{"id":220232,"date":"2016-02-29T23:05:00","date_gmt":"2016-02-29T23:05:00","guid":{"rendered":"https:\/\/eenewseurope.artwhere.co\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/"},"modified":"2016-02-29T23:05:00","modified_gmt":"2016-02-29T23:05:00","slug":"green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/","title":{"rendered":"Green Hills Software apporte son architecture de s\u00e9curit\u00e9 aux processeurs d\u2019applications i.MX 7"},"content":{"rendered":"<p>Alors que les concepteurs de syst&egrave;mes s&#8217;emploient &agrave; transformer les syst&egrave;mes embarqu&eacute;s d&rsquo;hier en produits intelligents et communicants actuels, il leur faut une solution processeur\/logiciel unifi&eacute;e afin d&rsquo;assurer la s&eacute;curit&eacute; sur les r&eacute;seaux non fiables, d&rsquo;exploiter les modes &rsquo;veille renforc&eacute;e&rsquo; et afficher des interfaces homme-machine (IHM) plus riches. Pour tirer le meilleur parti de ces fonctions mat&eacute;rielles, ils ont besoin de logiciels puissants et &agrave; multiples facettes qui puissent &agrave; la fois g&eacute;n&eacute;rer du code performant et de qualit&eacute;, g&eacute;rer les cl&eacute;s de s&eacute;curit&eacute; pour prot&eacute;ger les donn&eacute;es sensibles et les blocs d&rsquo;IP embarqu&eacute;s, et se d&eacute;ployer sur une architecture d&rsquo;ex&eacute;cution de confiance regroupant des processeurs h&eacute;t&eacute;rog&egrave;nes 32 et 64 bits bas&eacute;s sur les familles ARM Cortex-A, -R et -M.<\/p>\n<\/p>\n<p>Sous l&rsquo;&eacute;gide du syst&egrave;me d&rsquo;exploitation temps r&eacute;el (RTOS) INTEGRITY, certifi&eacute; au plus haut niveau pour la s&eacute;curit&eacute;, et de l&rsquo;infrastructure s&eacute;curitaire de gestion de cl&eacute;s, l&rsquo;offre de Green Hills d&eacute;di&eacute;e aux processeurs NXP regroupe une famille de RTOS pr&eacute;-certifi&eacute;s &lsquo;s&eacute;curit&eacute;&rsquo; et &lsquo;s&ucirc;ret&eacute;&rsquo; ainsi que des outils de d&eacute;veloppement et des bo&icirc;tes &agrave; outils cryptographiques qui permettent aux fabricants de syst&egrave;mes embarqu&eacute;s de cr&eacute;er et d&eacute;ployer des produits s&eacute;curis&eacute;s innovants pour les points de vente, la domotique des b&acirc;timents, la maison intelligente et les syst&egrave;mes de surveillance de patients.<\/p>\n<p>La famille de processeurs d&rsquo;applications i.MX 7 combine plusieurs c&oelig;urs Cortex-A7 et Cortex-M afin d&rsquo;offrir des performances exceptionnelles tout en consommant tr&egrave;s peu d&rsquo;&eacute;nergie. Leurs fonctions mat&eacute;rielles de s&eacute;curit&eacute; comprennent une technologie cryptographique &agrave; courbes elliptiques, une d&eacute;tection active de toute tentative d&rsquo;intrusion et un d&eacute;marrage s&eacute;curis&eacute;. Le mode &lsquo;arr&ecirc;t renforc&eacute;e&rsquo; (Deep Suspend) r&eacute;duit la consommation en mode veille. Ces processeurs offrent des connexions &agrave; haut d&eacute;bit gr&acirc;ce &agrave; diverses interfaces du type PCIe et Dual Gigabit Ethernet et &agrave; la prise en charge des protocoles AVB. Par ailleurs, quatre domaines de ressources contr&ocirc;l&eacute;s ind&eacute;pendamment et s&eacute;curis&eacute;s contribuent &agrave; cr&eacute;er des partitions logicielles intelligentes et &agrave; isoler les menaces contre la s&eacute;curit&eacute;. <\/p>\n<hr \/>\n<p>&quot;Le processeur d&rsquo;applications i.MX 7 est un produits hautement int&eacute;gr&eacute; et multi-march&eacute;, con&ccedil;u pour permettre aux syst&egrave;mes d&rsquo;exploitation privil&eacute;giant la s&eacute;curit&eacute;, comme INTEGRITY, de s&rsquo;ex&eacute;cuter sans aucun risque dans des environnements portables et connect&eacute;s,&quot; confirme Ron Martino, vice-pr&eacute;sident de la ligne de produits i.MX chez NXP Semiconductors. &quot;C&rsquo;est avec satisfaction que nous voyons Green Hills, fid&egrave;le &agrave; sa tradition, prendre en charge une fois de plus les processeurs d&rsquo;applications i.MX avec INTEGRITY.&quot;<\/p>\n<p>&quot;La prise en charge par INTEGRITY de notre Syst&egrave;me sur Module (SOM) est une extension importante de notre ecosyst&egrave;me,&quot; ajoute Roman Schnarwiler, responsables des technologies de Toradex. &quot;L&rsquo;excellence de Green Hills Software en mati&egrave;re de s&eacute;curit&eacute; la destinait tout particuli&egrave;rement aux fonctions de s&eacute;curit&eacute; de l&rsquo;i.MX 7 et en fait la solution id&eacute;ale pour les projets &agrave; s&ucirc;ret&eacute;\/s&eacute;curit&eacute; critique destin&eacute;s au march&eacute; industriel\/embarqu&eacute;. Nous sommes heureux d&rsquo;avoir le RTOS INTEGRITY comme partenaire de lancement pour notre nouveau SOM Colibri iMX7.&quot;<\/p>\n<p><a title=\"www.ghs.com\" href=\"http:\/\/www.ghs.com\/\" target=\"_blank\" rel=\"noopener\">www.ghs.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lors du salon Embedded World 2016, Green Hills Software a effectu\u00e9 la premi\u00e8re d\u00e9monstration de sa technologie de s\u00e9curit\u00e9 de pointe sur les processeurs d\u2019applications i.MX 7 de NXP Semiconductors au travers le module Colibri iMX7 SOM de Toradex supportant INTEGRITY.<\/p>\n","protected":false},"author":22,"featured_media":220233,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[],"domains":[47],"ppma_author":[1149],"class_list":["post-220232","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","domains-electronique-eci"],"acf":[],"yoast_head":"<title>Green Hills Software apporte son architecture de s\u00e9curit\u00e9 aux...<\/title>\n<meta name=\"description\" content=\"Lors du salon Embedded World 2016, Green Hills Software a effectu\u00e9 la premi\u00e8re d\u00e9monstration de sa technologie de s\u00e9curit\u00e9 de pointe sur les processeurs...