Secure Memory → Simplifying data security for OEMs.

Datakey Secure Memory line provides a range of security features, from EEPROM devices with pre-programmed, non-changeable serial numbers to those with on-board encryption, password-protected memory, mutual authentication and tamper protection circuits.

CryptoAuthentication Devices

These tokens take the security features of Microchip’s ATSHA204A and ATECC608A ICs and put them into a physically robust portable memory device.

  • Memory Capacity : 4.5 Kbit or 10.5 Kbit
  • Electrical Interface : I2C
  • Security Features : Unique serial number, password protected encrypted EEPROM, monotonic counter, random number generator, support for symmetric and asymmetric algorithms

CryptoMemory Devices

These keys and tokens take the security features of Microchip’s CryptoMemory® ICs and put them into a physically robust portable memory device.

  • Memory Capacity : 1 Kbit – 256 Kbit
  • Electrical Interface : I2C
  • Security Features : Unique serial number, password-protected encrypted EEPROM, mutual authentication between host and memory device.

Unique Identifier Devices

These keys and tokens provide 1.5Kbits of EEPROM memory along with a unique, non-changeable serial number.

  • Memory Capacity : 1.5 Kbit
  • Electrical Interface : I2C
  • Security Features : Unique serial number and optional custom OEM code for a copy-proof credential

CryptoAuthentication™ Devices

CryptoAuthentication™ memory tokens take the security features of Microchip’s ATSHA204A and ATECC608A ICs and put them into a physically robust portable memory device

Crypto Memory Line

The CryptoMemory® keys and tokens utilise Atmel’s CryptoMemory ICs.  We offer CryptoMemory keys and tokens with memory capacities from 1 Kb to 256 Kb.  When connected to an authorised host, the device and host will mutually authenticate each other.  Only after this takes place can encrypted communications occur.

More Than Just a Serial Number

Datakey Unique Identifier memory keys and tokens do contain a serial number that is guaranteed to be unique, but that’s not what makes this product unique. It is the 1.5 Kb of re-writable, non-volatile memory that make these products a much more powerful credential than read-only devices like mag-stripe cards or RFID badges.

Here are a couple of example ways to use our Unique Identifier memory devices:

  • 2-Factor ID

    Use an IIT memory token as the credential.  The serial number identifies the user and is used to encrypt the data.  The encrypted data includes a PIN that the user must enter at the device.  You must possess the token and know the password to gain access.  With the PIN stored on the device, the embedded device does not need to be constantly updated as new users are added.

  • ID with Audit Trail

    Let’s say you make a vending machine, parking meter, ticket machine or any other electronically-controlled device that collects cash.  At some point, someone must collect that cash and hopefully transfer all of it to the proper facility.  You can use an IIT token to gain access to the money.  The microcontroller validates the ID, but then also records on the token the amount of money removed.  When the deposit is made, the token is used to ensure the full amount is deposited.

CryptoAuthentication is a trademark of Microchip Technology Incorporated in the U.S.A. and other countries and is used under license

Want to find out more?

We would love to hear from you…

By submitting this form, you agree to Nexus sending you occasional details about our goods and services, and other value-added information.
For more details, please see our Privacy Notice.