Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Slide 13 Slide 14 Slide 15 Slide 16 Slide 17 Slide 18 Slide 19 Slide 20 Slide 21 Slide 22 Slide 23 Slide 24 Slide 25 Slide 26 Slide 27 Slide 28 Slide 29 Slide 30 Slide 31 Slide 32 Slide 33 Product List
Crypto Products Slide 9
The second example involves Embedded Software Clone Prevention. Whenever there is a need to protect the microcontroller code within an embedded application, several authentication checks can be inserted throughout the code. This approach makes it difficult for hackers to dump the code from external memory and reassemble the code without the authentication checks. Also, one can verify a signature in a code module, or the contents of a downloadable Flash memory.
PTM Published on: 2011-10-18