datasheets.com EBN.com EDN.com EETimes.com Embedded.com PlanetAnalog.com TechOnline.com  
Events
UBM Tech
UBM Tech
Welcome Guest Log In | Register | Benefits

Security Fundamentals 3: Secure Authentication in Embedded Systems

Original Air Date: Jul 23, 2013 | Duration: 60 minutes Webinar
1 3
More Info Less Info

Overview:
Secure Authenticator ICs are used to provide cryptographic protection and control capabilities to various embedded applications. Common uses include counterfeit prevention, usage control, system feature setting, and reference design license management. This webinar will take participants through the cryptographic fundamentals of secure authentication, review the security algorithm types and tradeoffs, discuss security attack threats and associated IC-level protection methods, an end application scenario, and overview of Maxim's latest DeepCover® Secure Authentication products.

Estimated Time: 1 Hour

What attendees will learn:

  • Understand the cryptographic concepts of challenge and response secure authentication
  • Understand the crypto algorithm types used with secure authentication and associated tradeoffs
  • Understand the architecture of secure authentication in the typical embedded system
  • Recognize there are serious threats to secure authenticators and that IC-level protection is necessary
  • Obtain an high level overview of Maxim's latest generation DeepCover Secure Authenticators
  • Review a typical secure application example of a host system with attached peripheral

Presenter:
Scott Jones, Executive Director, Embedded Security, Maxim Integrated

Scott Jones is an Executive Director of Business Management at Maxim Integrated where he leads a team responsible for Secure Authentication products. Over 12 years at Maxim Integrated, Scott has performed product line and end-customer business development. Prior to joining Maxim, he spent 15 years in applications and embedded HW/SW design roles at Dallas Semiconductor and other technology companies.


3 comments
write a comment

Francisco J. Galan Posted Jul 21, 2013

Could you send me the links of previous sessions record? Iy's only for revise and review.

reply

No Avatar

Jordi JP Posted Jul 23, 2013

Hello, I would like to join the webinar. However, after the registration, I got a message that says that e-mail address is restricted to join. Is there something I can do to join the webinar? Thanks, Jordi

reply

sudhish Posted Jul 27, 2013

Where I can get these presentations?

reply

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page