IP Protection

SHA-256 Authenticators for IP Protection

Maxim Integrated

This presentation will introduce a hardware authentication solution for IP protection. The purpose is to explain why authentication is needed, how it works, ways of implementing, and the features and benefits. There are numerous applications that require authentication to protect IP and Maxim provides this hardware security solution. Stealing one's password creates a security breach that can be quickly remedied by changing a password. However, stealing the identity creates a long term financial threat that can be catastrophic. All companies face this latter type of risk everyday. Hardware authentication solutions from Maxim Integrated help companies reduce this risk.

View Training Module
Related Parts
ImageManufacturer Part NumberDescriptionAvailable QuantityBuy Now
IC I2C TO 1WIRE BRIDGE 6TSOCDS2465P+IC I2C TO 1WIRE BRIDGE 6TSOC325 - Immediate
600 - Factory Stock
IC EEPROM 2K X 1 1WIRE 6DFNDS28E22Q+UIC EEPROM 2K X 1 1WIRE 6DFN71 - Immediate
2550 - Factory Stock
EVAL KIT FOR DS28E15DS28E15EVKIT#EVAL KIT FOR DS28E155 - Immediate
216 - Factory Stock
EVAL KIT FOR DS28E22DS28E22EVKIT#EVAL KIT FOR DS28E223 - Immediate
73 - Factory Stock
EVAL KIT FOR DS28EL15DS28EL15EVKIT#EVAL KIT FOR DS28EL153 - Immediate
319 - Factory Stock
IC EEPROM 512KBIT 1WIRE 6DFNDS28E15Q+UIC EEPROM 512KBIT 1WIRE 6DFN6 - Immediate
23300 - Factory Stock
IC EEPROM 4K X 1 1WIRE 6DFNDS28E25Q+UIC EEPROM 4K X 1 1WIRE 6DFN13800 - Factory Stock
EVAL KIT FOR DS28E25DS28E25EVKIT#EVAL KIT FOR DS28E251 - Immediate
248 - Factory Stock
To view modules, you will need Adobe Flash Player 9, or greater, installed on your computer. Adobe Flash Player is available FREE from Adobe.

Flash Player
Flash Player Support Center
PTM Published on: 2014-08-05