I met the Jmem Tek team at Web Summit 2024 and their message was crisp: if you want real protection against todayâs attacksâand tomorrowâs quantum threatsâyou start at the silicon. The company builds PUF-anchored, post-quantum security that lives inside chips, not bolted on afterward.

đ§Š The Problem: Software-Only Security Canât Shoulder the Load
Healthcare and industrial IoT devices face a perfect stormâlong lifecycles, fragmented fleets, and escalating threats (including quantum). Software-only controls struggle to guarantee device identity, protect secrets at rest, or survive invasive attacks. Whatâs missing is a root of trust thatâs bound to the physical chip and compatible with post-quantum cryptography (PQC) standards.
đ§ The Solution: PUF-Based Roots of Trust + PQC Acceleration
Jmem Tek integrates PUF (Physical Unclonable Function) with post-quantum algorithms to establish unforgeable device identities and quantum-resilient key exchange/signaturesâat hardware speed.
- JRoot: a hardware root-of-trust that provides identity, encryption, and integrityâfrom secure elements in phones to TPMs in servers and IoT gateways.
- JCrypt: a crypto accelerator validated under NIST FIPS 140-3 CAVP, supporting FIPS 203 ML-KEM and FIPS 204 ML-DSA for PQC.
- Design Services & Security IP: ASIC/IC design with PQC/PUF and secure provisioning, aimed at upstream semiconductor and OEM partners.
This âsilicon-firstâ stack addresses counterfeit prevention, secure onboarding, firmware protection, and device-to-cloud trustâpain points we see across connected health and regulated IoT.

đ What Makes Jmem Tek Different
- Hardware-anchored identities (PUF): secrets are derived from inherent silicon variationânothing static to steal or clone.
- Quantum-ready today: public materials emphasize post-quantum (PQC) readiness and NIST-aligned algorithm support, with external validation milestones.
- Pragmatic go-to-market: provides security IP and design services to chipmakers and device brandsâespecially helpful for SMEs that canât access Tier-1 vendor stacks.
- Ecosystem building: recent partnership news points to a full-stack, quantum-resilient SoC initiative with Quantum eMotionâuseful signal for OEMs evaluating roadmap depth.
đ§ Where It Fits in Your Architecture
H3 â Device Identity & Onboarding
Establish tamper-resistant identity at manufacturing, then perform PQC-secure onboarding to cloud or hospital networks. (JRoot + JCrypt).
H3 â Secure Updates & Telemetry
Bind firmware, attest state, and encrypt telemetry end-to-end with hardware keysâresilient even under invasive attempts.
H3 â Lifecycle at Scale
For fleets with 7â10+ year lifetimes (e.g., medical devices), hardware roots of trust help you rotate keys, revoke access, and adopt PQC without forklift upgrades.
đĽ The Team (Quick Links)
- John (JoHn) Chang â Founder & CEO: semiconductor security leadership; public profile indicates academic/industry blend and the companyâs direction.
- Paul Lo â Co-founder & CTO: digital IC development and security IP focus.
- Johnny Lu â Co-founder / VP: device testing & IP; also a 2025 InnoVEX speaker.
- Company: jmemtek.com ⢠LinkedIn. (Jmemtek)
đ¤ YOUR R&D Ă Jmem Tek: Collaboration Opportunities
At YOUR R&D, we build regulated-grade software and AI with strong security engineering. Areas where a joint project could move fast:

- Secure Device Onboarding for Health/IoT
- Architect PQC-based provisioning workflows with JRoot/JCrypt.
- Build factory tooling for key generation, attestation, and certificate issuance.
- Edge-to-Cloud Reference Design
- Implement mutual attestation and end-to-end encryption for clinical telemetry or industrial sensors.
- Integrate with AWS/Azure IoT and FHIR-based backends for healthcare.
- Software Toolkit & SDKs
- Developer-friendly SDKs that abstract PUF/PQC details; CI tests and fuzzing; sample apps for RTOS/Linux.
- Performance tuning for ML-KEM/ML-DSA on constrained MCUs.
- Compliance & Evidence
- Threat models, SBOM, and FIPS 140-3 pathway planning; documentation packs for CE/MDR, FDA premarket cyber guidance.
Curious about our approach to building trustworthy AI and secure platforms? Explore the YOUR R&D blogâa good jumping-off point for responsible design conversations.
â Bottom Line
Jmem Tek is building the kind of quantum-safe, hardware-anchored security stack that connected-device makers needâespecially in healthcare and safety-critical IoT. If your roadmap includes secure onboarding, attestation, and PQC migration without breaking performance budgets, this is a team to watch and a technology worth piloting. Learn more at jmemtek.com.
Links:
- Jmem Tek website: https://www.jmemtek.com/ (solutions, milestones, and white paper).
- YOUR R&D homepage: https://yourrnd.com/
- Related reading: YOUR R&D Blog
Hashtags:
#Cybersecurity #PostQuantum #PUF #IoT #HealthTech #Semiconductors #SoftwareDevelopment