Top

DeepCover Secure Microcontroller with MIPS 4KSd Processor Core

Secure 32-Bit MIPS Processor Supporting Linux OS with Advanced Physical Security and Encrypted External Bus

Product Details

Key Features

Simplified Block Diagram

Technical Docs

Support & Training

Search our knowledge base for answers to your technical questions.

Filtered Search

Our dedicated team of Applications Engineers are also available to answer your technical questions. Visit our support portal .

Key Features

  • MIPS32 4KSd RISC Processor
    • 130 MIPS at 96MHz
    • 2 x 8KB Cache
    • Memory Management Unit
    • Enhanced Power Management
    • Dedicated Instructions to Boost Cryptographic Operations
  • Memories
    • 128KB of SRAM
    • 256KB of Lockable Flash Memory
    • 256 Bytes of User OTP
    • 128KB of ROM (HAL, EMV Level 1, and Secure Bootloader)
    • Memory Controller Supporting One SDRAM and Up to Four Static Memories (Flash or SRAM)
  • Security Features
    • On the Fly AES Encryption/Decryption of External Memories
    • Hardware AES-128 Engine
    • Unique Serial Number (USN)
    • 512-Bit Battery-Powered Key Area (BPK) with Instant Erase Upon Tampering
    • Integrated Tamper Sensors (Frequency, Voltage, Temperature, Die Shield)
    • 12 External Sensor Inputs
    • True Random-Number Generator (TRNG)
    • Secure RTC with Interrupt Alarm
    • Secure Keyboard Controller (12 x 12)
  • Interrupt Controller
  • 1D/2D DMA
  • LCD Interface: 8-Bit Bus, 6800 Compatible
  • Three ISO 7816 Controllers
  • Thermal Printer Interface
  • USB 2.0 OTG Full Speed with 16 Endpoints and Integrated Transceiver
  • Four UARTs (IrDA and Full Modem Support)
  • I²C Master/Slave
  • SPI Master/Slave with Up to Seven Slaves
  • PS2 Master/Slave
  • SPP Interface
  • 6-Channel, 10-Bit ADC
  • 32 GPIOs
  • Four 16-Bit Timers/Counters
  • Two PWMs with One 15mA Output
  • Watchdog Timer
  • JTAG Boundary Scan
  • 256-Ball BGA, 0.8mm Pitch

    Applications/Uses

    • ATM Keyboards
    • EFTPOS
    • Electronic Metering
    • Healthcare Reader
    • PIN Pads

    Description

    DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced physical security to provide the most secure key storage possible.

    The DeepCover Secure Microcontroller (USIP™ Professional IC (USIP PRO)) was designed to provide an interoperable, secure, and cost-effective environment for new generations of trusted devices. This secure platform is fully compliant with EMV® and PCI PED standards. The USIP PRO is based upon the most secure, 32-bit, RISC core (MIPS32® 4KSd) from MIPS Technologies. While providing superior performance (1.35MIPS/MHz), this low-power core adds special instructions to accelerate cryptographic operations and security functions to enforce system integrity. Complemented by a secure memory management unit (MMU), the USIP PRO can run feature-rich operating systems such as Linux® in a secure way.

    System security is enhanced by a number of physical and logical protection mechanisms including environmental sensors (temperature, voltage, and frequency), active metal shield, real-time clock (RTC), and 512 bits of secure NVM storage (BPK) with instant erase capability upon tampering. For greater privacy, external memory content is fully protected through a universal cryptographic interface (UCI) that performs on the fly AES-128 encryption/decryption. The USIP PRO is one of the most integrated solutions for financial and other trusted terminals. It includes 128KB of SRAM, 128KB of ROM, 256KB of flash, and 256 bytes of OTP. Additionally, the USIP PRO accommodates external memories such as NOR flash, SRAM, and SDRAM.

    The device provides extensive communication support with USB On-The-Go (OTG), UART, SPI, I²C, PS/2, IrDA, and parallel SPP. In addition, the USIP PRO offers a unique set of peripherals such as smart card controllers, LCD interface, thermal printer interface, GPIO, PWM, watchdog, general-purpose timers, and a built-in ADC.

    Simplified Block Diagram

     

    Technical Docs

    Support & Training

    Search our knowledge base for answers to your technical questions.

    Filtered Search

    Our dedicated team of Applications Engineers are also available to answer your technical questions. Visit our support portal .