIOS, given that specific software might in a digital signage installation can be a to work, offer impressive features, and be essential to enable reliable power- tricky decision. While the added impact be reliable. All in all, it can be a tough up and graceful shutdown/reboot to of sound cannot be ignored, there is market to keep up with. protect the quality of service and meet a fine line between an attractor and a availability criteria. repellent. If sound is perceived to be However, with many advancements too loud, it can be irritating to the target made in embedded systems technology Leveraging technology advancements audience. If it is too quiet, then it can during the past few years, engineers have Addressing these design challenges, the be ineffective. Various mechanisms have been able to meet and even exceed the latest-generation ARM-based fanless been employed to sample the ambient expectations of the digital signage mar- SBCs enable a fit-and-forget approach noise and then select the “correct” ketplace. As a consequence, it remains to digital signage players, which is vital volume level. When sound is required in an important sector for SBC manufac- in these cash-starved times as costs for news or entertainment broadcasts, most turers and silicon suppliers. installation, support, and maintenance hardware platforms provide a line-level are being squeezed. output using an audio chip for feeding Barry Husbands into an external audio system. is the managing For example, the Blue Chip RE2 digital director of Blue Chip signage platform (Figure 1) uses the Cost of ownership Technology. ARM Cortex-A8 processor and a In the past, success in the marketplace Texas Instruments C64x DSP to handle used to come down to the screen, then high-quality graphics such as moving software, then the player’s graphics media or 3D while managing complex ability, and after that, cost of purchase. Blue Chip Technology tasks. Various peripherals and connec- Today, success tends to be driven by [email protected] tivity options are supported, including cost of ownership, power consumption, www.bluechiptechnology.co.uk LCD (RGB/LVDS), DVI/HDMI, RS-232, and software capabilities. www.embedded-computing.com Embedded Computing Design November 2012 | 25 Digital signage and touch screens Digital signage and touch

|

Expanding the possibilities of multitouch functionality

Strategies By Andrew Morrison and Ian Crosby

With the touch-screen sector now entering a new phase of innovation, the issue of applying multitouch operation to the larger format displays found in industrial and public use settings is becoming a key engineering concern. Designers must examine the sensor technology options available today and consider using new single-layer project capacitive sensing technology to enable sophisticated human-machine interactions in large displays destined for harsh environments.

Multitouch sensor technology has the functionality. However, certain obstacles mutual capacitive, which measures potential to revolutionize the way we are inhibiting the adoption of multitouch charge/discharge across a crossover or connect with all manner of electronics in these nonconsumer sectors. node between adjacent cells created hardware, giving touch-screen-based by an X-Y grid, tends to be less sensi- Graphical User Interfaces (GUIs) the The larger format multitouch sensor tive in the Z-axis and thus typically only ability to recognize complex gestures options currently on the market, though works well with thin glass. However, using several fingers such as rotating, acceptable for personal use such as mutual capacitive sensing offers the two-digit scrolling, three-digit dragging, all-in-one touch PCs, have serious ability to detect more than two inde- and pinch zoom, as well as allowing shortcomings when applied to more pendent touch points when mated with multiple users to collaborate. Analyst demanding application scenarios. Both the appropriate control electronics and firm Markets & Markets predicts that infrared and camera-based systems software. As a result, this technology the global multitouch business will reach require an exposed bezel for housing has been chosen in recent years as the $5.5 billion by 2016 (constituting more sensor elements. This means that, in principal method of bringing multitouch than 30 percent of the total touch panel addition to increasing vulnerability to functionality to consumer applications. market by this stage). The multitouch seg- damage from external forces, the buildup ment is currently exhibiting a compound of dust or dirt in the bezel recesses can Pros and cons of mutual annual growth rate of more than 18 per- hamper operational performance over capacitive sensing cent, with the portable consumer sector time. These systems also suffer from The current breed of mutual capacitive driving the vast majority of this growth. sensor drift and need regular recalibra- touch screens usually relies on Indium tion to rectify this. Tin Oxide (ITO) as the conductive Moving forward, the problem for design sensing medium. ITO is already widely engineers is knowing how to bring the Certain forms of projective capacitance used throughout the display industry multitouch capabilities that are already such as self-capacitive types, which by and provides the benefit of being becoming commonplace in smartphones their nature are extremely sensitive in near-transparent. and tablet PCs to other areas that could the Z-axis, have proved to be well suited also derive benefit from them. Digital for rugged touch-screen implementa- Though ITO has been a successful choice signage, Point-Of-Sale (POS), public infor- tions and can measure two independent in touch screens, it has certain limitations mation, and industrial control systems touch points simultaneously. Another when applied outside the consumer could profit greatly from this sort of form of projected capacitive sensing, arena. First of all, although conductive,

