AT88SA10HS-TSU-T Atmel, AT88SA10HS-TSU-T Datasheet

no-image

AT88SA10HS-TSU-T

Manufacturer Part Number
AT88SA10HS-TSU-T
Description
IC HOST AUTHENTICATION SOT23-3
Manufacturer
Atmel
Series
CryptoAuthentication™r
Type
Authentication Chipr

Specifications of AT88SA10HS-TSU-T

Applications
Networking & Communications
Mounting Type
Surface Mount
Package / Case
SOT-23-3
Operating Supply Voltage
2.5 V to 5.5 V
Maximum Operating Temperature
+ 85 C
Mounting Style
SMD/SMT
Interface Type
1 Wire
Minimum Operating Temperature
- 40 C
Number Of Timers
1
Program Memory Size
72 bit
Program Memory Type
ROM
Lead Free Status / RoHS Status
Lead free / RoHS Compliant
CryptoAuthentication™ Product Uses
Abstract
1.
2.
Companies are continuously searching for ways to protect property using
various implementations of security; however the cost of implementation can
drive companies away from effective hardware solutions to less secure
software solutions. With the introduction of the AT88SA10HS/102S devices,
affordable hardware security is now in reach and can provide exceptional
protection for:
Overview
This document provides an introduction to the Atmel AT88SA10HS/102S
CryptoAuthentication devices. These exceptional devices enable solutions to
countless problems across many industries. The use cases outlined in this
document will provide a brief description of possible applications for the
AT88SA10HS/102S devices and how they can be implemented.
AT88SA10HS/102S Introduction
To understand the operations and applications explained later in this
document you will first need to have a basic understanding of the
AT88SA10HS/102S devices and how they work. The AT88SA10HS and
AT88SA102S were developed to work together. The AT88SA102S is
designed to be embedded in the product that is protected or authenticated
(client) and the AT88SA10HS device is designed to be placed in the
validating system (host). The AT88SA102S client device can be used with or
without the host side device. When the AT88SA102S is used without the
host side AT88SA10HS chip the host microcontroller must store secret
information in order to perform the validation of the client. Having the secret
information stored in the embedded source code presents a security risk as
the secrets may be ascertained with little effort. For the strongest security
the AT88SA10HS host device should be used; this keeps the customer’s
secret keys protected securely in hardware away from hackers attempting to
reverse engineer the host embedded code.
Confidential file protection
Embedded software anti-cloning
Development system anti-cloning
Media transmission encryption
USB security dongles
Securing wireless or other radio transmission nodes
Authentication for data over power lines
Physical access control
Electronic lockers
Hardware user authentication
Consumable product authentication
Battery authentication.
CryptoAuthentication
Product Uses
AT88SA10HS
AT88SA102S
Application Note
8663B–SMEM–3/09

Related parts for AT88SA10HS-TSU-T

AT88SA10HS-TSU-T Summary of contents

Page 1

... AT88SA102S were developed to work together. The AT88SA102S is designed to be embedded in the product that is protected or authenticated (client) and the AT88SA10HS device is designed to be placed in the validating system (host). The AT88SA102S client device can be used with or without the host side device. When the AT88SA102S is used without the host side AT88SA10HS chip the host microcontroller must store secret information in order to perform the validation of the client ...

Page 2

... A product using the AT88SA10HS/102S can be configured so that the entire product line uses the same key or so that each device has a unique key. The response that a particular device will produce can only be reproduced by something that knows the key that is stored in the device ...

Page 3

Confidential File Protection The AT88SA102S provides an affordable solution that secures documents while in transit. Securing confidential files is accomplished by using a symmetric encryption algorithm for communication as explained in the introduction. The individual embedded system devices create ...

Page 4

Embedded Software Anti-cloning Software used to power embedded systems (host) is often copied, edited or changed by counterfeiters. Companies looking for an inexpensive way to protect their host embedded software from competitors and counterfeiters can now use the AT88SA102S ...

Page 5

Development System Anti-cloning The AT88SC102S provides an exceptional method of preventing third parties from creating clones of evaluation and development boards. To implement anti-cloning each evaluation or development board should be embedded with its own AT88SC102S CryptoAuthentication device. The ...

Page 6

Media Transmission Encryption Downloading files from internet sites has become common practice and in many cases the only way to get select software applications, upgraded features, extensions, or plug-ins. The AT88SA102S offers a solution to protect against theft of ...

Page 7

USB Security Dongles The AT88SA102S can enable security for a web application using an individualized USB dongle. This would provide web shopping, banking, and private member sites the ability to restrict user logon and usage to one individual and ...

Page 8

... Additional security can be achieved by adding an AT88SA10HS device in the host, so that the customer secrets would not have to be kept in the microprocessor code where developers and subcontractors may have access to them ...

Page 9

Authentication for Data over Power Lines Recent advances in transmitting data over power lines provide possibilities for brand new industries. However the implementation of such systems also creates new questions about who can access transmitted information, and who is ...

Page 10

... For an added level of security the AT88SA10HS device which shares the same single communication wire can be optionally used in the host to secure the host side keys. This configuration is displayed in Figure 9. ...

Page 11

... Solutions using the AT88SA102S CryptoAuthentication device now make securing many individual units or areas with many zones very affordable. The optional addition of the AT88SA10HS device can be used on the host side to make the lock both very secure and very inexpensive. Figure 10 displays the AT88SA10HS/102S devices being used to secure electronic locking applications ...

Page 12

Hardware User Authentication Users log on to many systems each day, in many cases using unique passwords. Users may be tempted to manage their passwords by writing them down, while convenient for the user this is one of the ...

Page 13

... AT88SA102S can also be used to provide a consumable usage tracking or to limit device usage cycles. An additional level of security can be added to the system by using the AT88SA10HS in the host. The AT88SA10HS maintains the secret keys in hardware instead of embedding them into the host microprocessor code. This makes the keys irretrievable for hackers attempting to circumvent the system. 8663B– ...

Page 14

... Figure 13. Battery Protection An additional level of security can be added to the system by using the AT88SA10HS in the host. The AT88SA10HS maintains the secret keys in hardware instead of embedding them into the host microprocessor code. This makes the keys irretrievable for hackers attempting to circumvent the system. The addition of the AT88SA10HS is displayed in Figure 14 ...

Page 15

... Integrated Development Environment (IDE) Software program which allows the use of different individual tools from one single development platform. Programming Services A system operated by Atmel to provide a secure method to insert customer’s secrets into devices as a part of the device manufacturing process. 1 National Institute of Standards and Technology, Nov 26, 2001. ...

Page 16

Supporting Documents CryptoAuthentication High Level Security Design CryptoAuthentication™ Product Uses 16 8663B–SMEM–3/09 ...

Page 17

Appendix B. Revision History Doc. Rev. 8663B 8663B–SMEM–3/09 CryptoAuthentication™ Product Uses Date 03/2009 Initial document release Comments 17 ...

Page 18

... OF THE POSSIBILITY OF SUCH DAMAGES. Atmel makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Atmel does not make any commitment to update the information contained herein. Unless specifically provided otherwise, Atmel products are not suitable for, and shall not be used in, automotive applications. Atmel’ ...

Related keywords