Scroll to top

Documents

Prpl High Level API Principles

Click here to download as pdf.

 

Customer demand for ever more features has led carriers, manufacturers and retail brands to apply more and more software customization to gateways, access points, and routers.

Unfortunately, keeping all this software customization in sync across different devices and models quickly turns into a technical nightmare. The main reason is the large fragmentation of embedded operating systems and middleware stacks across the different manufacturers and suppliers.

To overcome this, the prpl membership, a diverse group of industry players ranging from carriers to middleware vendors, from manufacturers to test laboratories, has come together to address this issue and finally standardize intra-device communication with a common API and data model.

Cover, Smart Home Report 2016

Smart Home Report 2016

Click here to download as pdf.

Even just a decade ago, few people could have predicted the impact the Internet of Things (IoT) would have on our lives. Networks of ‘smart’ internet-connected sensors and embedded computers exchanging information with each other may not sound particularly exciting to those outside the technology industry, but the use cases are virtually limitless.

Cover Security Guidance Report

Security Guidance Report

Click here to download as pdf.

Security is a core requirement for manufacturers, developers, service providers and other stakeholders who produce and use connected devices.Securing these is a major challenge, and failure to do so can result in significant harm to individuals, businesses and to nations. This guidance focuses on a new hardware-led approach to create stronger security for embedded systems. We propose three general areas of guidance. These are not the only areas that require attention, but they will help to establish a base of action as stakeholders begin addressing security in earnest.

Cover Application Note prpl Security Framework

prplSecurity Framework Application Note, July 2016

Click here to download as pdf.

This technical note describes how to build and run a secure application according to the principles set forth by the prpl Security Guidance for Critical Areas of Embedded Computing – see here. It demonstrates a real world implementation of the multi-domain security provided by the prplSecurity™ framework including: the prplHypervisor™, prplSecureInterVM™ communications, and prplPUF™ APIs.