Memory keys and plugs for OEMs
23 October 2019
DSP, Micros & Memory
Datakey’s family of Secure Memory devices includes the Slimline token series, as well as series of plugs and keys. The devices contain a serial number that is guaranteed to be unique, as well as 1,5 Kb of rewritable, non-volatile memory that makes these products a much more powerful credential than read-only devices like mag-stripe cards or RFID badges. Two typical use cases include 2-factor identification and identification with an audit trail.
 Secure Memory is ideal for credentials, storing serial number plus audit trail and PIN/password or biometric information. An IIT memory token can be used as the credential, where the serial number identifies the user and is used to encrypt the data. The encrypted data includes a PIN that the user must enter at the device. You must possess the token and know the password to gain access. With the PIN stored on the device, the embedded device does not need to be constantly updated as new users are added.
 As another application example, consider a vending machine, parking meter, ticket machine or any other electronically-controlled device that collects cash. At some point, someone must collect that cash and hopefully transfer all of it to the proper facility. You can use an IIT token to gain access to the money. The microcontroller validates the ID, and then also records on the token the amount of money removed. When the deposit is made, the token is used to ensure the full amount is deposited.
	
 
Further reading:
Memory for asset tracking
 Altron Arrow
 DSP, Micros & Memory
The Page EEPROM, ST’s latest memory, has been designed for efficient datalogging and fast firmware upload/download in battery-operated devices.
Read more...
Engineered for high-reliability applications
 Future Electronics
 DSP, Micros & Memory
The MCX E series of Arm Cortex-M4F and Arm Cortex-M7 microcontrollers from NXP are engineered for demanding industrial and IoT environments.
Read more...
NXP’s development platform guide
 DSP, Micros & Memory
Choosing between the FRDM i.MX 93, FRDM i.MX 91 and FRDM i.MX 91S development platforms can be intimidating, but once designers understand how each platform aligns with their application’s requirements, the decision becomes straightforward.
Read more...
XJTAG launches two new Flash programmers
 ASIC Design Services
 DSP, Micros & Memory
XJTAG has announced XJExpress and XJExpress-FPGA, a pair of Flash programmers perfect for development, debug and in-service applications.
Read more...
Processor offers competitive solution for advanced HMIs
 Future Electronics
 DSP, Micros & Memory
The new RZ/A3M microprocessor from Renesas features 128 Mbytes of fast DDR3L DRAM memory for system cost reduction, and supports 
1280 x 800 px video resolution at a rate of 30 frames/s.
Read more...
ESP32-C6 achieves PSA-L2
 iCorp Technologies
 DSP, Micros & Memory
Espressif Systems recently announced that its ESP32-C6 microcontroller has achieved PSA Certified Level 2 (PSA-L2) security certification, making it the first RISC-V-based MCU to reach this level.
Read more...
Microprocessor with integrated NPU
 Avnet Silica
 DSP, Micros & Memory
The RZ/G3E from Renesas is a microprocessor integrated with quad CPU and NPU in one chip, improving power efficiency, reliability, and security.
Read more...
Nordic Semiconductor launches nRF Connect SDK Bare Metal option for nRF54L series
 Avnet Silica
 DSP, Micros & Memory
This is a new, RTOS-independent software solution for Bluetooth LE development, designed to ease developers’ migration from the legacy nRF5 SDK and nRF52 series to the next-generation nRF54L series.
Read more...
Dual-core support in NECTO Studio
 DSP, Micros & Memory
MIKROE recently announced that version 7.3.0 of its NECTO Studio Integrated Development Environment now supports dual-core MCUs, allowing designers to program and debug each core independently.
Read more...
Post Quantum Cryptographic firmware library
 DSP, Micros & Memory
The STM32 post-quantum cryptographic library enables developers to satisfy application requirements for any combination of data integrity, confidentiality, identification/authentication, and nonrepudiation.
Read more...