There are many reasons why an end-product that contains a replaceable battery must require an authentication method for installing new or replacement batteries. One reason is safety, especially in products that use Li-Ion battery technology. However other valid reasons include reputation protection, counterfeit protection, and profit protection.
In the past battery replacements used form factor authentication – i.e. the battery casing and connectors were molded to fit the application. This type of authentication however can be easily overcome in cases where a third party can produce exact physical replicas.
An electronic solution to battery authentication offers the protection of an electronic challenge and response mechanism as a higher level safeguard to ensure a replacement battery is from a known source.
For battery authentication, a technique needs to be devised to authenticate the battery prior to allowing the system to charge and/or function with the battery. For the charging case, this might be an authentication routine that runs when external power is supplied to charge the battery. Alternatively, when the system is operated in a battery powered mode it accepts the power from the battery during the authentication process, but refuses the power from the battery if the authentication should fail.
There are many forms of electronic authentication available. Simple methods such as a simple unchanging bit stream challenge that looks for a simple bit stream response, can be easy to implement, but the authentication can also be defeated fairly easily. Using a more secure authentication technique will make much more difficult or economically impossible to defeat.
Maxim DeepCover® Secure Authenticators were designed for applications that have the most stringent of security needs; those where reputation protection, property protection, or profit protection are of the highest concern.
Maxim's Deep Cover secure authenticators provide strong, but affordable, cryptographic security using standards-based algorithms and provide all of the functionality to make design simple.
|Application Note||5779||Introduction to SHA-256 Master/Slave Authentication|
|Application Note||4623||Smart Cable Aids Quality Control and Authentication|
|Application Note||3675||Protecting Your R&D Investment with Secure Authentication|
- Symmetric-Key-Based Bidirectional Secure Authentication Model Based on SHA-256
- Strong Authentication with a High-Bit-Count User-Programmable Secret and Input Challenge
- 512 Bits of User EEPROM Partitioned Into Two Pages of 256 Bits