tuc in Python applications.
Overview
AI models deployed to edge devices — whether for vision, robotics, or sensor analytics — are susceptible to tampering if their integrity is not verified before use. Thistle’s approach enforces a simple runtime pattern:- Verify model signature using
tuc - Abort application startup on verification failure
- Load the model only on successful verification
Unified Secure Loader (Python)
To make integration seamless across platforms, we provide a unified secure loader module that encapsulates signature verification and model loading logic.Secure Loader Module: thistle_secure_loader.py
Setting Up Your Environment
Before using the secure loader, set your TUC configuration path:Platform Examples
See the platform-specific guides for integration examples:Edge Impulse
Image classification with
.eim modelsRoboflow PyTorch
YOLO and other PyTorch models
Roboflow ONNX
ONNX Runtime inference sessions
MemryX
MemryX hardware accelerator
DEEPX
DEEPX ONNX Runtime inference
TensorFlow Lite / LiteRT
Lightweight runtime for embedded and mobile edge AI
Summary
Thistle’s secure loader module brings the same robust provenance guarantees used for OTA updates to AI model consumption on edge platforms. By verifying model signatures at application startup usingtuc, your code only ever uses models
that were signed and released through your secure Thistle workflow.
Secure model usage is now a one-function call integration:

