• +886 2-2934-3166
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

Authentication

S10 Authentication Chip for Anti-counterfeiting and Device Management

Connected devices and electronic components possess characteristics of easy connection and deployment. Yet once the infrastructure is built but turns out to be immature, imminent threats are to cause large-scale losses of assets. In light of it, creating a unique identify for every unit and protecting digital assets from compromising are required for a robust and anti-counterfeiting system.

The S10 authentication chip centers on Infineon’s OPTIGA™ Trust SLS 10ERE authentication solution, effectively assisting customers to fulfill authenticity, integrity and safety of their products. It features a turn-key solution that can alleviate any concern of aftermarket replacement or counterfeiting.

The dominant cryptographic algorithm, Elliptic Curve Cryptography (ECC), fulfills strong authentication in the embedded system. Whether it is intended for an offline environment or a connected system, the host can authenticate against the client to verify authenticity. The S10 authentication chip, though playing a trivial role in a device or a component, critically ensures the overall security and sustainability of the entire system.

Connected devices and electronic components possess characteristics of easy connection and deployment. Yet once the infrastructure is built but turns out to be immature, imminent threats are to cause large-scale losses of assets. In light of it, creating a unique identify for every unit and protecting digital assets from compromising are required for a robust and anti-counterfeiting system.

The S10 authentication chip centers on Infineon’s OPTIGA™ Trust SLS 10ERE authentication solution, effectively assisting customers to fulfill authenticity, integrity and safety of their products. It features a turn-key solution that can alleviate any concern of aftermarket replacement or counterfeiting.

The dominant cryptographic algorithm, Elliptic Curve Cryptography (ECC), fulfills strong authentication in the embedded system. Whether it is intended for an offline environment or a connected system, the host can authenticate against the client to verify authenticity. The S10 authentication chip, though playing a trivial role in a device or a component, critically ensures the overall security and sustainability of the entire system.

Hardware
  • Easy to implement Single-Wire host interface
  • Unique asymmetric key pair per chip
  • 3.5 kbits user NVM
Parametrics
Applications

Key Features

Hardware
  • Easy to implement Single-Wire host interface
  • Unique asymmetric key pair per chip
  • 3.5 kbits user NVM
Parametrics
Applications

Use Case Application

Over the past years, public awareness of security has been raised, specifically for those who confronted imminent attacks or targeted markets that abounded with counterfeit products. Under the circumstance, security becomes a must rather than a choice. A great number of vendors consequently reached us and voiced their concerns. They covered a wide range of use case applications, in which the security mechanism was designed aiming to safeguard the value of digital assets and intellectual properties. IKV-Tech authentication solution is taking effect even now. In these cases, the given solution has proven a real-world impact on cost, trustworthiness and target market penetrability.

The S10 authentication chip enables anti-counterfeiting in a wide range of applications with salient advantages as follows.

  • Improved security with state of the art asymmetric elliptic curve authentication principle and uniqueness provided by chip individual key pair 
  • Optimized system costs with 1 chip solution 
  • Easy integration due to full turn-key solution 
  • Lean and easy connectivity with Single Wire Interface 
Over the past years, public awareness of security has been raised, specifically for those who confronted imminent attacks or targeted markets that abounded with counterfeit products. Under the circumstance, security becomes a must rather than a choice. A great number of vendors consequently reached us and voiced their concerns. They covered a wide range of use case applications, in which the security mechanism was designed aiming to safeguard the value of digital assets and intellectual properties. IKV-Tech authentication solution is taking effect even now. In these cases, the given solution has proven a real-world impact on cost, trustworthiness and target market penetrability.

The S10 authentication chip enables anti-counterfeiting in a wide range of applications with salient advantages as follows.

  • Improved security with state of the art asymmetric elliptic curve authentication principle and uniqueness provided by chip individual key pair 
  • Optimized system costs with 1 chip solution 
  • Easy integration due to full turn-key solution 
  • Lean and easy connectivity with Single Wire Interface 

Why is our security chipTrustworthyReliableRobust?

I. Manufactured by world-known companies (Infineon) 

Security chips own many patents, including cryptographic algorithm, tamper resistant, secure COS and sensors that detect intrusive and non-intrusive attacks. Though many companies buy intellectual properties trying to devise a SoC that equals a standard security chip, it turns out that the cost is several times higher than gains.
II. Equipped with an accelerator and safe storages

The absence of accelerators leads to poor performance in the encrypting process since cryptographic algorithms usually involve computing big numbers. For security concern, the accelerator functions only in the secure areas of chips to boost the overall performance of security services. Storages are likewise very important, especially for cryptographic keys and confidential information. 
III. Capability of detecting and resisting intrusion

Means of intrusion vary with hackers’ tricks. Without appropriate design and implementation, devices are very likely to be attacked within seconds once vulnerabilities are exposed. Smart cards are an example.
IV. Strictly controlled channel by the original manufacturer

The market of security chips usually involves export control; only by NDA and certification can the access be obtained, and regular inspection is also needed. Security chips available on DigiKey or Mouser have been cracked and proven extremely vulnerable.
V. Acquisition of international certificates

  1. FIPS 140-2 Validation Certificate 
  2. ISO 15408 Certification
  3. Common Criteria EAL

These three mainstream certificates cost considerably high, from hundreds of thousands of US dollars to millions.

Image

The market of security chips is very challenging; for manufacturers, precaution and countermeasures are in any time needed to satisfy clients’ requirements in this ever changing world, so our skills should always keep up with hackers’ newest tactics. Besides internationally accredited security chips, we also localize and customize our services, such as risk assessment, cost benefit analysis (CBA) and penetration test.

Lastly, to provide robust security chips and reliable solutions, IKV-Tech collaborates with world-known manufacturer, Infineon, to resell and develop the finest security chips. 

Send your message

Image

Address: No. 218, Section 6, Roosevelt Rd,

Wenshan District, Taipei City, 116 

TEL:+886-2-29343166

FAX:+886-2-29343167

 
Copyright © 2022 InfoKeyVault Technology. All rights reserved.