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/220232\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Green Hills Software apporte son architecture de s\u00e9curit\u00e9 aux processeurs d\u2019applications i.MX 7\" \/>\n<meta property=\"og:description\" content=\"Lors du salon Embedded World 2016, Green Hills Software a effectu\u00e9 la premi\u00e8re d\u00e9monstration de sa technologie de s\u00e9curit\u00e9 de pointe sur les processeurs d\u2019applications i.MX 7 de NXP Semiconductors au travers le module Colibri iMX7 SOM de Toradex supportant INTEGRITY.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/220232\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-29T23:05:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/import\/eci7693_green-hills_ghs604_toradex_photo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"504\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eeNews Europe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eeNews Europe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/\"},\"author\":{\"name\":\"eeNews Europe\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\"},\"headline\":\"Green Hills Software apporte son architecture de s\u00e9curit\u00e9 aux processeurs d\u2019applications i.MX 7\",\"datePublished\":\"2016-02-29T23:05:00+00:00\",\"dateModified\":\"2016-02-29T23:05:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/\"},\"wordCount\":734,\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/\",\"name\":\"Green Hills Software apporte son architecture de s\u00e9curit\u00e9 aux processeurs d\u2019applications i.MX 7 -\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\"},\"datePublished\":\"2016-02-29T23:05:00+00:00\",\"dateModified\":\"2016-02-29T23:05:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/test.eenewseurope.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Green Hills Software apporte son architecture de s\u00e9curit\u00e9 aux processeurs d\u2019applications i.MX 7\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\",\"name\":\"eeNews Europe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"caption\":\"eeNews Europe\"}}]}<\/script>","yoast_head_json":{"title":"Green Hills Software apporte son architecture de s\u00e9curit\u00e9 aux...","description":"Lors du salon Embedded World 2016, Green Hills Software a effectu\u00e9 la premi\u00e8re d\u00e9monstration de sa technologie de s\u00e9curit\u00e9 de pointe sur les processeurs...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/220232\/","og_locale":"fr_FR","og_type":"article","og_title":"Green Hills Software apporte son architecture de s\u00e9curit\u00e9 aux processeurs d\u2019applications i.MX 7","og_description":"Lors du salon Embedded World 2016, Green Hills Software a effectu\u00e9 la premi\u00e8re d\u00e9monstration de sa technologie de s\u00e9curit\u00e9 de pointe sur les processeurs d\u2019applications i.MX 7 de NXP Semiconductors au travers le module Colibri iMX7 SOM de Toradex supportant INTEGRITY.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/220232\/","og_site_name":"EENewsEurope","article_published_time":"2016-02-29T23:05:00+00:00","og_image":[{"width":504,"height":360,"url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/import\/eci7693_green-hills_ghs604_toradex_photo.jpg","type":"image\/jpeg"}],"author":"eeNews Europe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eeNews Europe","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/#article","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/"},"author":{"name":"eeNews Europe","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4"},"headline":"Green Hills Software apporte son architecture de s\u00e9curit\u00e9 aux processeurs d\u2019applications i.MX 7","datePublished":"2016-02-29T23:05:00+00:00","dateModified":"2016-02-29T23:05:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/"},"wordCount":734,"publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/","url":"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/","name":"Green Hills Software apporte son architecture de s\u00e9curit\u00e9 aux processeurs d\u2019applications i.MX 7 -","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/en\/#website"},"datePublished":"2016-02-29T23:05:00+00:00","dateModified":"2016-02-29T23:05:00+00:00","breadcrumb":{"@id":"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ecinews.fr\/fr\/green-hills-software-apporte-son-architecture-de-securite-aux-processeurs-dapplications-i-mx-7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test.eenewseurope.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Green Hills Software apporte son architecture de s\u00e9curit\u00e9 aux processeurs d\u2019applications i.MX 7"}]},{"@type":"WebSite","@id":"https:\/\/www.eenewseurope.com\/en\/#website","url":"https:\/\/www.eenewseurope.com\/en\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.eenewseurope.com\/en\/#organization","name":"EENewsEurope","url":"https:\/\/www.eenewseurope.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4","name":"eeNews Europe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22","url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","caption":"eeNews Europe"}}]}},"authors":[{"term_id":1149,"user_id":22,"is_guest":0,"slug":"eenews-europe","display_name":"eeNews Europe","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/220232"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=220232"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/220232\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/220233"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=220232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=220232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=220232"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=220232"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=220232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}