• PRODUCTS (19)
  • CATALOGUES

  • WHITE PAPERS

  • PRESS RELEASES

  • Suggested offers
  • 0 results. Did you mean ?
  • Suggested categories
  • 0 results. Did you mean ?
  • Suggested companies
  • 0 results. Did you mean ?
  • Suggested offers
  • 0 results. Did you mean ?
  • Suggested categories
  • 0 results. Did you mean ?
  • Suggested companies
  • 0 results. Did you mean ?
Become a supplier
Help
My account

Anti-cloning

Design-Software

Ask for a quote Receive Documentation Contact the supplier

This use case describes an application in which the host device is required to enforce authentication; that is, refuse to accept an unauthorized peripheral. The design challenge here is to find a robust way to implement security across the entire system, because weak points in the design might allow circumvention of the enforcement mechanism.

One reason for providing a secure identity that the host must authenticate is to ensure that a device (peripheral, etc.) whose operational capabilities expire after a specified number of cycles or a certain date cannot be operated beyond its expiration point.

This application differs from the Board ID™ tracking use case in which a person performs the enforcement function. Also, it differs from a simple authentication scenario in which the device does not need to have a unique identity, but only has to prove to the host that it is authentic.

OTHER PRODUCTS DESIGN-SOFTWARE FROM RENESAS TECHNOLOGY EUROPE

Board ID

Board ID

Ask for a quote
Development Tools

Development Tools

Ask for a quote
Tracking Use Case

Tracking Use Case

Ask for a quote
Usage Control

Usage Control

Ask for a quote

INTERNET USERS ALSO CONSULTED ON THE CATEGORY DESIGN-SOFTWARE

Check out all the products from category design-software

See also

Wiring software Simulation software

Buyers

Find your suppliers Complete your request and let our teams find you the best deals available.

Suppliers

Find your future clients List your products and services to enhance your web presence and receive qualified enquiries.