DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced physical security to provide the most secure key storage possible.
The DeepCover Secure Microcontroller (MAX32590) provides an interoperable, secure, and cost-effective solution to build new generations of trusted devices such as multimedia-enabled portable EFT-POS terminals. The MAX32590 integrates a Memory Management Unit (MMU), 32KB of instruction cache, 16KB of data cache, 4KB instruction TCM, 4KB data TCM, 384KB of system SRAM, 2KB of One-Time-Programmable (OTP) memory, 128KB of Boot ROM, 24KB of battery-backed SRAM. The MAX32590 maximizes on-chip bandwidth when dealing with high-speed communication such as 100Mbps Ethernet, large color LCD displays, and gigabit-sized mass storage devices.
In addition to hardware crypto functions, the MAX32590 provides a true random number generator, battery-backed RTC, nonvolatile SRAM and real-time environmental and tamper detection circuitry to facilitate system-level security for the application.
The secure microcontroller includes multiple communication interfaces. One USB host controller and one USB device controller with their respective USB transceiver, two Smart Card controllers, five SPI ports, three UARTs, an SD/SDHC/SDIO controller, an Ethernet 10/100 MAC with FIFO and an I²C bus are also provided. The three on-chip timers also support PWM output generation for direct control of external devices. An integrated Secure Keypad and Thermal Printer interface provide an integrated solution for mobile POS terminals. Additionally, a 3-channel 10-bit ADC is provided for printer support and general use.
|Part Number||MCU Core||Core Clock Speed |
|Data Processing||Internal SRAM |
|USARTs||SPI Bus||I2C Bus||USB||GPIO Pins||PWM||Timer Features||Package/Pins|
|MAX32590||ARM926EJ-S||384||32-bit||384||3||5||1 Master/Slave|| |
|See All Microcontrollers (48)|
| Pricing Notes: |
This pricing is BUDGETARY, for comparing similar parts. Prices are in U.S. dollars and subject to change. Quantity pricing may vary substantially and international prices may differ due to local duties, taxes, fees, and exchange rates. For volume-specific and version-specific prices and delivery, please see the price and availability page or contact an authorized distributor.
|App Note||6391||Implementing Secure Authentication Without Being a Cryptography Expert|
|App Note||6017||Maxim Integrated’s JIBEPOS Current Measurement|
|App Note||6005||Secure the IoT: Part 2, A Secure Boot, the "Root of Trust" for Embedded Devices|
|App Note||6004||Secure the IoT: Part 1, Public Key Cryptography Secures Connected Devices|
|App Note||5932||Fundamentals of Electronic Security: What Does Security Really Mean?|
|App Note||5631||Ensuring the Complete Life-Cycle Security of Smart Meters|
|Tutorial||5522||Industrial Systems Need the Added Protection of Security ICs|
|App Note||5328||Transforming a Smartphone Design into a Sophisticated Point-of-Sale Terminal|
|App Note||4809||Designing Next-Generation Payment Terminals That Meet PCI PTS 3.x Requirements|