Slide 1
Slide 2
Slide 3
Slide 4
Slide 5
Slide 6
Slide 7
Slide 8
Slide 9
Slide 10
Product List
Counterfeiters use technology to copy products, so companies must also use technology to defend against being copied. Prevention of counterfeiting requires a technology that itself cannot be copied. The solution must identify the PCB board, peripheral connector, or subsystem to the OEM system and prove that it is a part of the authentic OEM system. The technology should use a cryptographically secure authentication algorithm such as SHA-256. This acronym stands for Secure Hash Algorithm with 256-bit secret keys.
PTM Published on: 2014-08-05