artem
Advanced Member level 4
emule ds1961s
The idea is very simple use some volatile memory with low power consumption (coudl be external RAM or mcu internal ram for power down mode) and make protective tamper detection circuits . When anyone try to open the case the content of ram is to be destroyed either by power off. RAM should contain information the design is to be authenticated to before starting execution .
RAM could be preloaded with secret communication program to load encryption key
after device assembling.
Due to low power consumption it is possible to use litium battery for backup purposes .
The key be used for encryption of configuration memory . Each product configuration must be encrypted by using key in the ram . Or if your micro supports code in ram you can decrypt software on fly each time start up is happened. Each device must be encoded with its unique encryption key .
The idea is very simple use some volatile memory with low power consumption (coudl be external RAM or mcu internal ram for power down mode) and make protective tamper detection circuits . When anyone try to open the case the content of ram is to be destroyed either by power off. RAM should contain information the design is to be authenticated to before starting execution .
RAM could be preloaded with secret communication program to load encryption key
after device assembling.
Due to low power consumption it is possible to use litium battery for backup purposes .
The key be used for encryption of configuration memory . Each product configuration must be encrypted by using key in the ram . Or if your micro supports code in ram you can decrypt software on fly each time start up is happened. Each device must be encoded with its unique encryption key .