IP Protection

SHA-256 Authenticators for IP Protection

Maxim Integrated

This presentation will introduce a hardware authentication solution for IP protection. The purpose is to explain why authentication is needed, how it works, ways of implementing, and the features and benefits. There are numerous applications that require authentication to protect IP and Maxim provides this hardware security solution. Stealing one's password creates a security breach that can be quickly remedied by changing a password. However, stealing the identity creates a long term financial threat that can be catastrophic. All companies face this latter type of risk everyday. Hardware authentication solutions from Maxim Integrated help companies reduce this risk.

View Training Module
Related Parts
Manufacturer Part NumberDescriptionAvailable QuantityBuy Now
DS2465P+IC I2C TO 1WIRE BRIDGE 6TSOC336 - Immediate
1560 - Factory Stock
DS28E15Q+UIC EEPROM 512KBIT 1WIRE 6DFN73 - Immediate
28500 - Factory Stock
DS28E25Q+UIC EEPROM 4K X 1 1WIRE 6DFN46 - Immediate
10900 - Factory Stock
DS28E15EVKIT#EVAL KIT FOR DS28E156 - Immediate
214 - Factory Stock
DS28E25EVKIT#EVAL KIT FOR DS28E254 - Immediate
266 - Factory Stock
DS28E22EVKIT#EVAL KIT FOR DS28E223 - Immediate
75 - Factory Stock
DS28EL15EVKIT#EVAL KIT FOR DS28EL153 - Immediate
319 - Factory Stock
DS28E22Q+UIC EEPROM 2K X 1 1WIRE 6DFN25 - Immediate
150 - Factory Stock
To view modules, you will need Adobe Flash Player 9, or greater, installed on your computer. Adobe Flash Player is available FREE from Adobe.

Flash Player
Flash Player Support Center
PTM Published on: 2014-08-05