| | | | | | | | | This article describes four examples of using cryptographic techniques in the design of firmware to protect a device against malicious activity. |
|
|
|
Sponsored | | During the Russian-Ukraine war, some Russian communications equipment was recovered and pictures of it posted to Twitter. It was claimed that the Crypto Ignition Key in this equipment was made by Datakey. That’s when the FBI paid a visit. |
|
|
|
| |
| | |
|
|
| | | | Sponsored | The Datakey Mini-Bar is 60% smaller than its predecessor, the Bar, yet still provides the same MIL-STD-810 environmental performance. At 21 mm x 15 mm, the Mini-Bar memory token is only slightly larger than a microSD card yet remains easy to handle. |
|
|
|
| |
| | Sponsored | It’s game time, and your design calls for a portable memory device. Customize your memory device at Datakey.com and select: Memory Technology, Capacity, Serial Interface, Form Factor, Color, Logo and Customization Options. |
|
|
|
| |
| | |
|
|
| | | | Sponsored | When security or reliability concerns preclude the use of USB flash drives or SD cards, RUGGEDrive memory tokens offer a more secure and robust solution. Eliminate USB ports or SD card slots, so uncontrolled flash drives and SD cards won’t plug in. |
|
|
|
| |
| | Sponsored | Incorporating a secure memory device into an embedded design doesn’t have to be hard. Learn how to integrate a Datakey CryptoAuthentication memory token. View product info, white paper, application note, learning lab video and more. |
|
|
|
| |
| | |
|
|
| | | | Sponsored | | Datakey is the recognized leader in Crypto Ignition Keys (CIKs). CIKs are essential in many security applications and serve as a primary way to restrict access and de-classify equipment. This paper explains how to implement a removable memory device as a CIK. |
|
|
|
Sponsored | | This paper explains wireless coexistence and shows four ways to link/pair two or more devices to prevent unintentional crosstalk. Using a portable memory device to transfer device ID information between transmitter and receiver is examined in detail. |
|
|
|
| |
| | |
|
|
| | |
|
| | |
|