Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Slide 13 Slide 14 Product List
CryptoAuthOverview-Slide4

Consumer & medical product suppliers use CryptoAuthentication™ devices for a wide range of important purposes such as tracking licenses, fighting overbuilding & counterfeiting, and protecting firmware operation. One of the main uses is authenticating accessories that surround products such as smart phones, tablets, PCs, GPS, and cameras. Chargers, docking stations, speakers, wearables and other accessories can be protected by CryptoAuthentication™ devices. These devices can ensure that accessories from only legitimately authorized suppliers can be connected, allowing the suppliers to control their own ecosystems. CryptoAuthentication™ devices are also useful to verify that the correct firmware is being loaded at boot time to ensure quality and performance. The right hardware product running the wrong software is a bad combination and one that authorization can protect against. An increasingly serious problem for consumer and medical product makers are cloned and counterfeited products that show up not only in the black and grey markets, but in the legitimate supply chain as well. Not only are revenues impacted due to lost sales due to illegitimate products, but a company’s valuable brand equity can be damaged badly by clones and counterfeit products that are unreliable and even dangerous. The burden falls on legitimate manufacturers to guard against deceptive practices. CryptoAuthentication™ devices are a simple yet potent method to provide brand, revenue, and quality protection. CryptoAuthentication™ devices can also help to ensure a traceable logistical trail from the subcontractor to the end customer. The devices in actuality make subcontractor licenses more meaningful by foreclosing opportunities for bad subcontractor behavior, which unfortunately are increasingly commonplace. 

PTM Published on: 2014-03-13