Security Icon

Security

CryptoFirewall Verifier and Consumable Core

The CryptoFirewall Verifier and Consumable cores are hardware-based security blocks designed to provide secure authentication and reduce counterfeiting business risk for mass-market consumables and peripherals. For consumable devices like printers, medical devices, batteries and automotive components where extending ‘time to clone’ is essential to business success, CryptoFirewall cores deliver robust anti-counterfeiting for revenue, safety, and brand protection.

How CryptoFirewall Verifier Core works

The Verifier core is a robust, anti-counterfeiting hardware core designed to provide authentication with the highest level of tamper resistance.

The core can be used in conjunction with the CryptoFirewall Consumable core as part of a complete consumable protection system. It integrates into the device SoC and communicates to the CryptoFirewall Consumable core to authenticate and verify system integrity of the consumable or peripheral.

The Verifier core monitors the balances of the usage counters within the Consumable core, denying authentication once the balance reaches zero.

CryptoFirewall Core
CryptoFirewall Core

How CryptoFirewall Consumable Core works

Using field-proven, integrated anti-tamper security technologies, the Consumable core works in conjunction with either the CryptoFirewall Verifier core or Verifier firmware to provide consumers and manufacturers assurance of authenticity.

Secure device authentication: Each consumable or peripheral contains a low-cost security chip with the Consumable core that communicates with either a CryptoFirewall Verifier core or with Verifier firmware on the system-side SoC to authenticate and verify system integrity.

Secure usage authentication: The core contains usage counters with balances to authorize and track usage. Balances can be securely decremented with each use, and counters cannot be reset without a strict authentication process.

Solution Offerings

Part of a complete solution to protect against a broad range of attacks including:

  • Software bug vulnerabilities
  • Reverse engineering
  • Glitching/fault induction
  • Power analysis (SPA/DPA)
  • Test/debug mode exploits
  • Protocol attacks
  • Microprobing
  • Cryptanalysis
  • Focused ion beam analysis
  • Imaging/microscopy
  • Software emulation
  • Insider attacks
 

Secure device authentication

Secure usage authentication

Gate-level netlist targeted to vendor-specified cell library

Full technical documentation:

  • Interface specifications
  • Integration guides
  • Validation guides
  • Manufacturing test and personalization specs
 

Test and Verification:

  • Verification models
  • Emulation boards
  • Functional verification tests
  • System and validation tests

FREE Webinar: Understanding Fault Injection Attacks and Their Mitigation