Atmel ATSHA204AUSB软件保护器(加密狗)解决方案

关键词:USB软件保护器加密狗EEPROM存储器 ATSHA204AUSB

时间:2015-7-28 13:42:00      来源:中电网

Atmel公司的ATAES132A,ATSHA204A和ATECC508A是完整的加密器件,包括分成16个区的4.5Kb EEPROM,用来存储密钥数据,各种读/写数据,仅读数据,密码或保密数据以及消耗跟踪控制.访问各个部分存储器由不同方法进行限制,主要用在安全下载和引导,加密控制,反复制和信息安全.本文介绍了ATSHA204A主要特性和应用框图,以及采用ATSHA204A, ATAES132A和ATECC508A的CryptoAuthentication™ USB加密狗评估板AT88CK590主要特性,电路图和材料清单

Atmel公司的ATAES132A,ATSHA204A和ATECC508A是完整的加密器件,包括分成16个区的4.5Kb EEPROM,用来存储密钥数据,各种读/写数据,仅读数据,密码或保密数据以及消耗跟踪控制.访问各个部分存储器由不同方法进行限制,主要用在安全下载和引导,加密控制,反复制和信息安全.本文介绍了ATSHA204A主要特性和应用框图,以及采用ATSHA204A, ATAES132A和ATECC508A的CryptoAuthentication™ USB加密狗评估板AT88CK590主要特性,电路图和材料清单.
The Atmel® ATSHA204A is a full turnkey security device. It includes a 4.5Kb EEPROM divided into 16 slots. This array can be used for storage of keys, miscellaneous read/write, read-only, password or secret data, and consumption tracking. Access to the various sections of memory can be restricted in a variety of ways and then the configuration locked to prevent changes.
Access to the chip is through a standard I²C interface at speeds up to 1Mb/sec. The chip also supports a single-wire interface that can reduce the number of GPIOs required on the system processor and/or reduce the number of pins on connectors. It is compatible with most UART or serial I/O controllers. System integration is eased with a wide supply voltage range and an ultra-low sleep current of less than 100nA.
The ATSHA204A device includes an Electrically Erasable Programmable Read-Only Memory (EEPROM) arraythat can be used for key storage, miscellaneous read/write data, read-only, secret data, consumption logging,and security configuration. Access to the various sections of memory can be restricted in a variety of ways, andthe configuration can then be locked to prevent changes.
The ATSHA204A features a wide array of defense mechanisms specifically designed to prevent physicalattacks on the device itself or logical attacks on the data transmitted between the device and the system. Hardware restrictions on the way keys are used or generatedprovide further defense against certain styles of attack.
Access to the device is made through a standard I2C interface at speeds of up to 1Mb...

猜你喜欢