Datakey CryptoAuthentication
If it’s serious security you’re after, there’s a strong chance that Datakey keys and tokens could be right for you and your application – they offer a base level of security not seen in other removable memory devices.
The unique proprietary form factor makes infiltration via standard USBs and SD cards useless – the connectors are incompatible, which means your data is kept safe, simple as that – it’s like having a secret handshake, and unless you know it, you can’t unlock the data.
Datakey product distribution and availability is tightly controlled too, so you don’t need to worry about someone getting hold of some tokens and unauthorised devices logging into your system.
And as if the unique form factor wasn’t enough, it’s just the beginning.
If your application demands even stronger protection, the CryptoAuthentication range from Datakey will provide it – a true fortress for your most sensitive information, in your most sensitive systems.
Embedded within the tokens are Microchip’s legendary SHA-204 and ECC608 cryptoauthentication ICs, turning these already highly secure tokens into impregnable vaults for your data.
The CryptoAuthentication range includes a layered raft of security features:-
- Unique, uncrackable serial numbers: Each token is one-of-a-kind, making it impossible to replicate.
- Segmented memory: Control exactly who can access and what they can see with read-only and encrypted sections.
- Tamper-proof counters: Track usage meticulously with one-way counters that can't be reset.
- Advanced algorithms: Symmetric and asymmetric algorithms provide the highest level of encryption.
From securing feature distribution, Crypto Ignition Keys to safeguarding remote logs, CryptoAuthentication is the ultimate protection for your sensitive data.
If you’d like to test how the CryptoAuthentication range could massively improve the security in your next embedded design, then we can help.
As consultative distributors, we’re happy to talk through any potential applications, and give you the benefit of our expertise, and if you’d like to test the concept, we’re able to supply you with a specially developed development kit, which will get you up and running and testing these amazing security products in no time at all.