Security Icon


CryptoFirewall Consumable Core

Our hardware-based Consumable core is a cost-effective and robust security solution designed to prevent counterfeiting of mass-market consumables and peripherals including mobile accessories, medical devices, printer supplies, batteries and automotive components. This tamper-resistant security core can be integrated into existing chips, or implemented as a discrete security chip on consumables for unsurpassed protection against counterfeiting.

How CryptoFirewall Consumable Core works

Using field-proven, integrated anti-tamper security technologies, the Consumable core works in conjunction with either our CryptoFirewall Verifier core or firmware to provide consumers and manufacturers assurance of authenticity.

Secure device authentication: Each consumable or peripheral contains a low-cost security chip with the Consumable core that communicates with either a CryptoFirewall Verifier core or with firmware on the system-side SoC to authenticate and verify system integrity

Secure usage authentication: The core contains usage counters with balances to authorize and track usage. Balances are decremented with each use, and once the balance reaches zero, the system no longer authenticates.

CryptoFirewall Consumable Core

Solution Offerings

Part of a complete solution to protect against a broad range of attacks including:

  • Software bug vulnerabilities
  • Reverse engineering
  • Glitching/fault induction
  • Power analysis (SPA/DPA)
  • Test/debug mode exploits
  • Protocol attacks
  • Microprobing
  • Cryptanalysis
  • Focused ion beam analysis
  • Imaging/microscopy
  • Software emulation
  • Insider attacks

Secure device authentication

Secure usage authentication

Gate-level netlist targeted to vendor-specified cell library

Full technical documentation:

  • Interface specifications
  • Integration guides
  • Validation guides
  • Manufacturing test and personalization specs

Test and Verification:

  • Verification models
  • Emulation boards
  • Functional verification tests
  • System and validation tests

Related Markets & Applications

FREE Webinar: Understanding Fault Injection Attacks and Their Mitigation