skip to Main Content

Device-to-Host Authentication for Counterfeit Detection

Problem: How to Stop Inferior or Illegal Products

Companies are losing revenue (and reputation) due to aftermarket and grey-market suppliers that sell compatible products for less.

Example

An IoT device OEM needs a lightweight, scalable, and cost-effective method to create a trust link between their drone and their battery, in such a way that rejects any other battery that tries to connect.

Device-to-Host Authentication for Counterfeit Detection

Solution: Counterfeiting Detection in the Field

Use Case - Anti-Counterfeiting - Device-to-Host Authentication - Challenge-Response

  1. The drone verifies the identity of the battery and starts an authentication protocol
  2. The battery MCU regenerates its private key from its SRAM PUF
  3. Battery proves its identity and livelihood in a challenge-response authentication protocol
  4. Counterfeit or rogue batteries are not able to generate the correct private key from their SRAM and fail to prove their identity to the drone
Back To Top