Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Slide 13 Slide 14 Slide 15 Slide 16 Slide 17 Slide 18 Slide 19 Slide 20 Slide 21 Slide 22 Slide 23 Slide 24 Slide 25 Slide 26 Slide 27 Slide 28 Slide 29 Slide 30 Slide 31 Slide 32 Slide 33 Product List
Crypto Products Slide 5
In general terms, authentication is proving that a device or object is what it is purported to be. For example, proving that the battery pack for this battery powered tool is genuine or authentic is a key element to any robust security solution. Failing to implement an authentication scheme using a hardware security ICs significantly increases the change that the product or component will be cloned. If a cloned or unauthorized client is installed and used, the OEM, and possibly the end user, may be at significant risk. Cloned products or components can negatively impact an OEM’s revenue, brand image, and may lead to liability exposure.
PTM Published on: 2011-10-18