I met the Jmem Tek team at Web Summit 2024 and their message was crisp: if you want real protection against todayās attacksāand tomorrowās quantum threatsāyou start at the silicon. The company builds PUF-anchored, post-quantum security that lives inside chips, not bolted on afterward.

š§© The Problem: Software-Only Security Canāt Shoulder the Load
Healthcare and industrial IoT devices face a perfect stormālong lifecycles, fragmented fleets, and escalating threats (including quantum). Software-only controls struggle to guarantee device identity, protect secrets at rest, or survive invasive attacks. Whatās missing is a root of trust thatās bound to the physical chip and compatible with post-quantum cryptography (PQC) standards.
š§ The Solution: PUF-Based Roots of Trust + PQC Acceleration
Jmem Tek integrates PUF (Physical Unclonable Function) with post-quantum algorithms to establish unforgeable device identities and quantum-resilient key exchange/signaturesāat hardware speed.
- JRoot: a hardware root-of-trust that provides identity, encryption, and integrityāfrom secure elements in phones to TPMs in servers and IoT gateways.
- JCrypt: a crypto accelerator validated under NIST FIPS 140-3 CAVP, supporting FIPS 203 ML-KEM and FIPS 204 ML-DSA for PQC.
- Design Services & Security IP: ASIC/IC design with PQC/PUF and secure provisioning, aimed at upstream semiconductor and OEM partners.
This āsilicon-firstā stack addresses counterfeit prevention, secure onboarding, firmware protection, and device-to-cloud trustāpain points we see across connected health and regulated IoT.

š What Makes Jmem Tek Different
- Hardware-anchored identities (PUF): secrets are derived from inherent silicon variationānothing static to steal or clone.
- Quantum-ready today: public materials emphasize post-quantum (PQC) readiness and NIST-aligned algorithm support, with external validation milestones.
- Pragmatic go-to-market: provides security IP and design services to chipmakers and device brandsāespecially helpful for SMEs that canāt access Tier-1 vendor stacks.
- Ecosystem building: recent partnership news points to a full-stack, quantum-resilient SoC initiative with Quantum eMotionāuseful signal for OEMs evaluating roadmap depth.
š§ Where It Fits in Your Architecture
H3 ā Device Identity & Onboarding
Establish tamper-resistant identity at manufacturing, then perform PQC-secure onboarding to cloud or hospital networks. (JRoot + JCrypt).
H3 ā Secure Updates & Telemetry
Bind firmware, attest state, and encrypt telemetry end-to-end with hardware keysāresilient even under invasive attempts.
H3 ā Lifecycle at Scale
For fleets with 7ā10+ year lifetimes (e.g., medical devices), hardware roots of trust help you rotate keys, revoke access, and adopt PQC without forklift upgrades.
š„ The Team (Quick Links)
- John (JoHn) Chang ā Founder & CEO: semiconductor security leadership; public profile indicates academic/industry blend and the companyās direction.
- Paul Lo ā Co-founder & CTO: digital IC development and security IP focus.
- Johnny Lu ā Co-founder / VP: device testing & IP; also a 2025 InnoVEX speaker.
- Company: jmemtek.com ⢠LinkedIn. (Jmemtek)
š¤ YOUR R&D Ć Jmem Tek: Collaboration Opportunities
At YOUR R&D, we build regulated-grade software and AI with strong security engineering. Areas where a joint project could move fast:

- Secure Device Onboarding for Health/IoT
- Architect PQC-based provisioning workflows with JRoot/JCrypt.
- Build factory tooling for key generation, attestation, and certificate issuance.
- Edge-to-Cloud Reference Design
- Implement mutual attestation and end-to-end encryption for clinical telemetry or industrial sensors.
- Integrate with AWS/Azure IoT and FHIR-based backends for healthcare.
- Software Toolkit & SDKs
- Developer-friendly SDKs that abstract PUF/PQC details; CI tests and fuzzing; sample apps for RTOS/Linux.
- Performance tuning for ML-KEM/ML-DSA on constrained MCUs.
- Compliance & Evidence
- Threat models, SBOM, and FIPS 140-3 pathway planning; documentation packs for CE/MDR, FDA premarket cyber guidance.
Curious about our approach to building trustworthy AI and secure platforms? Explore the YOUR R&D blogāa good jumping-off point for responsible design conversations.
ā Bottom Line
Jmem Tek is building the kind of quantum-safe, hardware-anchored security stack that connected-device makers needāespecially in healthcare and safety-critical IoT. If your roadmap includes secure onboarding, attestation, and PQC migration without breaking performance budgets, this is a team to watch and a technology worth piloting. Learn more at jmemtek.com.
Links:
- Jmem Tek website: https://www.jmemtek.com/ (solutions, milestones, and white paper).
- YOUR R&D homepage: https://yourrnd.com/
- Related reading: YOUR R&D Blog
Hashtags:
#Cybersecurity #PostQuantum #PUF #IoT #HealthTech #Semiconductors #SoftwareDevelopment




