Systems with replaceable or limited life sensors, peripherals, modules, or consumables are commonly targeted by unauthorized aftermarket companies. These counterfeit replacements can introduce safety concerns, reduce quality, and negatively impact OEM revenue. With DeepCover® secure authenticators, a cryptographic solution can easily be implemented for any system where digital processing capabilities exist. With over 3.2 billion secure authentication units shipped, we are experts at helping you implement hardware-based physical security to achieve low-cost counterfeit protection, peripheral device authentication, secure feature setting, and more.
Also see:
Product | Device Type | Crypto Engine | Interface | Features |
---|---|---|---|---|
DS28E50 | Authenticator | SHA-3 | 1-Wire® | SHA-3 with ChipDNA™ PUF protection, authenticated decrement counter, FIPS/NIST compliant TRNG |
DS2477 | Coprocessor | SHA-3 | I2C, 1-Wire | SHA-3, secure I²C coprocessor with built-in 1-Wire master |
MAX66242 | Tag Authenticator | SHA-256 | NFC, I2C | ISO/IEC 15693 HF and I2C dual interfaces, SHA-256 two-way authentication, RF energy harvesting for external supply |
MAX66300 | Reader Coprocessor | SHA-256 | NFC, SPI, UART | NFC transceiver, SHA-256 coprocessor and secure host side key storage for MAX66240/MAX66242 |
Product | Device Type | Crypto Engine | Interface | Features |
---|---|---|---|---|
DS28E38 | Authenticator | ECC-P256 | 1-Wire | ECDSA P256 authentication with ChipDNA™ PUF protection, authenticated decrement counter, TRNG external data source |
DS28C36 | Authenticator | ECC-P256, SHA-256 | I2C | ECDSA P256 or SHA-256 two-way authentication, optional authentication protection of user EEPROM, TRNG source, secure GPIOs and download processing |
DS28E36 | Authenticator | ECC-P256, SHA-256 | 1-Wire | ECDSA P256 or SHA-256 two-way authentication, optional authentication protection of user EEPROM, TRNG source, secure GPIOs and download processing |
DS28E83 | Authenticator | ECC-P256, SHA-256 | 1-Wire | Gamma/eBeam sterilization tolerant, ECDSA P256 or SHA-256 two-way authentication, protected user OTP, secure download, TRNG source, secure GPIO |
DS2476 | Coprocessor | ECC-P256, SHA-256 | I2C | ECDSA/SHA-256 coprocessor, secure host-side key storage for DS28E38/DS28C36/DS28E36/DS28E83 |
ECDSA asymmetric authentication with ChipDNA PUF protection and 2Kb user EEPROM.
Learn More ›
Includes ISO 15693, I2C, SHA-256 tag/transponder with 4Kb user EEPROM, RF/I2C interface and energy harvesting.
Learn More ›
Security Short Subjects (Part 8): Secure Firmware Download for Embedded Systems
4:10 August 30, 2019
Secure Boot and Secure Download - Part 1: Protecting IoT Devices with Secure Authentication
5:36 February 14, 2018