furcate

Capability · Network

Devices speak — on your terms.

Edge fleets live across radio types, protocols, and trust regimes. Furcate composes Matter / Thread / LoRaWAN / private 5G / TSN with cryptographic device identity (TPM 2.0 / TEE) so devices speak — to each other, to a sovereign control plane, to the customer's perimeter and no further.

01

Matter + Thread for the residential / SMB tier

Matter 1.4 (November 2024) added energy-management device classes — heat pumps, EV chargers, water heaters, batteries, solar. Thread provides the IPv6 mesh underneath. Apple Home, Google Home, Amazon Alexa, SmartThings interoperate at varying compliance levels (Apple Home ≈99.2%, Google ≈98.7% per industry tracking). Furcate is a first-class participant in this ecosystem.

02

LoRaWAN for outdoor / industrial

Sub-GHz mesh for outdoor, industrial, and agricultural deployments where Wi-Fi and cellular don't reach. Ultra-low-power, multi-km range, kilobit-class throughput. The default for sensor pods on streetlights, in fields, on offshore platforms, in remote substations.

03

Private 5G + Time-Sensitive Networking (TSN)

Private 5G slices give industrial customers deterministic-latency wireless. TSN provides bounded jitter for control-loop traffic. Furcate routes safety-critical traffic through TSN-aware paths and isolates rollout / OTA traffic on its own slice so production isn't disturbed.

04

MQTT 5 + Sparkplug B + Eclipse Hono

Pub/sub messaging into the ISA-95 Unified Namespace pattern. Sparkplug B adds state, birth/death certificates, and a defined topic / payload schema. Eclipse Hono abstracts MQTT, AMQP, HTTP, LoRaWAN behind one API so application code stays protocol-agnostic.

05

TPM 2.0 + TEE — hardware root of trust

Trusted Platform Module 2.0 + Trusted Execution Environment (Intel SGX, ARM TrustZone). Every device has a hardware-attested identity that's verified at OTA enrolment, firmware updates, and federated-learning rounds. Confidential inference inside the TEE for sensitive models. The hardware backstop for sovereign-by-design posture.

06

Zero-trust mesh, sovereign control plane

Every edge device authenticates per session via PKI before it talks to the control plane. The control plane runs at the customer's perimeter — Crusoe Edge Zones, Microsoft Azure Local, HPE Private Cloud AI, or the customer's own bare-metal cluster. Customer data never leaves the trust boundary unless the customer's policy explicitly says it can.

Stack in play

Open foundations composed at this layer.

Matter 1.4 + Thread

residential / SMB mesh

Energy-class device interop; IPv6 mesh.

LoRaWAN

long-range low-power

Outdoor / industrial / agricultural multi-km coverage.

Private 5G + TSN

industrial wireless

Deterministic latency for safety-critical loops.

MQTT 5 + Sparkplug B

pub/sub data plane

ISA-95 Unified Namespace pattern.

Eclipse Hono

protocol abstraction

MQTT/AMQP/HTTP/LoRa behind one API.

TPM 2.0 + TEE

hardware root of trust

Attested identity, secure boot, confidential compute.