26 | November 2012 Embedded Computing Design www.embedded-computing.com ITO has a relatively high electrical resis- for tooling associated with conventional tance. This means it generally has fairly ITO constructions. As a result, hardware weak through-glass performance, only designers wishing to create attention- able to detect touch through a front grabbing, unique-looking user interfaces overlay thicknesses of ~2 mm. Secondly, could be forced to settle for generic ITO is only suitable for use with smaller touch-screen designs. display formats, as the impedance builds up over the length of the con- Engineers also face technical and ductive track. This means that sensor economic challenges when trying to systems’ signal integrity levels will not be incorporate projective capacitive-based acceptable once the displays involved multitouch functionality into designs have diagonals that are much beyond where either large form factors or a rela- 22", unless high input power, complex tively small number of units is involved, SWITCHES tiling arrangements, or other elaborate both of which are possible scenarios in & IP ROUTERS approaches are utilized. Finally, conven- nonconsumer design projects. However, More than 3O models... VPX, VME, cPCI tional ITO-based sensors do not permit projective capacitance sensing still ComEth 4410a flexibility in their production, as each proves to be the best way to ensure the new sensor design or size requires a longevity of touch screens in demanding separate set of photolithographic tools environments. to be created (see Figure 1). This calls for considerable upfront investment and A new approach to projective can only be justified if a large enough capacitive sensing number of units will be manufactured The engineering team at Zytronic has to cover the initial outlay, which can developed a mutual capacitive sensing be anywhere from $5,000 to $30,000 approach that overcomes several signifi- depending on size and complexity. cant hurdles, delivering a durable pro- • Data/control Planes 3U VPX switch jective capacitive sensing mechanism • Six 4-lanes ports (PCIe x4 Gen2) Consider the example of an interactive that can simultaneously support at least • Up to ten Giga Ethernet Ports digital signage or low-volume, custom- 10 independent touch points and be ized POS system. The display formats realized on display sizes above 70". This required for this system would prob- multitouch system is based on the com- SBCs ® ® ably be too large for an ITO imple- pany’s patented Projected Capacitive Intel & Freescale processors mentation, plus the limited front glass Technology (PCT), where an intricate TM thickness (typically 1-2 mm at most) sensor matrix comprising copper capac- QorIQ is unlikely to be strong enough for itors 10 mm in diameter is embedded the demanding, public-facing, high- into a laminated substrate. use environments in which it would be • P5020, or deployed. Furthermore, in many cases, This substrate can be placed behind a • P3041 the specialized nature of an interactive thick protective overlay of glass or poly- digital signage or POS system means carbonate to protect it from various ® TM that the number of units produced forms of potential damage. It can detect Intel Core i7 might not justify the high initial outlay touch events through up to 6 mm of

• 2nd or 3rd Gen • Dual or Quad Core TM • with a Kintex 7 • and its personality module

www.interfaceconcept.com Figure 1 | A conventional ITO-based multitouch sensor comprises many different layers. +33 (0)2 98 573 030 www.embedded-computing.com Embedded Computing Design November 2012 | 27 Strategies | Digital signage and touch screens

toughened glass, effectively doubling the projective overlay thickness that can be specified and thereby providing increased protection from impact, scratches, vibration, and exposure to harsh chemicals or extreme tempera- tures. Furthermore, this mechanism can be operated by gloved hands, making it highly suited to uncompromising indus- trial environments, or via a conductive stylus, allowing users to write directly Figure 2 | A single layer of copper electrodes replaces a multiple-layer ITO-based onto the screen. multitouch sensor.

