What this service includes

  • Firmware loading on the production line (in-line or offline)
  • Multi-image programming: bootloader, application, configuration partition
  • Signed bootloader enforcement
  • Key and certificate handling under access control
  • Per-unit firmware version and hash logged against serial
  • Optional cloud platform enrollment (AWS, Azure, custom PKI)

Production workflow for this service

  1. INPUT FILES
  2. Firmware handoff

    Binary received with version, hash, and signing key reference.

  3. Programming setup

    Programming fixture wired, debug interface confirmed.

  4. Programming sequence

    Bootloader, then application, then any configuration partition.

  5. Verification

    Read-back hash compared to expected before unit moves to test.

  6. Logging

    Per-unit firmware version, hash, provisioning timestamp written to traceability database.

  7. OUTPUT

Right fit when

  • Your product ships with firmware on the board.
  • You need signed firmware enforcement to meet customer or regulatory requirements.
  • You want every shipped unit traceable to a firmware version and hash.

Frequently asked questions

Can you load and provision firmware in production?

Yes. Firmware loading runs on the line through dedicated programming fixtures. We support SWD, JTAG, UART, and USB-DFU interfaces, multi-image programming (bootloader, application, file system), and signed bootloader chains. When the customer test plan calls for functional test alongside flashing, the unit moves on to a partner test house with the firmware already loaded.

Do we need a written test plan?

Yes when functional test is in scope. A production test plan defines pass and fail criteria, FCT vectors, calibration steps, and serialization rules. We help draft one if your team has not written one yet, based on your firmware behavior and target field performance. The test plan is handed to the partner test house we coordinate with for FCT.

How do you support Cyber Resilience Act (CRA) readiness for connected devices?

Production-side CRA support includes signed firmware enforcement, per-unit serialization for SBOM tracking, secure provisioning workflows, and documented test records. Product-side CRA obligations (vulnerability handling, security updates) remain with the OEM.

Quote embedded software

Send your BOM, gerbers, and CPL. We respond within one business day. NDA on request.