In the electronics industry, due to the expansion of the entire media industry, about its content and data.
Protection has always received much attention; Because of the huge development cost of hardware system, protecting it is the focus of the industry. The protection of firmware and core technology in product development is important, but the protection of visible parts such as packaging and PCB wiring can not be ignored. Most companies are generally used to using copyright protection systems that use security chips and algorithms. IDKT series is a set of customized encryption chips developed by our company, with pure logic circuits inside. This makes the whole encryption and authentication process safe and objective. In addition, IDKT uses AES256 encryption algorithm to encrypt and decrypt software and hardware, making encryption more secure. In order to prevent data from being intercepted, the communication of IDKT has been spread in the form of ciphertext, which is combined with the random combination of pseudo-data, so that the data can be delivered to safe customers. In order to make the customer scheme more perfect, IDKT operates in the form of system data, which is encrypted, diverse and hidden. At the same time, in order to break the defects of logic encryption chip, IDKT adopts a customized way to customize an independent algorithm for each customer to ensure the uniqueness of each customer's encryption. In order to ensure uniqueness, our company supplies in closed channels, making the market liquidity zero. Built-in 2KB EEPROM space, custom encryption parameters, double encryption is more secure. ? With the advent of the Internet of Things era, there are more and more interconnections between products, and intelligent extension devices are more and more extensive. How to ensure the benefits of solution providers in extended equipment and the authentication of the legitimacy of extended equipment have become another issue that solution providers need to consider. Simple software certification is no longer reliable, and hardware equipment certification has become the mainstream. IDKT series has brought such a scheme. When the hardware implant initiates the authentication request from the device and the host, it needs to go through IDKT? Perform corresponding encryption and decryption operations, send back the authentication ciphertext, and the host performs decryption and authentication.
Our encryption chip scheme is widely used in the following industries.
1.? Smart homes (firmware protection, communication encryption, file integrity verification and data encryption) and smart cities (firmware protection, communication encryption, file integrity verification and data encryption) in the Internet of Things (IoT) industry.
2.? Car machine industry? Car audio-visual system (firmware/system protection, license plate authorization and output control), car navigation (firmware/system protection, license plate authorization and output control), car diagnosis (firmware/system protection), car body sensor (communication encryption, firmware/system protection), car communication module (communication encryption, firmware/system protection), V2X (communication encryption, firmware/system protection).
3.? Four-axis aircraft industry? Flight control system protection (system protection, license authorization), accessory battery certification (accessory certification), flight control and handle certification (communication encryption)
4.? Printer consumables? Ink cartridge encryption and anti-counterfeiting (parts certification), system protection (system protection, license authorization)
5.? Software algorithm industry? Fingerprint identification algorithm (license authorization, data encryption), iris identification algorithm (license authorization, data encryption), video image analysis algorithm (license authorization), etc.
6.? Security industry? IPC (firmware/system protection, license authorization, yield control), DVR (firmware/system protection, license authorization, yield control), NVR (firmware/system protection, license authorization, yield control).
7.? Set top box industry? DVB-S and so on. (Firmware/System Protection)
8.? Electronic cigarette industry? Product safety (safety certification)? Encryption authentication and protection of scheme motherboard and smoke bomb
Embedded custom encryption chip and its scheme, product characteristics and application
IDKT-AE/ Al Idkt-AES/AEL Idkt-P1
1.) hardware uniqueness, because the unique ID serial number is customized for each customer from the wafer.
2.) Combining software and hardware, the original factory writes LIB for customers according to the operating platform characteristics of the customer system. Different compilers, different operating platforms, idle CPU and LIB are different, which greatly enhances the security performance.
3.) IC with unique ID serial number and unique LIB is provided by the original factory.
4.) Use AES 256 encryption technology to randomly calculate random data.
5.) Built-in 64-bit OTP function helps customers manage the shipment quantity and the problem of goods fleeing.
6.) Built-in 2KB EEPROM space, user-defined encryption parameters, double encryption is more secure. ?