By utilizing the same proven, maskless plotting process used to produce self- capacitive PCT screens for more than a decade, sensor formats can be scaled up as required, without accruing non- recurring engineering costs for photo- lithograph masks. This means that the volume of units does not negatively affect the commercial viability of the project employing multitouch opera- tion, allowing small-volume business to take advantage of this functionality Figure 3 | Image mapping can be used to determine the positions of several different in the same way as it is being sported touch points at once. in high-volume, consumer-oriented products. Energy transfer is localized to the inter- is now presenting the industry with section where the X and Y electrodes of an economically viable way of imple- The multitouch PCT sensor works in the multitouch PCT touch sensor cross. menting multitouch functionality that combination with Zytronic’s ZXY200 An image map of the energy received is can be supported both on large format touch controller. This device processes then generated from the measurements, displays and in harsh environments. This all touch event data being captured and the position of each touch point sophisticated human-machine interac- by the proprietary design copper array can be determined (see Figure 3). With tion could effectively become ubiquitous laminated to the rear of the glass sensor. multiple touch points being detected and as a result, no longer restrict com- Using a mutual capacitive approach on the screen, true “palm rejection” plex gesture recognition or simultaneous means that each of the intersecting functionality can be incorporated, with manipulation by several different users nodes created in the pattern is individu- touch performance in no way hampered to portable gadgets. ally monitored by the controller running by users resting their hands, arms, or proprietary firmware, which is optimized elbows on the screen. The ability to Andrew Morrison, for the use of copper and lower resis- operate with gloved hands makes it PhD, is technical tance (hundreds of Ohms/m compared particularly appropriate for use in out- director at Zytronic. to ITO’s thousands of Ohms/m), plus door environments such as retail and the resulting improvement in Z-axis sen- public information applications, as well sitivity and ultra-large-size capability. as in medical and industrial deployments Furthermore, because the copper wires where users need to wear protective are coated in a dielectric, it is possible clothing. to deposit the electrodes in a single Ian Crosby is sales ­process/layer, resulting in a simplified Innovative, versatile human-interface and marketing cross-sectional structure to the sensor technology director at Zytronic. (see Figure 2). This is not possible with Projective capacitive multitouch tech- ITO, as multiple layers need to be nology has already seen widespread Zytronic deposited to create the more complex uptake in the portable consumer space, [email protected] diamond electrode pattern that this where high-volume and small form factor www.zytronic.co.uk requires, with the X and Y electrodes designs are endemic. The emergence Follow: f in being isolated from one another. of innovative single-layer technology

28 | November 2012 Embedded Computing Design www.embedded-computing.com Integrated UPS SuperServer UPS Integrated * Supports Intel®Xeon® Processor* Supports family E5-2600product (with dual BBP™modules) SYS-1027R-72BRFTP SC 2012,Nov.12-15 Salt PalaceSalt Convention Center Featuring Power Backup Battery (BBP™)module th N +Function Module Battery (1000W) PWS-1K03B-1R * Intel Intel ® Short-Depth Battery Module Battery Short-Depth (200W) PWS-206B-1R ® , theIntel® , theIntel® Booth 817 Booth logo, Xeon® logo, Xeon® © Super Micro Computer,© SuperMicro to changewithout notice. Inc.Specifications subject © Super Micro Computer,© SuperMicro to changewithout notice. Inc.Specifications subject , andXeon® , andXeon® All other brands and names are the property oftheirrespectiveAll owners. otherbrands andnames are theproperty www.supermicro.com/BBP www.supermicro.com/X9 All other brands and names are the property oftheir respectiveAll owners. otherbrands andnamesare theproperty Inside, are trademarks orregistered trademarks ofIntelCorporation in theUSand/orothercountries. Inside, are trademarks orregistered trademarks ofIntelCorporation in theUSand/orothercountries. 3U Storage * Solutions • • • • • BBP™ Key Benefits: More cost-effective and higher efficiency thanusing traditionalUPS More cost-effective andhigherefficiency Frees deployment UPSspace to density increase server orfunctionality performance sacrificing Advanced design incorporates server UPSprotection without Hot-swappable andeasilydeployed Increases overall data center power efficiency monitored andmanagedviaIPMI. monitored BBP™ modulestatus information isconveniently UPS systems runningat 95%efficiency. TheSupermicro $2K/rack/year whencompared to singlerack 20KVA online with acost-effective infrastructure solutionandsaves a fullcharge, thesystem lowers power consumption Using lessthan1Wat 99.9%power tomaintain efficiency eliminating power asasinglepoint offailure. delivery the mostrobust protection againstpower disruption, strengthen andstorage Supermicro solutionswith server these newredundant, modules backup) BBP™(battery Available packcapacities, in200Wand1000Wbattery BBP™ Supermicro 2U Twin * Solutions ® Module Solution Solution

