Technology

Security-hardened silicon for African infrastructure

We design microcontrollers and hardware security IP purpose-built for utility metering, critical systems, and national platforms.

Core products

GridGuard NL-100

Our flagship secure microcontroller for smart electricity meters. Hardware encryption, tamper detection, and industrial-grade reliability for harsh grid environments.

Flagship Product

Hardware Security IP

Licensable building blocks — PUF-based key generation, cryptographic accelerators, secure boot modules — for partners designing their own silicon.

IP Licensing

Reference Platforms

Firmware stacks, evaluation boards, and integration support to accelerate your deployment from prototype to production.

Developer Tools

Why hardware security matters

Software-only security in utility meters has repeatedly failed. Firmware can be modified, memory can be read, keys stored in flash can be extracted. Across West Africa, these vulnerabilities enable electricity theft costing utilities hundreds of millions annually.

Nelix embeds protection at the silicon level — where it cannot be bypassed. Our hardware security module generates and stores cryptographic keys inside the chip itself, using physical unclonable functions that make each device unique and tamper-evident.

01 Application Layer
02 Firmware
03 Hardware Security Module Nelix
04 Physical Silicon

GridGuard NL-100 technical overview

40nm
Process Node
200MHz
Max Clock
10μA
Sleep Current
-40~125°C
Operating Range
ARM Cortex-M33 core with TrustZone
AES-256 hardware acceleration
RSA/ECC cryptographic engines
PUF-based key generation
Secure boot with chain-of-trust
Tamper detection with key erasure
Industrial temperature grade
Low-power optimized design

High-level block diagram

Block diagram of the Nelix security-hardened microcontroller architecture.

Nelix MCU — High-Level Architecture
Security subsystem highlighted in accent color
Core
ARM Cortex-M
Processing Core
Memory
Flash + SRAM
Encrypted storage
AI Engine
ML Accelerator
Edge inference
Comms
I/O Subsystem
SPI / UART / I²C
Security
PUF Engine
Silicon fingerprint
Crypto
AES / SHA / ECC
Hardware accelerated
Tamper
Detection Array
Physical + logical
Boot
Secure Boot
Root of trust

Physical Unclonable Functions

Every chip we produce has a unique, unclonable identity derived from nanoscale manufacturing variations — a silicon fingerprint.

PUF
Each chip's identity is physically unique
1

Silicon Variation

Nanoscale manufacturing variations create unique electrical characteristics in every chip — even chips from the same wafer.

2

Challenge-Response

The PUF engine generates cryptographic keys from physical properties. No keys stored in memory — nothing to extract.

3

Device Authentication

Each device proves its identity through its unique silicon fingerprint. Cloned or counterfeit devices are detected instantly.

4

Tamper Evidence

Physical attacks alter the silicon structure, destroying the PUF response. Any tampering is self-evidencing.

Detailed technical overview

Preliminary specifications subject to revision. Contact us for the latest datasheet.

Processing
CoreARM Cortex-M33
Clock SpeedUp to 120 MHz
Flash MemoryUp to 1 MB
SRAM256 KB
ML AcceleratorInt8 / Int16 MAC array
Security
PUF TypeSRAM PUF
Crypto EngineAES-256 / SHA-256 / ECC
Secure BootHardware Root of Trust
Tamper DetectionActive mesh + voltage / temp
Key StoragePUF-derived (no NVM keys)
Interfaces
UART3x
SPI2x
I²C2x
ADC12-bit, 8 channels
GPIOUp to 48 pins
Operating Conditions
Temperature-40°C to +125°C
Supply Voltage1.8V — 3.6V
Active Power< 30 µA/MHz
Sleep Mode< 1 µA
PackageQFN-48 / QFP-64

How we work

01

Specification

We work with you to define technical requirements, security needs, and integration constraints for your application.

02

Design & Validation

Custom architecture development, FPGA prototyping, and rigorous testing before committing to silicon.

03

Production & Support

Foundry manufacturing, quality assurance, integration support, and ongoing partnership.

Ready to talk architecture?

Our engineering team is ready to discuss your security requirements.