Nexus Logo industrial memory 180px tall

THE SAFE CHOICE FOR
INDUSTRIAL MEMORY AND DATA SECURITY

Search
Close this search box.

Secure Memory

SECURE DIGITAL MEMORY→ ENCRYPTED MEMORY

Simplifying data security for OEMs.

Datakey’s Secure Memory line provides a range of security features, from EEPROM devices with pre-programmed, non-changeable serial numbers to those with on-board encrypted memory, password-protected memory, mutual authentication and tamper protection circuits.

These tokens take the security features of Microchip’s ATSHA204A and ATECC608A ICs and put them into a physically robust portable memory device.

These keys and tokens take the security features of Microchip’s CryptoMemory® ICs and put them into a physically robust portable memory device.

These keys and tokens provide 1.5Kbits of EEPROM memory along with a unique, non-changeable serial number.

CryptoAuthentication™ memory tokens take the security features of Microchip’s ATSHA204A and ATECC608A ICs and put them into a physically robust portable memory device

The CryptoMemory® keys and tokens utilise Atmel’s CryptoMemory ICs.  We offer CryptoMemory keys and tokens with memory capacities from 1 Kb to 256 Kb.  When connected to an authorised host, the device and host will mutually authenticate each other.  Only after this takes place can encrypted communications occur.

Datakey Unique Identifier memory keys and tokens do contain a serial number that is guaranteed to be unique, but that’s not what makes this product unique. It is the 1.5 Kb of re-writable, non-volatile memory that make these products a much more powerful credential than read-only devices like mag-stripe cards or RFID badges.

Here are a couple of example ways to use our Unique Identifier memory devices:

2-Factor ID

Use an IIT memory token as the credential. The serial number identifies the user and is used to encrypt the data. The encrypted data includes a PIN that the user must enter at the device. You must possess the token and know the password to gain access. With the PIN stored on the device, the embedded device does not need to be constantly updated as new users are added.

ID with Audit Trail

Let’s say you make a vending machine, parking meter, ticket machine or any other electronically-controlled device that collects cash. At some point, someone must collect that cash and hopefully transfer all of it to the proper facility. You can use an IIT token to gain access to the money. The microcontroller validates the ID, but then also records on the token the amount of money removed. When the deposit is made, the token is used to ensure the full amount is deposited.

CryptoAuthentication is a trademark of Microchip Technology Incorporated in the U.S.A. and other countries and is used under license

Want to find out more?

We would love to hear from you…

Request for Brochure

"*" indicates required fields

Name*

By submitting this form, you agree to Nexus sending you occasional details about our goods and services, and other value-added information.
For more details, please see our Privacy Notice.