AT88SA10HS-TSU-T Atmel, AT88SA10HS-TSU-T Datasheet
AT88SA10HS-TSU-T
Specifications of AT88SA10HS-TSU-T
Related parts for AT88SA10HS-TSU-T
AT88SA10HS-TSU-T Summary of contents
Page 1
... AT88SA102S were developed to work together. The AT88SA102S is designed to be embedded in the product that is protected or authenticated (client) and the AT88SA10HS device is designed to be placed in the validating system (host). The AT88SA102S client device can be used with or without the host side device. When the AT88SA102S is used without the host side AT88SA10HS chip the host microcontroller must store secret information in order to perform the validation of the client ...
Page 2
... A product using the AT88SA10HS/102S can be configured so that the entire product line uses the same key or so that each device has a unique key. The response that a particular device will produce can only be reproduced by something that knows the key that is stored in the device ...
Page 3
Confidential File Protection The AT88SA102S provides an affordable solution that secures documents while in transit. Securing confidential files is accomplished by using a symmetric encryption algorithm for communication as explained in the introduction. The individual embedded system devices create ...
Page 4
Embedded Software Anti-cloning Software used to power embedded systems (host) is often copied, edited or changed by counterfeiters. Companies looking for an inexpensive way to protect their host embedded software from competitors and counterfeiters can now use the AT88SA102S ...
Page 5
Development System Anti-cloning The AT88SC102S provides an exceptional method of preventing third parties from creating clones of evaluation and development boards. To implement anti-cloning each evaluation or development board should be embedded with its own AT88SC102S CryptoAuthentication device. The ...
Page 6
Media Transmission Encryption Downloading files from internet sites has become common practice and in many cases the only way to get select software applications, upgraded features, extensions, or plug-ins. The AT88SA102S offers a solution to protect against theft of ...
Page 7
USB Security Dongles The AT88SA102S can enable security for a web application using an individualized USB dongle. This would provide web shopping, banking, and private member sites the ability to restrict user logon and usage to one individual and ...
Page 8
... Additional security can be achieved by adding an AT88SA10HS device in the host, so that the customer secrets would not have to be kept in the microprocessor code where developers and subcontractors may have access to them ...
Page 9
Authentication for Data over Power Lines Recent advances in transmitting data over power lines provide possibilities for brand new industries. However the implementation of such systems also creates new questions about who can access transmitted information, and who is ...
Page 10
... For an added level of security the AT88SA10HS device which shares the same single communication wire can be optionally used in the host to secure the host side keys. This configuration is displayed in Figure 9. ...
Page 11
... Solutions using the AT88SA102S CryptoAuthentication device now make securing many individual units or areas with many zones very affordable. The optional addition of the AT88SA10HS device can be used on the host side to make the lock both very secure and very inexpensive. Figure 10 displays the AT88SA10HS/102S devices being used to secure electronic locking applications ...
Page 12
Hardware User Authentication Users log on to many systems each day, in many cases using unique passwords. Users may be tempted to manage their passwords by writing them down, while convenient for the user this is one of the ...
Page 13
... AT88SA102S can also be used to provide a consumable usage tracking or to limit device usage cycles. An additional level of security can be added to the system by using the AT88SA10HS in the host. The AT88SA10HS maintains the secret keys in hardware instead of embedding them into the host microprocessor code. This makes the keys irretrievable for hackers attempting to circumvent the system. 8663B– ...
Page 14
... Figure 13. Battery Protection An additional level of security can be added to the system by using the AT88SA10HS in the host. The AT88SA10HS maintains the secret keys in hardware instead of embedding them into the host microprocessor code. This makes the keys irretrievable for hackers attempting to circumvent the system. The addition of the AT88SA10HS is displayed in Figure 14 ...
Page 15
... Integrated Development Environment (IDE) Software program which allows the use of different individual tools from one single development platform. Programming Services A system operated by Atmel to provide a secure method to insert customer’s secrets into devices as a part of the device manufacturing process. 1 National Institute of Standards and Technology, Nov 26, 2001. ...
Page 16
Supporting Documents CryptoAuthentication High Level Security Design CryptoAuthentication™ Product Uses 16 8663B–SMEM–3/09 ...
Page 17
Appendix B. Revision History Doc. Rev. 8663B 8663B–SMEM–3/09 CryptoAuthentication™ Product Uses Date 03/2009 Initial document release Comments 17 ...
Page 18
... OF THE POSSIBILITY OF SUCH DAMAGES. Atmel makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Atmel does not make any commitment to update the information contained herein. Unless specifically provided otherwise, Atmel products are not suitable for, and shall not be used in, automotive applications. Atmel’ ...