Device-to-Host Authentication for Counterfeit Detection
Problem: How to Stop Inferior or Illegal Products
Companies are losing revenue (and reputation) due to aftermarket and grey-market suppliers that sell compatible products for less.
Example
An IoT device OEM needs a lightweight, scalable, and cost-effective method to create a trust link between their drone and their battery, in such a way that rejects any other battery that tries to connect.
Solution: Counterfeiting Detection in the Field
- The drone verifies the identity of the battery and starts an authentication protocol
- The battery MCU regenerates its private key from its SRAM PUF
- Battery proves its identity and livelihood in a challenge-response authentication protocol
- Counterfeit or rogue batteries are not able to generate the correct private key from their SRAM and fail to prove their identity to the drone