Security For Android-Based Ecosystem With Mobile Storage IP


By Biswanath Tayenjam and Licinio Sousa Users are storing more sensitive data in flash memory on their mobile applications such as digital cameras, smart phones and tablets. Because of this reason, the Joint Electron Device Engineering Council (JEDEC) have developed two storage interface standards using inline encryption to secure data: embedded Multimedia Controller (eMMC) and Universal Fla... » read more

Improving Data Security


For industrial, military and a multitude of modern business applications, data security is of course incredibly important. While software based encryption often works well for consumer and some enterprise environments, in the context of the embedded systems used in industrial and military applications, something that is of a simpler nature and is intrinsically more robust is usually going to be... » read more

Ensure Robust Encryption With CAVP Validation For FIPS 140-2 Conformance


Cryptographic algorithms are mathematical procedures used to implement security protocols in today’s devices and communication infrastructure. Designers must validate their cryptographic algorithm implementations through certification by regulatory bodies, such as Communications Security Establishment Canada (CSEC) and National Institute of Standards and Technology (NIST), to ensure accuracy ... » read more

OTP Memory For Mobile Payment Applications


The trend toward mobile banking and payments as a way to replace debit or credit cards, or integrate a part of their functions into a mobile device, is moving faster than most industry analysts predicted. In China, for example, mobile payment systems Alipay and WeChat pay are popular and well used, and a great way for easy account monitoring and ditching the wallet. It is a fundamental change t... » read more

One-Time-Programmable Memories For IoT Security


Security in the IoT space is an issue of major concern. Hackers are attacking IoT devices across all layers of the infrastructure, from the application layer down to protocol, to the physical and deep into the IoT devices. I intend to focus on vulnerability prevention for IoT devices at the lowest level: memory structure and key storage. I conclude with indicating highly important features a... » read more

Security Improvements Ahead


After nearly two years of talking about how security is one of the biggest problems facing the IoE, progress is being made on a number of fronts. The changes involve many companies, both individually and collaboratively through standards groups. And while none of this will stop the kind of high-profile breaches that affected Target or Home Depot or JPMorgan Chase or a long list of other gian... » read more

The Real Value In Customizing Instructions


One element that distinguishes devices for the emerging IoT market from the mobile devices of the mature handheld market is power. Specifically, while the latter can accept a battery recharge cycle of days, the former demands years between battery recharge/replacement. Where the two devices resemble one another is their need for high performance. While embedded CPU cores have concentrated o... » read more

More Data, Different Approaches


Scaling, rising complexity, and integration are all contributing to an explosion in data, from initial design to physical layout to verification and into the manufacturing phase. Now the question is what to do with all of that data. For SoC designs, that data is critical for identifying real and potential problems. It also allows verification engineers working the back end of the design flow... » read more

Wireless Technologies For The IoE


It's generally understood the [getkc id="76" kc_name="Internet of Everything"] eventually will be the interconnect platform of all things, wireless and wireline. The utopian scenario is to have a common platform, with standardized protocols, which everyone builds to. Will that happen? Perhaps, but for a time, especially while the IoE evolves, that won’t be the case. Count on the early IoE bei... » read more

Blog Review: July 9


Cadence’s Richard Goering walks through a keynote speech from DAC, which was delivered by Imagination Technologies’ Peter McGuinness, about the evolving role of image processing and what it can do. There are lots of changes ahead in this space. Who’s financing the Internet of Things and what are they funding? ARM’s Brad Nemire takes a look at oort, a Bluetooth hub that looks like a ... » read more

← Older posts Newer posts →