Supplier eBooks

Cypress - 7 Experts on IoT Security and Privacy

Issue link: https://resources.mouser.com/i/1516458

Contents of this Issue

Navigation

Page 22 of 32

23 1. Mechanisms typically used to ensure hardware identity and authenticity include a digital signature to verify that a device code is valid, a digital certificate to verify digital communications with the device, and a MAC address that uniquely identifies that device. 2. Securing the component supply chain is a critical part of ensuring the security of the IoT devices you build. It begins with selecting a vendor; for many devices, this means working through a distributor and multiple vendors. MOHAN KULKARNI Product Manager, PMD Solutions KEY POINTS

Articles in this issue

view archives of Supplier eBooks - Cypress - 7 Experts on IoT Security and Privacy