datasheets.com EBN.com EDN.com EETimes.com Embedded.com PlanetAnalog.com TechOnline.com  
Events
UBM Tech
UBM Tech

Security Fundamentals 3: Secure Authentication in Embedded Systems

Original Air Date: Jul 23, 2013 | Duration: 60 minutes Webinar
1 24
More Info Less Info

Overview:
Secure Authenticator ICs are used to provide cryptographic protection and control capabilities to various embedded applications. Common uses include counterfeit prevention, usage control, system feature setting, and reference design license management. This webinar will take participants through the cryptographic fundamentals of secure authentication, review the security algorithm types and tradeoffs, discuss security attack threats and associated IC-level protection methods, an end application scenario, and overview of Maxim's latest DeepCover® Secure Authentication products.

Estimated Time: 1 Hour

What attendees will learn:

  • Understand the cryptographic concepts of challenge and response secure authentication
  • Understand the crypto algorithm types used with secure authentication and associated tradeoffs
  • Understand the architecture of secure authentication in the typical embedded system
  • Recognize there are serious threats to secure authenticators and that IC-level protection is necessary
  • Obtain an high level overview of Maxim's latest generation DeepCover Secure Authenticators
  • Review a typical secure application example of a host system with attached peripheral

Presenter:
Scott Jones, Executive Director, Embedded Security, Maxim Integrated

Scott Jones is an Executive Director of Business Management at Maxim Integrated where he leads a team responsible for Secure Authentication products. Over 12 years at Maxim Integrated, Scott has performed product line and end-customer business development. Prior to joining Maxim, he spent 15 years in applications and embedded HW/SW design roles at Dallas Semiconductor and other technology companies.


24 comments
write a comment

Francisco J. Galan Posted Jul 21, 2013

Could you send me the links of previous sessions record? Iy's only for revise and review.

reply

No Avatar

tbtonibareta Posted Mar 7, 2014

Yep same here. could you send me some links. thanks Banshee

reply

No Avatar

tbtonibareta Posted Mar 8, 2014

this would be a good opportunity. Thanks by the way news Canelo Alvarez

reply

No Avatar

ledbg Posted Mar 13, 2014

is it a security system? your information is very useful and waiting for more. Aluminum Alloy Pen Fishing Rod

reply

No Avatar

bookersharrow Posted Apr 8, 2014

your information is very useful and waiting for more. Snail Bob 7

reply

No Avatar

tbtonibareta Posted Mar 8, 2014

Keep up writing good article. Alvarez vs Angulo

reply

No Avatar

tbtonibareta Posted Mar 9, 2014

here we go tells the story of the months and years that follow after a zombie apocalypse. It follows a group of survivors, led by police officer Rick Grimes, who travel in search of a safe and secure home. The Walking Dead The Walking Dead Season 4 Episode 13 Live Stream Watch The Walking Dead Season 4 Episode 13 The comic goes on to explore the challenges of life in a world overrun by zombies who take a toll on the survivors, and sometimes the interpersonal conflicts present a greater danger to their continuing survival than the zombies that roam the country. Over time, the characters are changed by the constant exposure to death and some grow willing to do anything to survive.

reply

No Avatar

sw308495 Posted Mar 31, 2014

Prior to joining Maxim, he spent 15 years in applications and embedded HW/SW design roles at Dallas Semiconductor and other technology companies.Samsung fridge freezer parts.

reply

No Avatar

Jordi JP Posted Jul 23, 2013

Hello, I would like to join the webinar. However, after the registration, I got a message that says that e-mail address is restricted to join. Is there something I can do to join the webinar? Thanks, Jordi

reply

No Avatar

tbtonibareta Posted Mar 8, 2014

I did try it. It works here Canelo Alvarez vs Alfredo Angulo Live Stream

reply

sudhish Posted Jul 27, 2013

Where I can get these presentations?

reply

No Avatar

tbtonibareta Posted Feb 25, 2014

try visiting other pages. thanks

reply

No Avatar

hair extensions Posted Oct 18, 2013

is it a security system? your information is very useful and waiting for more. fusion hair

reply

No Avatar

andreberin Posted Apr 10, 2014

I will use this training for sure, thanks! I will be back with reviews! Good tipps!

reply

No Avatar

rosalijames Posted Dec 11, 2013

Good work! I always like to leave comments whenever I see something unusual or impressive. I think we must appreciate those who do something especial. Keep it up, thanks Best Online Reviews

reply

No Avatar

John Sander Posted Jan 18, 2014

Data encryption plays an important role nowadays. It is a necessary thing to protect your data. used forklifts

reply

No Avatar

jantravis Posted Apr 9, 2014

I know what you mean, I will use your advice for sure, thanks! great link

reply

No Avatar

tbtonibareta Posted Feb 25, 2014

I enjoy reading your blog. keep it up. Bookmark it now. Pretty Little Liars Season 4 Episode 21 Live-Stream thanks

reply

No Avatar

tbtonibareta Posted Feb 26, 2014

I'm confused is it a security system? thanks Watch Pretty Little Liars Season 4 Episode 21 Online

reply

No Avatar

tbtonibareta Posted Feb 26, 2014

Hey scott! I found your blog very helpful. Thanks for writing good article. Message from Technotrixs

reply

No Avatar

tbtonibareta Posted Mar 2, 2014

I found your blog very helpful that why I bookmark it. All visit my site 86th Oscars Academy Awards 2014 Live Stream 86th Academy Awards 2014 Live StReaM Online

reply

No Avatar

tbtonibareta Posted Mar 7, 2014

Secure Authenticator ICs are used to provide cryptographic protection and control capabilities to various embedded applications. Diaries

reply

No Avatar

cerebella Posted Apr 11, 2014

it is amazing what you did in this industry and for sure you can do more!

reply

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page