Product Protection & Use Security
Authentication solutions to prevent counterfeits and provide secure use-management of limited-life products.
Protecting the integrity and security of data is increasingly important in today’s world of connected devices. Ensuring that information from edge sensors is not manipulated or altered is accomplished by a portfolio of powerful products including 1-wire and DeepCover authenticators. Explore these solutions and how they can fit into your next product development.
Featured Products
Related Articles & Videos
AD3530R: 8-Channel, 16-Bit Voltage Output DACs, On-Chip Reference, SPI
The AD3530/AD3530R are low power, 8-channel, 16-bit, buffered voltage output, digital-to-analog converters (DACs) that include software-programmable gain controls that result in full-scale output spans of 2.5V or 5V for reference voltages of 2.5V.
AD8412A: −2V to 50V Wide Input Voltage Range, 1.8MHz High Bandwidth, Current-Sense Amplifier with PWM Rejection and Gain 10V/V
The AD8412A is a high-voltage, high-bandwidth current sense amplifier. The device features an initial gain of 10V/V, with a 1.8MHz bandwidth with a maximum ±0.11% gain error over the entire temperature range.
Featured
New memories breaking the gamma barrier for medical consumables
In this article from Analog Devices, learn about gamma irradiation versus alternative sterilization for medical devices, and explore solutions for overcoming previous incompatibilities by using the DS28E80 and DeepCover® secure authenticators DS28E83 and DS28E84.
3 years agoSecure authentication for medical disposables
In this article from Analog Devices, learn about the requirements for implementing a secure, low-cost method of authentication that suits both contact and contactless connections for medical consumables across the whole supply chain.
3 years agoChoosing the Right 1-Wire Master for Embedded Applications
In this article from Analog Devices, learn how to choose the right 1-wire master bus for applications where interconnect must be minimized.
3 years agoHow secure authenticators and coprocessors can simplify cryptography
In this article from Analog Devices, learn how to easily implement a secure system with secure authenticators and coprocessors.
3 years ago