Global Sources
EE Times-India
Stay in touch with EE Times India
 
EE Times-India > Processors/DSPs
 
 
Processors/DSPs  

Secure digital data transfer in portables, Part 3

Posted: 21 May 2009     Print Version  Bookmark and Share

Keywords:security modules  data transfer  key agreement 

Proprietary security modules are implemented on some devices for secure data transfer between compliant devices. The modules can be some or all of the modules mentioned in Part 1, such as encryption/decryption, key agreement, digital certificate or digital signature. Part 2 of this article series discusses how the security of transferred data over a network depends in the secrecy of these keys.

Proprietary technologies implemented in a device are usually kept secret to enforce additional security for data transferred between the devices. It is therefore incumbent on the device manufacturer not to disclose the proprietary technology, from or outside the device, and thereby compromising the security enforced by their usage.

The device manufacturer should find a method to store the software module in the device so that the secrecy of the technology is not compromised from the device. Code (Binary image) of these proprietary technology software modules usually will be in clear text inside the device.

View the PDF document for more information.





Comment on "Secure digital data transfer in port..."
Comments:  
*  You can enter [0] more charecters.
*Verify code:
 
 
Webinars

Seminars

Visit Asia Webinars to learn about the latest in technology and get practical design tips.

 

Go to top             Connect on Facebook      Follow us on Twitter      Follow us on Orkut

 
Back to Top