CPU Technology

CPU Tech produces the Acalis family of secure processors that provide the strongest protection for software and systems against the threat of reverse engineering. This advanced system-on-chip technology enables the development of secure and 100% software compatible electronics modernization technology solving obsolescence problems while reducing size, weight and power (SWAP) for commercial and defense systems. CPU Tech is a privately held company founded in 1989 with headquarters in Pleasanton, CA with a regional office in Reston, VA.

For more information, please visit

Our Website:

Latest Content From CPU Technology

Whitepaper: Secure Boot Requirements and Capabilities in Embedded Systems

by CPU TechnologyMay 20, 2010

The No. 1 vulnerability source in embedded processors is the initial boot phase of the device. Solutions to the problem of insecure boot processes vary enormously depending on the protection requirements of the system. Rather than relying on solutions based on product name, engineers will learn to make more informed decisions on how much end-system security they need, and match that to the various secure boot capabilities on the market, according to CPU Technology.

Whitepaper: Enabling Foreign Military Sales With the Acalis Secure Processor

by CPU TechnologyMay 20, 2010

A toughening regulatory climate has made the process of exporting defense articles more challenging. Earlier this year, Secretary of Defense Robert Gates announced initiatives to overhaul export control laws to more effectively manage technology export, but the initiatives will take time to implement. The simplest approach to enabling your system for foreign military sales is a primary design with an Acalis Secure Processor, and a disciplined approach to isolating CPI algorithms and operations to the Acalis device.

Whitepaper: Secure Hardware For Cyber Security

by CPU TechnologyDec 23, 2009

One of the primary objectives of a recent White House review of Internet security is to promote the user awareness of the information threats to the United States and to individual citizens. This awareness thrust is also important in demonstrating that information security is a top national priority. This, in turn, is intended to influence information systems providers to focus more on security as they develop systems. This white paper responds to that call with important feedback on the role of small, independent engineering firms in providing the full spectrum of secure hardware tools needed to improve our national Internet security posture.

Whitepaper: Secure Anchor Point

by CPU TechnologyDec 01, 2009

As the world computing infrastructure becomes likewise complicated, network and system communications have significant problems in identifying who to trust. Corporate and government personnel enter systems through a variety of methods: remote access, wireless PDAs, laptops via VPN from public access points. Establishing trust includes the identity of hardware and processor nodes, the identity and authenticity of software instructions, and the identity and authenticity of system users. Describing and categorizing all of the different types of friendly and unfriendly behavior in modern networks becomes overwhelming and cost prohibitive. One way to address the problem of trust in the electronic domain is the same way it is approached in the social world: relying on a handful of trusted sources to vouch for the authenticity of others, which can be called "secure anchor points." These can be official documents, badges, and personal references in the social world; the secure anchor point in a digital electronics system allows management and system administrators to validate the operational integrity of their networks and any persons who have access to their systems.