Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Slide 13 Slide 14 Slide 15 Slide 16 Slide 17 Slide 18 Slide 19 Slide 20 Slide 21 Slide 22 Slide 23 Slide 24 Slide 25 Slide 26 Slide 27 Slide 28 Slide 29 Slide 30 Slide 31 Slide 32 Slide 33 Product List
Secure System Building Blocks
Now the training module will shift its focus to how these fit within a secure system environment. At the most basic level, a client security IC is talking to the host microcontroller. In this scenario, the host algorithm and host keys, or secrets, are implemented in the software by the host microcontroller. Software solutions are not as secure as hardware solutions. In order to address the issue of host key storage, Microchip offers an optional host security IC, which securely stores and manages the host secrets. Each of Microchip’s families offer both the client and host hardware security ICs necessary to implement a truly secure system solution. CryptoMemory® provides this on the client side, CryptoCompanion™ provides this on the host side, and CryptoAuthentication™ client and host IC solutions add another contact solution option. Finally, where there is a need for a secure RFID implementation, Microchip offers a full solution with CryptoRF®, the Host IC with CryptoCompanion, and Reader IC.
PTM Published on: 2011-10-18