Technology

Security-hardened silicon for African infrastructure

We design microcontrollers and hardware security IP purpose-built for utility metering, critical systems, and national platforms.

Core Technologies

FPGA InferEdge™ Edge

Purpose-designed AI inference accelerator for edge deployment. 64×64 systolic array with SRAM compute-in-memory, optimized for INT8/INT4 workloads at 15–25W.

Edge AI, Low Power, Intermittent Ready, Energy-Aware, AI Inference

FPGA SecureGrid™

Security-hardened smart metering SoC for utility-grade grid infrastructure. PUF-based hardware root of trust with encrypted measurement, tamper detection, and over-the-air secure updates.

Grid Security, PUF Root of Trust, Anti-Tamper, Utility-Grade, Infrastructure

FPGA InferCloud™ Cloud

High-throughput AI inference accelerator for data center and cloud-connected deployment. Scaled compute architecture targeting rack-density inference workloads with TrustCore attestation for multi-tenant security.

Cloud AI, High Throughput, Multi-Tenant, TrustCore, Scalable Compute

Security begins at the silicon layer

Software-only security fails in physical environments. Firmware can be modified, memory can be read, and stored keys can be extracted. Across sub-Saharan Africa, field-deployed infrastructure operates in adversarial physical environments where attackers have commodity tools and physical access.

Nelix embeds security directly into silicon. TrustCore establishes a hardware root of trust where cryptographic keys are generated from physically unclonable functions, not stored in addressable memory. Secure boot, hardware isolation, and multi-vector tamper detection with sub-200 ns response ensure that critical operations cannot be bypassed, even with physical access to the device.

This architecture secures both infrastructure and compute. SecureGrid™ protects energy systems at the metering point. InferEdge™ enables trusted AI inference at the edge, across clinics, farms, vehicles, and grid equipment.

01 Application Layer
02 Secure API
03 Cryptographic Engine Nelix
04 Tamper detection Nelix
05 Secure boot chain Nelix
06 Hardware root of trust Nelix
07 PUF key generation Nelix
08 Physical Security Nelix

GridGuard NL-100 technical overview

40nm
Process Node
200MHz
Max Clock
10μA
Sleep Current
-40~125°C
Operating Range
ARM Cortex-M33 core with TrustZone
AES-256 hardware acceleration
RSA/ECC cryptographic engines
PUF-based key generation
Secure boot with chain-of-trust
Tamper detection with key erasure
Industrial temperature grade
Low-power optimized design

High-level block diagram

Block diagram of the Nelix security-hardened microcontroller architecture.

Nelix MCU — High-Level Architecture
Security subsystem highlighted in accent color
Core
ARM Cortex-M
Processing Core
Memory
Flash + SRAM
Encrypted storage
AI Engine
ML Accelerator
Edge inference
Comms
I/O Subsystem
SPI / UART / I²C
Security
PUF Engine
Silicon fingerprint
Crypto
AES / SHA / ECC
Hardware accelerated
Tamper
Detection Array
Physical + logical
Boot
Secure Boot
Root of trust

Physical Unclonable Functions

Every chip we produce has a unique, unclonable identity derived from nanoscale manufacturing variations — a silicon fingerprint.

PUF
Each chip's identity is physically unique
1

Silicon Variation

Nanoscale manufacturing variations create unique electrical characteristics in every chip — even chips from the same wafer.

2

Challenge-Response

The PUF engine generates cryptographic keys from physical properties. No keys stored in memory — nothing to extract.

3

Device Authentication

Each device proves its identity through its unique silicon fingerprint. Cloned or counterfeit devices are detected instantly.

4

Tamper Evidence

Physical attacks alter the silicon structure, destroying the PUF response. Any tampering is self-evidencing.

Detailed technical overview

Preliminary specifications subject to revision. Contact us for the latest datasheet.

Processing
CoreARM Cortex-M33
Clock SpeedUp to 120 MHz
Flash MemoryUp to 1 MB
SRAM256 KB
ML AcceleratorInt8 / Int16 MAC array
Security
PUF TypeSRAM PUF
Crypto EngineAES-256 / SHA-256 / ECC
Secure BootHardware Root of Trust
Tamper DetectionActive mesh + voltage / temp
Key StoragePUF-derived (no NVM keys)
Interfaces
UART3x
SPI2x
I²C2x
ADC12-bit, 8 channels
GPIOUp to 48 pins
Operating Conditions
Temperature-40°C to +125°C
Supply Voltage1.8V — 3.6V
Active Power< 30 µA/MHz
Sleep Mode< 1 µA
PackageQFN-48 / QFP-64

How we work

01

Specification

We work with you to define technical requirements, security needs, and integration constraints for your application.

02

Design & Validation

Custom architecture development, FPGA prototyping, and rigorous testing before committing to silicon.

03

Production & Support

Foundry manufacturing, quality assurance, integration support, and ongoing partnership.

Ready to talk architecture?

Our engineering team is ready to discuss your security requirements.