Battery Authentication

There are many reasons why an end-product that contains a replaceable battery must require an authentication method for installing new or replacement batteries. One reason is safety, especially in products that use Li-Ion battery technology. However other valid reasons include reputation protection, counterfeit protection, and profit protection.

In the past battery replacements used form factor authentication – i.e. the battery casing and connectors were molded to fit the application. This type of authentication however can be easily overcome in cases where a third party can produce exact physical replicas.

An electronic solution to battery authentication offers the protection of an electronic challenge and response mechanism as a higher level safeguard to ensure a replacement battery is from a known source.

Battery Authentication

For battery authentication, a technique needs to be devised to authenticate the battery prior to allowing the system to charge and/or function with the battery. For the charging case, this might be an authentication routine that runs when external power is supplied to charge the battery. Alternatively, when the system is operated in a battery powered mode it accepts the power from the battery during the authentication process, but refuses the power from the battery if the authentication should fail.

Authentication Alternatives

There are many forms of electronic authentication available. Simple methods such as a simple unchanging bit stream challenge that looks for a simple bit stream response, can be easy to implement, but the authentication can also be defeated fairly easily. Using a more secure authentication technique will make much more difficult or economically impossible to defeat.

Maxim Solution

Maxim DeepCover® Secure Authenticators were designed for applications that have the most stringent of security needs; those where reputation protection, property protection, or profit protection are of the highest concern.

Maxim's Deep Cover secure authenticators provide strong, but affordable, cryptographic security using standards-based algorithms and provide all of the functionality to make design simple.

Battery Authentication Block Diagram using Secure Algorithm

Resources

DS28E15
DeepCover Secure Authenticator with 1-Wire SHA-256 and 512-Bit User EEPROM

  • Symmetric-Key-Based Bidirectional Secure Authentication Model Based on SHA-256
  • Strong Authentication with a High-Bit-Count User-Programmable Secret and Input Challenge
  • 512 Bits of User EEPROM Partitioned Into Two Pages of 256 Bits