We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X
Maximize Your Experience: Reap the Personalized Advantages by Completing Your Profile to Its Fullest! Update Here
Stay in the loop with the latest from Microchip! Update your profile while you are at it. Update Here
Complete your profile to access more resources.Update Here!
0
$0.00
Item Qty
Your cart is empty.

Secure Authentication for Disposable Applications


Has your company adopted a business model to protect your disposable products from counterfeiting or copycat products? When you implement a security strategy, it is important that you identify the high-value targets in your system. While you might consider protecting the product within a cartridge, tubes, or cables and sensors, the host system may also be targeted for attacks. Depending on the threat model your company identifies, you can leverage our CryptoAuthentication™ ICs to implement several secure authentication architectures to defend your products from counterfeiting.

Free eBook Helps You Combat Counterfeit Medical Disposables


Our eBook is a complete guide to protecting your medical disposables from counterfeiters. This eBook covers everything you need to know to start using powerful CryptoAuthentication™ techniques based on our family of easy-to-use products.

Featured Products


Authentication Types


Symmetric Authentication

Our flexible CryptoAuthentication ICs can protect the symmetric keys in your host system or in the disposable itself. The SHA105 can be used on the host while the SHA104 or SHA106 can be used to protect the symmetric key on the disposable when it is paired with the SHA105 on the host system. The ATSHA204 offers more slots, allowing you to implement more use cases on the host system and disposable.

Asymmetric Authentication

Our cost-effective ECC204 or more-advanced ATECC608 devices enable you to implement Public Key Infrastructure (PKI) for asymmetric authentication with private/public key pairs and certificates. If you would like to eliminate the PCB in your disposable, consider using our three-pin and two-pin (ECC206) authentication ICs for Elliptical Curve Cryptographic (ECC). Depending on the threat model you are using, the public key can be stored in an immutable memory zone of the host system’s microcontroller (MCU) or in the ATECC608.

Adding Cloud Connectivity 


If your product requires cloud connectivity and support for additional security use cases, consider using the ATECC608 for your host system. This device has plenty of cryptographic capabilities to protect the private keys for Transport Layer Security (TLS) and Bluetooth® Low Energy (LE) sessions. It can also support secure boot, secure firmware upgrades and other symmetric or asymmetric host authentication functions to optimize the cost of your security architecture.

Cloud Connectivity in Authentication

Trust Platform Provisioning Service 


Use the Trust Platform Provisioning Service with four unique tiers of customer support and certified secure factories to leverage our pre-configured and pre-provisioned secure ICs with the most common security use cases.

The Trust Platform Design Suite (TPDS) tool includes secure IC configurators and use cases supported by code examples and tutorials to accelerate your development.

Compatible Parts


Interested in Identification?


We offer a comprehensive portfolio of memory devices that can provide product identification without security capabilities.