Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Product List
SHA-256 Authenticators for IP Protection Slide 8
Applications using authentication ICs have many value adders. IP Protection – OEM manufactures ensure the contract manufacturers cannot overbuild the product and that counterfeiters cannot copy an OEM manufacturer’s hardware or software IP. Life Cycle Management – OEM manufacturing information can be added to each build so only the OEM manufacture can securely access this data. System Feature Settings – OEM manufacturers can build one board or system and use the same software. By simply changing a single authenticator IC, the software then could enable different features. Board/Sub-System ID – Each authenticator has a unique ID. This allows the OEM manufactures to identify each board or subsystem within the application. Calibration Data Storage – Some peripherals are individually calibrated at the factory. The authenticator can securely store this data, which can then be used by the host to provide more accurate measurements. This is common in medical and industrial applications. Security Attack Protection – The Authenticators deploy advanced hardware security to protect secret keys and sensitive data against invasive or non-invasive attacks. Security for Cost Sensitive Applications – Some applications need a limited-use feature. This can be single use or a limited multi-use feature. Authenticators have an irreversible down counter to accomplish this. The authentication process also ensures that no other Third party vendor can use ones product in the OEM manufacture’s application. This is critical for the “Razor and Razor Blade” sales model, in which the OEM manufacture sells the main unit at a low cost and makes money from the disposables.
PTM Published on: 2014-08-05