1U Short Depth Solutions * * Solutions Depth 1U Short

SMCI-20121020 - 2 -community Beat Keeping the embedded conversation going

By Jennifer Hesse www.embedded-computing.com

BLOGS | MARKET STATS | SURVEYS | VIDEOS | SOCIAL NETWORKING

CPU+GPU smartphone Ultrabooks propel motion sensor growth ▲ powers fun with The cool features that characterize smartphones virtual mirrors and tablets such as gaming, indoor navigation, Puzzle fans can take and augmented reality are expected to boost their game to the the motion sensor market as Intel pushes to next level by playing incorporate these elements into ultrabooks. Global the Magic Mirrors sales of motion sensors including accelerometers, augmented reality app gyroscopes, and compasses used in ultrabooks developed by ARM will jump from $8.3 million in 2012 to $117.3 and available on the Samsung Galaxy Note. The player places million by 2016, a compound annual growth rate of markers on a table and looks through the smartphone to view 93.9 percent, according to the IHS iSuppli MEMS high-poly 3D objects being accelerated by an ARM Mali-400 MP & Sensors Service. GPU. To solve the puzzle, the player must move virtual objects Thus far, accelerometers have been the only type such as mirrors, prisms, and portals to manipulate a virtual laser of motion sensor used in notebooks to protect the beam and aim it at the projection of a flask containing a bub- Hard Disk Drive (HDD) in the event of a dropped bling liquid. An ARM Cortex-A9 CPU handles tag detection and computer. While that market was destined to decline image processing while the quad-core Mali-400 GPU renders with Solid-State Drives (SSDs) eliminating the need for the 3D content and applies unique shader effects to each object. HDDs, the advent of ultrabooks gives accelerometers Watch the demo at http://opsy.st/UR6X6C. revived relevance in notebook PCs to enable functions See more videos in our library: such as auto screen rotation. Ultrabooks will also http://video.opensystemsmedia.com. open new growth opportunities for compasses and gyroscopes, typically used for gaming and navigation in media tablets and smartphones. Read more: http://opsy.st/URigff

Global Forecast of Motion Sensor Revenue in Ultrabooks (Accelerometers, Compasses and Gyroscopes) (Millions of US Dollars) Linux TechChannel $140 Load up on Linux know-how at our Linux TechChannel, featuring articles, $120 white papers, and news from embedded $100 companies and organizations such as the Linux Foundation and the Linux $80 Professional Institute. Dive deep into the technical issues surrounding one of the largest and most active $60

free software projects in existence by checking out the E-casts $40 archived at our microsite, including an on-demand webinar from MontaVista Software, “Test Smarter & Faster – Keys to Efficient $20 Linux Software Test and Validation.” $0 Visit the Linux TechChannel at 2011 2012 2013 2014 2015 2016 http://tech.opensystemsmedia.com/linux. Source: IHS iSuppli Research, September 2012

Roving Reporter blog: Maximizing availability in industrial applications By Warren Webb Embedded control systems drive the critical and complex industrial machinery necessary to turn raw materials into finished goods in a factory environment. These systems must be designed for maximum reliability to avoid the high costs and lengthy delays involved with a production line shutdown, repair, and restart. To extend the uptime of these systems, designers have traditionally employed redundant hardware such as sensors and actuators that can be automatically substituted in the event of a failure. As factory control systems combine functionality and increase complexity to speed operation and lower overheads, designers are now employing similar measures to respond to and correct software malfunctions. To simplify this failover process and extend the availability of industrial applications, Intel has developed a number of technologies built directly into the latest generation processor architecture. Read more: http://opsy.st/SQryEW

30 | November 2012 Embedded Computing Design www.embedded-computing.com and PERFORMANCE OR SWaP

You Can Do More with Less. XPand6000 Series Small Form Factor (SFF) Systems from X-ES support the highest- performance Freescale™ QorIQ™ and 3rd generation Intel® Core™ i7 processors in the smallest SFF Systems available, at less than 72 in3 and 3.5 lbs. With COM Express processor modules, PMC/XMC I/O, and SSD storage, application-ready SFF Systems enable you to focus on your area of expertise. Call us today to learn more. Extreme Engineering Solutions 608.833.1155 www.xes-inc.com Tight on space and high in performance. That’s Extreme.