Service
Embedded Software
We load and provision your firmware on the production line, not in a back room. Bootloader, application, and configuration write in sequence. Signed binaries enforced. Per-unit hash, version, and timestamp tied to the board serial. AWS, Azure, or your own PKI for cloud enrollment.
What this service includes
- Firmware loading on the production line (in-line or offline)
- Multi-image programming: bootloader, application, configuration partition
- Signed bootloader enforcement
- Key and certificate handling under access control
- Per-unit firmware version and hash logged against serial
- Optional cloud platform enrollment (AWS, Azure, custom PKI)
Production workflow for this service
- INPUT FILES
-
Firmware handoff
Binary received with version, hash, and signing key reference.
-
Programming setup
Programming fixture wired, debug interface confirmed.
-
Programming sequence
Bootloader, then application, then any configuration partition.
-
Verification
Read-back hash compared to expected before unit moves to test.
-
Logging
Per-unit firmware version, hash, provisioning timestamp written to traceability database.
- OUTPUT
Right fit when
- Your product ships with firmware on the board.
- You need signed firmware enforcement to meet customer or regulatory requirements.
- You want every shipped unit traceable to a firmware version and hash.
Frequently asked questions
Can you load and provision firmware in production?
Yes. Firmware loading runs on the line through dedicated programming fixtures. We support SWD, JTAG, UART, and USB-DFU interfaces, multi-image programming (bootloader, application, file system), and signed bootloader chains. When the customer test plan calls for functional test alongside flashing, the unit moves on to a partner test house with the firmware already loaded.
Do we need a written test plan?
Yes when functional test is in scope. A production test plan defines pass and fail criteria, FCT vectors, calibration steps, and serialization rules. We help draft one if your team has not written one yet, based on your firmware behavior and target field performance. The test plan is handed to the partner test house we coordinate with for FCT.
How do you support Cyber Resilience Act (CRA) readiness for connected devices?
Production-side CRA support includes signed firmware enforcement, per-unit serialization for SBOM tracking, secure provisioning workflows, and documented test records. Product-side CRA obligations (vulnerability handling, security updates) remain with the OEM.
Quote embedded software
Send your BOM, gerbers, and CPL. We respond within one business day. NDA on request.