MENU

Turnkey security module protects brands from counterfeiting and cloning

Turnkey security module protects brands from counterfeiting and cloning

New Products |
By eeNews Europe



Normal
0

false
false
false

EN-GB
X-NONE
X-NONE

/* Style Definitions */
table.MsoNormalTable
{mso-style-name:”Table Normal”;
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:””;
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:”Calibri”,”sans-serif”;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:”Times New Roman”;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}

Batteries, chargers, printer ink and toner cartridges and other consumer electronics accessories represent one of the largest segments of the counterfeit products market. The VaultIC100 device features elliptic curve mutual authentication, a highly secure and efficient method of protecting these products.

Using the VaultIC100 security module, printers and ink cartridges, for example, can authenticate each other, ensuring that the ink cartridge has been approved for use with the printer, but also that it is the correct one for that model printer. Cell phones and laptops can ensure that only approved batteries of the correct type are employed, providing an extra measure of safety from potential fires or explosions.

The module can protect against cloning of various others products including computer and gaming console accessories, white goods, battery chargers, mp3 readers, Bluetooth earphones, smart energy meters and more. In the simplest case, the host product (a printer or cell phone, for instance) sends a random challenge message to the accessory product (ink cartridge or battery), which contains an embedded VaultIC100, to check if it is an authorized device.

The VaultIC100 uses its securely stored private key to compute the elliptic curve digital signature of the challenge message and send it back to the host. Using the corresponding public key, the host performs the necessary signature verification. Based on the result, the host decides whether to authenticate the accessory or not.

For even greater security, the VaultIC100 can be employed as part of a public-key infrastructure (PKI). Although more complex to implement, the PKI approach is a more secure way of distributing keys, and completely eliminates the need to store a copy of the secret key in the host device. The public key and its digital certificate either can be embedded in the host or stored in the VaultIC100 contained in the accessory product and retrieved by the host when needed for authentication. The private key is protected in the VaultIC100.

The VaultIC100 security module is low cost and measures 2x3mm. It includes a secure RISC CPU, hardware random number generator and INSIDE’s Ad-X advanced hardware crypto accelerator, which supports the use of various FIPS-recommended elliptic curves up to 303 bits. Communications are handled through one or two wire (I²C) interfaces, making the VaultIC100 suitable for a variety of high volume embedded applications.

The VaultIC100 also includes a variety of dedicated anti-tampering hardware for protection against simple and differential power analysis (SPA/DPA) attacks, advanced protection against physical attacks (including active shield), environmental protection systems (voltage, frequency and temperature monitors), light protection and secure management/access protection to prevent reverse engineering or cloning. VaultIC100 is Common Criteria EAL4+ ready and able to protect high-value assets.
Visit Inside Secure at www.insidesecure.com

If you enjoyed this article, you will like the following ones: don't miss them by subscribing to :    eeNews on Google News

Share:

Linked Articles
10s