Slide 1
Slide 2
Slide 3
Slide 4
Slide 5
Slide 6
Slide 7
Slide 8
Slide 9
Slide 10
Slide 11
Slide 12
Slide 13
Slide 14
Slide 15
Slide 16
Slide 17
Slide 18
Slide 19
Slide 20
Slide 21
Slide 22
Slide 23
Slide 24
Slide 25
Slide 26
Slide 27
Slide 28
Slide 29
Slide 30
Slide 31
Slide 32
Slide 33
Product List
The second example involves Embedded Software Clone Prevention. Whenever there is a need to protect the microcontroller code within an embedded application, several authentication checks can be inserted throughout the code. This approach makes it difficult for hackers to dump the code from external memory and reassemble the code without the authentication checks. Also, one can verify a signature in a code module, or the contents of a downloadable Flash memory.
PTM Published on: 2011-10-18