Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Product List
SHA-256 Authenticators for IP Protection Slide 4
Counterfeiters use technology to copy products, so companies must also use technology to defend against being copied. Prevention of counterfeiting requires a technology that itself cannot be copied. The solution must identify the PCB board, peripheral connector, or subsystem to the OEM system and prove that it is a part of the authentic OEM system. The technology should use a cryptographically secure authentication algorithm such as SHA-256. This acronym stands for Secure Hash Algorithm with 256-bit secret keys.
PTM Published on: 2014-08-05