Security-hardened silicon for African infrastructure
We design microcontrollers and hardware security IP purpose-built for utility metering, critical systems, and national platforms.
Core products
GridGuard NL-100
Our flagship secure microcontroller for smart electricity meters. Hardware encryption, tamper detection, and industrial-grade reliability for harsh grid environments.
Flagship ProductHardware Security IP
Licensable building blocks — PUF-based key generation, cryptographic accelerators, secure boot modules — for partners designing their own silicon.
IP LicensingReference Platforms
Firmware stacks, evaluation boards, and integration support to accelerate your deployment from prototype to production.
Developer ToolsWhy hardware security matters
Software-only security in utility meters has repeatedly failed. Firmware can be modified, memory can be read, keys stored in flash can be extracted. Across West Africa, these vulnerabilities enable electricity theft costing utilities hundreds of millions annually.
Nelix embeds protection at the silicon level — where it cannot be bypassed. Our hardware security module generates and stores cryptographic keys inside the chip itself, using physical unclonable functions that make each device unique and tamper-evident.
GridGuard NL-100 technical overview
High-level block diagram
Block diagram of the Nelix security-hardened microcontroller architecture.
Physical Unclonable Functions
Every chip we produce has a unique, unclonable identity derived from nanoscale manufacturing variations — a silicon fingerprint.
Silicon Variation
Nanoscale manufacturing variations create unique electrical characteristics in every chip — even chips from the same wafer.
Challenge-Response
The PUF engine generates cryptographic keys from physical properties. No keys stored in memory — nothing to extract.
Device Authentication
Each device proves its identity through its unique silicon fingerprint. Cloned or counterfeit devices are detected instantly.
Tamper Evidence
Physical attacks alter the silicon structure, destroying the PUF response. Any tampering is self-evidencing.
Detailed technical overview
Preliminary specifications subject to revision. Contact us for the latest datasheet.
How we work
Specification
We work with you to define technical requirements, security needs, and integration constraints for your application.
Design & Validation
Custom architecture development, FPGA prototyping, and rigorous testing before committing to silicon.
Production & Support
Foundry manufacturing, quality assurance, integration support, and ongoing partnership.
Ready to talk architecture?
Our engineering team is ready to discuss your security requirements.