Supplier eBooks

Analog Devices - Embedded Security: Keeping Edge Data Safe

Issue link: https://resources.mouser.com/i/1506851

Contents of this Issue

Navigation

Page 5 of 24

C h a p t e r 1 When an engineer designs a product, one of the most important considerations from a security perspective is that the product is used in the intended way. In the security world, ensuring that a device is used properly is known as secure use management—an area representing one of the major tenets of embedded security. To better illustrate the concept of secure use management, consider a surgical tool connected to and controlled by a host system during a medical procedure. For sanitary and reliability reasons, such a surgical tool may be designed to be used only a number of times (let's say 10), after which it may be unsafe to use. Hence, during the design process, an engineer needs to ensure that the tool (device) is used no more than 10 times, lest the device is compromised. This is one form of secure use management. Another form of secure use management is ensuring that a device uses real, genuine parts. A major concern here is that a device has not been assembled with counterfeit components or that the device itself is not a counterfeit product available for purchase by customers. One way of ensuring that a tool is not a counterfeit is to integrate a security solution within the device, known as secure authenticators, which contain all of the proper cryptographic keys, public and SECURE USE MANAGEMENT Gael Lemoine Lead Hardware R&D Engineer, Viasat, Inc. Devices are storing more personal and sensitive data, and this trend will continue to grow. Keeping data protected is not only an ethical responsibility, but it has become a key to success for companies that want to survive in a competitive world and retain customers' trust." 6 Embedded Security: Keeping Edge Data Safe

Articles in this issue

Links on this page

view archives of Supplier eBooks - Analog Devices - Embedded Security: Keeping Edge Data Safe